text
stringlengths
176
646k
id
stringlengths
47
47
dump
stringclasses
8 values
url
stringlengths
14
2.25k
file_path
stringlengths
125
141
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
236k
score
float64
2.52
5.13
int_score
int64
3
5
As the United States continues to grapple with long-term storage of highly radioactive spent fuel from the nation's nuclear power plants, science watchdogs are warning of serious flaws with the current storage method, which involves densely packing the combustible spent fuel assemblies under at least 20 feet of water in pools located at individual plants while awaiting creation of a permanent repository. The warning came in the May 26 issue of the journal Science, in a policy forum article titled "Nuclear safety regulation in the post-Fukushima era: Flawed analyses underlie lax U.S. regulation of spent fuel." The authors are physicists Edwin Lyman of the Union of Concerned Scientists' Global Security Program and Michael Schoeppner and Frank von Hippel of Princeton University's Program on Science and Global Security. Following the 2011 disaster at Japan's Fukushima Daiichi nuclear power plant, the U.S. Nuclear Regulatory Commission (NRC) ordered a comprehensive review of regulations. While the buildings that housed the Fukushima plant's spent fuel pools were destroyed, the spent fuel fortunately remained covered with enough water to keep the metal cladding that encloses the uranium from catching fire. Scientists working for the NRC estimated that a fire in one of the plant's pools would have dramatically increased the amount of radioactive pollution released and could have led to the forced long-term relocation of between 1.6 million and 35 million people from Japan's East Coast rather than 150,000. The NRC adopted a number of safety upgrades after the Fukushima disaster but rejected a measure to end dense packing of the 90 spent fuel pools located at nuclear plants across the U.S. — a technique utilities use to reduce storage costs. But the authors say the screening process failed to adequately account for the impacts of "large-scale land contamination events" from spent fuel pool fires. The NRC's own technical evaluation estimated that a fire in a densely packed spent fuel pool at the Peach Bottom plant in Pennsylvania just north of the Maryland border would require the evacuation of 4.1 million people from an area of over 9,400 square miles. "Unless the NRC improves its approach to assessing risks and benefits of safety improvements — by using more realistic parameters in its quantitative assessments and also taking into account societal impacts — the United States will remain needlessly vulnerable to such disasters," the authors warned. According to a 2012 Congressional Research Service report, two of the five states with the largest amount of spent nuclear fuel stored in wet pools are in the South — North Carolina and Alabama. The others are Illinois, Pennsylvania and New York. More realistic assessments needed Under the NRC's current rules (which the authors point out are self-imposed), the potential backfit for the storage problem — moving the spent fuel from the pools to air-cooled dry storage casks after a few years — could be adopted only if 1) the monetary value of the resulting public risk reduction were to exceed the cost of implementation and 2) the increase in safety were "substantial." The estimated cost of transferring the spent fuel to dry cask storage is $5 billion, about $50 million for each of the nation's 100 reactors. The NRC's analysis assumed the chance of a fire resulting in a large release of radioactive pollution would be small, though with considerable uncertainty. Its risk analysis also failed to account for a possible terrorist attack and made other assumptions that minimized the estimated health and economic consequences of a high-density fuel pool fire. For example, it ignored accident consequences beyond 50 miles and assumed radiation dose standards for population relocation that were less restrictive than those recommended by the Environmental Protection Agency. In addition, the NRC overlooked the societal risks of accidents such as the psychological trauma of mass relocation. "In our view, if the NRC were to use more realistic quantitative assessments and give weight to societal impacts, a requirement to expedite transfer of spent fuel to dry casks would be justified," the authors wrote. They are calling on Congress to allocate the $5 billion needed for the dry storage casks. They also note that states can take action to reduce risk. For example, New York and Illinois recently approved subsidies for continued operation of nuclear reactors that could add conditions requiring utilities to end dense packing of spent fuel pools. The renewed concerns about spent nuclear fuel storage come as the Trump administration is trying to jumpstart the controversial effort to create a permanent repository for the waste at the Yucca Mountain site in Nevada, which is opposed by that state's entire congressional delegation as well as by environmental advocates and nearby Native American communities. Back in March, the administration requested $120 million to restart the stalled approval process. That same month, Energy Secretary Rick Perry toured the Yucca Mountain site, just weeks after his home state of Texas filed a lawsuit against the federal government charging that it has failed to follow the law by providing a permanent disposal site for nuclear waste. While Congress approved the Yucca Mountain site in 2002, the Obama administration cut off funding in 2011 amid growing concerns including the site's suitability and transportation risks.
<urn:uuid:4e89d3d5-c705-46b8-a682-4b22b27350ac>
CC-MAIN-2022-33
https://www.facingsouth.org/2017/06/nuclear-regulators-flawed-analysis-leaves-millions-risk-radioactive-fires
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00688.warc.gz
en
0.949629
1,022
3.25
3
ḴᵛĀNSĀLĀR, title by which the supervisor and other workers of the kitchen department of the royal palace were known in the Ghaznavid and Saljuq periods (Bayḥaqi, p. 502; ʿOnṣor-al-Maʾāli, p. 66; ʿAbd-al-Wāseʿ Jalabi, II, p. 750). The title also occurred as salār-e ḵᵛān in Ferdowi’s Šāh-nāma and Ḵāqāni’s poems (Dehḵodā, s.v.). It was a very important function as indicated by the high level of expenditure in the kitchen department of the caliphs of Baghdad (Mez, p. 142). It is not known who was in charge of the royal kitchen from the Mongol until the Safavid period. Under the Mongols, there were three bokāvols (food servers, food tasters) and bāvorčis (cooks) who alternated serving lunch and dinner for the ruler (Spuler, p. 227; Doerfer, I, pp. 202-5, II, pp. 301-7). Under Timur, the bokāvol-e laškar was an administrative military officer who was in charge of equipment given to the soldiers and of maintaining and transmitting orders. He was also in charge of providing food at the madrasas as well as in the army. The bāvorči or cook was a less important office and there were fewer in number than bokāvols, nevertheless the function was also held by amirs, one of whom was close to the ruler (Manz, p. 172; Naḵjavāni, I, p. 48, II, pp. 53-56). Under the Timurids, Āq Qoyunlu, and early Safavids the bokāvol was still in charge of distributing food in madrasas. At court, bokāvols were ranked just below amirs and were in charge of order among the troops, marshalling them in battle order, and supplying amirs with their financial needs (Roemer, pp. 155-57; Ḵonji, p. 28, 80-81; Eskandar Beg, I p. 141; Doerfer, II, pp. 301-7), but their function as the shah’s butler and food taster (čāšnigir) was stressed. Although bokāvols or tasters as well as bāvorčis are also found at court during the early Safavid period (Bodāq Qazvini, p. 136; Waḥid-al-Zamān Qazvini, pp. 67, 108; Jonābādi, p. 555; Ḵoršā, pp. 335, 342), the superintendent of the royal kitchen during the 17th century had the title tušmāl-bāši, and he was referred to as moqarrab al-ḵāqān, indicating that he was one of the highest courtiers. He was in charge of the entire food preparation infrastructure of the royal household and responsible for the preparation and serving of food, whether at the palace or for the Shah’s traveling contingent. He was assisted by a mošref and a ṣāḥeb-jamʿ (Afšār, ed., p. 411; Mirzā Rafiʿā, p. 319, tr. p. 163; Mirzā Samiʿā, p. 89, commentary, p. 137; Richard, ed., II, pp. 15, 274; Chardin, V, p. 349; Tavernier, p. 225; Gemelli-Carreri, II, p. 381; Waḥid-al-Zamān Qazvini, pp. 205-6, 208, 213, 230, 235, 315, 320; Doerfer, I, pp. 269-71). Besides supervising cooks (āšpaz, bāvor, ḵᵛānsalār) the tušmāl probably also had some control over other food departments in the palace, such as the bakery, butchery, and fruits departments (Mirzā Rafiʿā, p. 319, tr. p. 163; Mirzā Samiʿā, pp. 89, commentary, p. 137; Wāleh Qazvini, pp. 294, 374, 420; Eskandar Beg, II, p. 775). In Qājār times, the royal kitchen department was known as ḵᵛānsalāri and āšpaz-ḵāna, and its head as ḵᵛānsalār. It was one of the most important departments of the court and, as in Safavid times, under the supervision of the nāẓer and, after about 1880, under the court minister (wazir-e darbār; Eʿtemād-al-Salṭana, I, pp. 385-86). Besides preparing the shah’s meals, this department was also in charge of providing lunch, dinner, and refreshments for the ladies of the royal harem. The šarbat-ḵāna was a subdivision of the royal kitchen, which prepared snacks (ḥāżeri) to be served with refreshments, as well as the bakery and the pantry (ābdār-ḵāna; qaḥwa-ḵāna). ʿAbd-al-Wāseʿ Jalabi, Divān, ed. Ḏabiḥ-Allāh Ṣafā, 2 vols., Tehran, 1960-62. Iraj Afšār, ed., ʿĀlamārā-ye Šāh Ṭahmāsb: zendagi-e dāstāni-e dovvomin pādšāh-e Ṣafawi, Tehran, 1991. Abu’l-Fażl Moḥammad Bayhaqi, Tāriḵ-e Bayhaqi, ed. Qāsem Ḡani and ʿAli-Akbar Fayyāż, Tehran, 1943. Budāq Monši Qazvini, Jawāher al-aḵbār: baḵš-e tāriḵ-e Irān az Qara Qoyunlu tā sāl-e 986 h.q., ed. Moḥammad-Reżā Naṣiri and Koichi Haneda, Tokyo, 1999. Jean Chardin, Voyages du Chavalier Chardin, en Perse, et autres lieux de l’Orient, ed. L. Langlès, 10 vols., Paris, 1811. Gerhard Doerfer, Türkische und mongolische Elemente in Neupersischen, 4 vols., Wiesbaden, 1963-75. Eskandar Beg Torkamān Monši, Tāriḵ-e ʿālamārā-ye ʿabbāsi, ed., Iraj Afšār, Tehran, 1955-56; tr. Roger Savory as History of Shah ʿAbbās the Great, 3 vol., Boulder, 1979-86. Mirzā Ḥasan Fasāʾi, Fārs-nāma-ye nāṣeri, ed. Manṣur Rastgār Fasāʾi, 2 vols., Tehran, 1988, I, p. 742. Moḥammad-Ḥasan Khan ʿEtemād-al-Salṭana, al-Maʾāṯer wa’l-āṯār, ed. Iraj Afšār with commentary by Ḥosayn Maḥbubi Ardakāni as Čehel sāl tāriḵ-e Irān dar dawra-ye pādšāhi-e Nāṣer-al-Din Šāh, 3 vols., Tehran, 1984-89. Giovanni Francesco Gemelli Carreri, Voyage du tour du monde, 6 vols., Paris, 1727. Mirzā Beyg b. Ḥasan Jonābādi, Rawżat al-Ṣafawiya, ed. Ḡolām-Reżā Ṭabāṭabāʾi Majd, Tehran, 1999. Fażl-Allāh Ruzbehān Ḵonji, Tāriḵ-e ʿālamārā-ye amini, ed. John E. Woods, London, 1992. Ḵoršāh b. Qobād Ḥosayni, Tāriḵ-e ilči-e Neẓām Šāh (Tāriḵ-e Ṣafawiya az āḡāz tā sāl-e 972 hejri qamari), ed. Moḥammad-Reżā Naṣiri and Kuʾiči Hānedā [Koichi Haneda], Tehran, 2000. Beatrice Forbes Manz, The Rize and Rule of Tamerlane, Cambridge and New York, 1989. Adam Mez, Die Renaissance des Islams, Heidelberg, 1922; tr. Salahuddin Khuda Bakhsh and David Samuel Margoliouth as The Renaissance of Islam, London, 1937. ʿAbd-Allāh Mostawfi, Šarḥ-e zendegāni-e man yā tāriḵ-e ejtemāʿi wa edāri-e dawraye Qājāriya, Tehran, 1964, I, p. 402-3. Moḥammad b. Hendušāh Naḵjavāni, Dastur al-Kāteb fi taʿyin al-marāteb, ed. ʿAbd-al-Karim ʿAli-oḡli ʿAlizāda, 2 vols. in 3, Moscow, 1964-76. ʿOnṣor-al-Maʿāli Kaykāvus b. Eskandar, Qābus-nāma, ed. Gōlām-Ḥosayn Yusofi, Tehran, 1973; tr. Reuben Levy as A Mirror for Princes: The Qābus Nāma, London, 1951. Jahāngir Qāʾem-maqāmi, ed., Nāmahā-ye Pārākanda-ye Qāʾem-maqām Farāhāni, 2 vols., Tehran, 1978, I, p. 391. Mirzā Rafiʿā Moḥammad-Rafiʿ Anṣāri, Dastur al-moluk, ed. Moḥammad-Taqi Dānešpažuh, in MDAT 16, 1968-69, pp. 62-93, 298-322, 416-40, 540-64; tr. with commentary Willem Floor and Mohammad Hassan Faghfoory as Dastur al-Moluk: A Safavid State Manual, Costa Mesa, 2007. Francis Richard, ed., Raphael du Mans, missionnaire en Perse au XVIIème siècle, 2 vols., Paris 1995. Hans R. Roemer, Staatsschreiben der Timuridenzeit: Das Šaraf-nāmä des ʿAbdallāh Marwārīd in kritischer Auswertung, Akademie der Wissenschaften und der Literatur Mainz, Veröffenlichungen der Orientalischen Kommission 3, Wiesbaden, 1952. Ruz-nāma-ye Irān, repr. in 5 vols., Tehran, 1997, IV, p. 3303. Mirzā Samiʿā, Taḏkerat al-moluk, facs. ed. and tr. V. Minorsky as Tadhkirat al-mulūk: A Manual of Safavid Administration(ca. 1137/1725), London, 1943. Bertold Spuler, Die Mongolen in Iran: Politik, Verwaltung und Kultur der Ilchanzeit 1220-1350, Leipzig, 1955. Jean-Baptiste Tavernier, Voyage en Perse, Paris, 1930. Mir Moḥammad-Ṭāher Waḥid-al-Zamān Qazvini, Tāriḵ-e jahānārā-ye ʿabbāsi, ed. Eḥsān Ešrāqi, Tehran, 2005. Yusof Wāleh Qazvini Eṣfahāni, Ḵold-e barin: Irān dar zamān-e Šāh Ṣafi wa Šāh ʿAbbās-e dovvom, 1030-1071 h.q., ed. Moḥammad-Reżā Naṣiri, Tehran, 2001. July 20, 2009 Originally Published: July 20, 2009 Last Updated: July 20, 2009
<urn:uuid:a0cb6c6b-7985-491c-b8ae-6db8d32f3434>
CC-MAIN-2022-33
https://www.iranicaonline.org/articles/kansalar-title-kitchen-department
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00688.warc.gz
en
0.764312
3,072
2.703125
3
What do we do all day? We have been fascinated by the stark contrast in the culture between Japan, France, and any other place we have ever lived or visited. As a group, we’ve constructed a long list of quirks, rituals, oddities and cultural differences since our arrival, from the obvious to the subtle. (More on that later from the kidoos) Here is the starting point for this section, which will overlay our entire journey. The teacher constructed a large matrix of categories of culture, in which the kids observe and categorize their findings. This will provide the framework for comparing and contrasting the variation across the destinations we inhabit. From food, religion, music, manners…the list is daunting. And fun. The object is to photograph, or video, or write about, or speak to these differences, and ask why?And how? And what they mean. And importantly, what’s the best parts…perhaps the shortcomings…the meanings…and how they themselves relate to other cultures. How might others observe us? Finally, how do each of us fit in, and relate to one another in the larger context of this world, seemingly so big…yet so small? Let me finish by noting, like as not, the kids and we adults are acutely aware of the fact that we wear the “Trump banner.” Interesting times and questions arise from everywhere we go. Often people ask, “Hmmm…No buses, no gym, no assembly or home room, one teacher, three grade levels…What do you actually DO each day?” We don’t really have Sundays or Mondays, or Tuesday…or Fridays. So far, we mostly have action filled and eventful “UN-days”. The kids don’t really know what day it is, and “class” is in session for much of every single day. Much of the process and practices unfold by location, available possibilities and interests. (More on this in a guest post by Professor Gugick later) But suffice to say, after the basic R,R,Rs, the structure of teaching is dictated by the nature and interests of the students themselves. It’s early in the process, but so far the natural flow and attraction of a pliable format seems to have really captured their imagination. The daily notes for each child are recorded by the teacher upon that days completion. In the example here, on 8/23/2017: - Classical music, which is a video containing music behind a science theory - Game Theory - A paper airplane contest - A nature hike identifying 15 Balinese plant species - City research on our next destination, Ubud, to identify attractions we might visit. Each child must argue for in presentation format, why mom and dad should choose their activity. - Algebra: Literal equations - 30 minute reading break - Study of rice cultivation - Each child must create, draw or find on-line, four icons that represent each of their personalities for business cards that each child will need as a cultural requirement in Japan. Afterwards, PE choices of soccer on the beach, rice patty or jungle hikes, or swimming are the physical activities. We eat breakfast and lunch together, but often dinner apart. So far, a “typical” day. Finally, as a matter of practice, we intend to examine what we’ve learned in big picture from our stays. As we leave our current location tomorrow, we have three discussion and writing topics from which each child must choose two about which to think, and write an essay. These topics below are their choices dictated from our first stop: - Social Studies: Are the Balinese people poor? Are they happy? - Science: Why do the beaches have black sand? - Introspection: How does the Chinese tea ceremony we participated in a few days ago reflected in and pertain to how you live your life? How would you make changes based upon what you learned? Lather. Rinse. Repeat. Oh…and use sunscreen. So, we were in the process of applying to a school, and were typically uncertain as to our future location vis-a-vis it’s overlap with work projects in Asia and Africa. Well, here’s the genesis of the journey, to the day, in the form of an email I sent to Arthur Gugick, a friend, former Penn classmate and teacher extraordinaire teaching in Ohio. “Arturo. Bonjour and i hope this finds you well.I have a wild question out of the blue. Due to some work demands, Stacia and i are considering taking the next year off and homeschooling our 3 kids. They will be in 2nd, 6th and 8th grade. Here’s the thing. If we do this it will be in Asia and Africa. A wild in region learning experience. Part history. Part science, math and so forth in different countries but based in say Japan or HK for 6 months and Zambia for example (not set in stone) but traveling out of base to Laos, Vietnam, China, Uganda, Tanzania etc. A weird world school in essence. We have contacts all over that could make it incredible. Chimp sanctuary in Uganda, bamboo bike builders in Zambia, robots in China, etc. etc. You get the idea of how amazing it could be. Its kinda the last chance year we could ever do it. My kids are really good folks and pretty worldly. We’ll set up sport and physical activity etc. in each place. So…here’s the question…What we need to find is one great teacher in math and English that can design and execute an accelerated disciplined and documented curriculum and who is willing to travel for a year with our family. I think for the right person its the adventure of a lifetime. The program itself, in my opinion, can be remarkable with the right fit.Question. How/where do i search for teacher availability for such a teaching job? I need one great educator that has vision, energy and cahones. I am searching for the perfect match. Thoughts?Merci. Gracias. GrazieAnd here was his reply… On Feb 9, 2017 06:18, <email@example.com> wrote:MikeI know the perfect person for you.He started his career working at a K-4 Montessori elementary school (4 years) so he has experience working with younger children. The Montessori paradigm is one of individual curricula dependent upon a student’s personal needs and strengths. I know he took these ideas when he raised his own children. He taught both his children to read by age four. (one is an honors OSU student and the other is a gifted musician heading off to CIM)He has worked in Middle schools (6 years), and in High schools (14 years). Perfect for your children: He’ll know what’s appropriate for their age and has the knowledge to push them to beyond their potentials. And although he’s taught mostly mathematics, he has also taught Computer Science, middle school science, high school astronomy and physics, reading, writing, and everything in between.Great sense of humor. Strong family values. Excellent resume. Amazing references. Vision, energy, and, yes, cahones. And as a bonus: he’s a Lego master.Lets talk more about this.ArthurHe had me at Lego master…And so it was.
<urn:uuid:cf01d2b1-00ea-4036-af95-9262420e5122>
CC-MAIN-2022-33
http://sixoffpiste.com/tag/arthur-gugick/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.957321
1,596
2.734375
3
STUART, CHARLES, soldier, magistrate, and pamphleteer; b. 1783 in Jamaica, of Scottish parents; d. 26 May 1865 at Lora Bay, Collingwood Township, Canada West. Charles Stuart was educated in Belfast, Ireland, and at age 18 received a commission in the military service of the East India Company. He rose to the rank of captain of the 1st battalion of the 27th Regiment, but resigned in 1815, likely because of his superior officers’ uneasiness about his uncompromising position on numerous social and military matters. Stuart’s parents were Presbyterians of an extreme Calvinistic type and they deeply influenced his character. In 1817, seeking a new life, Stuart immigrated to Upper Canada, and settled in Amherstburg. He corresponded regularly with Lieutenant Governor Sir Peregrine Maitland*, offering advice on how to govern the province better and expressing a desire to be ordained in the Church of England. By the fall of 1819, however, he was in England where he published The emigrant’s guide to Upper Canada, a strange mixture of geography, politics, and moral sermonizing, which Edward Allen Talbot* said should be more aptly titled “The Pilgrim’s Guide to the Celestial Regions.” Talbot felt the book provided some useful information about Upper Canada, but that it also contained “a confused medley of polemical theology, whining cant and complimentary bombast. . . .” Returning to Amherstburg in 1820 Stuart renewed his efforts to uplift the moral life of the colony through his new position as magistrate. His religious eccentricities and a propensity to meddle in the personal affairs of others led him into a heated clash with the officers of the Fort Malden garrison concerning the extent of his jurisdiction over soldiers charged with civil offences. Calm was restored only when he resigned as magistrate in 1821. Stuart eventually found an outlet for his religious and humanitarian zeal among the black refugees who were beginning to enter the area from the United States. He set up a small black colony near Amherstburg and helped the refugees establish themselves as farmers; he was described by the British physician John Jeremiah Bigsby* as “a working Christian . . . waging successful war with the Negro slavery of the United States.” In 1822 he moved on to a new challenge as principal of Utica Academy in New York State. Here he began his life-long friendship with 15-year-old Theodore Dwight Weld who was to become one of the leading figures in the anti-slavery cause. During the late 1820s the two men were converted by revivalist Charles Grandison Finney; they joined his “Holy Band” and toured the country preaching and exhorting. In 1829 Stuart returned to England and enlisted as an agent and pamphleteer for the growing Anti-Slavery Society of the United Kingdom; he lectured incessantly and wrote some of the finest anti-slavery pamphlets of the time. English abolitionists described him as “a persevering, uncompromising friend of the cause.” In his pamphlets Stuart attacked the American Colonization Society which was encouraging the settlement of black fugitives on the West African coast, and he presented as an alternative the Wilberforce colony near London, Upper Canada. If blacks were leaving the United States, he urged them to enjoy the hospitable setting in Canada. Stuart’s writings influenced the growth in the 1820s and early 1830s of the anti-slavery movement in the United States, and in 1834 he moved there to work again with Weld. During lecture tours in Vermont, New York, and Ohio, he was frequently the object of mob violence. A return to England in 1837 lengthened into 13 years of residence broken only by visits to the West Indies to view the results of emancipation achieved by anti-slavery forces in 1833. Stuart remained active in anti-slavery circles and in 1846–47 worked also on famine relief for Ireland. In 1840 he had been made an honorary life member of the British and Foreign Anti-Slavery Society; he also received a promotion from the rank of retired captain to retired major and an increase in his $800 annual pension. Back in Canada in 1850, he assisted in the formation of the Anti-Slavery Society of Canada at Toronto in February 1851, serving as its first corresponding secretary and assisting the society through his connections with abolitionists such as John Scoble in England and Lewis Tappan in the United States. However, he served for only one year before moving into semi-retirement with his new bride, a distant relative, at Lora Bay in Collingwood Township. Over the next ten years he attended a few abolitionist conventions in the United States and in 1855 and 1858 he met with John Brown, who led the abolitionist attack on Harper’s Ferry, Virginia, in 1859. However, more and more he concentrated on church work and the temperance cause in his own community near Thornbury, Canada West. By the end of the 1850s his work as an international abolitionist was over, although he continued to correspond with those active in the movement. The first half of the 19th century saw a surge of interest in humanitarian projects throughout the English speaking world and although one could hardly expect the struggling pioneer settlers in Upper Canada to display a lively interest in such ventures, humanitarian impulses were not lacking. The outlet for these impulses was quite often to be found in societies to aid escaped slaves and other black immigrants. These Canadian societies were nurtured by the writings and speeches of abolitionists in the United States and England and in fact they were part of an international philanthropic movement, of which Charles Stuart was a tireless crusader. Charles Stuart was the author of The emigrant’s guide to Upper Canada; or, sketches of the present state of that province, collected from a residence therein during the years 1817, 1818, 1819, interspersed with reflections (London, 1820); Is slavery defensible from Scripture? To the Rev. Dr. Hincks, Killileagh (Belfast, 1831); Remarks on the colony of Liberia and the American Colonization Society, with some account of the settlement of coloured people at Wilberforce, Upper Canada (London, 1832); and The West India question . . . (London, 1832; repr. New Haven, Conn., 1833). William L. Clements Library, University of Michigan (Ann Arbor), Weld-Grimké papers. J. J. Bigsby, The shoe and canoe, or, pictures of travel in the Canadas . . . with facts and opinions on emigration, state policy, and other points of public interest (2v., London, 1850), I, 263–66. Globe, 9 June 1865. Letters of Theodore Dwight Weld, Angelina Grimké Weld and Sarah Grimké, 1822–1844, ed. G. H. Barnes and D. L. Dumond (2v., New York, 1934; repr. Gloucester, Mass., 1965), II, 589. D. G. Simpson, “Negroes in Ontario from early times to 1870” (2v., unpublished phd thesis, University of Western Ontario, London, Ont., 1971). Fred Landon, “Captain Charles Stuart, abolitionist,” Western Ontario History Nuggets (London, Ont.), 24 (1956), 1–19.
<urn:uuid:eb797829-59b5-49e1-9c6c-de8ee1deca14>
CC-MAIN-2022-33
http://www.biographi.ca/en/bio/stuart_charles_9F.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.970329
1,570
3
3
What can giant computing systems do for you? Updated: 2012-10-07 07:53 Why do we need supercomputers? First, weather forecasting: Supercomputers can simulate the movement of airflows and ocean currents, enabling scientists to make accurate predictions about the weather, which can decrease the damage wrought by nature disasters. Second, earthquake warnings: Researchers need supercomputers to simulate the movements of the Earth's lithosphere so they can predict earthquakes. Third, genomics and bioscience: Supercomputers are needed to perform the large number of calculations involved in genomics and biomedicine. Fourth, physical geography: Scientists need supercomputers to create simulations involving physical geography, for example, those used in oil exploration. Fifth, astrophysics: Supercomputers are essential in astrophysics, where they are used to simulate the interactions and behavior of celestial objects including galaxies, stars and planets. Sixth, automobile design: Supercomputers can cope with all the calculations involved in automobile design, including fluid mechanics, fuel consumption, aerodynamics and impact resistance. Seventh, new materials: supercomputers are indispensable for the development of nano materials. Eighth, social sciences: Social sciences including macro-economic and population studies cannot be done without an enormous amount of calculations, so they also need supercomputers. Developing China's first supercomputer The first high-powered computers were developed in the United States by Seymour Cray, the so-called father of supercomputing, in the early 1960s, while he was working for the Control Data Corp. A decade later, he left to start his own business, Cray Research, which has dominated the field ever since. Although smaller competitors are fighting for a share of the market, most disappeared without a trace when the market crashed in the mid-1990s. Today, supercomputers are typically produced by Cray, IBM and Hewlett-Packard. In China, technicians at the institute of computing technology under the China Academy of Sciences built the nation's first computer in 1958, two years after the unveiling of the National Plan on the Prospect on the Development of Science and Technology (1956-1967), China's first long-range plan for scientific and technological development. But China's development of a supercomputer hit a hurdle during the "cultural revolution" (1966-1976), and it wasn't until 1978 that then leader Deng Xiaoping chose the National University of Defense Technology as one of the chief institutions to develop China's own supercomputer. Five years later, the college produced a computer that could perform 100 million calculations a second. It was China's first supercomputer. China made high performance computing a key item of the 863 Program, a State-sponsored development initiative, in the 9th Five-Year Plan (1996-2000), and China now has four national supercomputing centers: Tianjin, Shenzhen, Changsha and Jinan. (China Daily 10/07/2012 page8)
<urn:uuid:1da69eed-fe95-424a-aedb-9522284ce465>
CC-MAIN-2022-33
http://www.chinadaily.com.cn/sunday/2012-10/07/content_15798494.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.927383
630
3.609375
4
Christ’s famous words, “give unto Caesar what is for Caesar and give unto God what is for God” was important clarification to Christians on how to be good citizens. Christ knew His Kingdom was not of this world but He also knew that Christians live in the temporal world. Under such conditions, certain things must be given to God for spiritual salvation, but there were also duties to give to lawful authority. The Christian citizen is thus not only brining the joy of the good news to the world, but also existing within society, obeying its laws and contributing not only at a spiritual level but also at a social level. Christians share their many talents with their community and nation and serve as examples of good moral character while obeying and serving their nation. Whether it is as mere citizen or political post, a Christian is meant to obey law and represent just cause within society. A good Christian citizen while obeying just law and serving as a good civic and moral example also pushes for just and good social reforms through the proper legal and peaceful channels. The good Christian protects the rights of others, opposes unjust laws that discriminate and impose suffering on others and protect the right of the weak. Obviously abortion is a key issue here in regards to an unjust law that must be opposed through civic and legal discourse. Those who take upon public office have a dual duty to both their faith and state. While they cannot allow religious based ideals to overwhelm those who believe differently, Christian political leaders must adhere to the moral natural law in all legislation. Those who break from those fundamental truths that bind all humanity, for the sake of secular glorification, fail both their duties as a statesperson and Christian. Again this is why all Christian political leaders MUST oppose abortion legislation and denounce it for the evil it is. A Christian hence is called to represent Christ in the nation and promote social morality. This is done through voting according to conscience based on Christian ideals and also by supporting and promoting social justice to all. While Christians may disagree with current social laws, they promote change to truth through peaceful measures that reflect the example of Christ. Christian citizens also stand up against anti religious laws that look to remove reference of God to society. The constant attack of atheism is found in society and this atheism looks to remove the freedoms and expressions of God in the public square. The Christian citizen is called to peacefully battle this insult to God. A good Christian citizen will also avoid extremism and nationalism. Christian citizens will promote love of country and patriotism, but they will not support nationalistic values that place value over others of different race or creed. In a pluralistic society, Christians while promoting the teachings of Christ, nonetheless, respect the values and opinions of others. They do not look to force the teachings of Christ on others, but look to gently teach by word and example. A Christian citizen however never places civic duty over the duty to God. When the state over steps its boundaries, like Christians who endured death centuries before and in communist nations today, the Christian citizen stands up for religious freedom and the teachings of Christ at the expense of even one’s own life. This is an unfortunate reality for many nations under communist control who denounce religious freedom and expression of one’s own personal worship. In these cases, the Christian is called to duty to God first and overthrow of the evil government. There should never be a conflict between being a good citizen and a good Christian in a democracy and just republic. When balance is given to both, Christianity can flourish and add to the value of the secular state by producing good citizens that respect law and the social needs of others. Love of nation is never a bad thing. In fact, it is a prerequisite of any good person. It places the love of neighbor over oneself which is a central teaching of the faith. Christian citizens hence are always willing to sacrifice for their home and fellow citizen. If you would like to learn more about Christian Counseling or would like to become a certified Christian Counselor, then please review the program and see if it matches your academic and professional goals. The program is online and independent study and designed for qualified professional seeking a four year certification in Christian Counseling.
<urn:uuid:9e409018-b583-4602-9e0e-b4ec02df1a53>
CC-MAIN-2022-33
https://aihcp.net/2021/01/14/christian-counseling-training-article-on-christianity-and-the-good-citizen/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.960242
850
2.59375
3
To earn an acceptance into the graduate school of your choice, you’ll need to pass the Graduate Record Exam (GRE) test. The GRE Test Preparation is offered in two formats: the computer-based version and the paper-based version. The computer-based version has been around since 2002 and is widely accepted by all of the top schools in America, as well as other countries around the world. Preparing for the GRE can be difficult because it tests various topics that may or may not be familiar to you. how to Prepare GRE test When you’re trying to get ready for the GRE, it can be hard to know what resources are worth your time and which will just waste it. That’s why we’ve compiled this list of the best free GRE test preparation and practice questions online, so you can be confident that you’re getting the most bang for your buck with your studies. Don’t worry if you’re not sure how to use them – we have tips here on that, too! Just click on any of the free resources below to get started preparing for your GRE! GRE Test Preparation & Practice Questions Online Consists Three Major Sections which are given below - Verbal Section - Quantitative Section - Analytical Writing Section Preparing for the Verbal Section One of the best ways to prepare for the Verbal section of the GRE is to practice with questions that are similar to those you will see on the actual exam. The Educational Testing Service (ETS) website offers a free practice test that can help you get familiar with the types of questions you will see on the GRE. In addition, there are many websites that offer free practice questions for the math and verbal sections of the GRE. Preparing for the Quantitative Section The Quantitative section of the GRE is all about math. If you’re not confident in your math skills, there are a few things you can do to prepare. First, try a practice test to see what areas you need to work on. Then, find some online resources or a tutor to help you brush up on the topics you’re struggling with. Finally, make sure to get plenty of rest and eat healthy on test day so that you can do your best. Preparing for The Analytical Writing Section The GRE analytical writing section can be an intimidating experience for many students, with its unique format and emphasis on logic and clarity of argument. Fortunately, even though the test may seem daunting, there are several tactics you can use to ensure that you ace the section. In this article, we’ll discuss some of these strategies, so if you’re planning on taking the GRE in the near future and are preparing to tackle the AWA section, keep reading! sample GRE questions to help you ace the test The GRE, or Graduate Record Examination, is an important part of applying to any graduate school program. But the GRE isn’t exactly the easiest test to prepare for! Lucky for you, we have 10 sample GRE questions below that are designed to help you understand how the GRE works and what you can expect to see on test day. Take some time to go through these questions, learn from them, and figure out if you’re ready for this big test! 1. The Issue of Whether IQ Tests are Fair IQ tests have been around for centuries and are used for a variety of purposes, from measuring intelligence to predicting success in school or work. But are these tests really accurate? And are they fair? Let’s take a look at some of the pros and cons of IQ testing. 2. How Accurate Are IQ Test Results? IQ tests measure a range of cognitive abilities and provide a score that is intended to serve as a measure of an individual’s intellectual abilities and potential. However, IQ test results are often criticized for being inaccurate and unreliable. 3. How Do I Prepare For The Test? The best way to prepare for the GRE is to practice, practice, practice. Start by taking a look at some sample questions so you know what to expect on test day. Then, create a study plan and stick to it. Dedicate a few hours each week to studying and take practice tests often. The more prepared you are, the better your chances of doing well on the GRE. 4. What Is The Format Of The Exam? The GRE® General Test is a computer-delivered test that is offered year-round at testing centers around the world. It is composed of three sections: Verbal Reasoning, Quantitative Reasoning, and an Analytical Writing section. The Verbal and Quantitative sections are each worth 170 points, and the Analytical Writing section is worth 0.6 to 6.0 points. 5. How Is The Exam Scored? The GRE is a computer-adaptive test, meaning that the difficulty of each section is based on your performance on previous questions. The exam is scored on a scale of 130-170, with 130 being the lowest score and 170 being the highest. There are three sections on the exam: Verbal Reasoning, Quantitative Reasoning, and Analytical Writing. The Verbal and Quantitative sections are each worth a maximum of 170 points, while the Analytical Writing section is worth a maximum of 6 points 6. Strategies For Taking The Test The GRE is a computer-based test that is offered year-round at testing centers around the world. The test is divided into three sections: Verbal Reasoning, Quantitative Reasoning, and Analytical Writing. You will have 3 hours and 45 minutes to complete the entire exam. 10 sample GRE questions to help you get a perfect score Are you worried about your GRE score? With its high demand and competitive application process, getting into grad school can seem almost impossible without a perfect GRE score. Fortunately, you don’t have to be a genius to ace the test—you just need to know what to expect, then practice! Here are 10 sample GRE questions that will help you get the best possible score on your exam. 1. The Basics The GRE is a standardized test that is often required for admission into graduate programs. The test is comprised of three sections: Verbal Reasoning, Quantitative Reasoning, and Analytical Writing. The Verbal and Quantitative Reasoning sections are each further divided into two parts. In this post, we will focus on the Quantitative Reasoning section. 2. Basic Arithmetic The math section of the GRE is designed to test your ability to understand and solve mathematical problems. The questions range from basic arithmetic to more difficult concepts like algebra and geometry. In this section, you will be asked to solve problems involving addition, subtraction, multiplication, and division. You will also be asked to solve word problems that require you to read and interpret data. 3. Word Problems The first step in solving any word problem is to read the problem carefully and identify what information is given and what is being asked. Once you have a clear understanding of the problem, you can begin solving. 4. Reading Comprehension The first section of the GRE is Reading Comprehension, which measures your ability to read and understand complex information. The questions are based on passages that range in length from one paragraph to several pages. There are three types of Reading Comprehension questions: Multiple Choice, Select-in-Passage, and Numeric Entry. 5. Text Completion - The GRE is a standardized test that is required for admission to many graduate programs. - The test consists of three sections: Verbal Reasoning, Quantitative Reasoning, and Analytical Writing. - The Verbal Reasoning section measures your ability to read and understand complex texts. - The Quantitative Reasoning section measures your ability to reason quantitatively, solve problems, and interpret data. 6. Sentence Equivalence - The test consists of five sections: Verbal Reasoning, Quantitative Reasoning, Analytical Writing, Integrated Reasoning, and an unscored section. - There are two types of questions on the Verbal Reasoning section: Text Completion and Sentence Equivalence. - For the Text Completion questions, you will be given one or two sentences with one or three blanks. 7. Passage-Based Reading Comprehension - The first step is to find a comfortable place to sit or recline. You will want to be able to focus on the screen without being distracted by your surroundings. - Next, locate the power button on your computer and make sure it is turned on. - Once your computer is turned on, open up the internet browser of your choice. - In the search bar, type in GRE practice test and hit enter. 8. Improving Sentences - The first step is to identify errors in the sentence. - The second step is to determine what kind of error it is. - The third step is to select the best way to fix the error. - The fourth step is to revise the sentence. - The fifth and final step is to proofread the sentence for any other errors. 9. Improving Paragraphs - The first step is to identify the main idea of the paragraph. What is the author trying to say? - Once you have identified the main idea, see if there are any supporting details that can be added. These could be statistics, examples, or quotes. - Next, see if there are any places where the argument could be strengthened. This might involve adding additional evidence or addressing counterarguments. - Finally, check for any errors in grammar, punctuation, or syntax. 10. Improving Essays - Read through the essay prompt and brainstorm ideas. - Make a list of key points you want to make in your essay. - Write a rough draft of your essay, focusing on getting your main points across without worrying too much about grammar or style. - Edit and revise your essay, paying attention to improving both the content and the form of your writing. - Proofread your essay for any final mistakes before you submit it. FAQs About GRE Test There are some frequently asked questions about GRE Test 1. What is the green line test ? The Graduate Record Examination (GRE) is a standardized test that is an admissions requirement for many graduate schools in the United States. The GRE is administered by Educational Testing Service (ETS). 2. How Long is the GRE Test The GRE test is divided into three sections: Verbal Reasoning, Quantitative Reasoning, and Analytical Writing. The entire test takes about 3 hours and 45 minutes to complete. 3. How hard is the GRE test The GRE test is not an IQ test. It is a test of your verbal, mathematical and analytical skills. The skills required to do well on the test can be learned. The test is not easy, but it is also not impossible. There are many resources available to help you prepare, including study guides and practice tests. What’s on the gre test (two sentences): The GRE test consists of three sections: Verbal Reasoning, Quantitative Reasoning, and Analytical Writing. 4. Is it worth taking an online practice test? We often get asked whether taking an online practice test is worth it. The answer really depends on how comfortable you feel with the material and how much time you have to prepare. If you’re struggling with the material, we recommend taking a practice test to see where you need to focus your studies. However, if you’re confident in your abilities and are running out of time, it may be better to just focus on reviewing key concepts. 5. What happens if I don’t meet minimum score requirements set by colleges? The minimum score requirements set by colleges are just that – minimums. That means that if your score is below the minimum, your application will likely be rejected. However, it’s important to remember that every college is different, and some may be more lenient than others. Additionally, some colleges consider other factors besides your GRE score when making admissions decisions.
<urn:uuid:9d148098-813b-46ab-ac5b-050199cbcd62>
CC-MAIN-2022-33
https://iubians.com/2022/07/gre-test-preparation-practice-questions.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.937258
2,520
2.59375
3
Nutrition in primary care yields health and economic benefits Personalized nutrition advice from primary healthcare providers including General Practitioners is better than usual care at improving a person's health and costs little more, a Griffith University study has found. Researchers from Griffith's Healthy Primary Care team conducted an international review of published health studies from the UK, Ireland, Western Europe, The Netherlands, Sweden and Australia to determine the cost of providing nutrition care to patients with cardiovascular disease, diabetes, obesity and malnutrition. "We found that personalized support to eat a healthy diet provided in community-based health services was much more effective at improving a person's health than usual care, and only slightly more costly,"' said lead researcher Dr. Katelyn Barnes. She said while it should be expected that any intervention is more costly than usual care, they still found that the cost required to improve people's health was minimal, and within recommended ranges for viable health investments. "The studies we examined showed that over three to 24 months, a person who is eating healthier may have fewer visits to health professionals, reduced medications and feel more productive." Given the benefits, Dr. Barnes says now is the time for smart governments to realize the opportunity they have: invest in nutrition care to save money. "The cost of not investing in regular support for healthy eating will be felt mostly by individuals through poorer health outcomes and increased use of health services,"' she said. "The study is timely given the current efforts by the federal government to set a 10-year plan for Australian primary care, including to be more comprehensive and person-centered. "Nutrition clearly has a prominent role in our future's health system. Overall, benefits from a person's dietary improvements are felt by multiple parties including governments, general businesses, health insurance and services, and individual people through lower health care spending (via taxes), and improved quality of life and economic productivity."
<urn:uuid:31b2f987-57ab-4494-a41c-d9dfd27a618a>
CC-MAIN-2022-33
https://medicalxpress.com/news/2021-10-nutrition-primary-yields-health-economic.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.964671
389
2.78125
3
Compensation is the total cash and non-cash payments that you give to an employee in exchange for the work they do for your business. Employee benefits are optional, non-wage compensation provided to employees in addition to their normal wages or salaries. The accurate compensation and benefits schemes make sure that hard-working employees are satisfied moderately and in the most cost-effective way for the company. The differences between compensation and benefit are as follows: - It is guaranteed payment, - In presence of compensation, an employee will not get extra motivation. - This is the payment for the work. - All of the employees get this. - Organizations are obligated to provide this. - Compensations are always tangible. - It is the same for an equal level of the job. - Salary and bonus are the examples of compensation. - It is not guaranteed payment. - In presence of benefits, employees will be motivated. - This is extra of the job payment. - Experienced and skilled workers mainly gain this. - Organizations are not obligated. - Benefits may be tangible or intangible. - It can vary at the same level of the job. - Retirement plans, health life insurance, life insurance, disability insurance, vacation, employee stock ownership plans, etc. are the example of employee benefits.
<urn:uuid:1d9d8652-7eef-4d68-b686-b346fe5d19fe>
CC-MAIN-2022-33
https://qsstudy.com/differentiate-compensation-benefits/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.938643
279
2.578125
3
What is Fly Spray Allergy? There are all sorts of insects that bother horses and their owners. Flies are usually a major problem no matter what region you live in. This leads owners to seek relief for their horse which can often be found in the form of a fly spray. While this works great for many horses, some can be allergic to it. There are a large variety of sprays available to owners so your horse may be allergic to one or more of the sprays depending on the ingredients. An allergy to a spray is also known as a contact allergy; when the product comes into contact with your horse, his system sets off a type of allergic reaction. Diagnosis can usually be done by observation of clinical symptoms alone. Treatment is straightforward and if done correctly, prognosis of recovery is very good. It is possible your horse is allergic to the fly spray you apply on him. If you notice he has hives or skin lesions, contact your veterinarian. Symptoms of Fly Spray Allergy in Horses Symptoms of this allergy may include: - Profuse sweating - Excessive activity of the sebaceous glands - Papules/lesions on the area of contact - Pain at application site, rare but possible The term allergy to fly spray can be used synonymously with a contact allergy. A contact allergy is typically a delayed sensitivity, but not always. This means it usually requires weeks to months of repeated exposure to the allergen for the sensitization to develop. Once there is sensitivity, clinical symptoms typically appear 24 to 48 hours after exposure. However, there are cases where the horse shows immediate sensitivity to the substance after one or a couple of applications. The degree of sensitivity varies on the ingredient involved as well as the horse as an individual. Causes of Fly Spray Allergy in Horses There are many different fly sprays available over the counter and through your veterinarian. Each spray has different ingredients and proportions of each ingredient within it. There are fly sprays that may contain pyrethrins, pyrethroids, fipronil, organophosphates, or N, N-diethyl-meta-toluamide (DEET) concentrations. Your horse may be allergic to one or multiple of these primary insecticides. You can try to a natural spray but even then it is possible your horse may be sensitive to the citronella ingredient. Diagnosis of Fly Spray Allergy in Horses When diagnosing an allergy to fly spray in your horse, it will be based primarily on clinical signs. Symptoms of a contact allergy are very similar no matter what the culprit. Your veterinarian will begin by performing a full physical exam on your horse. She will make note of all his symptoms and where it is primarily affecting him on his body. She will also want to collect a verbal history from you to discuss what your horse has come into contact with recently. This will be important when she is trying to come to a conclusion of what exactly caused his reaction. Once you think you have correctly selected the allergen, you will need to retest it for a true diagnosis. First, you will need to clear up the original reaction by removing the suspected allergen from your horse’s routine. You will need to avoid using the fly spray until the initial reaction clears up completely. This may require you to wash the skin thoroughly multiple times to remove any remaining allergen. If there is no secondary skin infection, the lesions on the affected area should clear up in 7 to 10 days. Once the lesions have healed, you will now need to rechallenge the suspected allergen source; this means you will need to use the fly spray again. If it is the spray, you can expect the lesions to reappear and/or worsen within 24 to 48 hours. Another way to diagnose a contact allergy is by utilizing a patch test. You will use a shaved area on the lateral aspect of your horse’s neck and apply suspected allergens to different patches. This test is beneficial if you are unsure of which substance your horse is allergic to. You will be able to try multiple substances at once to come to a diagnosis quicker. If your horse is not experiencing the typical symptoms of a contact allergy, your veterinarian may want to verify her diagnosis with other diagnostic tests involving the skin. For example, your veterinarian may want to take a skin scraping sample or perform a skin cytology to check for other possible causes. These tests can rule out skin issues that produce similar symptoms. The veterinarian may need to rule out parasitic infections, fungal skin infections, or other likely skin ailments to come to a proper diagnosis. Treatment of Fly Spray Allergy in Horses If you notice your horse having a skin reaction like the symptoms listed above, you should immediately bathe your horse with a gentle shampoo and rinse off thoroughly. This is the best way to remove the applied spray as quickly as possible. Topical application of calamine lotion or antihistamines can help with any itching; witch hazel can also be utilized to help with itching. The skin will need to be treated accordingly with the lesions and symptoms your horse has developed. If there is a secondary skin infection from constant rubbing or self-mutilation, your horse will need antibiotics. Your veterinarian may also recommend a topical medication which may come in a liquid, ointment, or spray formula for you to apply directly to the lesions themselves. Your veterinarian may need to prescribe additional medications or therapies depending on the severity of your horse’s condition. Avoidance of the allergen is ideal. It may take some time, but if you are able to narrow down the ingredient of the fly spray you horse is allergic to, it would be much better for your horse. Then you can shop for a different spray that does not contain the ingredient and therefore can be safely used on your horse. You can also use other methods of preventing flies from bothering your horse. There are screens you can put over your windows to decrease fly access points in his area, you can put fans where you keep him to discourage flies from landing on your horse and biting him, you can put on a blanket, and more. Worried about the cost of Fly Spray Allergy treatment? Pet Insurance covers the cost of many common pet health conditions. Prepare for the unexpected by getting a quote from top pet insurance providers. Recovery of Fly Spray Allergy in Horses The more severe the allergy is and the region affected will play a part in your horse’s recovery. If the area is small, the symptoms may be quick to resolve; if a large region is affected, recovery may take longer. You must also take into account if there is a secondary skin infection present. If so, the recovery process will take longer and need more aggressive treatment. However, as long as you address the condition of the skin and treat it according to your horse’s veterinarian, prognosis of recovery is good.
<urn:uuid:3d95e795-5cbc-4c03-8274-3030b77acdde>
CC-MAIN-2022-33
https://wagwalking.com/horse/condition/fly-spray-allergy
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.94427
1,464
2.53125
3
When some people drink, alcohol boosts their energy and they become more social and talkative, while others withdraw, want to be alone, or get more emotional. It is pretty evident that alcohol use (and abuse) affects the brain and, in turn, people’s emotions and behaviors. But what exactly is going on inside of the brain when we drink? Those who get more social may think alcohol is a stimulant because of how they act after drinking. But others have the opposite effect and consider it a depressant. So what is the truth? The long story short is that alcohol is a depressant, not a stimulant, regardless of what some people might think. It may not always feel like it, especially when you’re drinking in social situations, but it has a depressing effect on your body and mind. Depressants, such as benzos, opioids, and alcohol, slow down the brain and nervous system functioning. The word depressant does not mean someone will feel depressed when ingesting it. It does mean that alcohol slows down the speed that neurotransmitters send messages between the body and the brain, causing multiple side effects, such as a lack of coordination. While people who drink may feel extra relaxed and have lower inhibitions (they might do things they usually wouldn’t, thinking that they have “liquid courage”), these are true because their central nervous system is impaired. In the United States, aside from alcohol, most depressants are controlled substances. Some are prescribed to help with anxiety, sleep, and prevent seizures, while others are considered street drugs. Most people have heard of the date rape drug Rohypnol. This classic example of a depressant with no medical use is sold on the streets to increase a high or used against someone without their knowledge. Just like alcohol, other depressants cause specific effects on the body. These effects range from minor to severe and can ultimately cause death. When people mix alcohol with other types of depressants, such as opioids, they are putting their life at risk every time. Did you know that alcohol is the most commonly used addictive substance worldwide? It’s no wonder, considering how socially accepted it is. But many people don’t know how alcohol can affect the body. Contrary to popular belief, alcohol is not just a relaxant –– it has a range of impacts on different body parts. Alcohol alters mood, behavior, thoughts, and even the nervous system. People who drink heavily, even on occasion, risk putting their health and well-being in danger from the depressant-type effects alcohol has on the body and mind. Experts at the Alcohol and Drug Foundation remind their readers that there is no safe level of drug use. The following information on the effects of depressants shows that the adverse side effects of drinking alcohol have a wide range. These effects can occur only after taking a low dose or having one to two drinks of alcohol: Higher doses of alcohol look much different than one to two drinks: Lastly, an overdose on a depressant such as alcohol can look like this: Individual body mass, weight, the amount of alcohol consumed, genetics, history of use, overall health, and whether or not alcohol is combined with other substances are all factors in how a certain level of alcohol will affect one person versus another. Someone with increased risk factors might only drink a few drinks yet experience side effects such as those on the high or overdose list. There is no safe way to know ahead of time how a depressant will affect you, and this is especially true if you mix a number of depressants to get high. The safest thing to do is to stay away from depressants altogether. If you are someone who likes to have a drink or two from time to time, understanding the effects of depressants on your body and mind will help you make better choices. Alcohol is a depressant and should be consumed in moderation to avoid the many dangers associated with its use. It’s essential for people who drink alcohol to learn about these dangers so they can make intelligent decisions about their health and well-being. If you are struggling with alcohol addiction, get help from a professional like the compassionate staff at Arista Recovery. There are many resources available to you, and seeking treatment is the best thing you can do for yourself or your loved ones.
<urn:uuid:86868dca-2ba7-4ac2-b170-01eec0313a4c>
CC-MAIN-2022-33
https://www.aristarecovery.com/drug-addiction/alcohol-addiction/is-alcohol-a-depressant/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.953734
893
3.375
3
Editor’s Note: The methods described below are not approved or recommended by the CDC for the sterilization of N95 respirators. With the shortage of surgical and N95 masks in the country today, people are getting somewhat desperate. Many people are making their own masks out of cloth, mostly because they don’t have any other option. But medical personnel can’t count on that. They are required to wear proper personal protection equipment (PPE) when at work. The mask that everyone wants and the mask that has been touted as the one to use is the N95 mask. Designed to be a disposable mask, these have been in short supply since the beginning of the pandemic. People who have them probably bought them before the pandemic hit, as most businesses have given their stocks to local hospitals. If you’re one of the fortunate people to have some N95 masks to use, you’re probably hoarding them, trying to get the most mileage possible out of them. That probably means that you’re not changing them when you should. These are disposable masks, intended to be replaced. Related: 30 Supplies for Pandemic Survival The big risk with not replacing your mask is that you could end up infecting yourself with the mask, rather than that mask protecting you. While the masks will physically last much longer than just one usage; if a mask is not decontaminated after each use, how can you be sure that it’s safe to use? Fortunately, there are ways of decontaminating an N95 mask, even though most people don’t bother. If you use these techniques, rotating your stock, your masks should last much longer, giving you protection far beyond what would normally be expected. Using Time to Sterilize Your Masks Probably the easiest way to sterilize your N95 masks is to just let them sit. The CDC has quantified how long the SARS-CoV-2 virus can live, putting an upper limit on it at three days. But that three days is on a hard surface, such as metal or plastic. Viruses don’t survive anywhere near on soft surfaces, as they do on hard ones. Allowing your masks to sit someplace safe, where nobody is going to have contact with them, will allow the viruses to die, just by leaving them there. If you can leave them there for four days, you can be sure that when you go back, your mask will be free of the virus and ready to be used again. Using Heat to Sterilize Your Masks The French Scientist Louis Pasteur discovered in the mid-1800s that microscopic pathogens, specifically bacteria, die at 159°F. That knowledge has since been extended to include bacteria. So, if all we’re concerned about is killing the virus, all we need is to heat the mask up to more than 160°F. The easiest way to do this is to put it in one of the better food dehydrators. While your oven will get much hotter, we really don’t want to overdo the heat. If we can do it at 165°F, to give ourselves a few degrees extra of tolerance, then it will be much less damaging to the materials used in the filter to decontaminate it at that temperature, rather than 200°F. While 165°F or even 200°F won’t cause the paper in the filter to burn or the rubber in the elastic band to melt, it will dry the materials out. So you may see some drying of the rubber in the masks after a few tries, making it more likely to break. Using UV Light to Sterilize Your Masks It has been discovered that ultraviolet light (UV light) between 200 and 400 nanometers is uniformly deadly to both bacteria and viruses. Hospitals use this to decontaminate rooms as well as putting wall scones in the hallways with UV light to kill any bacteria or viruses in droplets, floating in the air. You can find plenty of UV light by stepping outside your door. The sun provides UV for free, usually much more than we want. But we can use that sunlight for good, by leaving those masks out in the sun and allowing it to kill the virus. Please note though, this does not work well on an overcast day, as the cloud cover will block as much as 70% of the UV. Another option is to use a UV light indoors. There are special lights used for this purpose, but you can also use a “black light” of the type used with fluorescent paint. These operate at 320 to 350 nanometers, which is in the range necessary to kill the virus. Three Different Chemicals You Can Use to Sterilize Your Masks Chemical sterilization is one of the most common means of disinfecting. The problem is, we’re dealing with a paper mask, so we have to be a bit careful about how we go about using it. Too much of a good thing could end up destroying your mask. So what are these three chemicals? - Chlorine bleach - Rubbing alcohol - Hydrogen peroxide Editor’s Note: Using these 3 substances listed above will remove the static charge in the microfibers in N95 facial masks and can reduce filtration efficiency well below its factory designed 95%. So please use them at your own risk, and ONLY if it’s the only solution you have left. After all, something is always better than nothing. One thing that’s needed for this is something to act as a mold or form. This can be just about anything that is waterproof and about the same size as the inside of the mask. A tennis ball will work or an inverted glass. As long as it can hold the mask in the right shape until it dries, it will be okay. In the case of any of these, we want to spray a fine mist of the chemical on the outside of the mask. Spray it thoroughly enough to cover the entire surface, without soaking the mask. Then set it on your mold and leave it to dry. Please note that it must dry fully before you use the mask, as these chemicals can be toxic if you breathe them in. Chlorine bleach will evaporate overnight, which is just about ideal for using the mask again the next day. But even if you use one of the other chemicals listed above, you still want to give the mask overnight to sit, allowing the disinfectant to dry thoroughly. Important Note: All three of these disinfectants can be poisonous when inhaled. When you first put a mask on, which you have sterilized for reuse, take a good whiff and make sure you can’t smell the disinfectant. If you can, set it aside and don’t use it. Rather, rinse off the disinfectant and allow the mask to air dry, before trying it again. You may also like:
<urn:uuid:f02599df-abdc-46ba-aa12-29f9e0cff6f5>
CC-MAIN-2022-33
https://www.askaprepper.com/6-ways-to-sterilize-your-n95-mask-for-endless-protection/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.949471
1,463
2.859375
3
This month we had the pleasure of interviewing Amanda Keetley, the co-founder of Less Plastic, one of Dr. Bronner’s All One UK Initiative partners. Less Plastic is a family run organisation based on the south coast of Devon with a mission to help people reduce their plastic use for the benefit of human health and the environment. Tell us a little about Less Plastic and what caused you to start the organisation? We started Less Plastic in 2015 and what prompted it was a walk on the beach in the winter after a storm and seeing the scale of the plastic pollution. That was the first time to me it brought home what we were doing and made me think about the amount of plastic I was using. I had a moment when I knew I had to do something. So we did a beach clean and then I went home to read up about it. At the time in the UK there wasn’t very much news or information about plastic pollution so I did my research to find out how we could use less plastic in our lives as I felt that was more achievable for everyone. So I started with my own family and then, as marketing was my background, I used this to share the tips that I was finding with others. What are the main environmental concerns that you think we should all be aware of? One of the issues is how plastic breaks down in the ocean. So much sinks down to the bottom and breaks down into microplastics. What we still don’t know is what impact that has on human health. Plastic is in everything and this is worrying. We can’t do anything about what is already out there but what we can do is stop that concentration increasing because there is a limit that our bodies can cope with. To reduce toxicity, we need to reduce the plastic we throw away. When we look at environmental concerns, it’s important not to look at any issue in isolation. The umbrella is nature. Humans have lost their connection with nature. If we can just relearn to respect and protect nature and restore what we have damaged, this will sort all these issues out. We have to have a shift of mind to understand that we need nature and will not survive without it. You live by the coast, have you seen the amount of plastic washed up increase or decrease over the past couple of years? That’s a difficult question to answer because we might not always see the plastic as it’s broken down. However, I know from looking at plastic production, that they are increasing exponentially year on year, so it is getting worse. We have to understand that recycling with plastic isn’t infinite. We need to cut our ties with plastic or at least reuse the plastic we do have. It’s not just at home that we need to be more conscious of our use of plastic, it’s also in the workplace. What ways can we help to reduce our impact there? The first thing is to get the team engaged as there is much more awareness on sustainability now. Get people to just open their eyes up to how much plastic their workplace is using. I find showing a video or giving a group talk around the issues which is affecting both the environment and human health most impactful. Companies can also become more efficient if they do this by reducing the amount they need to spend. Encourage staff to do team bonding clean ups in their local town, beach etc. It makes you more aware of the problem. Also look at the basics ie catering make sure you don’t have plastic water bottles, encourage people to have reusables in the canteen. Take inspiration from nature and be circular. Younger people expect their companies to do this. They are the ones trying to hold the older ones accountable. It’s therefore our responsibility to do something. Educating others is an important part of your mission. What are your top tips for people who want to reduce the amount of plastic in their lives? - As you go out and about, try and avoid take away packaging or minimise it. Take a reusable bottle/cup with you and bag. Take your lunch with you in a reusable container. Find your local places where they serve things on a plate and put pressure on them to change the way they do things. - When you’re out and about, if you have a zero waste store near you, try shopping there. You have the benefit then of eating food which hasn’t been wrapped in plastic as well as the environmental benefits. - Bathroom and cleaning products. It’s so much nicer to simplify. You don’t need lots of different cleaners and I love that about Bronner’s Castile Soap that you can use it for any cleaning. I go for higher quality and less which makes life simpler too as well as less costly. Are there are useful resources that can help us generally consume less and reduce our plastic? On the Less Plastic website under the Products tab you can access our free Infographics and other educational materials including my book ‘Plastic Game Changer’, the world’s first book to help people in business reduce plastic waste. To watch the full interview please visit @Drbronnersuk Instagram channel. Dr. Bronner’s is a family business committed to honouring the vision of our founder Dr. E.H. Bronner by making socially and environmentally responsible products of the highest quality, and by dedicating our profits to helping make a better world. “All-One!”
<urn:uuid:6dded213-32d7-45e3-bcb3-517039ad2935>
CC-MAIN-2022-33
https://www.drbronner.co.uk/all-one-blog/2021/07/reasons-to-go-less-plastic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.972798
1,147
2.53125
3
The recession had negative impacts on men and women15. Measures taken in response to the recession, including changes to welfare reform and restricted public expenditure, have had a further negative impact on women16. It is also envisaged that steps to rebalance the economy will have a further disproportionate impact on women; for example, the proposed further reduction of funding for public/third sector services on women’s employment17, reduced services of which women are the primary users, and potentially subsequent requirements to provide care.7 Men and women experience industrial and occupational segregation within the labour market with a gender imbalance within some industry sectors18. For example, in STEM –related professions, men outnumber women by nearly three to one19. Whilst women are over-represented in the public sector as a whole, they are significantly under-represented at a senior level in the NI public sector, with men and women holding 70.8% and 29.2% of all executive level positions respectively20. Women are persistently over-represented in administrative/ secretarial work21. Further, women are more often employed with atypical contracts, particularly part time working22, on zero-hours contracts, as well as in low paid jobs. While the gap is narrowing, more men (73.4%) are in employment than women (64.7%)23 and rates of economic inactivity remain higher among women (32%) than men (21%).24 Whilst there is a small gender pay gap in favour of women25, women frequently experience sex discrimination in the workplace, including due to pregnancy / maternity and unequal pay26. Barriers also persist for men in seeking flexible working arrangements27. A recent report in Great Britain (2016) has highlighted that flexible working can benefit all employees, men and women, as well as employers and the economy, and expressed concern about the lack of Government policies encouraging employers to promote flexible working28. Additional barriers exist for trans people, women with multiple identities, and those with caring responsibilities, including lone parents29. - - - - - - - - - - 15. For example, the loss of jobs in the male dominated construction and manufacturing sector disproportionately affected men. See McQuaid R, Hollywood E, Canduela J (2010) Employment Inequalities in an Economic Downturn commissioned by ECNI. More recently, there have been some indications of recovery in employment levels, including in construction. 16. For example, women’s jobs, including those in the public sector previously viewed as more secure, were seen to be becoming more precarious. See Hinds, B,(2011) The NI Economy Women on the Edge?. See also ECNI (2012) ECNI policy position on welfare reform. 17. See Fawcett (2013) The Impact of Service Cuts on Women ECNI (2013) ECNI Shadow Report CEDAW 18. For example, women predominate in caring, leisure and other service’ and ‘administrative and secretarial’ occupations and men are disproportionately represented in ‘skilled trades’ occupations. 19. See STEM Business Group (2013) Addressing Gender Imbalance Reaping the Gender Dividend in STEM 20. See Ballantine J, Banks G, Haynes K, Manochin M, Wall T, (2014) An Investigation into Gender Equality Issues at the Executive level in NI Public Sector Organisations OFMDFM 21. In 2015, 72.1% of those employed in administrative and secretarial occupations are women. 40.4% of all managers and senior officials are women (aged 16-64) (compared to 31.6% in 2011). ECNI analysis of LFS Q2 2015. Data obtained upon request from UK Data Service. 22. In 2015, 38% of female employees work part time compared with 10% of male employees. NISRA (2015) Women in Northern Ireland Department for the Economy 23. NISRA (2016) Quarterly Supplement to the Labour Market Report April – June 2016 Data Tables. Table QS2.1 Employment by sex, 16-64 24. NISRA (2016) Quarterly Supplement to the Labour Market Report April – June 2016 Data Tables. Table QS4.1 Economically inactive 25. In terms of the gender pay gap in Northern Ireland, in 2016 median hourly earnings were higher for full time and part-time females than males. The ratio of female to male median hourly earnings excluding overtime for all employees has increased to 90.9% (2016) from 88.3% (2015). The full time ratio of female to male earnings has increased slightly from 101.5% in 2015 to 103.2% in 2016. NISRA (2016) NI Annual Survey of Hours and Earnings Report April 2016 26. It will be noted that over a quarter of discrimination enquiries(26.2%) made to the Commission in 2015/16 related to sex discrimination and the vast majority of these related to employment; particularly in the area of pregnancy and maternity. ECNI Discrimination Enquiries Statistics 2015/16. 27. See A Hegewisch, EHRC, (2009) Flexible working policies: a comparative review 28. House of Commons (2016) Women and Equalities Committee Report on Gender Pay Gap Second report of session 2015-2016, March 2016 29. FRA (2014) Being Trans in the EU, UCD (2010); All Ireland Traveller Health Study, Carers UK (2015) The State of Caring Report 6. STEM – Science, Technology, Engineering and Mathematics
<urn:uuid:018e774a-4fca-4c6f-8d78-507d535fabe2>
CC-MAIN-2022-33
https://www.equalityni.org/GenderPolicy
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.937338
1,151
2.65625
3
Salford, LG, AE Brun, JL Eberhardt, L Malmgren and BRR Persson. Nerve cell damage in mammalian brain after exposure to microwaves from GSM mobile phones What did they find? As expected, both control and experimental animals had albumin within the hypothalamus. This is normal. A closer look shows things far from normal! Exposed animals (Right), however, were much more likely to have albumin leaking from blood vessels in inappropriate locations. Control animals, (not exposed) in contrast, showed either no albumin leakage or occasional isolated spots, as seen in the actual picture on the left. A closer look at the cells within the brain revealed that exposed animals had “scattered and grouped dark neurons… often shrunken.. with loss of internal cell structures.” These altered neurons were seen in all locations, but “especially the cortex, hippocampus and basal ganglia.” A word of caution? Research on rats suggests that heavy use of mobile phones may put people at risk for neuronal damage. The idea that frequent exposure to the electromagnetic fields (EMFs) generated by mobile phones could cause adverse health effects has taken on the status of urban myth in many people’s minds due to the lack of definitive scientific evidence. But startling new findings by a team of researchers from Lund University in Sweden make the issue once again a cause for genuine concern–and suggest it might be time to get serious about using your headset when talking on your mobile phone and encouraging your family members to do the same Salford et al. document serious neuronal damage in rat brains following exposure to microwave radiation from a cell phone, at levels comparable to what people would experience during normal use. Damage to nerve cells was observed in several places within the brain, including the cortex, hippocampus and basal ganglia. It was associated with evidence of leakage of proteins through the blood-brain barrier. The authors express concern that “after some decades of (often) daily use, a whole generation of [cell phone] users may suffer negative effects, perhaps as early as middle age.” In a companion news story in the issue of Environmental Health Perspectives in which the research is published, the journal comments: “It might be time to get serious about using your headset when talking on your mobile phone and encouraging your family members to do the same.” What did they do? Salford et al. exposed rats to microwave radiation from a GSM cell phone, varying the intensity of radiation across a range that would be experienced by mobile phone users. The rats were contained within plastic trays inside a specially constructed wooden box that allowed free movement, other than to prevent direct contact with the source of radiation. One set of animals was placed in the box without turning on the transmitter; they served as a control group. The others were exposed to peak power densities of 0.24, 2.4 and 24 Watts/square meter (which translates to 2 milliWatts per kg, 20 mW/kg and 200 mW/kg, respectively). Each group contained 8 animals. After a 50-day waiting period, during which the rats were monitored for behavioral abnormalities, Salford et al. killed the animals, carefully removed their brains, and studied them by applying stains and albumin antibodies that allowed detection of abnormalities. Salford and his colleagues scored the rat brains for the number of dark neurons. They observed that higher exposures produced more dark neurons The number of small horizontal bars indicates the number in each treatment group with a given score. All treatment groups differed significantly from the control group. Adapted from Salford et al. What does it mean? Most of the public debate about possible health effects of microwave radiation from cell phones has focused on cancer. While debate about this continues, most studies, including by Salford’s research team, have had negative results. This work focuses on a different mechanism which had been identified by earlier authors (e.g., Oscar and Hawkins 1977) but not pursued vigorously: increased permeability of the blood-brain barrier. These results clearly establish an adverse impact at levels within the range experienced by people using cell phones. According to these scientists, “intense use of mobile phones by youngsters is a serious consideration. A neuronal damage of the kind described here may not have immediate, demonstrable consequences, even if repeated. In the long run, however, it may result in reduced brain reserve capacity that might be unveiled by other later neuronal disease or even the wear and tear of aging. We cannot exclude that after some decades of (often) daily use, a whole generation of users may suffer negative effects, perhaps as early as in middle age.” That is a cautious way of saying that Salford and his team of scientists are very concerned about the possible human impacts of cell phone use. Indeed, as noted above, the journal in which these results were published, Environmental Health Perspectives (the journal of the National Institute of Environmental Health Sciences)
<urn:uuid:7fa351f7-596a-40ac-88bf-bacc244fbc42>
CC-MAIN-2022-33
https://www.rfsafe.com/brain-damage-cell-phones-hurt-teens-later-life/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.964217
1,047
3.078125
3
AS THE CANYONS of Wall Street echo again with an avalanche of sliding stocks a la 1929, can the thud of falling bodies be far behind? Certainly one enduring image of the Crash, by now almost a part of the national folklore, is that of ruined financiers pitching themselves out windows and off buildings and bridges. Will Rogers happened to be in New York on "Black Thursday," Oct. 24, 1929. In his nationally syndicated newspaper column for that day, he wrote: "When Wall Street took that tail spin, you had to stand in line to get a window to jump out of, and speculators were selling space for bodies in the East River." The New York correspondent for one of London's sensationalist tabloids wired home that lower Broadway was clogged with corpses. Visiting New York at the time of the "slump", as it was bravely called at first, was Winston Churchill. In an article in a London newspaper he later recalled the sight of a workman smoking his pipe on the girder of an unfinished building 400 feet above Manhattan. The fellow was inadvertently causing a traffic jam in the street below. A crowd had gathered, believing that the man was a broken speculator bent on self-destruction, and it was "waiting in a respectful and prudently withdrawn crescent for the final act." So goes the legend. What are the facts? How many people jumped in 1929? From "Black Thursday," Oct. 24, until the end of the year, 100 suicides and attempted suicides were reported in The New York Times, including cases around the country and overseas. Eight of these people had jumped from building, bridge, boat or airplane. Half of these plunges were attributed to losses suffered in the Crash. The number of suicide leaps in Wall Street during this period was a mere two. Of course, "Black Thursday" and "Black Tuesday" of October 1929 were but the beginning of a series of stock market dislocations that lasted into the 1930s, ushering in the Great Depression. It seems likely that collective memory shifted later finance-related suicides back in time to the remembered hysteria of the Crash. The suicide rate which, surprisingly, had been rising steadily through the prosperous '20s, actually peaked in 1932 when 17.4 of every 100,000 Americans took their own lives -- an all-time high. (The national figure for 1985 was only 12.0. New Yorkers especially seem to have become more resilient. Their suicide rate, 4 points higher than the national figure in 1932, was 4 points lower in 1985.) Such statistics tell quite a different story from the "suicide wave" portrayed in contemporary newspaper headlines. The suicide rate in New York City for the first several weeks after the Crash was in fact lower than it had been during the summer of 1929 when the bull market was still raging, and likewise lower than for the same period the year before. When New York City's chief medical examiner produced these mortality statistics, they flew in the face of conventional wisdom -- a New York Times headline from Nov. 14 read: "City's Suicides Fewer/Figure Refute Tales of Increase Owing to Stock Losses." This is not to downplay the toll of misery that the Crash exacted. Morgues were not the only places registering victims. Physicians treated a rash of nervous breakdowns. The apple sellers, the breadlines, and the "Hoovervilles," too, soon bore witness to the consequences of the Crash. In five-hours' time on Oct. 29, "Black Thursday," an invisible, odorless, weightless phenomenon -- numbers changing on a ticker tape -- cost the American people as much money, by one estimate, as the United States had spent on the First World War. Contemporary newspaper and wire service accounts detailed some of the casualties. Ignatz Engel was a retired cigar maker in the Bronx who invested in the market in time to be wiped out by the Crash. On Nov. 13, depressed over his losses, he lay down on a blanket in his kitchen and opened all the jets of the gas range. The next day, the president of the Rochester Gas and Electric Corp., no longer able to endure his loss of more than $1,200,000, ended his own life using -- what else? -- gas. A Chicago dentist snuffed himself with gas on Dec. 12; police said that he had succumbed to remorse for having persuaded his young woman assistant and laboratory aide to put all of their savings into the market in the euphoria before the Crash. Guns were another popular way out. A bullet was the choice of the New York banker J. J. Riordan, the most prominent financier to commit suicide in the last months of 1929. Announcement of his death was postponed until Mr. Riordan's bank closed for the weekend. A hurried audit revealed that only his personal holdings, not the bank's, had been caught up in the Crash. Confirming the international implications of Wall Street's debacle, there were suicides by a broker in Chile and another in Cuba, the latter found hanged in the Members' Room of the Havana Exchange. In Philadelphia, one broker shot himself at the Penn Athletic Club and another was hauled out of the Schuylkill after "the cold water had changed his mind." The retrieval of Julius Umbach from the Hudson was less auspicious. His suicide was explained by notes in his pocket calling for more margin. During the early hours of New Year's Day 1930 a Brooklyn broker kept his neighbor awake with whistling and hymn-singing before turning on the gas and lying down on his bed wearing a blue serge suit, grey kid gloves, and pearl-colored spats. A young man named Lytle shot and killed himself in a hotel in Milwaukee, leaving behind four cents and a suicide note directing that "my body should go to science, my soul to Andrew W. Mellon and sympathy to my creditors." The note also asked that his body not be removed from the room until the rent was up. As in this past week's events, record activity as well as record losses marked the Crash of '29. Brokers were reported sleeping in shifts atop pool tables. Even the stock ticker couldn't keep up -- a problem still unsolved by computer technology. Hulda Borowski was trapped in the pandemonium. At the time of the Crash she had been employed for 28 years as a clerk for a Wall Street brokerage house. Tuesday, Nov. 5 found the 51-year-old Mrs. Borowski working late into the night, a labor repeated the following night until she fell asleep in the wire room and was ordered to go home. The next morning she returned to work at 9:00 appearing extremely fatigued. Early in the day she rode the elevator up to the roof of the 40-story building on lower Broadway where she worked. She came down in a state of distraction, according to the elevator man, forgetting to get off at her floor. Around 10, she took another ride up to the roof. This time Mrs. Borowski came down directly, smacking against the curbstone of Cedar Street, narrowly missing some passers-by. In the ensuing commotion, rumors rippled through Wall Street to the effect that an important member of the Exchange had just ended it all. The suicide of an influential figure was naturally more newsy than that of a clerk. But shining a spotlight on them distorts the reality that that these Crash-related suicides from October through December 1929 represent only about 1 percent of all the Americans who took their own lives during that same period. The rest were driven by different, particular desperations. Perhaps a few lives were saved because the Crash of 1929 was followed so closely by the Holiday Season and its mandated good cheer. Thanksgiving may have restored the will to go on for many, but not for Margaret Mason. The 58-year old woman raised turkeys in a town in upstate New York. The day that the turkeys were to be killed and taken to market for Thanksgiving diners, she set fire to the small barn containing the birds. She died in the flames with her turkeys, declared the coroner, handing down a verdict of suicide. Bennett Lowenthal is a Cincinnati writer.
<urn:uuid:40bb7c99-96f8-4c54-9aec-cfdd3a024cb2>
CC-MAIN-2022-33
https://www.washingtonpost.com/archive/opinions/1987/10/25/the-jumpers-of-29/17defff9-f725-43b7-831b-7924ac0a1363/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00688.warc.gz
en
0.981387
1,693
2.578125
3
are kidney stones hard or soft People also ask What is a kidney stone? Under certain conditions, substances normally dissolved in urine, such as calcium, oxalate and phosphate, become too concentrated and can separate out as crystals. A kidney stone develops when these crystals attach to one another, accumulating into a small mass, or stone. Kidney stones come in a variety of mineral types: Can you have kidney stones and not know it? You can have kidney stones and not have any symptoms. Or the symptoms may not start until your kidney stone goes on the move. A stone can move around within your kidney. Do kidney stones cause severe pain? This builds rapidly to extreme pain. In most cases, kidney stones pass without causing damage-but usually not without causing a lot of pain. Pain relievers may be the only treatment needed for small stones. Other treatment may be needed, especially for those stones that cause lasting symptoms or other complications. Why did I get a kidney stone? It鈥檚 often hard to figure out the reason you got a kidney stone. But they are created when your urine has high levels of certain minerals. These include: Think about stirring up your favorite drink from a powder mix. If you don鈥檛 add enough liquid — say, water or juice — the powder will clump up and turn into hard, dry chunks.
<urn:uuid:5b733674-05c2-4c01-bbb0-499d0644b5e0>
CC-MAIN-2022-33
http://www.kontrast.top/are-kidney-stones-hard-or-soft/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.940053
292
3.03125
3
Bigfoot reports indicate that many people take years and years to get over their bigfoot sighting. In fact, some of them even have terrible nightmares for weeks or months on end. But why does witnessing a bigfoot have such a severe effect on people? Well, here are 5 reasons: - Bigfoot scares people When a person sees a bigfoot for the first time, the experience is usually not pleasant. The thing is, an unexpected bigfoot sighting does not make a person excited or amazed. Instead, it scares the hell out of him or her. The majority of people who have seen a bigfoot recount that during their encounter the creature kept looking at them, and the whole experience made them super uncomfortable. These people, due to the initial unpleasantness, find it hard to go back to the place of encounter again. If they saw the creature in a forest, for instance, they may never want to go back to that same forest. If it was hanging near their house or property, owners wanting to leave their place as soon as possible for good may even cross their mind. These folks experience a fear of being hunted or watched by someone, and it makes them restless. This makes it hard for them to forget the whole episode. For example- Listen to this testimony: - Bigfoot encounters are sudden The typical bigfoot encounter is sudden. While some people see a bigfoot while driving on a lonely road, others see it inside the dense forest for a few seconds. Due to the suddenness of the whole thing, a bigfoot sighting leaves people speechless. This may sometimes trigger mental trauma, such as PTSD. Therefore, the impact is severe. - Bigfoot is a beast Past bigfoot sightings indicate that the creature is a stinking giant – 7 to 10 feet tall, weighing about 600 to 800 pounds, with dense black, red or brown fur with glowing eyes. In other words, bigfoot is supposed to be a beast! And, most normal people do not like beasts. So, when a person suddenly sees a bigfoot, he or she cannot fathom its very existence. The sighting, therefore, has a severe effect on him or her. - Bigfoot shatters beliefs Beliefs are very strong things, and some people have grown up believing that UFOs, ghosts and bigfoot just do not exist! When this group of people sees a bigfoot for the first time, their whole belief system gets challenged. Mentally, this is equivalent to a major life change. This takes a toll on their body and their whole system is impacted severely. - Bigfoot is an urban legend Bigfoot is something that is supposed to be able to cover 15 to 20 feet in just 2 strides! People have been hearing its stories since their childhood, but have never seen one. The whole thing is a very popular urban legend. So, when a person is made to witness that very urban legend in real life by fate, he cannot believe his eyes and senses. This makes forgetting the episode all the more difficult.
<urn:uuid:8f3f6fcb-4b9a-4c14-8263-281b0be612ac>
CC-MAIN-2022-33
http://www.whatisbigfoot.com/bigfoot-severe-effect-people-5-reasons/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.972071
615
2.5625
3
Most of computer users in the 20th and 21st century must have known the name Internet Explorer (also called as IE). It used to be the icon of legend and irreplacable in the past. However, the game has changed and the future has a thing out of our expectation. Microsoft saw the market share of the browser sharply declines yearly. In this article, we'll learn the rise and downfall of Internet Explorer and find the reasons which cause the fall. The rise of Internet Explorer 1995: Microsoft Internet Explorer (IE version 1.0) was born Internet Explorer was introduced as a free download on August 16, 1995 by Microsoft. The first version was known as Internet Explorer 1.0 and came out with Windows 95. The browser competed directly with Netscape Navigator which had already become the most popular browser just after its release in 1994. At this time, only 16 million of computer users worldwide have access to the internet and the browser was fairly new. At first, Internet Explorer couldn't catch up with Netscape which had a market share of 80%. However, Microsoft started to invest more in developing IE and spent more than $150 million annually on marketing. As a result, Internet Explorer began to gain customer's attention. 1995: Internet Explorer 2 competes with Netscape Navigator Internet Explorer 2.0 is the key to compete against Netscape. After a few months, the next version of IE was introduced with a huge improvement which enabled it to catch with Netscape Navigator. Many early web pages were developed to be compatible with Navigator exclusively, which represented 90% of the market at the time. Therefore, Microsoft must find a way to imitate Netscape and gradually surpass this browser. IE 2.0 has been designed to incorporate Netscape's bookmarking system and support HTML features so that web pages look the same no matter what browser is opened. In addition, IE 2.0 is also the first version released by Microsoft for Mac OS, 6 months after its release for Windows. 1996: Internet Explorer 3 gains momentum In 1997, Microsoft released IE3.0 and it quickly overtook Netscape. The main success of IE3 is the integration with Windows 95/NT4. IE 3.0 was included as a standard browser in these operating systems while other browsers were also available for download, at that time including Netscape Navigator and Opera. Unfortunately, many early web pages continue to be developed exclusively for Netscape Navigator. 1997: Internet Explorer 4.0 continued to improve the browsing experience Internet Explorer 4.0 released in 1998, was designed to be compatible with Windows 98 which was then launched and it improved the browsing experience for users on slow dial-up connections. The IE4 compatibility mode also helped to prevent web developers from making a mess of their sites but instead create web pages which are both functional and visually appealing. Microsoft also launched a new product called MSN (Microsoft Network) to keep up with the trend of online services and compete with AOL. 1997: Internet Explorer 5.0 is incompatible with Mac OS Internet Explorer 5 is released in August, 1997 as a part of Windows 98 only and IE5 did not support any other operating system. Therefore, Mac users are forced to continue using IE4 or switch to another browser such as Netscape Navigator 4.0. In addition, Microsoft has also challenged AOL by releasing a new service called MSN 2 which is aimed at high-speed internet connection (i.e broadband) with enhanced tools and features such as the ability to send and receive email with a personalised address, chat room and instant messaging. 1999: Microsoft leads the browser market share by offering IE for free On August 11, 1999, Microsoft released IE 5.5 for Windows as a part of Internet Explorer 5. In addition to being able to browse the web more easily through better usability and improved features such as RSS, it's also the first browser to be released for free. By this time, Netscape Navigator becomes an outdated piece of technology and lost its market-share to IE, which becomes the best-selling web browser in history with a 54% share. That was the story how the king IE grew up in the past. But there is no king could live forerver. The downfall of Internet Explorer 2001: Internet Explorer 6 is considered the worst technology product of all time In May 2001, Microsoft introduced the current version of Internet Explorer 6 to the market. This version has been designed with more advanced security features and include a pop-up ad blocker which is later removed due to its controversial nature. However, IE 6 is remembered by many for a lot of security flaws, mostly by design. As a result, many web developers begin developing their sites for IE6 only while others switch to other browsers such as Firefox, Safari, Opera, and Flock. By 2004, the US-CERT organization had issued a vulnerability report stating that IE's vulnerabilities combined with the browser's deep integration into Windows made it a burden and many security experts password convinces users not to use it. In 2006, PC World ranked IE 6 as the worst technology product of all time, saying it "probably the most insecure software on earth." This is also the last version to be fully named "Microsoft Internet Explorer" because after the antitrust lawsuit, Microsoft renamed IE to Windows Internet Explorer. 2006-2008: Windows Internet Explorer 7 with the fiercest competitor After more than 5 years since IE 6, Windows Internet Explorer 7 was released and is the default browser on Windows Vista to replace IE 6 on Windows XP. IE7 is the first version of IE to do away with the separate rendering engine for each version. Using Microsoft's own Trident instead, users are able to use a customized version in Windows XP as well as several other browsers on various platforms including Windows Vista and Mac OS X. Perhaps due to the long time between the two versions, IE 7 struggled to catch up with IE 6 in terms of market share and allowed Mozilla Firefox and Google Chrome to compete. 2009: Internet Explorer 8 shows many improvements but still not enough In 2009, Microsoft released IE 8 with better support for HTML5 and improved security features. IE8 is considered a significant improvement over IE7, but it still failed to catch up with Chrome and Firefox due to the huge market share of its predecessors. While there are some improvements on user experience, most users still use IE6 on Windows 2011: Internet Explorer 9 with relevant enhancements In 2011, IE9 was released to address the increased competition from Chrome and Firefox in terms of market share. IE9 is the first version built for Windows 7 and takes advantage of new features such as SPDY which allows browsers to request web pages faster. However, its support on older versions of Internet Explorer (IE 6/7) are limited. The company released IE 9 separately without the operating system and launched a series of TV and Internet advertisements. Many users and experts then said that IE 9 is technologically comparable to Firefox and Chrome. Even so, IE 9 still failed to penetrate the market the way Microsoft had hoped. Chrome and Firefox has stepped foward so far, and IE 9 couldn't catch up. 2012: Internet Explorer 10 - the misstep with Windows 8 In 2012, IE10 was released to be the default browser of Windows 8. As expected, IE10 will be included in most Windows 8 devices (PC's and tablets) which are designed for better touch support among other features. Meanwhile, IE 10 was not supported on Windows 7. Microsoft expected the combination could bring back their market share, and IE 10 was expected to replace IE 9 on Windows 7 at one point, but they were wrong. The fail of Windows 8 make more users stay far away from this browser. Users running Windows 7 still use IE 9 because they are satisfied with it and don't want to upgrade. IE 10 has Adobe Flash Player integrated, but some Flash features are limited to the Metro version to avoid battery drain. Despite this, IE 10 is still neglected by users, partly due to the general discontent towards Windows 8. 2013: Internet Explorer 11 - the last version After years of experimental versions, IE 11 was released in 2013 and is the last version of Internet Explorer. It has many bug fixes and security enhancements but nothing new to offer. Chrome and Firefox were already on a different level and users don't want to be bothered with an outdated browser. At this point, there's almost no one still using IE 6/7/8. Most users have moved on to Chrome or Firefox for better user experience and improved security. 29 July 2015: The death has been confirmed Microsoft Edge is the new default web browser in Windows 10, and was released on 29 July 2015. And this date has confirmed the death of Internet Explorer. Microsoft Edge is the brand new design of Microsoft's default web browser for devices running on Windows 10. As such, it does not support any version of Internet Explorer prior to IE11. It is worth noting that this change will only come into effect later this year when Microsoft releases their next major update for Windows. Reasons causing the downfall of Internet Explorer Microsoft was too slow to respond to the changes of the technology environment. The render engine of IE8 and IE9 is based on Trident which was first used in Internet Explorer 5.5, released 12 years ago. It turned out that the rendering engine of older browsers like IE8 were so outdated that they didn't even support Flexbox which has become a standard for modern websites after 2010. This meant web designers had to use workarounds for IE8 which had negative effects on web performance. IE 6/7/8 were also not designed for touch screens, while their competitors focused on better user experience with the growing number of users using mobile devices. Microsoft was too slow to respond to competition Microsoft was very slow to respond to the threat from other browsers in the market. It took them over five years (2006-2011) after Chrome release to finally catch up with better HTML5 and improved security features. Even when they did, it was already too late because Chrome is already a superior product on many aspects (Google search engine, pre-installed by many devices, etc) Microsoft mistepped with IE Updates and Microsoft Windows For many years, the company has been less willing to push updates and changes after IE 6 was released. The release of IE10 as part of Windows 8 also failed because it wasn't supported on Windows 7 at the time, while Chrome and Firefox had a much larger user base for their last versions even when they were not included in any operating system. Does Microsoft have a chance to get back the browser market share? Yes, Microsoft always have a chance to get back the market share as long as Windows still lives. Microsoft's Windows is the most widely used computer (desktop, tablet and console) operating system (OS) in the world with around 70 percent of the market share during the first half of 2021. Therefore, Microsoft still have enough time to attract its users to Microsoft Edge. However, Microsoft needs to spend a huge effort in order to change their strategy and market presence for a better user experience. For many years, Microsoft has only focused on chasing Google Chrome and Mozilla Firefox but forgotten about users - the core and most important factor. Microsoft needs to listen to its users for what they want and what they do not want with the browser, as Google or Apple always does. They also need to build apps for other platforms (Android, iOS) if they want to compete with Google's dominance in the mobile OS market. In the past, Internet Explorer was a dominant browser in the world. But as time has passed and competition increased, they have fallen to third place behind Google Chrome and Firefox. The reasons for this are Microsoft's slow response to change in technology environment, IE6/7/8 being outdated with user experience not keeping up with modern standards of web development (flexbox), lack of support for Windows 7 or newer versions when releasing IE10 which is included on Windows 8 OS; also their late response to major security threats from other competitors like Google Chrome. However, there is still hope that Microsoft can get back its share of the market if it pays attention to what users want - feedback about features people care about most or where they feel frustrated by browsers today and not focusing solely on Chrome/Firefox.
<urn:uuid:24c77837-01df-4fde-b397-9274a22ac5f6>
CC-MAIN-2022-33
https://en.hocmarketing.org/case-study/the-rise-and-downfall-of-internet-explorer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.962746
2,595
2.71875
3
Kolchak’s gold in a Russian bank Kazan in 1918 before being moved onto the Lake Baikal train A RUSSIAN mini-submarine may have found billions of pounds worth of lost gold in a Siberian lake, it was revealed yesterday. Explorers have long searched for lost Tsarist treasures dating from the Bolshevik Revolution, when forces loyal to the deposed royal family fled the advancing Red Army. Legend has it that 1,600 tons of gold – which could now be worth billions of pounds – was lost when anti-Communist commander Admiral Alexander Kolchak’s train plunged into Lake Baikal, the world’s oldest and deepest freshwater lake. Last year, parts of a train and ammunition boxes were found. And in recent days, the Mir-2 submersible has discovered “shiny metal objects” 1,200 feet below the surface at Cape Tolstoy. “Deep-sea vehicles found rectangular blocks with a metallic gleam, like gold,” said one source. Explorers attempted to grab hold of the blocks with a manipulator arm but failed because of loose gravel on the bottom of the lake. Sources say that the submariners know the exact spot and are planning a new mission to determine if they have found the gold. The Moscow News independent newspaper yesterday ran a story on the find, with the headline: “Lost gold of the Whites found in Baikal”. The story described the lost gold as “one of the great mysteries” of the Russian Revolution. Read moreRussia: Lost Gold Of Tsars Found In Lake Baikal, The World’s Deepest Lake
<urn:uuid:fd84ad02-2a61-4a9c-8fa2-5232d8cd8ee4>
CC-MAIN-2022-33
https://infiniteunknown.net/tag/siberia/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.93093
350
2.9375
3
Copyright 2020 by Richard O. Aichele - email email@example.com - and InforWorks.com P.O. Box 4725, Saratoga Springs, NY 12866 USA World War One was 146 days old when a number of German, French and British ordinary soldiers maning the trenches of the Western Front recognized the futility of man against machine guns and high explosive shells. On Christmas Eve, the traditional time of peace and good will to others, the guns in some areas fell silent. The Soldiers Christmas Truces by Richard O. Aichele Christmas Eve December 1914. Sections of the front line trenches grew quiet. Christmas songs replaced gunfire and explosions. Soldiers walked peacefully from their trenches into No-Mans Land. They exchanged gifts with the enemy soldiers. Early in the war, there were local unofficial truces but on Christmas Eve 1914 along some sections of the front line trenches German, French and British soldiers met openly between the trenches, enjoyed their adversaries Christmas carols and even exchanged gifts of tobacco or food. A German photo shows one incident of soldiers mingling in no-mans land between the trenches. Another photo shows British and German soldiers celebrating together in a trench. Unfortunately, those incidents were too short. Once discovered by higher ranking officers far behind the front lines, orders were issued to stop the peaceful activities and return to the business of killing the soldiers in the other trenches. And, too often, those orders were very forcibly enforced on their own troops by shelling the enemy trenches and, when necessary, their own trenches. Christmas truces between French and German soldiers also occurred. Any signs of fraternization often resulted in severe reactions by high ranking officers well to the rear of the trench fighting. Louis Barthas, a thirty-five year old Frenchman mobilized when the war started, recalled one incident in his book Poilu. On Christmas Eve 2014 Bathas's unit manned the second line of French trenches facing German trenches near Annequin, France. "As soon as night fell, we were huddled in our holes, enjoying the thoughts of sleeping until dawn, when at about 9 O'Clock a harsh voice passed the order to get out of our holes and to hoist up our packs at all speed. In fact, something unusual had happened up at the front line. You could hear songs, clamors, numerous flares were set off on both sides, but no firing at all. Two hours later the alert was called off. We had no explanation of what happened until the next day." Barthas wrote that punishments for the front line's trench Christmas Eve incident began. "On Christmas Day, without any respect for the holiness of the day, they put us to work digging a big shelter...useless work...for that very evening we had to go up to the front line." The extra duty continued for several days. Christian Carion wrote, "The Artois region in France still carries the scars of bitter fighting and loss from the trenches of World War One. So why shouldn't one moment of camaraderie between enemies be celebrated and remembered," in the BBC December 25, 2014 article How France Has Forgotten The Christmas Truce Soldiers. Click for the complete bbc.com news article. The realities of some German and French front line soldiers seeking a little peace during Christmas 1914 varied. "Joint burials also took place in no man's land with Masses read in Latin. Soldiers visited each others' trenches to compare working conditions. Some evenings when the Scotch whisky had been flowing, soldiers fell asleep in the opposite trench and left the following day, apologising to those who lived there." The article noted that "Yves Buffetaut's book, Battles of Flanders and Artois, that enemy soldiers on opposing sides fraternized with each other over the Christmas period of 1914, ...some French soldiers applauded a Bavarian tenor, their enemy a German, on Christmas Eve while others played football with the Germans the next day." Christian Carion wrote, "I believe it took a great deal of courage for those men of Christmas 1914 to walk unarmed through no man's land at night to meet their counterparts in the opposite trench. And yes, it takes a huge amount of courage to offer your hand and venture a fraternal gesture." For just these brief periods, the normal peaceful inclinations of ordinary soldiers overcame the high level political insanity that later consumed millions of soldiers' lives during the next four years. - - - - - - - - - - - - Information Works Inc. Great War Websites High Speed Rail Passenger Trains now carry millions of people in Europe and Asia at speeds up to 220 MPH comfortably and are environmentally green. Ships - Steamboats Since 1807, river steamboats such as the Delta Queen, Alexander Hamilton, Mary Powell, Natchez, have changed America. America's Railroads Steam, diesel and electric locomotives gave every part of America fast reliable trains for people and goods since 1802.
<urn:uuid:3b628d55-4225-4694-8ac4-0bac0fe759fe>
CC-MAIN-2022-33
https://inforworks.com/soldierschristmastruces.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.959237
1,049
3.421875
3
Crescent ♑ Capricorn Previous main lunar phase is the New Moon before 3 days on 9 November 2007 at 23:03. Moon rises in the morning and sets in the evening. It is visible toward the southwest in early evening. Lunar disc appears visually 7.5% narrower than solar disc. Moon and Sun apparent angular diameters are ∠1798" and ∠1939". Next Full Moon is the Beaver Moon of November 2007 after 11 days on 24 November 2007 at 14:30. There is low ocean tide on this date. Sun and Moon gravitational forces are not aligned, but meet at big angle, so their combined tidal force is weak. The Moon is 3 days young. Earth's natural satellite is moving from the beginning to the first part of current synodic month. This is lunation 97 of Meeus index or 1050 from Brown series. The length of the lunation is 29 days, 18 hours and 37 minutes. This is the year's longest synodic month of 2007. It is 40 minutes longer than the next lunation's length. The lengths of the following synodic months are going to decreasing with the true anomaly getting closer to the value it has at the point of New Moon at perigee (∠0° or ∠360°). The length of the current synodic month is 5 hours and 53 minutes longer than the mean synodic month length. It is 1 hour and 10 minutes shorter compared to 21st century's longest synodic month length. At the beginning of the lunation cycle the true anomaly is ∠183.8°. At the beginning of next synodic month the true anomaly is going to be ∠209.6°. 3 days after point of apogee on 9 November 2007 at 12:31 in ♏ Scorpio. The lunar orbit is getting narrow, while the Moon is moving towards the Earth. It will keep this direction over the next 10 days, until the Moon reaches the point of next perigee on 24 November 2007 at 00:12 in ♊ Gemini. The Moon is 398 574 km (247 662 mi) away from Earth and getting closer over the next 10 days until the point perigee when Earth-Moon distance is going to be 357 196 km (221 951 mi). 9 days after descending node on 3 November 2007 at 22:09 in ♌ Leo. The Moon is located south of the ecliptic over the following 5 days, until the lunar orbit crosses from South to North in ascending node on 18 November 2007 at 12:46 in ♓ Pisces. 22 days since the beginning of current draconic month in ♓ Pisces, the Moon is navigating from the second to the final part of the cycle. At 04:37 the Moon is meeting its standstill point to reach South declination of ∠-28.006°. Over the next 12 days the lunar orbit is going to extend northward to face maximum declination of ∠27.958° at the point of next standstill in ♊ Gemini on 26 November 2007 at 03:58. In 11 days on 24 November 2007 at 14:30 in ♉ Taurus the Moon is going to be in a Full Moon geocentric opposition with the Sun and thus forming the next Sun-Earth-Moon syzygy alignment.
<urn:uuid:6da0e037-1d23-4dd3-a6ab-353629e48be7>
CC-MAIN-2022-33
https://lunaf.com/lunar-calendar/2007/11/13/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.912424
721
2.859375
3
The HoloLens lets you view the world with different eyes 26 July 2022 David van Snippenberg, University of Applied Sciences (HBO) student in Industrial engineering and Silvan Roelandschap, HBO student in Electronics Engineering, completed an internship at Strukton Rail. They focused their efforts on the use of the HoloLens. In this blog they tell us what this is and what they developed. Le’ts first explain the HoloLens and what it is, because not everyone has ever heard about this ‘headset’. A HoloLens is like a set of ski goggles that projects a digital image onto the real world. When you put on these goggles you not only see everything around you, but objects or texts projected onto your surroundings by the goggles as well. What’s special about the HoloLens is that it takes the real objects in the space into account. This way you can pick up a virtual cup of coffee by hand and put it on a real table. In other words, there is interaction between the real and virtual world. Strategy and technology Our internship started off with a purchase by Strukton Rail Managing Director Tjark de Vries: he purchased ten HoloLenses under the motto ‘this technology is a good fit for Strukton Rail and we are simply going to start working with it’. The plan is to use the HoloLens for Strukton Rail Signalling training courses. We were privileged to figure out how to best deploy the HoloLens. David focused on the strategic portion: is it financially feasible? How do you involve colleagues in this change? Silvan focused his efforts on the technical implementation: how do you develop a training course using the HoloLens. And how do you develop the required software? ‘This technology is a good fit for Strukton Rail and we are simply going to start working with it’ Testing the training course Next we developed a trial setup together: mounting a rail on its substructure using the explanation provided by means of the HoloLens. Not a training module to be used in real life, but purely for us as a test. Is it possible to use the HoloLens to train someone? What works and what doesn’t work? We tested this training module on ten Senior Secondary Vocational Education (MBO) students and ten HBO students, all of whom were very enthusiastic about it. The goggles fit nicely and the explanation was effective: everyone took approximately the same time to complete the installation. Furthermore, the students became very enthusiastic about Strukton Rail as a potential employer: interesting, a company that embraces such innovations. Certainly a plus point for the Recruitment department. During our internship we saw that the HoloLens has many possibilities. And also that it has major benefits. For example, you can train more people with fewer trainers. The explanation is projected inside the goggles. Furthermore, you can do the training where and when you want. Even on the tracks so to speak. Moreover, the HoloLens is not meant to save on training, it is meant to help ensure that Strukton employees are even better trained. Despite the fact that there are too few trainers – because the lack of personnel is a problem here as well – it is still possible to quickly and effectively train employees this way. What else is possible with the HoloLens? Quite a bit! For example, a technician can use the HoloLens to call a colleague via Teams. He or she can then watch what the technician is doing via the same goggles and provide assistance remotely. This is referred as ‘Remote Assist’ (see the call for participation at the end of this blog). The goggles can also be used on the railway. It projects a GIS map with cables and pipelines onto the real world and this way you know exactly where and where not to dig. The goggles can also come in handy for inspecting the work. For example, does everything match the drawings? Research shows that the goggles can help prevent as much as 50% of all faults. But are there any limitations? Well, yes and no. Although anything is possible with the goggles, the question is whether you want to do everything with them. It is better to have a trainer directly teach simple actions. The goggles are too slow and cumbersome for this purpose. We recommend that the goggles be used for complex actions only; this is where the real added value lies. Furthermore, it is important to develop a strategy: how are we going to use the HoloLens? The goggles’ versatility is a potential ‘hazard’ here as well. Because it can be used in so many different ways, it is easy to lose sight of the forest for the trees. However, it’s clear to us that the HoloLens is a great acquisition for the future. Visit us at the InnoTrans in September We will be glad tell you much more about the HoloLens at the InnoTrans in Berlin 20 - 23 September / Hall 25 / Booth 285
<urn:uuid:4e329b4b-05d1-4e9a-bd9b-72cf564d110d>
CC-MAIN-2022-33
https://struktonrail.com/our-stories/news/2022/08/the-hololens-lets-you-view-the-world-with-different-eyes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.953857
1,058
2.640625
3
Apparently, because we don’t already have enough problem with scooters weaving in and out of traffic, scientists are working on a way for rats to drive around in miniature cars. Yes, these rodents can now literally join the rat race. Smartphones and tablets are packed with sensors. Normally they’re used by apps or the phone itself, but now Android users can take advantage of their mobile device’s light sensor, microphone and accelerometer to gather and record data with the help of Google and Exploratorium’s new Science Journal app. Bento Bioworks claims it has created a compact and relatively affordable device that incorporates the machines you’ll need to prepare and analyze DNA samples on the go. The Bento Lab is meant for professionals and enthusiasts, but there will be a starter kit for newbies as well. Astronauts on the International Space Station get up to some cool experiment. Sometimes these experiments have limited scientific value, but look really cool. Take this video from the ISS shot with a fancy RED 4K camera. A few years ago we learned of rumors about contact lenses that gave the wearer night vision. But a better solution may have been around doctors for years all along. Independent research team Science for the Masses made eye drops based on Ce6, a substance used to enhance the potency of lasers against cancer cells as well as to treat night blindness. From Blade Runner to CSI, popular fiction often stretches the capabilities of photography in the service of plot. But technology has a way of catching up. Last year, psychologists Rob Jenkins and Christie Kerr were able to extract identifiable faces that were merely reflected in the eyes of a photographed person. Most people who start playing video games do so with whatever is trending at the time that they start. Same goes for other forms of entertainment as well. I’d wager that no music listeners began their journeys by hearing a primitive human banging two rocks together rhythmically, and then slowly worked his/her way through prehistory and history to the modern day. Even if you use the Internet only casually – thanks for spending time here! – chances are several companies have gathered a bit of data about you, or at least your online habits. These trawlers range from big fish such as Facebook, Google or your government to obscure advertising companies and perhaps even hackers. Facebook is the largest social network out there and has hundreds of millions of users around the world. Something you might not know is that by using the social network, you are allowing them to mess with your head at times. The weird thing about social media is that it’s not really that social in the personal sense. Sure, you can connect and message with friends and acquaintances, whenever and wherever they might be. But if you’re sending online messages to someone you could otherwise talk to on the phone or in person, then isn’t that kind of besides the point? When posting online, how much personal information is too much? A lot of people post statuses, pictures, and videos on social networks like Facebook, Twitter, and Instagram that often reveal more than they intend to. For example, someone could simply be posting a selfie shot in their garden, but other people (like would-be stalkers, for example) might be able to identify where they live from that photo alone. Lab rats have it bad enough having to jump through hoops and perform in order to be studied, but now life just got worse for the furry rodents. Scientists at Japan’s Waseda University have created a robotic rat designed to terrorize their organic lab rats, inducing stress and depression so their reactions can be studied. How do you get over an addiction? Some people check into rehab, others go cold turkey, while others resort to hiring people off Craigslist to slap themselves out of it. The first two seem like typical things to do. If robots and humans are to work together, we need to destroy all copies of The Matrix, The Terminator and other media portraying robotic uprising. That’s the first thing we should do. Only after we have done that should we expand on the experiments being done in the Jouhou System Kougaku (JSK) Lab of the University of Tokyo, which involves teaching robots to work together. Jamie and Adam have some explaining to do. While trying to bust their latest myth, they sent a cannonball through someone’s home in Dublin, California. This marks the first time that they have been busted before an actual myth.
<urn:uuid:980d6139-5017-42e6-98ca-5e8466cf6f62>
CC-MAIN-2022-33
https://technabob.com/blog/tag/experiment/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.953637
929
2.546875
3
One “campaign” claims neuroscience is the next exciting technology for business that can be applied to all aspects of business, from training to marketing; Another camp cautions that we must be cautious of implementing it since a lot of the research is in reality pseudoscience. Business leaders might be excused for being a bit confused. Which is the correct answer? Let’s examine the things that neuroscience can and cannot be used to benefit your company. Before we consider where neuroscience could be usefully applied in business, it’s essential to think about the limitations. First of all, although the nervous system and brain have been extensively studied over the many centuries, it was only in the last few years that brain imaging methods (functional MRI or fMRI) are now widely available to regularly examine the brain. In several instances substituted observational neuroscience as well as the use of surveys for gathering data. It’s worth mentioning that the motivation for the rise of neuroscience was to help treat diseases and to better understand the functions of the brain for medical purposes. It’s not about helping inspire employees, enhance the business plan, or increase sales of products. The field of science is to be in its early days – even the most optimistic of neuroscientists will tell you that we’re only aware of the bare minimum of what is to learn about the inner workings in the brain. Neuroscience could be hindered due to the cost that is involved in conducting research and how well the studies are setting up, and the purpose of the survey itself. However, there is a limitation regarding the analysis of the results of the research. A few of us have been trained in neuroscience. Therefore executives rely on those who are knowledgeable about the science to translate it into a business. Are the conclusions accurate, or are they being stretched to be stretched? It is straightforward for data to be altered, lost through translations, or not understood by the person receiving the information. In these circumstances, being cautious about neuroscientific research in a business setting is recommended. Where can neuroscience be of help? The temptation for businesses is that because studies on clinical research provide solid facts and data that back the conclusions, These conclusions are brand new “truths” that could be used to confirm or disprove previous methods of business, offer new strategies, and then be utilized in all aspects. As we’ve already said, the field of neuroscience is in its infancy, and studies that are ten years old are usually replaced by the latest discoveries. However, it can be highly beneficial when it comes to entities who understand the science and recognize its limitations. They’re often capable of drawing plausible conclusions regarding human behavior and are capable of bridging the gap between science and its application to actual life. For example, working with leaders to improve meetings, teamwork, or workplace atmosphere all boils to a single element: identifying what drives individuals’ behavior. Neuroscience has provided insight into basic needs that individuals require in different quantities in group situations. Recognizing these needs and applying strategies to ensure these requirements are met has been proven to result in real-world, tangible results for teams which is an excellent example of how neuroscience can benefit the workplace. Neuroscience also has lots to speak about the process of making decisions. The daily routine is essentially many decisions, and we can imagine why this could be relevant. In the context of business, leaders can make better decisions when they’re better aware of standard steps their brains undergo before making a decision, and, naturally, companies are always looking at the buying decisions of their customers and the ways they can influence them. The best thing to do is be aware of the people you are dealing with. Examine the credentials of organizations you deal with, ensure they are ethical and also ensure that they can bridge the gap between neuroscience and its applications.
<urn:uuid:250eaa8a-1b82-4baa-8b00-e832ec21925f>
CC-MAIN-2022-33
https://www.davidkowalski.nl/what-neuroscience-can-and-cannot-do-for-your-business-1044/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.95848
801
2.65625
3
Last Updated on May 6, 2015, by eNotes Editorial. Word Count: 462 The reader of “irrepressibly bronze, beautiful and mine” should recall that the late 1980’s, when the poem was written, was a period of raging political and literary debate about the depiction of black men in novels by black women—and in the media at large—as brutal rapists and victimizers. This debate frequently centered on Alice Walker’s novel (and the film adaptation of) The Color Purple (1982). Shange often found herself in the middle of the debate because of her widely popular play, for colored girls who have considered suicide/ when the rainbow is enuf (1976), which depicted black men as potential rapists and killers of black women. Against this backdrop, “irrepressibly bronze, beautiful and mine” can be seen for what it is—a political love poem to black men. The basic message of the poem is that the speaker has for all of her life felt intimately connected to black men. The black man she is addressing toward the end of section 1 is literally the friend of her father, who used to appear every summer, but is also an image of black men she has known throughout her life. All of her life, she says to him, she has been holding his heart in her hand. This is a turn on the cliché of holding “my heart in my hand” and implies not that she has always wanted to give herself to him but that she has always felt that she had a part of him she wanted to give to him. It also implies that the man in question, who is a stand-in for black men in general, has a lot of heart, so much that he could leave some with her. The list of black male heroes in section 2 is a tribute to the hearts of these men and an appreciation of the way they have defined the black spirit of which she feels a part. It is to the struggle and pain of defining this spirit that she pays tribute. The third section of this poem should also be read historically. A widely expressed belief of the time held that the lack of moral values within the black community was responsible for the ongoing economic subjugation of blacks and that sexuality in young people was best repressed. Opposed to this, Shange stresses the sense of vitality, excitement, and completion in sexuality. The title of this poem provides a good clue to understanding the poem itself. That the person is “irrepressible” implies a vitality of spirit that cannot be contained. The element of sensuality implicit in describing him as “bronze, beautiful and mine” conveys not only the deep intimacy the speaker feels for her subject but also contains in language the sensuousness of spirit celebrated and infused by the poem.
<urn:uuid:50d5354b-98ff-4754-957e-fbe63e2fa87d>
CC-MAIN-2022-33
https://www.enotes.com/topics/irrepressibly-bronze-beautiful-mine
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.979303
581
3
3
Abnormal laboratory results Hepatitis C: diagnosis and monitoring - D.J. Siebert, A.M. Breschkin, D.S. Bowden, S.A. Locarnini - Aust Prescr 1999;22:91-4 - 1 August 1999 - DOI: 10.18773/austprescr.1999.073 The diagnostic blood tests for hepatitis C virus (HCV) are the serological assays, which detect antibodies to HCV, and the molecular assays which detect or quantify HCV RNA. Screening tests for antibodies are first done using serological tests such as enzyme immunoassay. The molecular assays can be used to confirm the diagnosis or monitor the response to antiviral therapy. Detection of HCV RNA in patient serum provides evidence of active HCV infection. New assays can identify different HCV genotypes. All of these assays have limitations which affect their utility as diagnostic tests. Advances in viral diagnosis have significantly reduced the risk of post-transfusion hepatitis C in developed countries. The first serological assays were developed after the RNA sequence of hepatitis C virus (HCV) was identified in 1989.1 Molecular biology techniques have since been used to detect and quantitate viral nucleic acid. Various algorithms help the physician correctly identify patients infected with hepatitis C, evaluate them for the presence of significant liver disease and monitor their response to antiviral therapy. Interpreting hepatitis C tests depends on an awareness of the risk factors (Table 1) in conjunction with liver function test results. Injecting drug use (past or present) Blood or blood product use before May 1990 Abnormal liver function tests/cryptogenic liver disease Occupational exposure to HCV Extrahepatic conditions without apparent cause (e.g. mixed cryoglobulinaemia, acquired porphyria cutanea tarda, other syndromes linked to hepatitis C) Imprisonment (past or present) Sharing razors and tooth brushes with HCV infected people* Migration from the Middle East, South-East Asia, Africa, South America* Unspecified request for HCV testing (possible concealed risk)* HCV infected parent (especially mother)† Sexual contacts of HCV infected people† * Potential or moderately increased risk only † Very low risk Infectious HCV particles (virions) are less than 80 nm in diameter, have a lipid envelope and are strongly associated with the lipoprotein fraction of human serum. Each virion contains a single RNA molecule. The virus circulates in the blood as a population composed of a master sequence and a large number of minor variants. This occurs because of random mutations during viral replication and also the selection pressure exerted by the host's immune response. This mixed population of viral particles is referred to as a quasispecies and is the basis of the variation found in the HCV genome. Such intrinsic variability may explain why chronic HCV develops in over 80% of acutely infected people. Comparison of HCV master sequences from around the world has led to subclassification of the virus into 6 distinct genotypes. Enzyme immunoassay (EIA) is the most common method for detecting antibodies to HCV (anti-HCV). Three generations of anti-HCV screening assays have now been used in Australia. Improvements in the sensitivity of each successive generation of tests have been achieved by increasing the number of recombinant HCV antigens that are used, as well as modifying the other antigens present. The drawback of the first generation tests was that they produced a high false-positive rate for anti-HCV in low-risk populations such as blood donors and people with no risk factors for HCV infection. They were also confounded by non-specific reactivity in patients with autoimmune diseases and hypergammaglobulinaemias. The sensitivity was also low because only one HCV antigen was included. Supplemental assays for HCV antibodies are not widely used in Australian diagnostic laboratories. Such tests are designed to increase the specificity of serodiagnosis by detecting specific antibodies to individual HCV antigens. All of the commercially available tests are expensive. Their cost effectiveness among various risk groups of patients has not been established. Some reference laboratories currently use these supplemental assays. The overall sensitivity and specificity of second generation assays are both 95-98%. They may be increased somewhat by third generation tests which incorporate extra HCV antigens. The results obtained within each generation of tests are very similar, regardless of the commercial source of the test. The results of screening tests can be divided into two sets based on the risk of infection: The first generation tests suggested that between 0.3% and 1.5% of blood donors world-wide were positive for anti-HCV. In Australia, 0.45% of blood donors in New South Wales were found to be anti-HCV positive. At first, HCV was only identified in 95-98% of the units of blood responsible for post-transfusion hepatitis C infections. This suggested that some infected units of blood were being missed. Second generation assays detected one additional anti-HCV positive donor per 1000 tested. However, the introduction of these two generations of tests led to successive reductions in the incidence of post-transfusion hepatitis. The third generation tests are thought to detect a single additional infectious unit of blood for every 10 000 units screened. Now that screening assays are more sensitive, blood banks are more concerned with eliminating false positive screening results because their primary aim is to supply blood for transfusion which is verifiably HCV negative. The major problem in low prevalence groups, like blood donors, has been that 30-50% of sera found to be repeatedly reactive in first generation EIA screening tests could not be confirmed as positive by a supplementary antibody assay. With second generation EIAs, 39-50% of screen positive sera were later found to be false positives after supplementary antibody tests and nucleic acid assay. The vast majority of infected high-risk individuals are detected by the serological screening tests. However, first generation EIAs were only able to detect seroconversion in 50% of patients at 4 months and in 90% of patients 6 months after primary HCV infection. This relatively late seroconversion to non-structural viral antigens meant that a diagnosis was delayed or missed if patients were tested at the onset of acute hepatitis or too soon after exposure (Fig. 1). Antibodies to the C100 antigen appear after the response to recombinant structural antigens such as c22p (third generation tests) and c22-3 (second generation tests). Symptoms (*) develop in only 25% of cases. ALT = alanine aminotransferase Second generation EIAs overcame the problem of late seroconversion to anti-HCV positive status in infected patients. Between 12% and 20% of patients with chronic HCV who were not detected with first generation assays were seropositive after second generation tests. This seroconversion was usually detected within 12 weeks. A further 20% of patients with cryptogenic liver disease were also found to be anti-HCV positive by the new assays. Based on limited data, third generation tests appear to detect seroconversion earlier. A minority of infected high-risk individuals may not become anti-HCV positive.2 This includes both immunosuppressed patients with defective lymphocyte responses (who produce no antibody) and individuals infected with non-genotype 1 HCV. For example, second generation assays, which were based on genotype 1a or 1b antigens, can fail to detect other genotypes despite evidence of HCV RNA in the serum of patients with post-transfusion hepatitis. The sensitivity of all 3 generations of screening EIAs, in high-risk groups, is therefore slightly below that observed in low prevalence populations. In Australia, patients who have a positive screening test, are most likely to have HCV if they have one of the following features: The most prevalent genotypes are 1, 3 and 2. The currently used second and third generation screening tests do not appear to miss established infection in otherwise normal adults.4 However, most published Australian data include individuals derived from both high-risk (diagnostic) and low-risk (blood donor) populations and do not distinguish between the two groups. In addition, rare high-risk patients who fail to seroconvert to anti-HCV positive status do not appear in the test performance statistics. Clinicians should be aware that screening tests alone do not absolutely exclude hepatitis C in patients who have a risk factor for HCV or evidence of hepatitis. For example, in migrants from countries outside the U.S.A., Canada and northern Europe, infections due to other HCV genotypes (genotype 4 – Middle East or genotype 6 – South-East Asia) should be considered when there is clinical or biochemical evidence of hepatitis, but currently used HCV genotype 1 based screening tests are negative. Under a new National Health and Medical Research Council (NHMRC) strategy, a positive test must be confirmed before a report will be issued.5 In blood donors, the aim of testing is to establish, with the greatest possible certainty, which donors are not infected. The NHMRC strategy advises blood banks to retest all positive sera in duplicate using the same screening EIA. If the repeat tests are both negative, the donation is considered HCV negative.5 Clinical assessment will be required if the screening test is repeatedly positive. For diagnostic laboratories, which are generally screening patients with liver disease or those who have a risk factor for HCV, the strategy aims to eliminate laboratory error and confirm the positive status of a reactive screening test (Fig. 2). Those sera which are positive in the first test are retested using a different EIA which contains a different range of recombinant HCV antigens. If the second test is positive, a positive result is issued to the clinician. If there is a difference between the first and second test results, the serum is retested with the first EIA again. Where this repeat first test is no longer reactive, the screen is reported to the clinician as a true negative. However, if the repeat of the first EIA remains positive, the serum is referred to a reference laboratory for further testing.5 Molecular assays for viral RNA can be used to assess indeterminant EIA results. They can be divided into two distinct categories. The first and most common are qualitative tests which detect minute amounts of viral RNA in the serum, body fluids and tissues. These assays are based on the polymerase chain reation (PCR) (see `Diagnostic tests: DNA i. approach and techniques.' Aust Prescr 1995;18:45-8). A positive result confirms the diagnosis of HCV infection; however, a negative result does not exclude infection. Quantitative tests, including quantitative PCR and branch-chain DNA assays, have also been developed to measure HCV RNA levels in serum and other body fluids. These assays presently lack the sensitivity of the qualitative tests, but hold promise as a means of tailoring antiviral treatment schedules to pretreatment viraemia and for monitoring HCV replication during antiviral therapy.6 Detection of HCV RNA using reverse transcription polymerase chain reaction (RT-PCR) has become an increasingly important tool. The presence of HCV RNA in the serum differentiates current from past infection and can act as a marker of response to antiviral therapy. As most anti-HCV positive patients develop chronic hepatitis C, the NHMRC strategy suggests that testing for HCV RNA is not mandatory to confirm the presence of viraemia.5 Indications for qualitative PCR include: When attempting to resolve equivocal and indeterminant serological profiles, the results of qualitative PCR assays vary with the characteristics of the population under test. For example, among screen-positive blood donors in the U.S.A., only 25% are positive by HCV PCR. The misdiagnosis of HCV on a single blood test should be avoided, especially in low-risk patients. Before quantitative tests can replace qualitative tests, they must reach a higher degree of sensitivity.6 Ideally, they should help us to answer these questions: At this stage, we know that HCV RNA levels are relatively stable in untreated patients with chronic HCV and that interferon therapy reduces the viraemia in a significant proportion of treated patients. There is a high degree of variability among hepatitis C sequences obtained from different geographical sources and risk groups. These genotypes may have clinical significance. For example, some studies have shown that genotype 1b is relatively resistant to interferon therapy and may be more likely to lead to cirrhosis and hepatocellular carcinoma.7 Genotyping has been used extensively in epidemiological studies. At present, its clinical utility as a predictor of the outcome of HCV disease is being evaluated in both treated and untreated patients. Diagnostic research will focus on several areas. One priority is the identification and production of better recombinant antigens to improve the detection of anti-HCV antibodies and enhance the specificity of both screening tests and supplementary assays. In addition, quantitative antibody assays may have a role in monitoring disease activity and response to therapy. Improvements in the quantitative HCV RNA assays will be essential in the therapeutic monitoring of chronically infected patients and those undertaking antiviral therapy. The ability to detect and characterise genetic variants of HCV quickly will also become increasingly important. Variants that influence the virulence of HCV, the natural history of chronic hepatitis C or confer resistance to new treatments may have prognostic significance. In Australian diagnostic laboratories, an anti-HCV screening test is reported as positive only after the patient's serum is found to be reactive in two different assay systems. While HCV RNA is likely to be present in the serum of high-risk patients who are anti-HCV positive, viral RNA is less likely to be detected in the serum of low-risk anti-HCV positive patients. Medium- to long-term follow-up, with repeated testing for evidence of viral RNA, may be required for those who do not have a risk factor for HCV infection, but repeatedly test positive on HCV screening assays. Misdiagnosis of HCV on the basis of a single positive screening test should be avoided, particularly in low-risk patients. Quantitative assays and HCV genotyping may eventually provide data which predict the long-term risks and outcomes in both treated and untreated HCV infection. Steatosis associated with hepatitis C Picture provided by Dr Richard Jaworski Farrell GC. Chronic viral hepatitis. Med J Aust 1998;168:619-26. The following statements are either true or false. 1. The polymerase chain reaction which is negative for viral RNA does not always exclude infection because low level or intermittent viraemia may go undetected in chronically infected patients. 2. Most patients infected with hepatitis C clear the infection within a few weeks. Answers to self-test questions Department of Microbiology, Royal Brisbane Hospital, Brisbane Victorian Infectious Diseases Reference Laboratory, Melbourne Victorian Infectious Diseases Reference Laboratory, Melbourne Victorian Infectious Diseases Reference Laboratory, Melbourne
<urn:uuid:af7b7204-3525-44cc-9587-b3298ca1e9f5>
CC-MAIN-2022-33
https://www.nps.org.au/australian-prescriber/articles/hepatitis-c-diagnosis-and-monitoring
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.93004
3,255
2.859375
3
Cold and Flu When to See a Doctor The cold, which is the same medical entity as the common cold, and the flu, also referred to as influenza, are two extremely common, usually seasonal viral infections, mainly characterized by fever, headache, cough and a runny nose. The two terms, cold and flu, are used by many patients interchangeably, but they are different medical conditions, with different causative viruses and complications, which many times cannot be told apart. EPIDEMIOLOGY AND CAUSES It cannot be argued that the common cold and the flu constitute two of the most common types of human ailments, if not the top two. Statistics show that adults are affected 3 times per year on average from the common cold, whereas children suffer from it approximately 6 times every year. Concerning the flu, it has been reported that about 1 in 5 people in the United States are affected by it every year. You can catch the cold all-year round, but it usually happens in the winter. The flu, on the other hand, runs from fall to spring, and, just as the cold, people most frequently get it during the winter. The cold and the flu have the same general cause: they are the results of viral infections. However, different types of viruses are responsible for the two diseases. The cold is caused by the rhinovirus in the majority of the cases, whereas the flu is a result of infection by the influenza virus A, B or C. Symptoms tend to overlap, and it is not always easy to distinguish between the common cold and the flu. Symptoms that are typical of the common cold include a runny nose, sneezing, and coughing. Nasal discharge may be yellow- or green-colored and the cough is productive, which, is a medical term to say that it also produces sputum. Sputum may be clear, yellow or green. These symptoms are often accompanied by a sore throat and mild, if present, pains in muscles and bones. A mild headache may also exist. Adults do not usually have a fever when they are affected by the cold, and, if they do, it is low-grade. The flu results in very similar symptoms. A runny nose and sneezing are sometimes present and the cough is generally more dry, without the production of sputum. You may sometimes get a sore throat and body aches that can be debilitating and affect the whole body. Fever is present and high. The flu, especially in very young and very old people who have other health problems, can result in serious complications, such as pneumonia, multiorgan failure and, possibly, hospitalization and death. DIFFERENCE BETWEEN THE FLU AND A COMMON COLD Keep in mind that, in adults, high fever with chills indicates the flu. A cough that results in coughed-up sputum is more compatible with the common cold. Furthermore, severe body aches felt across the whole body with extreme weakness suggest that you are down with the flu. Even though it may seem like a simple task to differentiate between the two infections if someone does not get tested, it is many times difficult to tell the difference between some symptoms may not be present, or may suggest the other infection. In a nutshell, the cold is an infection that tends to be milder and develop gradually, whereas the flu develops abruptly, with severer symptoms and may have serious complications for some people. WHO IS AT HIGH RISK FOR DEVELOPING COMPLICATIONS FROM THE FLU? As mentioned above, the flu can have serious complications for some individuals. This should primarily concern: • People with an immature immune system: infants, children. • People with a compromised (weakened) immune system: senior citizens, people with inborn defects of the immune system, people who has received a transplantation, people who take drugs that weaken the immune system • People who have comorbidities, namely other serious, co-existing conditions, such as heart failure, diabetes, rheumatic diseases, cancer, etc. HOW DO WE GET THE FLU OR COLD? Both the cold and the flu are caused by viruses that go about in the air. When a person is infected, tiny droplets containing the virus are thrust into the air. You can get these viruses if you happen to be nearby and inhale the droplets; to get infected, someone does not need to sneeze right on you, but a very small amount of airborne viral load that you won’t even feel and can be transmitted when someone talks are enough. Another way to get infected is by touching a surface or object previous touched by someone who had the virus. WHEN TO SEE A DOCTOR If you belong to any of the categories of people at high risk of complications and you experience symptoms possibly related to the flu or the cold, do contact your doctor. If you do not belong to any of these categories, and experience cough, fever, fatigue, congestion, and headaches that do not get better in 2 days, also contact your doctor. If you develop other alarming symptoms, such as fainting, dyspnea (difficulty in breathing), severe chest pain and loss of orientation or confusion, seek immediate treatment, as they are indications of a disease spread and subsequent complications. Depending on your symptoms, your doctor will acquire a detailed medical history and perform a thorough physical examination. He or she will obtain vital signs (blood pressure, temperature, heart rate and oxygen), listen for abnormal breath sounds through auscultation, perform a neurological exam and look at the skin for any abnormalities. They will also check your ears and throat. Tests that provide a reliable answer to whether you have the flu are available and require the doctor to obtain a swab with material from the nose or throat. The test is completely painless and non-invasive. Basic treatment for the cold and flu involves fluids, resting and staying at home. You can use painkillers and over-the-counter NSAIDs (nonsteroidal anti-inflammatory drugs) to relieve pain. A doctor may prescribe antibiotics, but only in the case of a complication, or for the avoidance of a potential complication; otherwise, antibiotics do not work for the common cold or flu itself, because they target bacteria, not viruses. Anti-viral drugs to fight the flu are also available, which need to be prescribed and ingested within 48 hours from the start of symptoms. Anti-viral flu vaccines are available and are usually administered to people at high risk of ending up with complications if they get the flu, healthcare providers or other groups of people. Talk to your doctor to see if you really need to get a vaccine. • I avoid getting out in the cold, because, I will catch a cold. Being in cold temperature and air doesn’t cause you to catch a cold. It is a virus that results in the disease. • I got the flu this year, this is why I will not get it again. People can get sich with the cold or flu more than one time per year, simply because there are various types and sub-types of viruses that cause them.
<urn:uuid:23707230-cf12-41a8-a0bb-693b909b4018>
CC-MAIN-2022-33
https://www.ourdoctor.com/cold-flu/cold-and-flu-when-to-see-a-doctor
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.957599
1,525
3.890625
4
The phonics argument appears to have been cut and dried, at least so far as the teaching of children in primary schools is concerned. In the world of adult literacy, however, the battle continues. Opinions remain divided on the effectiveness for older learners of this method, which connects the sounds of spoken English with letters or groups of letters. The fact that phonics is primarily associated with teaching very young children the basics of reading has led many teachers working with adults to make scant use of it. And there has been a widespread assumption that adult learners will not be very receptive to a method they could perceive as babyish and of which some might have unfavourable memories. But advocates of phonics as a key tool in teaching adults to read believe the time is ripe for a change in attitudes. They hope to get the go-ahead and funding for a major experiment they are confident will produce compelling evidence for their case. Their hope is that the study will have a similar impact to the one that convinced the Rose review of the primary curriculum in 2005 to plug "synthetic phonics" as the main modus for teaching young children to read, and the government to accept this recommendation. A proposal to carry out a substantial randomly controlled trial comparing phonics with other mainstream methods of teaching adult literacy has been put to the Economic and Social Research Council (ESRC) by a team of academics from London University's Institute of Education and the University of York. "It's due to be considered by the relevant committee at the ESRC in the next month or so," says Professor Greg Brooks, one of the team. If all goes according to plan, Brooks - who was a member of the Rose review led by the former Ofsted director Sir Jim Rose - reckons it will have a powerful effect on adult basic skills education. "It ought to convince adult literacy teachers that this is something they should take seriously and incorporate into their teaching practices," he says. His confidence has been boosted by a recent project that looked at three approaches to adult literacy, including phonics. Although a small number of teachers was involved, the results were dramatic. Only two out of nine teachers from across the country who took part had previously used phonics to any significant extent with adults, though all had had some training in it. Throughout the autumn of 2007 all used phonics systematically. Eight of the nine said they would definitely continue to use the strategy. The approach also proved popular with the students, who were mainly at the lowest stages of literacy (entry level 1-3). According to the assessment, they made "significant progress in reading comprehension and spelling" and this was achieved in a very short time. On average they attended only five or six sessions between assessments of reading and spelling. Although relatively modest, this is the largest study of teaching strategies in adult literacy carried out to date in Britain and it fills a gap. There was an almost complete lack of evidence relating specific teaching strategies to any progress that adult literacy students make, Brooks says. The study was led by his partner and academic colleague Maxine Burton and a group at Sheffield University, commissioned by the National Research and Development Centre for Adult Literacy and Numeracy (NRDC) and funded by the Department for Innovation, Universities and Skills. The final report on the project is awaiting Dius's go-ahead for publication, although Burton and the team have produced a "practitioner guide" for teaching phonics based on the study. Like Brooks, Burton is pleased at the extent to which the participating teachers warmed to phonics. "There is a controversy about using the strategy," she says. "It's associated with teaching reading to children and adult literacy practitioners are fairly careful not to teach adults like children. And the use of phonics in teaching children has faced controversy - but recently there has been a volte face on this." The hypothesis Burton wanted to test in the NRDC project was why, if it was now shown to be effective with children, the phonics approach should not work well for adults. But first it was important to clear up a misunderstanding, she says. "People imagine the phonics method means that nothing but phonics is used," she says. "Our approach is that it should be part of a much broader curriculum." June Borrowdale, one of the teachers who took part, endorses this. Though considerably more enthusiastic about phonics after the project than she was before, she says she would never present it without other strategies. An undiluted diet of phonics would become boring. Borrowdale, who is based at North Nottinghamshire College, moved into basic skills teaching five years ago. She did a year's training course at Sheffield Hallam University, which included some phonics. "It wasn't given particular prominence," she says. Her class of up to eight students were on the lower entry levels of literacy and they were eager to try different approaches "because these people were getting pretty desperate. They had tried and tried over the years and nothing had worked." Most of them had heard about the success of phonics with children. "We did have a resistance from a couple of learners because they felt it was babyish - sounding out c-a-t," Borrowdale says. "But I explained that it was important to go back to the beginning." To vary the mix and reinforce what students had learned, she would use games, but again these needed to be introduced with care: "You have to make clear with adults that they are learning, that the games have a purpose." The project opened her eyes to phonics. "There was lots of repetition but it did work and at the end of the year the learners felt they had benefited," she says. There are, however, formidable sceptics about phonics. Alan Wells, former director of the now-defunct Basic Skills Agency, says phonics might prove useful with a very small group of adults who have no reading skills. But the vast majority of adults who need help with reading and writing are not at the lowest entry levels. "For adults, who have far more problems than young children, I doubt whether phonics are going to work," says Wells. "They have a wide range of problems, from spelling to poor comprehension." The common explanation from adults who could not read had formerly been that they had been at the back of the classroom and overlooked by teachers, but this is becoming rarer, he says. "You won't find many who had problems at school and were not targeted with a range of methods. If all these interventions, including pretty certainly phonics, haven't worked, I'm not sure that they are going necessarily to work now."
<urn:uuid:2856d96e-18a5-4eef-a92a-bd2fbb30b1f5>
CC-MAIN-2022-33
https://www.theguardian.com/education/2009/apr/14/literacy-adult-education-phonics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.987506
1,371
3.09375
3
Are you trying to figure out how to browse the web safely? Read this article to learn pro tips for using the internet safely. The average person spends more than six and a half hours a day online, which adds up to about a quarter of their life is spent on the Internet. What’s scary is that the average person has had personal data stolen at least four times in 2019, probably without knowing it. Do you want to browse the web but nervous about doing it safely? Keep reading to learn these pro tips for secure browsing to keep your information safe. Install Antivirus Software There is a reason we list this first. It protects your computer and information from malicious software that can be found on various sites. The programs and websites may seem valid, but behind the scenes, they steal your valuable information. Threats can hide in reputable websites and sources, but the antivirus program monitors every application. It will detect an attack before it happens. You should make sure you stay on top of updates for your antivirus software. You should also consider getting a suite or making sure you have Ransomware. Most of these programs are free, and they add another layer of protection. Be sure you renew your subscription every year for secure Internet browsing, or you will be left unprotected. “Do Not Track” in Your Browser Several browsers have the ability to issue “do not track” to websites. You just have to enable this request. It depends on how the sites respond to this request, but it still is a good idea to tell sites you don’t want to be tracked. Use Unique Passwords You don’t want to use the same password multiple times because if one website is hacked your information can be shared for other sites as well. It is hard to remember unique passwords for multiple sites because these passwords need to be unpredictable, long, and have symbols and numbers. To help you remember all your passwords, you should use a password manager. These programs encrypt and securely save your login information for multiple sites. They can also help you sing in automatically—you just need to remember the main password. Turn on Private Browsing You can use private browsing to block websites from tracking your browsing data. It doesn’t hide your activity from your service provider. But, it will reduce cookie accumulations, which can be helpful if you want to keep something secret like a surprise gift for your significant other. Get a VPN and Use It VPNs (virtual proxy networks) encrypt your data from Internet requests before they reach the web. It works the same way no matter how you are connected to the Internet. The encrypted data is then sent to the VPN server that will decrypt the requests before it gets to the online destination. The information is then sent back the same way to protect your information. This keeps advertisers and Internet service providers from tracking your moves. Keep Your Browser Up-To-Date Keeping your browser updated is vital to your safety. Patches are released to fix any vulnerabilities. This applies to both PC and Mac with all types of browsers, and yes, you can get Internet Explorer for Mac. Updates are vital beyond your browser. Be sure you update the operating system or any other software as soon as possible because they are also fixing problems. Be sure to turn off pop-ups in your web browser. The ads are more than just annoying; they can also contain inappropriate content or malicious links. Most browsers have automatic filters, and you can allow them for trusted sites if you want. Watch out for Phishing Phishing attacks are ways to trick users into giving out their personal and sensitive information. These messages appear to be from reputable sites like banks, shopping sites, payment processors, and social media sites. The links actually take you to a site that looks legit but steals your information. To avoid these issues, don’t answer unsolicited messages from any of your vendors or even your bank. You should never click on hyperlinks or attachments in emails. You should just go straight to the main site if you have questions. Pay With Your Smartphone When possible, pay with your smartphone with Apple Pay or Android equivalent when you can. The old credit card system is not as secure. The app adds an additional layer of security, and you can choose which credit card, debit card, or bank account you want to use. The “s” in “https” means secure, so this website has encryption features. When you visit a site, look for the “https:” or the padlock icon in the URL bar. This verifies the site is secure, and you can enter personal information. Avoid Public or Free WiFi Even though most people know this, it deserves to be repeated. Do not use public WiFi or any free WiFi to send personal information over the Internet. Wireless sniffers can steal your information from these unprotected networks. Clear Your Cache Even if websites do track your data, you can limit impacts. To do this, you need to clear your browser cache and delete cookies, and you can do this by going to your browser’s settings. This prevents ads from around the web from following you based on your search history. You can do this manually, but you can also use software to automate this process. You may want to consider allowing sites you visit regularly by whitelisting them, so this way you don’t have to keep re-entering your login details. Now You Can Browse the Web Safely Follow these tips and you can browse the web securely. Just remember to always do updates and be careful when you give out your personal information. Ready to explore beyond the Internet? Keep checking out our site for more travel adventures.
<urn:uuid:0274237d-e6b3-479f-ae92-c8ca2f59c993>
CC-MAIN-2022-33
https://www.travelwithamate.com/how-to-browse-the-web-safely-while-travelling/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.909764
1,202
2.8125
3
Fistula is abnormal opening between two tubular organs. Females generate fistula in urinary and reproductive tract such as- Vesico vaginal fistula: abnormal opening between vagina and bladder. Uretero vaginal fistula: abnormal opening between the vagina and the ureter. Urethro vaginal fistula: abnormal opening between the vagina and the urethra. These fistulas are the result of trauma, pelvic surgery, infection or inflammatory bowel disease. This occurs during childbirth when the labour is long and protracted. The fistulas usually lead to constant leakage of urine and stool from the vagina, irritation in female genital organs; frequent UTI’s and other symptoms include vomiting diarrhea and abdominal pain. Non Invasive Measures: Fibrin glue: a medicinal adhesive glue used to seal the fistulas. Plug: collagen matrix to fill the fistula. Catheters: to drain the fistula in order to prevent infection. Trans abdominal surgery: Fistulas are treated by making an opening into the abdominal wall and fistulas are sealed. Laparoscopic surgery: Using the camera and small tools inserted to repair the fistulas.
<urn:uuid:a2a70ed9-d08c-479d-9857-e9d7950d4cd3>
CC-MAIN-2022-33
https://www.urocarebangalore.com/fistula-in-females/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.830608
245
2.984375
3
Minimizing moisture is key to winter hay storage Ranchers need to plan ahead regarding winter forage supplies, and this includes finding ways to store hay to help preserve quality and reduce moisture damage. Dr. Emily Glunk Meccage, former forage Extension specialist in the Department of Animal and Range Sciences at Montana State University (MSU) was involved with a research project a couple years ago, which looked at round bale storage outdoors as not everyone has the luxury of hay sheds, and on many ranches, there is a lot of hay stored outside. “We found how individuals stack hay affects the quality and the moisture retention of those bales over the winter. We want to minimize the amount of moisture and mold in those bales because it can affect cattle health and performance,” says Meccage. Danielle Peterson, livestock production specialist for Purina Animal Nutrition, was a graduate student at MSU during this study, and the research was part of her thesis. She says after processing the data, results were similar to other studies assessing hay stored in various ways. These results showed indoor storage is best, but for outdoor storage, single bale high in a long row seems to be the most consistent for retaining quality within bales. The pyramid stack is intermediate. Many people don’t have enough hay yard room to put all their bales in long single rows, so they stack some on top of each other to save space. Even though this might seem more efficient, it can lead to more spoilage. “We looked at differences between bales stored at the top of the pyramid and the bottom. However, the mushroom stack, where the bottom bale is upright and another is placed on top on its side, had the most variability,” says Meccage. “We found top bales had hardly any change in quality, but bottom bales soaked in moisture that had run off of the top bales, as well as moisture from the ground surface,” says Peterson. “Visual quality of the bottom bales from the ground up was much lower than visual quality from the top down.” The bottom bales were significantly lower in total digestible nutrient (TDN) and energy content and were higher in moisture content than the top bales. “This reduction in forage quality can have an impact on animal performance,” says Peterson. If producers are feeding one group of cattle the top bales and another group the bottom bales, they might be getting completely different nutrient levels, even if the hay was harvested at the same time from the same field. “We did a two-year study, and at one of our locations we saw a lot more mold growth in between the bales in the pyramid stack than we did the first year,” says Meccage. “Each year is a little different in how much moisture those bales receive and when they receive it.” Peterson says there are different amounts of precipitation at various locations on any given year, and thus, hay storage results including amount of dry matter and quality loss differ each year. “For example, during the second year of our study, our hay storage location at Havre, Mont. had extremely high precipitation compared to other years,” Peterson says. “Moisture that freezes won’t create as much mold as moisture in warm weather.” “When planning long-term, it’s often a good idea to hold some hay in reserve in case we have a bad year. If we plan to keep some hay over for the next year, it pays to try to stack the hay in a manner that it will keep better and not be ruined by moisture,” says Meccage. A person could afford to build a hay shed with the money lost in damaged hay over time. “Hay that’s been stored outside and uncovered may decline in dry matter and quality,” says Peterson. “Feeding this hay can result in lower animal performance including lower average daily gains, poor animal health and possibly even abortion in cows in certain cases with moldy hay.” Return on investment varies depending on how much hay and what type of hay individuals store, but a hay shed will pay for itself over several years. “One of the cheaper options that has a beneficial effect fairly quickly is just to decrease the hay-to-soil contact. Having a gravel base to stack hay on will greatly reduce moisture damage. Putting hay on pallets, railroad ties or gravel will allow for drainage and eliminate moisture wicking up into the hay from wet ground. This will help preserve hay quality,” says Meccage. Putting tarps or black plastic over the hay can also protect it from wet weather and can be economical, especially if producers stack bales on top of each other. The tarp can cover twice as much hay as with a single row. Even though these coverings are expensive, they can often be re-used for several years, which makes them more cost-effective in preserving quality of the hay. The covering also keeps snow and moisture from freezing on the bales, which can make it very challenging to remove the net wrap or twines when feeding them. Heather Smith Thomas is a corresponding writer for the Wyoming Livestock Roundup. Send comments on this article to email@example.com.
<urn:uuid:d699940e-0e10-42c4-8451-c57937ee7a1c>
CC-MAIN-2022-33
https://www.wylr.net/2020/11/27/minimizing-moisture-is-key-to-winter-hay-storage/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00688.warc.gz
en
0.959881
1,137
2.703125
3
Before going into the analytical questions, there probably needs to be some explication as to how the Pygmalion myth fits into the consideration of robots as a topic. Although there is divine intervention, certainly a direct relationship between the creator and the created is a common consideration in literature concerning robots. Of course, Pygmalion did not have access to the technologies commonly associated with building a robot, but he did use what resources were available at the time to create an entity that was not born of woman. There are other myths in which beings are created through the efforts of an individual will, such as the story of Prometheus' creation of man from clay; however, that process of creation entirely delegates the role of the creator to a divine entity. Since the topic of robots involves the crucial element of human creators, one might view the Pygmalion myth as contributing to the idea of human involvement in the creating of an artificial life. 1) What is the role/function of the statue-turned-maiden? Why was it created? Here the reader can see a case of pure projection. Pygmalion had constructed what to his mind constituted the perfect woman, or at least the most unprecedented woman relative to the ones he had encountered. On a physical level, he sculpted features into the object of his desire that would be most appealing to him. Since she could not react to him as a thinking, feeling woman, he made up fantasies in which he interacted with her. All this had to be dictated solely by his imagination and will. However, this situation was not to his complete satisfaction. He wanted her to respond, but what he asked for negotiated a hard balance between his being able to define tightly the parameters under which she should operate and allowing her free will. This tension is a source of much conflict within later literature between the creator and the created, but in Pygmalion's case, the results of his work result in his satisfaction. 2) How human is it? Is it meant to be so? The statue was remarkably human in appearance even before it was brought to life. On the other hand, the nature of her character is unclear by the end of the story. If she became a woman compliant to Pygmalion's fantasies, then she would become little more than an extension of his will--a tool or a plaything not much different from the statue she had been. The ability to resist, to exercise free will seems to be crucial to the fundamental definition of human existence. There was no definitive manifestation of free will on Galatea's part. She functioned relative to Pygmalion's expectations and did not behave in any way that took her beyond those boundaries. This x factor that would have made her more human seems to be missing, but if she were to approach him as an equal, one might wonder if the ending of the story would have come to such benign fruition. However, there was no pressing of this issue, since Pygmalion had defined how the relationship should be conducted from the beginning. Other literature would find detrimental consequences to Pygmalion's lack of compromise in the relationship. 3) How does it act in society and how do humans react to it in turn? Galatea fulfilled the role of wife and mother, but since that fell well within the expectations of Pygmalion and his society; nothing consequential has come of it. Relative to today's standards, this may reflect some limitations in perception with regard to the roles of women and to considering the real consequences of ostensibly getting what one wishes for. 4) What are the consequences within the context of the world of the work? As discussed in question #2, she really does not function in any other capacity than an extension of Pygmalion's desire and will. Since there is no consideration of potential conflict in the relationship, one can assume that she does not evolve much beyond that role. To read more about the objectification of women within the thematic context of robots, click here to go to the film division of this website. 5) Does it introduce a new idea or aid in the evolution of the robot? If so, what is its contribution? This sets a precedent for humankind becoming involved in the process of creating an artificial life. Admittedly, Pygmalion merely created the form of Galatea while Venus provided the actual means for Galatea to achieve life, but Pygmalion's desire to define his creation's existence informs the kind of relationship that can exist between the creator and the created. In Galatea's case, Pygmalion has essentially designed her to meet his every specification. However, the myth does not consider the viabilty of maintaining that level of control, or the potential for the creator to lose control of the created, or even be dominated by the created, but there are other subjects discussed throughout this website that examine those outcomes. Return to Summary and Background on Pygmalion. Go to Bibliography. Return to Literature Index.
<urn:uuid:c1e60348-5fe9-4bd6-a6f7-d506f024432b>
CC-MAIN-2022-33
http://websites.umich.edu/~engb415/literature/pontee/Pygmalion/Pygqstns.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.982327
1,031
2.953125
3
Online discussion and critical thinking skills: A case study in a Singapore secondary school AbstractStudies have shown that electronic discussion can be used effectively to teach critical thinking and can achieve greater understanding. The use of online discussions is common in polytechnics and universities, and many schools in Singapore have begun to introduce online forums for discussion beyond the classroom. This research investigates lower secondary school students' critical thinking in an asynchronous online discussion environment. The findings show that the students in this age group have only minimally exhibited critical thinking skills during the online discussion. However, investigation into students' perception of online discussion shows positive attitudes. Some enhanced scaffolding strategies for online discussion participants and guides on designing good questions are recommended to foster critical thinking skills in this environment. How to Cite Articles published in the Australasian Journal of Educational Technology (AJET) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant AJET right of first publication under CC BY-NC-ND 4.0. This copyright notice applies to articles published in AJET volumes 36 onwards. Please read about the copyright notices for previous volumes under Journal History.
<urn:uuid:c3a193ff-11a4-4bfa-9fae-3a1e230bd4bb>
CC-MAIN-2022-33
https://ajet.org.au/index.php/AJET/article/view/1191
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.876237
287
3.203125
3
First Definition of NFS |Definition:||Not for Sale| |Guessability:||2: Quite easy to guess| |Typical Users:||Adults and Teenagers| What does NFS mean? Network File System (NFS) NFS, or Network File System, was designed in 1984 by Sun Microsystems. This distributed file system protocol allows a user on a client computer to access files over a network in the same way they would access a local storage file. What does NSF mean on TikTok? ” Not So Fast ” is the most common definition for NSF on Snapchat, WhatsApp, Facebook, Twitter, Instagram, and TikTok. NSF. Definition: Not So Fast. What is NFS in FB? This is what NFS stands for. What does NFS mean in shoes? ‘NFS’: Not for sale. What does NFS mean on Roblox? Home / All Camps / Minecraft & Roblox / Advanced Roblox Camp – Game Development: Need For Speed! What does NSF mean in medical terms? Nephrogenic systemic fibrosis (NSF), also known as nephrogenic fibrosing dermopathy (NFD), is a disease of fibrosis of the skin and internal organs reminiscent but distinct from scleroderma or scleromyxedema. It is caused by gadolinium exposure used in imaging in patients who have renal insufficiency. What is NSF healthcare? About NSF International: NSF International (nsf.org) is a global independent organization that writes standards, and tests and certifies products for the water, food, health sciences and consumer goods industries to minimize adverse health effects and protect the environment (nsf.org). What does NSFW mean in text? not safe for work; not suitable for work —used to warn someone that a website, email attachment, etc., is not suitable for viewing at most places of employment Sure, you can let employees use company PCs for non-work Web browsing, but you don’t have to let them visit NSFW sites.— What does NFS stand for Tryhackme? NFS stands for “ Network File System ” and allows a system to share directories and files with others over a network. By using NFS, users and programs can access files on remote systems almost as if they were local files. It does this by mounting all, or a portion of a file system on a server. What does SFS mean on Snapchat? It either stands for ” snap for snap “, “shoutout for shoutout”, or “spam for spam”. What does NFS mean in food? NFS = not further specified. NS = not specified. Food codes with NFS, NS, quantity not specified, or guideline amount per in the measure description are used when the amount of food eaten is not known. What is Murah? = heart of kindness, loving and loving character: once you say, thousands of times you accept your heart; generous (kinder) give, not stingy: he is a friend who is very afraid of the wrath of God. murah 1.
<urn:uuid:07549f33-5719-4ca8-b872-6ba663aa24af>
CC-MAIN-2022-33
https://cheapsocialmarketing.com/instagram-marketing/what-does-nfs-mean-on-instagram.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.895185
701
3.03125
3
Substance Abuse & Personality Disorder Personality disorders are a type of mental health condition in which people have problematic or maladaptive patterns of thought and behavior which are characteristically inflexible, inappropriate, and disrupt the lives of those affected. People with personality disorders have difficulty controlling their emotions and tend to behave or react to others in socially unacceptable ways. This often causes distress and turmoil in their personal, professional, and social lives. People with personality disorders often do not realize or accept that their thought patterns or behaviors are the cause of their problems; instead, they tend to shift blame onto others.1 There are 3 main types, or clusters, of personality disorders, which are grouped based on some similarities in their characteristic features and presentation.1,19 - Cluster A—Disorders characterized by odd or eccentric thoughts and behaviors. This includes paranoid or schizoid personality disorders. - Cluster B—Disorders characterized by dramatic or disordered emotional reactions and unpredictable or inappropriate behaviors. Borderline personality disorder (BPD), antisocial personality disorder (APD), and narcissistic personality disorder are in this group. - Cluster C—Disorders characterized by anxious or fearful thoughts and behaviors, including avoidant and dependent personality disorders and obsessive-compulsive personality disorder. People with BPD often have unstable and intense emotional reactions, impulsive and harmful behaviors, and chaotic relationships with others.4 People with APD, sometimes called sociopathy, have little regard for social rules, are manipulative, and treat others coldly or harshly, without guilt or remorse for any harmful consequences of their actions.5 Substance use is commonly seen in people with personality disorders. Certain ones—such as BPD and APD—are very strongly associated with substance abuse.21 Though we often see alcohol or drugs in the context of mental disorders, such problematic substance use can worsen or complicate the course of these mental health disorders in the long run.2 The use of substances by people with mental health issues can increase the likelihood of developing a co-occurring substance use disorder (SUD), which is often characterized as problematic alcohol or drug use that continues despite giving rise to health issues or causing problems at work, school, or home. A person with an SUD often come to “need” the substance to face daily life and may continue seeking and using the substance, even if it results in a situation where they are in financial distress, desperate and alone, after cutting ties with family and friends who disapproved of their substance abuse.3 Substance abuse and substance use disorders (SUDs) can be common with mental illnesses, including personality disorders. If someone is dealing with both a mental illness and a substance use disorder then that is identified as a co-occurring disorder. Standards in the Diagnostic and Statistical Manual used by mental health professionals indicate that, for those who have both a substance use disorder and a personality disorder, the primary disorder is the personality disorder provided that the personality disorder does not occur due to the effects of the alcohol or drugs.20 The personality disorder is primary if the disorder’s symptoms were apparent before the addiction began and continue when drug and alcohol use has stopped.20 Being diagnosed with a personality disorder and an SUD allows care providers to then work to determine if the personality is primary or substance-induced so that then they can determine the most effective treatment.20 What Is Borderline Personality Disorder? BPD usually starts in adolescence or early adulthood.6 A person with BPD may have trouble regulating their emotions and can experience dramatic mood swings. They may have intense feelings of anger, sadness, or anxiety that can last for hours or days and quickly shift from one intense emotion to the next. This turbulent emotional state can trigger intense, uncomfortable feelings and impulsive behaviors and result in a chronic pattern of dysfunctional and chaotic relationships with others.7 People with BPD may also have a distorted, negative, and unstable self-image and feel that others regularly misunderstand or mistreat them. They may react to perceived mistreatment or abandonment with anger and aggression or by engaging in self-harm or other impulsive, risky behaviors.8 Other signs and symptoms of BPD include: 6,9 - Intense fear of abandonment and being alone. People with BPD may go to extreme measures to avoid this; they may also cut off communication with someone abruptly in anticipation of being abandoned. - Chronic patterns of intense and unstable relationships, which swing from idealization to intense dislike or anger. - Impulsive and risky behaviors, such as unsafe sex, reckless driving, binge eating, and substance abuse. - Self-harming behaviors, such as cutting or suicidal behaviors or attempts. Borderline individuals may find it difficult to maintain employment and relationships or to complete educational or other goals. Bouts of intense, inappropriate anger may cause ongoing conflict in relationships and can result in legal issues and even jail time. People with BPD may be more likely to be in abusive relationships. The impulsivity common to borderline personalities can result in unplanned pregnancies, sexually transmitted diseases, accidents, and physical altercations.6 The exact causes of BPD are not fully understood, but it is thought to result from a combination of factors including the following:10 - Genetics – People with close family members who struggle with BPD may be also be at higher risk themselves. - Brain structure and function – Certain neurological differences may make it more difficult for people with BPD to control emotions and could result in impaired judgment and communication abilities. - Environment – exposure to prior traumatic life events may increase an individual’s risk of developing BPD. Borderline Personality Disorder & Addiction Some estimates have been made that as many as 2.7% of adults are affected by BPD and of these, nearly 80% will have a co-occurring substance use disorder or alcohol use disorder (AUD) at some point in their lives.12 The high rate of co-occurrence of substance use disorders in people with BPD may be due in part to their characteristic impulsive behavior.13 People prone to acting impulsively may be more likely to drink or use drugs, even when they know that it could be damaging to their future goals or present life circumstances. Difficulty regulating emotions, especially negative emotions like anger and depression, is also a key characteristic of BPD, and using substances to dull the effect of negative emotions is reported to be one of the primary motivators leading to substance abuse.14 People with co-occurring BPD and SUD tend to be even more impulsive and unstable than those with only BPD. They also have higher rates of suicidal behaviors, drop out of treatment more often, and have shorter periods of abstinence or sobriety than those without BPD.12 BPD itself is difficult to treat due to the characteristic impulsivity and unstable self-image; a co-occurring SUD could make these issues worse, which in turn makes treatment more challenging. For these reasons, it could be beneficial to address both disorders at the same time. People with BPD who don’t receive adequate treatment are less likely to make healthy life choices and more likely to develop other chronic mental or medical illnesses.9 What Is Antisocial Personality Disorder? People with APD have rigid and dysfunctional thought processes and a history of impulsive and aggressive behavior, with no remorse for the consequences or violating the rights of others.15,16 The characteristic behaviors seen in APD cause problems in relationships and in maintaining employment.17 APD affects approximately 4.3% of the population, with the highest rates seen in young, unmarried men with lower levels of education. APD is prevalent among those who are/have been incarcerated.15 Other signs and symptoms of APD include:18 - Persistent lying or use of deceit to exploit others. - Being callous, cynical, and disrespectful to others. - Manipulating others for personal gain or personal pleasure. - Having a history of legal problems, including criminal behaviors. - Using intimidation and dishonesty to violate the rights of others. - Engaging in impulsive and dangerous behaviors. - Having no concern for the safety of oneself or others. - Lacking empathy or remorse for having harmed others. - Having a history of abusing others in relationships. - Being unable or unwilling to consider negative consequences or learn from past mistakes. - Repeatedly failing to fulfill work or financial obligations. The characteristic behaviors associated with APD, which include violence, irresponsibility, recklessness, and dishonesty, can result in substantial psychological, legal, and financial burdens for affected individuals, their families, and spouses. APD is also associated with increased mortality from unnatural causes, especially at a younger age, and increased rates of suicide, medical illness, and injury.15 While the cause of APD is not yet known, the following factors are associated with an increased risk for developing APD:5 - Having been diagnosed with a conduct disorder in childhood. - Having a family history of APD or other personality or mental health disorder. - Having experienced abuse or neglect in childhood. - Having a violent or chaotic family life in childhood. Antisocial Personality Disorder (APD) & Addiction Substance use disorders are very common in those with antisocial personality disorder. Prevalence estimates indicate that more than 80% of people with APD will have a co-occurring SUD at some point in their lifetime.15 People with APD also exhibit impulsive behaviors, which might increase the likelihood of greater substance use and being unable or unwilling to cut down or stop using a substance, even when use has become a problem in many aspects of their life.18 People with APD are also prone to engaging in risky behaviors, without regard for self-harm, which could lead to or escalate problematic substance use. When it comes to treatment for this comorbidity, a long-term, highly structured integrated approach that addresses both the substance use and personality issues may be the optimal strategy.21 Such a strategy may involve some combination of evidence treatment approaches such as contingency management and cognitive behavioral therapy (CBT) to support changes in maladaptive thoughts and encourage healthy changes in behavior. Other treatment approaches that support motivation may also prove useful in integrated treatment, as people with both BPD and APD tend to have chronic issues with negative self-image, and establishing external sources of motivation to boost their self-image could additionally support functional recovery.2 - Mayo Clinic. 2020. Personality disorders. - National Institute on Drug Abuse. 2020. Common comorbidities with substance use disorders. - 2020. Substance use disorder. - gov. 2017. Borderline personality disorder. - Mayo Clinic. 2020. Antisocial personality disorder. - Mayo Clinic. 2020. Borderline personality disorder: Symptoms & causes. - 2018. Borderline personality disorder. - S. Department of Health & Human Services: Office on Women’s Health. 2018. Borderline personality disorder. - National Institute of Mental Health. Brochures and fact sheets: Borderline personality disorder. - National Alliance on Mental Illness (NAMI). 2020. Mental health conditions: Borderline personality disorder. - National Institute of Mental Health. 2017. Borderline personality disorder. - Kienast, T., Stoffers, J., Bermpohl, F., & Lieb, K. (2014). Borderline personality disorder and comorbid addiction: epidemiology and treatment. Deutsches Arzteblatt International, 111(16), 280–286. - Lane, S. P., Carpenter, R. W., Sher, K. J., & Trull, T. J. (2016). Alcohol craving and consumption in borderline personality disorder: When, where, and with whom. Clinical Psychological Science: A Journal of the Association for Psychological Science, 4(5), 775–792. - Trull, T. J., Freeman, L. K., Vebares, T. J., Choate, A. M., Helle, A. C., & Wycoff, A. M. (2018). Borderline personality disorder and substance use disorders: an updated review. Borderline Personality Disorder and Emotion Dysregulation, 5, 15. - Goldstein, R. B., Chou, S. P., Saha, T. D., Smith, S. M., Jung, J., Zhang, H. … & Grant, B. F. (2017). The epidemiology of antisocial behavioral syndromes in adulthood: Results from the National Epidemiologic Survey on Alcohol and Related Conditions-III. The Journal of Clinical Psychiatry, 78(1), 90–98. - Fisher, K.A., & Hany, M. 2020. Antisocial personality disorder. In: StatPearls [Internet]. StatPearls Publishing, Treasure Island, FL. - 2020. Antisocial personality disorder. - Mayo Clinic. 2020. Antisocial personality disorder. - American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders (5th ed.). Arlington, VA: American Psychiatric Publishing. - Pettinati, H. M., O’Brien, C. P., Dundon, W. D. (2013). Current status of co-occurring mood and substance use disorders: a new therapeutic target. The American Journal of Psychiatry, 170(1), 23–30.
<urn:uuid:32c1c467-8433-4e47-8ded-4a09584be436>
CC-MAIN-2022-33
https://co-occurring.net/personality-disorders/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.91814
2,780
3.390625
3
This article needs additional citations for verification. (May 2019) |Regions with significant populations| |United States (Arizona)| |Oʼodham, English, Spanish| |Traditional, Catholic, Protestant| |Related ethnic groups| |Other Piman peoples| The Tohono Oʼodham (/ , , /; Oʼodham: [ˈtɔhɔnɔ ˈʔɔʔɔd̪am]) are a Native American people of the Sonoran Desert, residing primarily in the U.S. state of Arizona and the northern Mexican state of Sonora. The federally recognized tribe is known in the United States as the Tohono Oʼodham Nation. The Tohono Oʼodham Nation, or Tohono Oʼodham Indian Reservation, is a major reservation located in southern Arizona, where it encompasses portions of three counties: Pima, Pinal, and Maricopa in the United States. It also extends into the Mexican state of Sonora. The Tohono Oʼodham tribal government and most of the people have rejected the historical name Papago used by European colonizers. They call themselves Tohono Oʼodham, meaning "desert people". The Pima, a competing tribe in this territory, referred to them as Ba꞉bawĭkoʼa, meaning "eating tepary beans". The Spanish colonizers learned that name from the Pima and transliterated it as Pápago, in their pronunciation. European-American English speakers who later settled in the area also used that term. The historical lands of the Tohono Oʼodham stretched over much of what are now the jurisdictions of southern Arizona and Northern Mexico, across most of the Sonoran Desert. In the south their land abutted against that of the Seris and Opata peoples. To the east, they ranged to at least the San Miguel River valley. The people may have migrated further east in seasonal travel. The Gila River represents the northern limits. To the west, their lands extended to the Colorado River and the Gulf of California. The frontiers of their territory would have been shared to an extent with neighboring tribes. These lands are characterized by wide plains bordered by tall mountains. Water is scarce but is believed to have been more plentiful before European colonization. Their practices of cattle grazing and well drilling decreased stream flows. Localized natural springs provided water in some areas. In some areas, the people also relied on tinajas, or potholes, that were filled with rainwater in the mountains. Rains are intensely seasonal in the Sonoran Desert, with much rainfall occurring in late summer monsoons. Monsoon storms are generally fierce and produce flooding. The remainder of rainfall generally falls in winter and is more gentle. Snows are extremely rare, and winters have a few days below freezing. The growing season is very long, up to 264 days in places. Summer temperatures are extreme, reaching up to 120 °F (49 °C) for weeks at a time.: 1–5 The Tohono Oʼodham migrated between summer and winter homes, usually moving to follow the water. They built their summer homes along alluvial plains, where they channeled summer rains onto fields they were cultivating. Some dikes and catchment basins were built, as was typical of Pima practices to the north. But most streams were not reliable enough for the people to build permanent canal systems. Winter villages were built in the mountains, to take advantage of more reliable water, and to enable the men to engage in hunting games.: 8–10 Historically, the Oʼodham-speaking peoples were enemies of the nomadic Apache from the late seventeenth until the beginning of the twentieth century. The Oʼodham were settled agricultural people who raised crops. According to their history, they knew the Apache would raid when they ran short on food, or hunting was bad. Conflict with European settlers encroaching on their lands resulted in the Oʼodham and the Apache finding common interests. The Oʼodham word for the Apache 'enemy' is ob. The relationship between the Oʼodham and Apache was especially strained after 1871 when 92 Oʼodham joined Mexicans and Anglo-Americans and killed an estimated 144 Apache in the Camp Grant massacre. All but eight of the dead were women and children. The Oʼodham also captured 29 Apache children, whom they sold into slavery in Mexico. Little of early Oʼodham history is known. That recorded by Europeans reflects their biases. The first European exploration and recording of Oʼodham lands was made in the early 1530s by Álvar Núñez Cabeza de Vaca of the ill-fated Narváez expedition. Esteban the Moor passed through these lands, one of the four survivors of the Narvaez expedition. He returned later to lead Fray Marcos de Niza in an attempt to find the mythical Seven Cities of Gold. Esteban was killed by the Pima when he disrespected their customs, and de Niza cut short his journey. De Niza wrote that the native cities were grander than Mexico City, which led to the Coronado expedition.: 20–23 Considerable evidence suggests that, before the late seventeenth century, the Oʼodham and Apache were friendly and engaged in the exchange of goods and marriage partners. Oʼodham oral history, however, suggests that intermarriages resulted instead from raiding between the two tribes. It was typical for women and children to be taken captive in raids, to be used as slaves by the victors. Often women married into the tribe in which they were held captive and assimilated under duress. Both tribes thus incorporated "enemies" and their children into their cultures. The San Xavier District is the site of Mission San Xavier del Bac, the "White Dove of the Desert". This is a major tourist attraction near Tucson. The mission was founded in 1700 by Jesuit missionary and explorer Eusebio Kino. Both the first and current church building were constructed by Sobaipuri Oʼodham. The second building was constructed under direction of Franciscan priests, during a mission period from 1783 to 1797. The oldest European building in present-day Arizona, the mission is considered a premier example of Spanish colonial design. It is one of many missions built in the Southwest by the Spanish on what was then the northern frontier of their colony. Tourists sometimes assume that the desert people had embraced the Catholicism of the Spanish conquistadors. Tohono Oʼodham villages resisted such change for hundreds of years. During the 1660s and in 1750s, two major rebellions rivaled in scale the 1680 Pueblo Rebellion. Their armed resistance prevented the Spanish from increasing their incursions into the lands of Pimería Alta. The Spanish retreated to what they called Pimería Baja. As a result, the desert people preserved their traditions largely intact for generations. The Tohono Oʼodham share linguistic and cultural roots with the closely related Akimel Oʼodham (People of the River), historically known as Pima, whose lands lie just south of present-day Phoenix, along the lower Gila River. The Sobaipuri are ancestors to both the Tohono Oʼodham and the Akimel Oʼodham, and they resided along the major rivers of southern Arizona. Ancient pictographs adorn a rock wall that juts up out of the desert near the Baboquivari Mountains. On the nature of the Oʼodham, Eric Winston writes:: 18 The Oʼodham were not a people in a political sense. Instead, their sense of belonging came from similar traditions and ways of life, language and related legends, and experiences shared in surviving in a beautiful but not entirely hospitable land. In the Santa Barbara Mission Archive-Library are materials collected by a Franciscan friar who worked among the Tohono Oʼodham. These include scholarly volumes and monographs. The Office of Ethnohistorical Research, located at the Arizona State Museum on the campus of the University of Arizona, has undertaken a documentary history of the Oʼodham, offering translated colonial documents that discuss Spanish relations with the Oʼodham in the seventeenth and eighteenth centuries. Oʼodham musical and dance activities lack "grand ritual paraphernalia that call for attention" and grand ceremonies such as pow-wows. Instead, they wear muted white clay. Oʼodham songs are accompanied by hard wood rasps and drumming on overturned baskets, both of which lack resonance and are "swallowed by the desert floor". Dancing features skipping and shuffling quietly in bare feet on dry dirt, the dust raised being believed to rise to atmosphere and assist in forming rain clouds. Society focused on the family, and each member had specific roles to play. Women were in charge of food preparation and also gathered the bulk of food, although all members helped. Older girls in the family would be in charge of fetching water each morning, the duty would fall to the wife if there were no daughters. Women also wove baskets, and made pottery, such as ollas. Men performed many of the farming tasks, and hunted. Older men would hunt larger game like bighorn sheep, younger men and boys hunted small game. Most communities had a medicine man, a usually male position. Decisions were made by men in a communal fashion, with elders holding prominence.: 8–11 Children were free to play until age six, around which time they began to learn their roles. Grandparents and older siblings were the most frequent teachers, as parents tended to be very busy.: 12 Marriages were generally arranged by parents, or if the parents had died, older siblings. Since individual villages tended to be closely related, marriages were generally between villages, as close relatives were not allowed to marry. A wife would generally move to the village of her husband, but exceptions could be made if the wife's village needed more help. Polygamy was allowed. Although women had little choice in whom they married, they could choose to leave their marriage if unhappy; they would then return to their village and a new marriage would be arranged.: 11–12 Society was intensely communal, and there were few positions of authority. Hunters shared their catches with the entire village. Food and supplies were shared with those whose needed it. It was expected that if you had been given things in a time of need that you would repay the debt when you could.: 12–15 Despite a shared language and heritage, the Oʼodham were only loosely connected across their lands. Loyalty laid with the village, not the people. However, the Oʼodham generally got along well with neighbors. They regularly gathered with nearby villages, and would even partner with them in times of conflict against outsider tribes. Gatherings for races, trade, socialization, and gossip were frequent events.: 12–15 Gambling was a common recreational event, with men playing a game with sticks similar to dice, and women playing a game which required tossing painted sticks. They would bet trinkets such as shells or beads, as well as valuables such as blankets and mats. Betting also occurred on races, which were the most important sport. Girls were already generally good runners due to being water fetchers, and all members needed to be able to run to escape danger or attacks. Day long races were popular events, and courses would be 10–15 mi (16–24 km). Women played a field hockey-like game called toka which is still enjoyed and is a frequent school sport on the modern reservation.: 45–46 Though they shared a linguistic root with the Pima, and could understand the languages of nearby tribes, such tribes were considered distant cousins at best. Even within the Oʼodham there were linguistic and cultural differences that led to the groups being only loosely united. Different groups had different origin stories, linguistic quirks, and appearances. Where a person lived was the best indicator of which group they belonged to, more so than the other differences. As of the 1700s, when Europeans began to categorize the tribes, there were probably at least six groups. The actual number of groups has varied by author. The following categorization is from Eric Winston's 1994 textbook on the Oʼodham, and includes seven groups, along with some subgroups.: 12–15 - Himuris – They lived along the southern edge of Oʼodham lands, in modern Mexico. In the west they lived up to the confluence of the Altar River and the Magdalena river in what is now Magdalena de Kino. Their range extended all the way to the eastern reaches of the Oʼodham. They were the first to make contact with Europeans. - Hia C-eḍ – Divided into northern and southern groups, they stretched along the western border of the lands, from the furthest north to the southernmost reaches. In the south they shared the land with the Seris, and those there may have had more in common with them than the rest of the Oʼodham. To the north they had contact with the Yumas, and the northern Hia C-eḍ shared some of their traits. The Hia C-eḍ dialect was the most distinct, and they spoke much faster than other groups. Since their lands were the hottest and driest they had very large ranges and migrations. Little of the land was suitable for farming, and thus the Hia C-eḍ were almost exclusively hunter-gatherers. - Hu:huhla – The oldest group of the Oʼodham, they lived in a strip to the east of the Hia C-eḍ. The other tribes considered them to be "orphans"; it is possible they were there before the Oʼodham arrived and were assimilated. Their style of living mirrored the Hia C-eḍ, as there lands were also poor. - Kohatk – They lived along the northern extent, and intermingled with the Pima. They extended south to modern Tucson. They had considerable trade and intermarriage with the Pimas. - Koklolodi – Situated above the Himuris, but below the Totokwan. - Sobapuris – This easternmost group lived between the San Pedro and Santa Cruz rivers. They took more cues from the Pima and lived in more permanent settlements. Their lands were on the edge of the Sonoran Desert and thus had better water supplies, ensuring year round settlement in most areas. Members only left the village to hunt and gather, and did not usually make seasonal migrations. Unfortunately their cooler lands, fertile fields, and consistent water made their land the most desired by European settlers, and their lands were the first to be taken over. The Sobapuris suffered the most from colonization. - Totokwan – Centered around Ge Aji Peak, they inhabited the ceremonial center of the northern Oʼodham. The Oʼodham were a generally peaceful people. They rarely, if ever, initiated conflict, and got along well with most neighboring tribes. The exception was the Apache, who were frequent raiders of the Oʼodham and other tribes. The Apache were to the east and northeast of the Oʼodham, and had probably moved into the area sometime in the fifteenth century AD. They had limited interest in farming, and preferred to raid neighboring troops for supplies. The eastern Oʼodham, the Sobapuris, bore the brunt of Apache attacks.: 18–19 The original Oʼodham diet consisted of regionally available wild game, insects, and plants. Through foraging, Oʼodham ate a variety of regional plants, such as: ironwood seed, honey mesquite, hog potato, and organ-pipe cactus fruit. While the Southwestern United States does not have an ideal climate for cultivating crops, Oʼodham cultivated crops of white tepary beans, papago peas, and Spanish watermelons. They hunted pronghorn antelope, gathered hornworm larvae, and trapped pack rats for sources of meat. Preparation of foods included steaming plants in pits and roasting meat on an open fire. Saguaro cactus fruit was an especially important food.: 8–10 The Tohono Oʼodham use long sticks to harvest the fruits, which are then made into a variety of products including jams, syrups, and a ceremonial wine. The seeds are also edible, and were turned into porridge. The harvest begins in June; villages would travel to the saguaro stands for the duration of the harvest. A pair of saguaro ribs, about 6 m (20 ft) long, is bundled together to make a harvesting tool called a kuibit. They then reduce the freshly harvested fruit into a thick syrup through several hours of boiling, as the fresh fruit does not keep for long. Four kilograms (9 pounds) of fruit will yield about 1 liter (1⁄4 U.S. gallon) of syrup. Copious volumes of fruit are harvested; an example harvest in 1929 yielded 45,000 kg (99,000 lb) among 600 families.: 324–326 At the end of the harvest, each family would contribute a small amount of syrup to a communal stock that would be fermented by the medicine man. This was cause for rainmaking celebrations. Stories would be told, there was much dancing, and songs would be sung. Each man would drink some of the saguaro wine. The resulting intoxicated state was seen as holy, and any dreams it brought on were considered portentous. This was the only time that the Oʼodham drank alcohol during the year.: 17–20 Ak cin, known as "mouth of the wash," refers to the farming method in which farmers would monitor the weather for signs of storm cloud formations. The appearance of storm clouds signified that there was going to be a downpour of rain. Farmers would anticipate these moments and quickly prep their plantations for seeding as the rain began to flood their lands. This type of agriculture was most commonly used during summer monsoons. Traditional tribal foods were a combination of goods provided by nature and items they cultivated. From nature, the Tohono Oʼodham would consume rabbit, sap and flour from mesquite trees (flour was made by crushing the pods of the trees), cholla cactus, and acorns. On the agricultural side of their diet, farmers focused on corn, squash, and tepary beans. Lost traditions, modern times It was not until more numerous Americans of Anglo-European ancestry began moving into the Arizona territory that the outsiders began to oppress the people's traditional ways. Unlike many tribes in the United States, the Tohono Oʼodham never signed a treaty with the federal government, but the Oʼodham experienced challenges common to other nations.: 163 As Oʼodham communal lands were allocated to households and some "surplus" sold to non-Native Americans under the Dawes Act of 1888, a variety of religious groups entered the territory. Presbyterian missionaries built schools and missions there, vying with Roman Catholics and Mormons to convert the Oʼodham to their faith.: 20–21 Major farmers established the cotton industry, initially employing many Oʼodham as agricultural workers. Under the U.S. federal Indian policy of the late 19th and early 20th century, the government required native children to attend Indian boarding schools. They were forced to use English, practice Christianity, and give up much of their tribal cultures in an attempt by the government to assimilate the children of various tribes into the American mainstream. The current tribal government, established in the 1930s under the Indian Reorganization Act of 1934, reflects years of commercial, missionary, and federal intervention. While the federal government encouraged tribes to reestablish their governments, it approved models based on the electoral system and structure of the US. The goal was to make the Indians into "real" Americans, but the boarding schools generally offered training only for low-level domestic and agricultural labor, typical of jobs available in rural areas. "Assimilation" was the official policy, but full participation was not the goal. Boarding school students were supposed to function within the segregated society of the United States as economic laborers, not leaders. The Tohono Oʼodham have retained many traditions into the twenty-first century, and still speak their language. Since the late 20th century, however, U.S. mass culture has penetrated and in some cases eroded Oʼodham traditions as their children adopt new trends in technology and other practices. Beginning in the 1960s, government intervention in the tribe's agricultural cultivation caused the Tohono Oʼodham tribe members to shift from a traditional plant-based diet to one that favored foods high in fat and calories. The government began to close off the tribe's water source, preventing the Indigenous group from being able to produce traditional crops.: 41–45 This resulted in the widespread trend of type 2 diabetes among members of the tribe. The adaptation of a processed food diet caused the presence of type 2 diabetes to rise at alarming rates, with nearly 60 percent of the adult population in the tribe facing this disease and 75 percent of children expected to contract this disease in their lifetime. Children are also at risk for childhood obesity. Many of the original crops that the Indigenous group produced, such as tepary beans, squash, and the buds of cholla cactus, were items that could have aided in combating the diabetes crisis within the community. These foods possessed nutrients that would have helped normalize blood sugar and minimize the impact of diabetes. However, as a result of government intervention, many of these traditional foods were lost. A local nonprofit, Tohono Oʼodham Community Action (TOCA), has built a set of food systems programs that contribute to public health, cultural revitalization, and economic development. It has started a cafe that serves traditional foods. The Tohono Oʼodham community has made efforts to combat future issues by attempting to rehabilitate the systems the tribe had in place before government intervention. The Indigenous group has been advocating for the restoration of their water privileges so that they will be able to effectively produce traditional crops for the tribe. Moreover, even in tribal schools, such as those in the local Baboquivari Unified School District, the quality of lunch programs is being reassessed in order to bring a larger emphasis of the need for healthier food options. The Tohono Oʼodham Nation is one of the only Indigenous groups to offer tribal members access to medical treatment in the United States. Requirements for this enrollment include being a Mexican citizen and a member of the Tohono Oʼodham tribe. As advocacy for the border wall continues to grow, inspections and securities along these boundaries have heightened, limiting tribal members' access to resources beyond the border. The cultural resources of the Tohono Oʼodham are threatened—particularly the language—but are stronger than those of many other aboriginal groups in the United States. Every February the nation holds the annual Sells Rodeo and Parade in its capital. Sells District rodeo has been an annual event since being founded in 1938. It celebrates traditional frontier skills of riding and managing cattle. In the visual arts, Michael Chiago and the late Leonard Chana have gained widespread recognition for their paintings and drawings of traditional Oʼodham activities and scenes. Chiago has exhibited at the Heard Museum and has contributed cover art to Arizona Highways magazine and University of Arizona Press books. Chana illustrated books by Tucson writer Byrd Baylor and created murals for Tohono Oʼodham Nation buildings. In 2004, the Heard Museum awarded Danny Lopez its first heritage award, recognizing his lifelong work sustaining the desert people's way of life. At the National Museum for the American Indian (NMAI), the Tohono O'odham were represented in the founding exhibition and Lopez blessed the exhibit. Tucson Indian School The Tohono Oʼodham children were required to attend Indian boarding schools, designed to teach them the English language and assimilate them to the mainstream European-American ways. According to historian David Leighton, of the Arizona Daily Star newspaper, the Tohono Oʼodham attended the Tucson Indian School. This boarding school was founded in 1886, when T.C. Kirkwood, superintendent of the board of national missions of the Presbyterian Church in the United States, asked the Tucson Common Council for land near where the University of Arizona would be built. The Common Council granted the Board of Home Missions a 99-year lease on land at $1 a year. The Board purchased 42 acres (17 ha) of land on the Santa Cruz River, from early pioneer Sam Hughes. The new facility opened in 1888, with 54 boys and girls. At the new semi-religious boarding school, boys learned rural trades like carpentry and farming, while girls were taught sewing and similar domestic skills of the period. In 1890, additional buildings were completed but the school was still too small for the demand, and students had to be turned away. To raise funds for the school and support its expansion, its superintendent entered into a contract with the city of Tucson to grade and maintain streets. While officially called the Tucson Indian Training School, "any person of either sex, regardless of race or color", who showed "promise of development into a Christian leader or citizen and whose educational needs may, in the judgement of the school, be better served by the school than by another available resource" was eligible for admission. In 1903, Jose Xavier Pablo, who later went on to become a leader in the Tohono Oʼodham Nation, graduated from the school. Three years later, the school bought the land they were leasing from the city of Tucson and sold it at a significant profit. In 1907, they purchased land just east of the Santa Cruz River, near present-day Ajo Way and built a new school. The new boarding school opened in 1908; it has a separate post office, known as the Escuela Post Office. Sometimes this name was used in place of the Tucson Indian School. By the mid-1930s, the Tucson Indian School covered 160 acres, had 9 buildings and was capable of educating 130 students. In 1940, about 18 different tribes made up the population of students at the school. With changing ideas about education of tribal children, the federal government began to support education where the children lived with their families. By August 1953, it had no grades lower than 7th grade. In 1960, the school closed its doors. The site was developed as Santa Cruz Plaza, just southwest of Pueblo Magnet High School. Tohono Oʼodham Nation The Tohono Oʼodham Nation within the United States occupies a reservation that incorporates a portion of its people's original Sonoran desert lands. It is organized into eleven districts. The land lies in three counties of the present-day state of Arizona: Pima, Pinal, and Maricopa. The reservation's land area is 11,534.012 square kilometres (4,453.307 sq mi), the third-largest Indian reservation area in the United States (after the Navajo Nation and the Uintah and Ouray Indian Reservation). The 2000 census reported 10,787 people living on reservation land. The tribe's enrollment office tallies a population of 25,000, with 20,000 living on its Arizonan reservation lands. The nation is governed by a tribal council and chairperson, who are elected by eligible adult members of the nation. According to their constitution, elections are conducted under a complex formula intended to ensure that the rights of small Oʼodham communities are protected, as well as the interests of the larger communities and families. The present chairman is Ned Norris Jr. Like other tribes, the Tohono Oʼodham felt land pressures from American ranchers, settlers, and the railroads. Documentation was poor, and many members did not leave their lands in a written will.: 92–3 John F. Trudell, a US attorney general assistant recorded an Oʼodham man declaring "I do not know anything about a land grant. The Mexicans never had any land to give us. From the earliest times our fathers have owned land which was given to them by the Earth's prophet.": 30 Because the Oʼodham lived on public lands or had no documentation of ownership, their holdings were threatened by white cattle herders in the 1880s. However, they used their history of cooperation with the government in the Apache Wars to bargain for land rights.: 27–28 Today, Oʼodham lands are made up of multiple reservations: - The main reservation, Tohono Oʼodham Indian Reservation, which lies in central Pima, southwestern Pinal, and southeastern Maricopa counties, and has a land area of 11,243.098 square kilometres (4,340.984 sq mi) and a 2000 census population of 8,376 persons. The land area is 97.48 percent of the reservation's total, and the population is 77.65 percent of the total of the entire reservation lands. - The San Xavier Reservation, at , is located in Pima County, in the southwestern part of the Tucson metropolitan area. It has a land area of 288.895 square kilometres (111.543 sq mi) and a resident population of 2,053 persons. - The San Lucy District comprises seven small non-contiguous parcels of land in, and northwest of, the town of Gila Bend in southwestern Maricopa County. Their total land area is 1.915 square kilometres (473 acres), with a total population of 304 persons. - The Florence Village District is located just southwest of the town of Florence in central Pinal County. It is a single parcel of land with an area of 0.1045 square kilometres (25.8 acres) and a population of 54 persons. Tohono Oʼodham Community Action (TOCA) The Tohono Oʼodham Community Action (TOCA) was founded by current CEO and President Terrol Dew Johnson and co-founder Tristan Reader in 1996 on the basis of wanting to restore and re-integrate lost tribal traditions into the community.: 41 Located in Sells, Arizona, they originally started as a community garden and offered basketweaving classes.: 41 : 41 Now, the organization has expanded to having its own two farms, restaurant, and art gallery. Another influence to the creation of this organization originates from the fact that the Indigenous tribe was on the brink of collapse as a result of growing dependency on welfare and food stamps. The Tohono Oʼodham people were facing the lowest per capita income of any Indigenous reservation, with 65 percent of members living below the poverty line and 70 percent facing unemployment. Crime amongst the younger generation rapidly increased as a result of gang activity and the high school drop out rate was over 50 percent. Homicide was prevalent within the community, with the rate being three times the national average. In 2009, TOCA opened its restaurant, Desert Rain Café. The purpose of the cafe's launch was to bring traditional tribal foods to the community in order to help combat the growing presence of Type 2 diabetes. Thus, the restaurant practices the integration of traditional foods with each menu item containing at least one traditional ingredient, such as mesquite meal, prickly pear, or agave syrup. For crops such as tepary beans or squash, the café utilizes their farms to produce these goods, providing customers with fresh meals. Some of their dishes include a Mesquite Oatmeal Cookie, Short Rib Stew, Brown Tepary bean Quesadilla, or pico de gallo. It has been estimated that the restaurant serves over 100,000 meals yearly. Basket weaving was a dominant cultural characteristic, being used in rain ceremonies that lasted for four days and nights. These baskets were also purposed for daily use to hold or prepare foods. At the start of the institution, Johnson would hold weekly classes on Wednesday for artisans throughout the reservation. Making a basket could take as long as one year. This prolonged process stems from the fact that the fibers used in these baskets must be harvested and prepared, plus creating a design that represents the history of the Tohono Oʼodham nation. Materials for baskets vary between grasses native to the area, such as Yucca grass and devil's claw plant, an awl, and knife. Martin Luther King Jr.'s first visit to an Indian reservation On April 2, 2017, in the Arizona Daily Star newspaper, noted historian David Leighton related what is believed to be Martin Luther King Jr's first visit to an Indian reservation, the Tohono Oʼodham Indian Reservation. On September 20, 1959, Martin Luther King Jr. flew to Tucson from Los Angeles to give a talk at the Sunday Evening Forum. On that night, he gave a speech called "A Great Time To Be Alive," at the University of Arizona auditorium, now called Centennial Hall. Following the forum, a reception was held for King, in which he was introduced to Rev. Casper Glenn, the pastor of a multiracial church called the Southside Presbyterian Church. King was very interested in this racially mixed church and made arrangements to visit it the next day. The following morning, Glenn picked up King in his Plymouth station wagon and drove him to the Southside Presbyterian Church. There, Glenn showed King photographs he had taken of the racially diverse congregation, most of whom were part of the Tohono Oʼodham tribal group at the time. Glenn remembers that upon seeing the photos, "King said he had never been on an Indian reservation, nor had he ever had a chance to get to know any Indians." He then requested to be driven to the nearby reservation, as a spur-of-the-moment desire. The two men traveled on Ajo Way to Sells, on what was then called the Papago Indian Reservation, now the Tohono Oʼodham Indian Reservation. When they arrived at the tribal council office, the tribal leaders were surprised to see King and very honored he had come to visit them. King was very anxious to talk to them but was circumspect with his questions. "He was fascinated by everything that they shared with him," Glenn said. The ministers then went to the local Presbyterian church in Sells, which had been recently constructed by its members, with funds provided by the national Presbyterian church. King had a chance to speak to Pastor Towsand, who was excited to meet King. On the way back to Tucson, "King expressed his appreciation of having the opportunity to meet the Indians," Glenn recalled. Notable Tohono Oʼodham - Annie Antone, contemporary, pictorial basketweaver - Terrol Dew Johnson, basketweaver and native food and health advocate - Augustine Lopez, Tohono Oʼodham nation chairman - Ponka-We Victors, Kansas state legislator - Ofelia Zepeda, linguist, poet, writer - Juan Dolores, early Tohono Oʼodham linguist - Maria Chona, basketweaver - Raul Mendoza, basketball coach - American Indian, Alaska Native Tables from the Statistical Abstract of the United States: 2004–2005 Archived 2012-10-04 at the Wayback Machine - "Tohono O'odham". Lexico UK English Dictionary. Oxford University Press. n.d. - Winston, Eric P. (1994). Sharing the Desert: The Tohono O'odham in History. Tucson: University of Arizona Press. pp. 166. ISBN 0816514909. - Winston, Eric P. (1994). Sharing the Desert: The Tohono O'odham in History. Tucson: University of Arizona Press. pp. 166. ISBN 0816514909. - Kiernan F. McCarthy. "OFM Collection, Santa Barbara Mission Archive-Library" (PDF). Sbmal.org. - See the special issue of Journal of the Southwest, Vol. 56, No. 2 (Summer 2014), entitled "Oʼodham and the Pimería Alta." - Zepeda, Ofelia (1995). Ocean Power: Poems from the Desert, p. 89. ISBN 0816515417. - Greene, Jacqueline Dembar (1998). The Tohono O'Odham. New York: Franklin Watts. ISBN 0531203263. OCLC 36713087. - Nebhan, Gary Paul (1997). Cultures of Habitat: On Nature, Culture, and Story, pp. 197–206. - Buckley, Steve (2011) [First published 2009]. Common Plants of Saguaro National Park (PDF). National Park Service; Sonoran Desert Network. p. 63.[ISBN missing] - Bruhn, Jan G. (1971). "Carnegiea gigantea: The Saguaro and Its Uses". Economic Botany. 25 (3): 320–329. doi:10.1007/BF02860768. ISSN 0013-0001. JSTOR 4253267. S2CID 44788245. - di cintio, Marcello (February 14, 2012). "Farming the Monsoon: A Return to Traditional Tohono O'odham Foods". Gastronomica. 12 (2): 14–17. doi:10.1525/GFC.2012.12.2.14. JSTOR 10.1525/gfc.2012.12.2.14. - Marak, Andrae M.; Tuennerman, Laura (2013). At the Border of Empires: The Tohono O'odham, Gender, and Assimilation 1880–1934. Tucson: University of Arizona Press. p. 146.[ISBN missing] - Banks, Dennis & Yuri Morita (1993). Seinaru Tamashii: Gendai American Indian Shidousha no Hansei, Japan, Asahi Bunko. - The American Indian Heritage Support Center, official website - "Tohono O'odham community action: a community food system" (PDF). Closing the gap: Solutions to race-based health disparities. Applied Research Center (ARC) and Northwest Federation of Community Organizations (NWFCO) and Applied Research Center (Report). Oakland, California and Seattle, Washington. 2005. p. 68. Retrieved November 25, 2019. - "Health Is Culture – Tohono O'odham Community Action (TOCA)". California Newsreel. Unnatural Causes. Retrieved November 25, 2019. - "Tohono O'odham Community Action, Sells, AZ". David Hanson. Retrieved 2019-04-23. - Wesner, Chelsea (September 5, 2012). "Tohono O'odham Nation". Wellness in Native America. Retrieved November 25, 2019. - "Desert Rain Café". AZ Highways. 2015-03-18. Retrieved 2019-05-02. - Luna-Firebaugh, Eileen M. (2002). "The Border Crossed Us: Border Crossing Issues of the Indigenous Peoples of the Americas". Wíčazo Ša Review. 17 (1): 159–181. doi:10.1353/wic.2002.0006. ISSN 1533-7901. S2CID 159542623. - "Spirit of the Heard Award". Heard Museum. Retrieved July 22, 2016. - "23 Aug 1953, Page 51 - Arizona Daily Star at". Newspapers.com. 1953-08-23. Retrieved 2022-06-05. - Leighton, David (Feb 9, 2015). "Street Smarts: Tucson Indian School taught hoeing, sewing". Arizona Daily Star. Retrieved April 5, 2017. - Dodge, Jennifer, and Jonathan Walters. “Community Action, Naturally: Tohono Oʼodham Community Action.” NYU/Wagner. - Service, Yuji Miyaji/ Arizona Sonora News. "Tohono O'odham Basketry: One of Sells' richest preserved traditions – Arizona Sonora News Service". Retrieved 2019-04-23. - Leighton, David (April 2, 2017). "Street Smarts: MLK Jr. raised his voice to the rafters in Tucson". Arizona Daily Star. Retrieved April 7, 2017. - Frances Manuel and Deborah Neff, Desert Indian Woman. Tucson: University of Arizona Press, 2001.[ISBN missing] - Wesley Bliss, "In the Wake of the Wheel: Introduction of the Wagon to the Papago Indians of Southern Arizona", in E.H. Spicer (ed.), Human Problems in Technological Change. New York: Russell Sage Foundation Publications, 1952; pp. 23–33.[ISBN missing] - Eloise David and Marcia Spark, "Arizona Folk Art Recalls History of Papago Indians", The Clarion, Fall 1978. - Jason H. Gart, Papago Park: A History of Hole-in-the-Rock from 1848 to 1995. Pueblo Grande Museum Occasional Papers No. 1, (1997). - Andrae M. Marak and Laura Tuennerman, At the Border of Empires: The Tohono O'odham, Gender, and Assimilation, 1880–1934. Tucson: University of Arizona Press, 2013.[ISBN missing] - Allan J. McIntyre, The Tohono Oʼodham and Pimeria Alta. Arcadia Publishing, 2008.[ISBN missing] - Deni J. Seymour, "A Syndetic Approach to Identification of the Historic Mission Site of San Cayetano Del Tumacácori", International Journal of Historical Archaeology, vol. 11, no. 3 (2007), pp. 269–296. - Deni J. Seymour, "Delicate Diplomacy on a Restless Frontier: Seventeenth-Century Sobaipuri Social And Economic Relations in Northwestern New Spain, Part I". New Mexico Historical Review, vol. 82, no. 4 (2007). - Deni J. Seymour, "Delicate Diplomacy on a Restless Frontier: Seventeenth-Century Sobaipuri Social And Economic Relations in Northwestern New Spain, Part II". New Mexico Historical Review, vol. 83, no. 2 (2008). - David Leighton, "Street Smarts: Tucson Indian School taught hoeing, sewing", Arizona Daily Star, February 10, 2015 - David Leighton, "Street Smarts: MLK Jr. raised his voice to the rafters in Tucson", Arizona Daily Star, April 2, 2017 - Official website - Tohono O'odham / ITCA (Inter Tribal Council of Arizona) - Tohono O'odham Community Action (TOCA) - TOCA's Desert Rain Cafe - How To Speak Tohono Oʼodham – Video - Tohono Oʼodham utilities - O'odham Solidarity Project - Online Tohono O'odham bibliography - Tohono O'ʼodham, Papago in Sonora, Mexico
<urn:uuid:552a0ad7-4dc8-4ab0-9582-0921d8472924>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/Tohono_O%27odham
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.960556
9,448
3.546875
4
By Sarah McGoldrick EYE AILMENTS – LAZY EYE. OFTEN MISDIAGNOSED AS BAD BEHAVIOUR OR ACTING OUT IN CLASS, AMBLYOPIA (LAZY EYE) IS OFTEN DIFFICULT TO RECOGNIZE BY PARENTS AND TEACHERS. THE CAUSES OF AMBLYOPIA CAN OFTEN BE THE RESULT OF MISALIGNED EYES OR STRABISMUS AS WELL AS HEREDITARY FACTORS. ‘Lazy Eye’ is a common non-clinical term usually used to denote either strabismus, aka an eye turn, or amblyopia. Amblyopia is a condition where the eye does not see clearly even when vision is compensated with lenses and where there is no health concern,” said Dr. Charles Boulet, owner of Diamond Valley Vision Care in Alberta. “Sometimes these come as a combined problem where there are an eye turn and the turned eye becomes amblyopic because it is much less dominant.” According to the Doctors of Optometry Canada, it is estimated that two to four per cent of children under the age of six have amblyopia. He said parents and many medical and optometric practitioners have the idea that there is a developmental window during which vision can be modi ed and after which nothing can be done, but this is not the case. In the past, the standard treatment for Amblyopia was eyeglasses, patching, eye drops or surgery. “It is often assumed that the only way to ‘treat’ a turned eye is surgery. Research suggests that surgery is only sometimes helpful and carries many risks while modern Optometric Vision Therapy (OVT) is much safer and provides better functional results,” he said. “OVT takes time, and it is not well understood outside of the behavioural optometric community, but it is easily the most underutilized optometric specialty.” Boulet said the principles of treatment of strabismus and amblyopia have not changed much themselves in the last few decades in OVT – this is because human brain physiology has not changed. Innovations in technology and increased attention in research has meant that ophthalmology and orthoptics have both begun to adopt more OVT type strategies in addressing functional vision problems like strabismus and amblyopia. “Medically, patching was once the primary means of treating these conditions, but we now know that patching is only marginally e ective in amblyopia, and can often increase the Percentage of Time Strabismic (POTS) among those with eye turns. In cases of strabismus and amblyopia, specialty prescribing is often the best rst step, and should be given great attention,” he said. He noted the use of aniseikonic/ isophoric lens designs, now made relatively simple through ShawLens. com, can be an easy rst step in addressing the causes. With this type of lens, the images are equalized at the retinal level. Sensory fusion can now occur. The patient can integrate the two images more easily. We’ve found through clinical research that the time was taken to correct the amblyopia is signi cantly reduced and, best of all, vision suppression using a patch or drops may not be necessary. “Amblyopia, commonly referred to as lazy eye, is weakness of vision in an otherwise healthy eye. It is frequently associated with a blurred image from an uncorrected refractive error in one eye or mis-alignment of the images due to strabismus,” said Peter J Shaw OD, CEO Shaw Lens and Adjunct Associate Research Professor, University of Waterloo. He said in either case the result is that the visual cortex of the brain is unable to fuse the images together as one. In order to deal with the image di erence and resultant disruption the brain actively inhibits and ignores the less viable image from one eye and over time this behavior, if left untreated, permanently impairs the resultant vision. Research has shown that this inhibition actually occurs in the brain and not the eye, so really, perhaps it should be called lazy brain. “The most frequent causes of amblyopia is blurred vision due to anisometropia or anisometropic astig- matism,” he said. “These are common vision conditions that even when corrected with eyeglasses fail to fully remediate the problem. This can create an obstacle to fusion in visual cortex in the form of aniseikonia (unequally sized ocular images due to spectacle image magni cation inequality).” He said in order to increase the success in the treatment of amblyopia many optometrist specializing in developmen- tal vision employ the use of iseikonic corrective therapies including contact lenses, refractive procedures and iseikonic eyeglass lenses. Iseikonic therapies including iseikonic eyeglass lenses ensure that the images in the brain are equally sized and provide the necessary foundation to fully remediate the amblyopic vision. “When all barriers to eye teaming are eliminated, the vision system can function as nature intended. The results from iseikonic therapies can be dramatic with improvement in vision from mild to moderate straight eye, refractive amblyopia seeming to occur instantly,” he said. “Sometimes vision therapy is required to achieve the fullest vision potential, new techniques in therapy often include 3D games and eye-hand coordination tasks,” he said adding experts in vision agree that patching is no longer consid- ered a primary therapy for amblyopia. “Teaching the eyes to work together provides a lasting and less invasive approach to successfully treating am- blyopia. Iseikonic lenses such as Shaw Lens provide the foundation to enable eye teaming,” he said. Many ECPs are not familiar with the new forms of treatment for Amblyo- pia. It is recommended that they consult with an expert in the industry to ensure proper treatment. “The best thing an ECP who is un- trained in managing these conditions can do is to search for a developmental optometrist whose practice emphasizes this type of work. Patients need to know that there is something that can be done, and that these are less medical conditions than functional ones, and the best trained to deal with theses are developmental optometrists,” said Boulet. “These are not permanent conditions, necessarily, and in most cases great improvements can be made within 6 months or less. These cases should be monitored more closely and require active therapies. ECPs can certainly use prism and lenses to assist una ected clients and parents to understand to some degree how these conditions feel.” He added ECPs should also remind people that these conditions are not a simple matter of seeing blur, but that vision is multifaceted and that these conditions will consequently impact on motor skills, cognitive skills, and emotional state. It is often di cult to keep kids engaged in Vision Therapy. It can require many hours of work on the part of the child and the parent. Boulet said a team e ort is required on the part of all involved to see success. “First, ensure there is an appropriate Rx in place. OD’s and MD’s all too often will prescribe the cycloplegic refraction as the baseline/habitual Rx. This is almost always contraindicated in children as they will most often choose to disregard the Rx by looking over the top of the frame,” he said. “Strabismus treatment, in particular, requires ongoing work at home, and the treating facility needs to work with the family to ensure they are on task and motivated. The referring ECP should ensure they check up with the family to also encourage adherence to the treatment program.” He noted traditional eye patch treatments can still be useful, however, the variety of alternatives means kids should no longer have to wear them for extended periods of time. “Patching was traditionally used as the sole primary treatment tool, with children wearing them full time for up to several years. We know that this approach often loosens binocular function and leads to increased time strabismic. Because vision is designed to be binocular, treatment is best approached as a binocular system, or at the outset at least as a bi-ocular system (each eye viewing di erent targets but in the same visual eld),” he said. “We also know that aniseikonic/ isophoric lens designs can also be more e ective than patching in cases of refractive amblyopia and that this ap- proach is often more agreeable to patients as it serves to boost binocular vision, not suppress it.” He noted ECPs should do their research before recommending a surgical option. He noted surgery will have no impact on amblyopia if there is no strabismus. He said surgery can be helpful in some cases of immovable strabismus, but most often, these cases are not as- sessed by developmental optometry. “The best approach in terms of safety, cost, and outcomes is to turn to OVT rst, then surgery, if it’s still indicated, followed again by OVT to reduce the need for repeat surgeries. Surgery approaches the visual system as a mechanical entity, so very much like an automobile or computer where if a part is out of alignment or no longer working, it simply needs to be ‘ xed’ or replaced,” he said. “Human physiology is not at all like this and therefore, treatments by surgery often require repeat procedures because the brain still has not learned operatebothvisualchannelsasateam.”
<urn:uuid:982246a5-36f2-4870-95e9-def01f90e012>
CC-MAIN-2022-33
https://opticalprism.ca/combatting-lazy-eye-the-next-generation-of-treatment/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.94888
2,117
3.328125
3
Insects come in hugely varied forms and life stages: butterflies, bees, mosquitos, caterpillars, grubs, grasshoppers, mealworms, ticks, cockroaches, and ladybugs. Some are easily appreciated for their beauty, others are considered pests at home. Learn more about insects and how we can provide homes for beneficial insects, and what we can do to help manage undesirable insect populations. Building a House for Native Bees Honey bees are a non-native species in North America. Though they are important for pollinating agricultural fields, they are not as well suited to pollinating native plants as the native bees. What can you do to support native bees? Build a bee hotel! Watch the following video to get some ideas:
<urn:uuid:b13e185b-8e1c-48d4-9895-d18f7a86ddbc>
CC-MAIN-2022-33
https://shop.natureteam.com/pages/insects
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.933645
166
3
3
The word “jawn” is unlike any other English word. In fact, according to the experts, it’s unlike any other word i... The word “jawn” is unlike any other English word. In fact, according to the experts, it’s unlike any other word in any other language. It is an all-purpose noun, a stand-in for inanimate objects, abstract concepts, events, places, individual people, and groups of people. It is a completely acceptable statement in Philadelphia to ask someone to “remember to bring that jawn to the jawn.” “The consensus is that it came from ‘joint,’ and from New York,” says Jones. Ben Zimmer, a linguist and language columnist who’s written and talked about “jawn” before, agrees, writing in an email that “‘jawn’ evidently developed as a Philly variant of ‘joint’ in the ’80s,” following the release of the popular 1981 single “That’s The Joint” by Funky Four Plus One, an early hip-hop group from the Bronx. (Video Credits: Cursed By Beauty) There are a few instances where “jawn” can be used but “joint,” in, say, New York, cannot. “In Philly, you can say ‘I have a lot of jawn to do for school,’” says Jones. “You can’t say in New York, ‘I have a lot of joints to do.’” Neither Jones nor I have ever heard “joint” used to refer to people or groups of people; typically it’s for objects or items. Joint is like a lesser jawn. It tries, but it has limits. In Philadelphia, a phenomenon occurred, first with the word “joint” and later with its mutation “jawn,” known in the linguistic community as “semantic bleaching.” The term refers to a word that, though originally it has one or a small number of specific meanings, eventually loses the shades of meaning and becomes something much broader and general. An example would be “awesome,” which originally meant “inspiring awe or fear,” and was used more often to refer to scary things than good things. Bill Labov, starting in the 1970s, began to make systematic recordings of speakers in Philadelphia, a project that would eventually become the Philadelphia Neighborhood Corpus. It is, as the site says, “by far the largest single sociolinguistic corpus of any speech community.” Neighborhood by neighborhood, person by person, linguists blanketed Philadelphia and recorded thousands of hours of Philadelphians speaking. One such recording, in 1981, is of paramount interest to Jones and other jawn-philes. A young black male Philadelphian from a West Philly neighborhood was recorded using what’s probably an in-between point in the evolution of jawn. He used the word “joint,” but the ways in which he used that word are completely in tune with the way “jawn” is used in Philadelphia today, much broader than the way “joint” was used in New York either then or now. “He used it to mean a bag, like a bag of chips; a physical place; a variety of different women, like Puerto Rican joints versus Irish joints; and his own genitalia.” From Gaia to Kali; every goddess in mythologies have a prominent role to create or restore the balance in nature and the universe. No wonder, the God of healing and magical tradition allied to it, never failed to surprise people especially in ancient times. Let’s discover some of God and Goddess of healing and their amazing contribution. This list showcases the Gods of death, the Underworld, and destruction: from the Egyptian God of Death- Anubis, who was recognized as a man with a jackal head, to the Hindu God of Death- “Yama,” who took the records of each person’s death. But Thanatos was the personified spirit of non-violent death.
<urn:uuid:2e19d79d-ed07-4a5a-812a-86ced075d31b>
CC-MAIN-2022-33
https://stillunfold.com/miscellaneous/jawn-a-word-that-would-replace-half-of-your-vocabulary
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.96617
924
2.53125
3
For decades, scientists have found out about the sanitation ability of ultraviolet wavelengths, especially germicidal UV (likewise recognized as UV-C). Invisa Shiled In the last few years, germicidal UV light aided quit the spread of numerous virus like the influenza and also other superbugs. Can germicidal UV additionally combat the unique coronavirus (or COVID-19)? The COVID-19 circumstance is swiftly changing, and also it’s triggering priorities to move for a lot of us. Shielding patients, consumers, employees, and our households is more vital than in the past. Sanitizing often made use of surface areas is extremely important, and UV light is very reliable at suspending pathogens like microorganisms and viruses. Germicidal UV items recommend pathogen kill rates greater than a 99.9% price. They’re exceptionally useful right currently in the house because of their efficiency. Obtaining An at-home UV Sanitizer Is Worth It Invisa Shiled Healthcare facilities have actually accepted ultraviolet (UV) lights as a cleaning device for many years, making use of huge, industrial-grade equipments to decontaminate spaces. Now, smaller versions of UV sanitation lights are readily available to customers looking to clean basically anything, from phones to commode seats. At-home UV sanitizers are highly efficient at eliminating germs and also viruses. - Ultraviolet (UV) light ruins the molecular bonds that hold with each other the DNA of infections as well as bacteria. * UV light is a specifically excellent option for sanitation due to the fact that it kills bacteria despite medication resistance and without hazardous chemicals. - At-home approaches of UV sanitation have actually been confirmed very effective versus virus and also can be found in a range of types– consisting of portable sticks, phone sanitizers, as well as tooth brush cleansers. What is UV-C or Germicidal UV Light? Germicidal UV or UV-C is part of the ultraviolet range best understood for its capability to inactivate pathogens like microorganisms and infections. It uses specific wavelengths of the ultraviolet range, generally between 200 to 280 nanometers. Germicidal UV is normally utilized to sanitize surface areas and areas. COVID-19 can survive on certain surface areas for approximately three days, so it’s critical to sanitize at normal intervals. Although the scientific research behind germicidal UV has been around for a lengthy time, it hasn’t been commonly utilized till lately. The CDC as well as FEMA began to support the use in healthcare facilities in the very early 2000s. Ever since, a number of clinical evaluations have kept in mind the performance and also use has entered the last 13 years. Exactly how To Use a UV Light To Kill Germs In Your Home UVC lights available to customers can be found in various kinds, consisting of boxes, containers, and also covered sticks. Each has its own collection of instructions for exactly how to utilize the light to eliminate bacteria, with specifics on points like the length of time the hygiene takes and also, when it comes to sticks, exactly how close it needs to be to the item you’re attempting to sanitize. Larger box-shaped variations fit tablet computers, playthings, as well as baby bottles. Invisa Shiled One 2008 research checked the efficacy of the VIOlight, a $US30 tooth brush sanitizer that claims to free your toothbrush of disease-forming germs. The research found that, contrasted to a toothbrush that had actually not been treated with ultraviolet light, the VIOlight removed 86% even more colony-forming units of S. salivarius, lactobacilli, and E. coli. These germs can create strep throat, digestive system issues, and a variety of other diseases. Sanitizing wands permit you to swing UVC light over anything you might intend to disinfect, including counters, bed linens, and also steering wheels. The sticks can be utilized anywhere, job within secs, and are typically utilized by visitors worried concerning points like hotel room cleanliness. A 2014 research study tested the effectiveness of these mobile sticks and also discovered that they killed 100% of commonly-found germs within 5 secs and suspended 90% of spore-forming bacteria, which are harder to kill, within 40 seconds. What’s The Difference Between Germicidal UV and UV From The Sun? Germicidal UV, or UV-C, is a specific spectrum of ultraviolet light (UV). UV power occurs naturally from the sunlight or can be produced synthetically in lighting fixtures as well as light bulbs. Although it is commonly called “UV light,” ultraviolet wavelengths fall simply beyond the noticeable light range. Rather than light, UV is medically called radiant energy. Consequently, you will not any see light produced from UV products. UV wavelengths can range anywhere from 10 nanometers (nm) to 400 nanometers (nm). Germicidal UV uses the wavelengths between 200 to 280 nm. Far-UVC also falls within germicidal UV, but uses a smaller sector of wavelengths. UV-An as well as UV-B light can likewise kill some microorganisms as well as germs. Does UV Light Kill Germs? The 3 main sorts of UV rays are UVA, UVB, and UVC. Because UVC rays have the shortest wavelength, as well as as a result highest energy, they can killing germs as well as viruses, likewise called pathogens. Invisa Shiled UVC light has a wavelength of between 200 as well as 400 nanometres (nm). It is very effective at decontamination because it ruins the molecular bonds that hold with each other the DNA of viruses and also bacteria, consisting of “superbugs,” which have actually created a stronger resistance to antibiotics. Powerful UVC light has actually been regularly utilized to sanitize surgical tools as well as medical facility areas. A research that included 21,000 clients that stayed overnight in a room where a person had actually been formerly treated discovered that sanitizing a health center room with UV light along with standard techniques of cleansing cut transmission of drug-resistant germs by 30%. This is partially due to the fact that UVC light can efficiently sanitize hard-to-clean nooks as well as crannies. UVC light additionally works by ruining the DNA of pathogens, that makes it effective versus “superbugs.”. Researchers have recently been dealing with narrow-spectrum UVC rays (207-222 nm). This sort of UVC light kills germs and also viruses without passing through the outermost cell layer of human skin. A 2017 research revealed that 222 nm UVC light eliminated methicillin-resistant Staphylococcus aureus (MRSA) microorganisms simply as properly as a 254 nm UVC light, which would certainly be toxic to people. This research was duplicated in 2018 on the H1N1 infection, as well as narrow-spectrum UVC light was again found to be reliable at getting rid of the virus. This has specifically essential effects for public wellness considering that the opportunity of non-toxic above UV lights in public rooms could dramatically reduce the transmission of conditions. Since it kills bacteria regardless of drug resistance and also without harmful chemicals, killing bacteria and also infections with UV light is especially reliable. It is also efficient against all germs, also newly-emerging microorganism pressures. Can Germicidal UV Light Kill Viruses? Germicidal UV lights can actually alter the DNA as well as RNA of infections and germs, destroying their capacity to duplicate. Invisa Shiled Viruses are not living organisms, so germicidal UV can not practically “eliminate” them. Rather, we can state germicidal UV “suspends” viruses, while it does eliminate microorganisms. Bacteria might be immune to other things like prescription antibiotics, however can not develop a resistance to UV light. Can UV Lights Inactivate COVID-19? Due to the fact that this is a novel (or new) coronavirus, screening is really minimal however is currently recurring. The framework of COVID-19 is various from past viruses. For that factor, there is not adequate data to say that UV lights can inactivate COVID-19. Pathogens can be rated based on their tolerance to anti-bacterials, like germicidal UV. Course 3 viruses are the easiest to obtain rid of. Products that are able to suspend more resistant viruses like tiny and big non-enveloped infections (Class 1 & 2 viruses) ought to also be efficient against surrounded infections like coronaviruses. Many UV item makers claim their products can eliminate most Class 1 viruses. Based upon this details, germicidal UV is thought to be efficient against COVID-19. Is UV Light Safe? Current researches reveal certain wavelengths of UV light may be safer than others while still targeting infections as well as germs. Far-UVC lights use a slim range of UV-C wavelengths, from 207 to 222 nm. Far-UVC is thought to be equally as efficient at eliminating bacteria as higher varieties of UV-C light, yet less harmful to our skin and also eyes. One research in particular concentrates on making use of far-UVC light. The research concluded that 222 nm UV can suspend virus yet not penetrate the skin. Right here’s the lower line when you’re selecting germicidal UV items: Make certain you get the best light bulb for the best fixture and comply with item use guidelines. Benefits of Germicidal UV Lights. Germicidal UV lights are very efficient and also have numerous major advantages. - When used appropriately, Pathogen kill rate– Tests reveal that germicidal UV products kill up to 99.9% of infections as well as microorganisms. On top of that, pathogens and also bacteria can not come to be immune to UV like they can specific prescription antibiotics and also antibacterial products. - Limited chemical exposure– UV-C operates in place of possibly damaging chemicals. It’s safe to go into a space after germicidal UV items sanitize the area, however it may be difficult to take in an area that has simply been splashed down with chemicals. - Lighting configurations– There are numerous lighting configurations for germicidal UV light, including different types of fixture installation, mobile systems, and also commercial HVAC attachments. Mobile devices are a fantastic choice for hospitals, airports, fire and also police terminals, and the hospitality market since they’re very easy to relocate from area to room. And also, mobile systems are an economical option compared to setting up fixtures in every space. What Are Ultraviolet (UV) Light Sanitizers? ” Unlike the ordinary American, our tech devices do not take a shower each day,” claims Michael Schmidt, PhD, a teacher with the division of microbiology and also immunology at the Medical University of South Carolina. “We shower to remove the microbes associated with our skin. The only point that microbes like better than human skin is plastic and glass,” he discussed. Invisa Shiled In various other words, microbes are drawn in to your smart device, your earbuds, your tablet computer and also other products you likely use everyday. Up until lately, your finest choice was to use a microfiber cloth– or a choice– to physically wipe these microorganisms away. Recently, companies have been launching products furnished with ultraviolet (UV) light to sanitize items (or themselves). These UV light sanitizers guarantee to rid your tech and various other family things of bacteria that could make you sick. How Do UV Light Sanitizers Work? On the UV light spectrum there are UV-A, B, as well as C lights. Only the UV-C light can eliminate bacteria, states Philip Tierno, PhD, a clinical professor in the department of pathology at New York University Langone Medical. ” This light has a variety of performance, which interferes and also damages the nucleic acids of bacteria as well as other microorganisms,” Tierno discussed, including that the series of light can also disrupt healthy proteins in the microbes by eliminating particular amino acids. They function best on smooth surfaces and have limitations, Tierno encouraged. ” UV-C permeates ostensibly, as well as the light can’t enter crannies and also spaces,” he discussed. That consists of points like buttons or phone instances, which are lined with crevices. If a germ is encased within a food fragment, for instance, the UV light will not have the ability to get at it. ” These eliminate microbes quickly,” Michael Schmidt claimed. “But when your gadget appears, it’s only as secure as its last encounter.” To put it simply, using the UV light sanitizer does not accredit you to get filthy and ignore feasible brand-new bacteria on the phone. What is UV Light Sanitizer? It is a digital tool that is helpful to clean most house products from toys to smart phones at house with an Ultraviolet light in it. You can even use it to get rid of the germs from the commode! You can get a 100% outcome with this small portable gadget in a snap. No requirement for any chemical options to wipe the various sort of poor germs around your residence. Invisa Shiled A 2014 study in the American Journal of Infection Control located that a mobile UV stick eliminated 100 percent of numerous types of germs generally located on surface areas after simply five secs, and inactivated 90 percent of especially durable spore-forming germs after 40 secs. According to the researchers, a UVC tool is a sensible choice to making use of chemicals to sanitize surface areas. Advantages of Portable UV Sanitizers - Kill bacteria off of your phone and also tools without messing up your devices with smelly as well as damp wipes! - Universal sterilizer for traveling or home – Disinfect your gadgets anywhere you go! - Reach inside your shoes or check any type of polluted surface to damage germs in your footwear, on iPad-compatible tools, key-boards, laptop computers, baby playthings, toothbrushes, push-button controls, door knobs, toilet covers, cups, steering wheel dental retainer! - Proven to Work – UV Sanitizer has actually been clinically shown to kill germs utilizing its sanitizing, germ-killing feature. - UV Light Sanitizer eliminates germs as well as fungi in just couple of seconds, even at an 8-inch distance! - Handheld, Portable and easy to use – simply check the location to be sanitized. Its small and pocket-size design makes it a really light and also the ideal cleaner equipment. Here are the key features of this device:. - Portable for usage around the residence. When taking a trip, * Can be made use of. - Destroys bacteria, viruses, and germs. - Eliminates toxins. - Protects against exposure to germs. - Cleans making use of ultraviolet rays. - Long-lasting battery that works an entire day on a single recharge. - User pleasant. - Effectively sanitizes all surfaces. - Safe to utilize. Finest UV Light Sanitizers For Your Smartphone as well as Other Devices Of course, there are certain means to best keep your skin clean. One gadget can often get neglected throughout our day-to-day hygiene as well as sanitation regimens: Our phones, which we placed with the ringer every day. You’re constantly scrolling via it– eating, resting in between sweaty collections at the health club and more. Maybe your youngsters are getting it with less-than-clean hands. Or maybe you’re whipping up supper (hello, raw chicken), following a Pinterest dish. There’s a great deal of microorganisms and also germs spending time on your stuff. Your Mobile Phone – Biggest Germ Carrier Ever! As individuals take sanctuary from the coronavirus in their houses, people are cleaning their hands even more than ever before. What regarding your mobile phone, which you most likely touch extra than any type of other things in your residence? Invisa Shiled A smartphone is the most personal item we have lugging it almost everywhere from the supermarket to restrooms. Smartphones are recognized to bring more germs than one would certainly imagine. Research studies have located it to be dirtier than bathroom bowls. The coronavirus itself, per an analysis by the Journal of Hospital Infection, can “persist on inanimate surface areas like metal, glass or plastic for as much as 9 days,” suggesting your mobile phone might be in danger. Cleansing them with a piece of fabric and also anti-bacterial can seem like a duty. And also, alcoholic solutions can potentially be destructive to your phone’s display. A much more convenient and effective alternative are sanitizing accessories that make use of ultraviolet (UV) light. These box-shaped tools, that faintly appear like mini hibernation cubicles from sci-fi flicks, come furnished with a cradle where you place your phone (or anything else that fits, like AirPods), shut it up, turn it on, as well as in around 10 mins you should get a germ-free phone. Utilizing A UV Sanitizer to Clean Your Mobile Phone With a good UV light sanitizing device, you can clean surfaces like desktop computers and door handles, sinks and also commodes, or those items that are always with you, like your phone. And also by the means? You must truly cleanse your phone once in a while. According to several studies, our phones have to do with the dirtiest objects in our lives, harboring typically almost 20,000 distinctive kinds of bacteria. And also while cleaning down a mobile phone with soap as well as water or isopropyl alcohol might not be the finest concept, UV phone sanitizing cases won’t harm the device but will remove bacteria and also viruses, as long as you use the sanitizing hardware effectively and on a regular basis. Utilizing UV Light to Kill Germs As society hunkers down in an effort to stop the spread of COVID-19, typically known as the coronavirus, individuals are taking rigid safety measures to maintain themselves from catching the illness, including self-quarantining and disinfecting frequently touched surfaces. Hand sanitizer, scrubing alcohol, and various other anti-bacterials are currently in short supply. With manufactured sanitizers in limited supply, lots of are relying on nature’s disinfectant: ultraviolet light. UV irradiation has long been utilized to disinfect objects as well as spaces, so it makes feeling to question: Can UV light eliminate coronavirus? You know a sunburn is not in fact a melt, right? Not a melt such as you would certainly receive from severe exposure to a hot oven or an open flame. Sunburns are in fact radiation damages brought on by ultraviolet light. In the short term, this UV exposure triggers peeling, discomfort as well as soreness; in the long-term, too much unguarded direct exposure to sunshine can lead to skin cancer cells. There’s a positive side here, though: the very same UV light (particularly UV-C light, which has a wavelength between 200 as well as 280 nanometers, while visible lights smallest wavelength procedures 380 nm) that harms the very DNA of human skin with time can be utilized as well as used to eliminate off germs in a matter of minutes. Are UV Light Sanitizers Safe? A particular spectrum of ultraviolet light, far UV-C, “effectively inactivates microorganisms without damage to revealed mammalian skin,” according to a study released in Nature. “This is because, due to its strong absorbance in organic products, far-UVC light can not penetrate also the external (non living) layers of human skin or eye; however, due to the fact that germs and infections are of micrometer or smaller sized dimensions, far-UVC can permeate and inactivate them.”. Invisa Shiled Research study like this Nature study shows that far-UVC lights can remove also air-borne viruses without damaging individuals, and also so we can think of a world in which walking via airport terminal safety or getting in a healthcare facility includes travelling through a UV decontamination chamber. Exactly How UV Light Kills Microbes Viruses don’t replicate by themselves, yet they do have genetic material, either DNA or RNA. They replicate by attaching to cells and injecting their DNA. Some viruses break out of the contaminated cell (this kind of reproduction is called the lytic cycle), while others combine into the contaminated cell, reproducing every single time that cell separates (lysogenic). If you’ve ever before gotten a sunburn, you’ve had a taste of exactly how UV light eliminates viruses: UV light can harm DNA. A DNA particle is made from two hairs bound with each other by 4 bases, adenine (A), cytosine (C), guanine (G), and thymine (T). These bases are like an alphabet, and their sequence types instructions for cells to replicate. UV light can create thymine bases to fuse with each other, clambering the DNA sequence and basically throwing a wrench right into the equipment. Since the DNA sequence is no more proper, it can no more replicate properly. This is just how UV light annihilates viruses, by destroying their capacity to replicate. Don’t Wait To Get Sick Again Remove the hazardous germs you and your liked ones are exposed to on a daily basis. It takes simply a few secs for assurance. Look into the UV Sanitizers offered today to keep you as well as your family members secure from germs. Invisa Shiled
<urn:uuid:171d426b-99b6-4958-a529-1e67c4584a72>
CC-MAIN-2022-33
https://valdostatech.org/invisa-shiled/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.952662
4,657
2.65625
3
Installing an air conditioner is one of the best ways to keep the air fresh and clean in your home or office. A well-maintained air conditioner will ensure that the air circulates well in your room, thereby providing comfort to everyone in the room. In terms of cleaning and maintaining the air conditioner, it has a longer service life. One of the maintenance procedures of the air conditioner is a chemical overhaul. Visit Singapore Aircon Service for more information. What is chemical maintenance? Chemical repair refers to the process of thoroughly restoring and cleaning the air conditioner. This process is designed to clean machines and air conditioners that stay for a long time without the need for cleaning or maintenance. Therefore, chemical repair helps to improve and restore the performance of the air conditioner. When it cannot be cleaned normally, you can also use the air conditioning chemical repair program to restore the functions of other machines. The best thing about this process is that you have to pay more attention to it during execution. First, the air conditioner must be disassembled from the wall until every part of the device must be thoroughly cleaned. After that, you can use chemicals to properly clean the unit filter to ensure that the air removed from it is fresh and clean. This is very important because it can limit allergies and breathing problems related to dust particles and dirty air in air conditioners. After completing this operation, you are required to lubricate the fan bearings to ensure that the equipment runs quietly without making any noise. If your air conditioner is leaking, you must chemically clean the drainage system to prevent this problem and stop the leak. During the chemical repair process, the chemical evaporator coil will be chemically cleaned to remove accumulated dust and dust, so that the heat can be correctly transferred to the air conditioner. When performing this process, you will also be asked to refill the gas used to change the heat in the air conditioner. The chemicals used in the chemical repair process or air conditioning will ensure that the equipment produces clean cold air, broken air, and dust particles that may accumulate. Why is a chemical update necessary for Aircon? You should also use chemical repair methods to control the equipment and check the thermostat. The entire device must be tested in advance before it can be used. For example, you are required to remove the coil from the wall, clean it thoroughly with chemicals, and then rinse it with water to avoid corrosion of the chemicals when it is used again. When reinstalling the coil unit, the blower wheel, fan blades and drain pan must be cleaned. Then, after performing this check, you can check the pressure to ensure that the equipment is operating properly. Another advantage of using the air conditioning chemical repair program is that it will not corrode or damage your air conditioning unit. Compared with other cleaning procedures, it is very safe for you, because the cleaning procedure may make certain parts rust and then decompose over time. Using a chemical overhaul to clean the air conditioner can bring many benefits. When you clean the air conditioner, it will not work too much, so it will consume less power and save a lot of electricity bills. The chemical repair process will also extend the service life of the air conditioning unit, thereby providing you with safe, fresh and clean air. The correct chemical repair process will keep your air conditioning unit intact, so you don’t need to replace parts from time to time. After spending a long time, you will not hire an expert to repair it. Try to use the air conditioning chemical repair method, you will find the benefits you will get. So many people use it to clean their units, and they live a life of enjoying a beautiful environment.
<urn:uuid:f1e3238a-e247-4850-972b-9fa7d5588c4a>
CC-MAIN-2022-33
https://www.attracthome.co.uk/why-do-air-conditioning-units-need-chemical-maintenance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.922489
765
2.71875
3
Te Huarere (The Weather) Resource pack Te Huarere is a story about a week of weather in Aotearoa. It's raining in Auckland, windy in Wellington, cloudy in Taranaki, snowing in Wanaka and frost in Wakatipu. At the end of the story, we discover that the sun is always shining on the East Coast! The resource pack aligns with the achievement objectives in the Maori language curriculum guidelines. The pack includes: - A big bilingual book - for shared reading, with teachers' notes that include assessment rubrics and ideas for second language activities - l0 small bilingual books - for group work or independent reading - A set of flashcards - for vocabulary recognition - Downloadable link - containing an audio file to help with pronunciation, a digital file for the big screen and a template (with instructions) for palm-sized mini block that each student ca take home and read with whānau Write Your Own Review We found other products you might like!
<urn:uuid:683d1a83-9333-440c-b994-fd00d7a1c216>
CC-MAIN-2022-33
https://www.creativeclassrooms.co.nz/te-huarere-weather-resource-pack.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.887237
233
2.96875
3
Multidisciplinary Investigation of a Widespread Sea Star Wasting Syndrome - Part II: Bacterial and Viral Genomics, Electron Microscopy and Toxicology Sea star mortality in several genera including Pycnopodia and Pisaster was unusually high along the west coast of North America, from Alaska to southern California from September 2013–current (January 2014). The number of dead sea stars is estimated in the millions and the mortality rates in affected regions continue to be high (January 2014) with upwards of 100% mortality documented in certain sea star species.1 A similar but smaller event also occurred along the east coast earlier in 2013. An international and multidisciplinary team of scientists at various institutions including, but not limited to, Cornell University, Wildlife Conservation Society, SeaDoc Society, Monterey Bay Aquarium, Vancouver Aquarium, Seattle Aquarium, USGS National Wildlife Health Center, and Northwest ZooPath, are participating in the ongoing efforts to determine the cause of this unusual wildlife mortality event. Captive and free-ranging sea stars of various species and states of health were collected in British Columbia, Washington, and California. Sea star samples were analyzed using a wide array of diagnostic techniques including cytology, microbiology utilizing bacterial and viral genomics, toxin analysis, water and sediment evaluation, histopathology using traditional and non-traditional polymer embedding techniques, and transmission and scanning electron microscopy. Over 1,200 potential bacterial pathogens and numerous animal-infecting viruses have been isolated from diseased sea star samples through microbiological genomics performed at Cornell University. Efforts to identify toxins as well as to fulfill Koch's postulates via inoculation of apparently healthy sea stars with material from wasted sea stars are underway to determine the suspected transmissibility of the wasting syndrome. The results of transmission and scanning electron microscopy by wildlife veterinary pathologists at the University of Connecticut and the Wildlife Conservation Society will be reviewed. Lastly, the challenges and importance of investigating a large-scale wildlife mortality event in a marine species with little previous baseline health data through the efforts of a large team of scientists will be discussed with the summary of current diagnostic results and future directions. The authors would like to thank the dive community for their support monitoring sea star disease as well as collecting samples for analysis. The authors thank additional collaborators including Dr. Raimondi and Melissa Miner from the University of California, Santa Cruz; Dr. Benjamin Miner from Western Washington University; Dr. Drew Harvell, Cornell University. * Presenting author 1. Sleeman Jonathan. Sea Star Mortality on the West Coast. USGS National Wildlife Health Center, Wildlife Health Bulletin. December, 2013. www.nwhc.usgs.gov/publications/wildlife_health_bulletins/WHB_2013-06_Sea_Stars.pdf
<urn:uuid:80695487-c46d-45aa-ab1c-cf279cca553c>
CC-MAIN-2022-33
https://www.vin.com/apputil/content/defaultadv1.aspx?pId=11397&catId=35874&id=6251943
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00688.warc.gz
en
0.908604
583
2.609375
3
“The principle of organic economy was too essential to the functioning of the society not to affect ethics and aesthetics profoundly.” — Ursula K. Le Guin, from the novel The Dispossessed Architectural sustainability, or the green building movement, is dominated by concern with buildings energy efficiency and use of sustainable materials. Left largely undiscussed is the question of the cultural values that shape our homes. American homes have increased in size, cost, and complexity, even while the building’s energy efficiency and materials have improved. Geoff Manaugh often points out the possibility that after technical fixes to fossil fuel energy have been perfected, we will still live in precisely the same way as before – with automobiles, large homes, and consumption. The most visible counter-trend, small homes movement, has had a limited cultural impact as its absurd minimalism contrasts so greatly against excessive cultural norms. It’s often pointed out we simply don’t have enough raw materials for billions of the world’s poor to live at the same standards as exist in the developed world. What’s lacking is a concerted effort to cultivate aesthetic and cultural models for more resource-efficient living. Other professions involved in the planning and design of cities have dedicated considerable effort to realizing models for less resource intensive environments. New Urbanism proposes neighborhood-scale pattern for more efficient development. Together with Smart Growth, some think it is the nucleus to a new “sustainable urbanism.” The field of landscape architecture has sought to align aesthetics with ecology (PDF), and great strides have been made in seeking to design parks and landscapes that are both beautiful and beneficial to natural ecosystems. The architectural profession needs to engage in a similar effort. Oddly the place best situated to cultivate a cultural ethic of creative and efficient homes are the nations where wealthy and deeply impoverished live side-by-side. Here the resources of professionals can be deployed within the limits of the forced austerity of poverty. Vaughan Burns, a South African architect I met with last summer while studying abroad, has made it his life’s work to make humane low cost housing. In the country, government efforts to provide housing to the poor had pushed the architectural profession to the limits of economy. Every centimeter of cement or piping, every hinge, every ounce of paint makes a difference in cost when you’re building 2.3 million homes. Although Vaughan lamented how this tendency can result in inhumanely minimal structures (the model to the right is a new version, enlarged from the previously standard 380 square feet), he has taken it as a creative challenge to formulate a philosophy that maximizes the benefit for residents. Vaughn said he’d been commissioned by middle income and even wealthy clients to build homes much larger, but in the same style as low-cost government housing. The owners almost certainly could afford a conventional home, but found the simplicity, economy, and beauty of the “low cost mindset” more appealing. In his view architecture had just four basic elements: floors, doors, roofs, and windows. These structural categories doubled for metaphors of four rules of design that have guided his designs. The first, the “floor,” is client participation. Vaughan argues for participation both because it is important to creating good design and also because of its transformative impact on the clients. The second, the “door,” represents multi-functionality of design. Buildings should maximize the use of every space, surface, and room. An architect specializing in alternative building techniques has observed “many standard homes built today feel hollow and empty until they are filled with possessions.” He observed his designs include window seats, window shelves, and creative flooring making the homes “quite pleasing even before you move in.” An efficient home could convince the occupant to choose a smaller space, and even “need” fewer belongings to live. Third, the “roof,” is the principle of expandability and sub-divisibility to provide maximum future use of the structure. This may mean making halls wide enough to contain a narrow bed should it need to be converted to a bedroom, using easily recyclable materials, or allowing outdoor access to a bathroom to allow it to be shared among several small homes. Fourth, the “window,” stands for the value of embracing symbolism. Fake traditional touches can be cheap but provide a sense of community or identity. Murals can transform a plain surface into something beautiful, powerful, and meaningful, all at the cost of the artist’s time and the paint involved. Rather than abolish symbolism as inauthentic or unnecessary ornament, Vaughn argues we must recognize the imaginary thing can be just as good as the real thing. After all, in his view through architecture we transform real things — raw materials and labor — into the unreal — comfort, shelter, and space for living. Perhaps someday, like in Le Guin’s fictional future, economy itself will profoundly affect our aesthetics as one of the desired unreal products of architecture.
<urn:uuid:2b96c34b-1338-4019-9f9f-b64601abf09a>
CC-MAIN-2022-33
http://goodspeedupdate.com/2008/2201
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.957769
1,042
2.890625
3
By Robert Burchett; Certified Communications Engineer Most everyone knows how a metal detector works by now; in simple terms, you walk between the bars, the magnetometers SEND some magnetic energy to objects on your person, the item disrupts the magnetic field, the detector senses this and alerts. This is the same for detectors from $100 to $10,000 Cell Phone Detectors work exactly the opposite; they LISTEN for the radio signals that come out of the phones. This is completely different and so it is helpful to explain how to deploy them and how they can be a major part of your security procedures to do the best possible job. When in doubt CALL first! What they WILL detect upon: What they WON’T detect upon: How phones register on the network and how we use this fact to catch them. Phones RANDOMLY send ‘pings’ of short information bursts to the cell network to let it know where they are, request if there are voicemail messages in queue, texts waiting for them, etc. Many of the detectors on the market will not detect these VERY short bursts (about 1/10 of a second) but we do. This is good and bad…here is why: If you walk past the detector with your phone ON (as previously described) and the phone isn’t talking, texting or registering then the detector won’t hear it…this is because the phone has a very small battery and regardless of the fact that it is a cell phone, it won’t send radio signals until it needs to; if it did then the battery would go dead in an hour and that would not be useful to any of us. So: when you place the detector inside of a secure area AND then when a concealed phone registers on the network we will let you know that it happened. That is a good thing; no metal detector can do this. These bursts are not at any specific time; we see them from 2 to 5 times per hour; but no one really knows for sure…we just lie in wait for them to ping and then alert you accordingly which a metal detector cannot do as you have to be exactly between the bars in order to have them work…we must use each machine the correct way to get it to perform the job it was designed to do. When is registration a blessing and a curse at the same time? Cell phone text & voice calls transmitted signals are a “managed” signal for the most part; this means while you are moving toward a tower the system tells your phone to turn the power down. If you are moving away from it they say turn your power up. This makes your tiny battery last longer and we are all happier for it…but then comes the “curse” part. When a phone “loses sight” of the cell phone network then it is no longer a ‘managed’ signal and that can be ‘induced’ by storage in a locker or below ground for example where it can’t hear its network. This means that WHEN it does transmit the registration burst (and this can be quite often) the power output will be at MAXIMUM the phone has capability of. Blessing? Sure; that means we can catch them easily. Curse? Yes; that too; since cell phone signals transmit through walls…and everyone knows that. When can an unmanged phone signal be a problem? Many facilities require that you put your phone in a locker at the front of the building and then the phone usually loses contact with the network. Should the phone be turned ON when in that locker some of them will begin a series of ‘cries for help’ or constant ‘registration’ bursting to try and acquire connectivity. This is an unmanaged call and typically at full power which can travel several floors or through many walls as it tries to connect; and a detector placed near it will alert on this signal constantly…this is NOT a “false” alert, the detector is simply doing its job and informing you of the event. Be aware & use it to your advantage; not as a problem or issue to be avoided. Where else can this phenomenon occur? Suppose a phone is taken below ground level or inside of any “shielded” environment where it is on the person, powered up and on “standby” but can’t connect with the network. Some phones have been observed to constantly attempt to ping the network with repetitive registration bursts over and over trying to contact the system to no avail. Properly placed and monitored detectors will alert on this and inform you immediately despite the fact that no OUTSIDE signal can get in…and that means the detector is doing a great job of alerting you to the event. These phones are subject to their internal programing by their manufacturer; so we see some that DO register with zero signals and some that do NOT. Facility managers ask why the detector has been known to alert in “radio dark” areas and this is why. Sometimes the phones are designed to NOT do anything when there is no network as well. Consider that our very expensive ($5000+) metal detectors can’t do this at all no matter the threat level unless you specifically walk between the bars, the fact that our highly engineered cell phone detectors WILL alert you to phones in unauthorized areas can be a major component to your security policy…if properly deployed. Where to properly place the detectors for maximum effect is very important; pay close attention here to get the most out of your security detection system with the maximum policy enforcement: You can install them at the door, in front of the entrance to the secure area BUT be aware that nearby (lobby, street, etc.) locations where phones are permitted to be used and these radio signals pass through walls…we expect and demand that they do…so this is no surprise. We just need to take it into account. Detectors placed there become Behavior Modifiers which is GOOD. If you want the HIGH DETERRENT factor that our detectors are well known for then by all means place one AT the entrance but be sure to turn it down LOW on sensitivity so it doesn’t just alert all day long…after a while the personnel nearby will become quite annoyed with it and either unplug it or simply ignore it completely…even if it is telling you exactly what you wanted to know. This is the correct way to implement an effective security policy. Get every bit of the deterrent factor you can and then catch the ones that were missed by placing detectors INSIDE of the secure area. This will maximize the investment AND modify their behavior as well. Suppose you have a secure area/ part of a building/ room/ floor where phones are NOT allowed and it is below, above or adjacent to a NON-secure area where phones ARE permitted to be used (cafeteria, smoke area, restroom, hall, etc.). This creates manageable issues and must be taken into account. The way to deal with this is to put the detector as FAR away from the non-secure area (don’t forget the floor above and below too!) and adjust the detector low enough to try and not hear outside of the protected area while hearing the inside…this is a little difficult and here is why: How far away will they detect phones? There is no ‘finite and specific’ distance that phones will be detected. This is due to the variable power output discussed previously. There are 9 steps of power up/ down that a phone will send out when under control of the network so no one knows what power setting the phones are allowed to send at PLUS: There are several FORMATS of cell phone signals and in order of the most-to-least power being transmitted they are as follows: This means that the detectors will alert on a GSM phone when it is farther away than for example a CDMA phone if both are “unmanaged” (at maximum power) or “managed” (variable power but probably lower than full) at the moment of transmission. That makes it difficult to measure exactly where the pickup zones are, how far away we can ‘hear’ it and alert the incident to you. This is why there is no “default” or “factory setting” for sensitivity. Handheld detectors; what they do and don’t do: Handheld detectors are great for certain specific applications; and, like everything, they have capabilities we employ but need to understand them to get the most from their ability. (We don’t call it “limitations”). The good parts: The bad parts: Get the most out of your security system: Wideband Unit: One type of ULTRA-WIDE-BAND RF DETECTOR that is quite popular is the Wideband Detector shown. This unit picks up cameras, bugs, surveillance mikes, GPS trackers etc. that use CELLULAR to transmit out This unit is “OFFICE FRIENDLY” and wall mounts or sits on the desk in your conference/ board room environment. Comes with AC power and alkaline battery operation for portable use or where no power outlet is available. Model 810 on Standby This model comes with the flashing sign stating “Cell Phones Are NOT Allowed In This Area” which informs the hearing-impaired (for ADA compliance) and also is good for quiet environments like churches, libraries, military conferences, etc. Choose this type when placing it at the ENTRANCE to a secure facility for overt policy enforcement alerting. The obvious nature of it helps your security policy to succeed with the intended Behavior Modification. This unit is available with Silent Remote Alerting features such as vibrating pocket alert units that tell the guards which area is ‘cell phone active’ so call to discuss them first. This unit is also available with LAN Networking to alert to your computers desktop; call to discuss this. High Integrity vs. Low Integrity facilities: Prisons, jails, detention centers, etc. are examples of low integrity persons inside them (inmates) as opposed to business, industry boardrooms, military, government and other high-security facilities who employ high integrity pre-qualified personnel who occasionally ‘push the rules’ policy envelope. The proper ways to deploy a cell phone detection system in the high-integrity facilities are nearly identical to the scenario in place when you travel by air. First state the goal clearly; We all know it is to PREVENT people from bringing unauthorized “things” into the facility as defined by POLICY. Every secure facility has exactly the same GOAL. How Behavior Modification Works: Suppose you are going to the airport and you have a weapon in your car. Do you KNOW in advance that you will walk thru a metal detector? Of course you do! (silly question…but highly relevant) So what do you do? Bring it in anyway and “hope” no one will be alerted? No way. You KNOW the consequences in ADVANCE for failure to comply and you KNOW you will be found. So the weapon stays in the car safe and sound. What just happened? That is 100% deterrent factor; pure and simple. This scenario happens repeatedly every day. The airport wins since they did NOT detect your weapon and they are happier for it even if the metal detectors are turned off they still modify bad behavior on-sight. Consider that today metal detectors at airports, despite the fact we make a good living selling thousands of them at a cost of millions of dollars, almost never find a real weapon…they detect keys, watches, glasses, pens, change, belt buckles, etc., we all know the drill. After all these years of them being omnipresent their role is simply to be the policy ENFORCERS who almost never really alert on a tangible threat. They do that job very well too and everyone knows it. We both know that you want to eliminate unauthorized cell phone use in your facility but you really don’t want the labor intensive problem of shakedown of every person on arrival with a metal detector so what to do? For those of you in a “high integrity” environment employing smart folks who will push the rules policy as far as they think they can get away with it but put up a Cell Phone Detection system and the results are quite dramatic. For example I know that if I am dumb enough to walk into that facility with this thing in my pocket they are going to find out about it…so the result is I leave it in the CAR…problem solved. OK I am not stupid but I will sure bend the rules if left to my own devices. Deterrent factor detectors with in-your-face high visibility altered the behavior pattern and the goal is quickly attained. 50% detection and 50% deterrent solves both issues: We put these in all the time…for a while the detectors alert constantly…but soon word travels fast and within a short timeframe they stop alerting which is clearly telling you “the policy is being enforced quietly” and the DETERRENT factor becomes 100% of the solution just like at the airport. Consider years ago when metal detection was first installed at airports. For a while after they first appeared people brought all manner of well-known unauthorized items there only to find them in the trash can or in the hands of TSA with the result of them missing their flight. That timeframe is now gone by but the results linger forever. Metal detectors are now at virtually every airport with almost no detection of high-threat items any longer and more detectors are sold every day expecting little or no resulting alerts. With cell phone High Deterrent overt cell phone detection systems in place we assault your EYES and your BRAIN exactly like that annoying metal detector at the airport causing you to leave the weapon in the car. We alter BEHAVIOR patterns and we are the best in the world at it since 1996 when we invented this industry. For low-integrity facilities: If you administer a jail or other detention facility then there are many real threats you face; one of which causes as much injury and property loss as any firearm or other weapon and that is a cell phone in the hands of a violent criminal. They are not affected by voice alerts or other self-policing enforcement tactics that are more than enough in high integrity facilities; the system engineered for your facility must alert you in a very few seconds and you must respond immediately; here is why. Smuggled in phones are limited: Unless your facility gives inmates chargers and outlets then it is pretty safe to assume that their battery is finite and small. Inmates don’t walk around like teenagers with the phone on all the time hoping for a text. They leave it OFF and turn it ON only to send a quick message and then it is back OFF again as fast as possible. The goal here is to DETECT and CAPTURE that phone ASAP. Many phones will automatically REGISTER on the network (“Ping”) when first turned on, and that is our clue to get into action. We also alert you when they send a text or dial the phone too; so now the issue is for us to tell YOU of the event and for your responders to spring into action. Alerting methods: We need to tell your responders of the event so the solutions vary widely from facility to facility based upon floor plans, distance from the areas suspected of cell phone activity to either the responder directly (direct signal detector-to-responder) or by other means to get the event related to the response station (guard station, etc.) We use every available method to get the signal back to the responders: Localizing cell phone signals to any one area for rapid location and capture. These are all engineered solutions designed to fit your floor plan and facility and are typically not a cookie-cutter type of product. Please call on us for some engineering consultation to insure you get what you need, but here is a primer for you to begin thinking about before you make that all-important call: This is a common question posed by all detention center management. The question is easy but the answer is derived from many responses from YOU and depends upon many factors: · Your floor plans, building design, number of floors/ tiers, number of buildings & spacing · Location(s) of responder posts in relation to the inmate/ cells/ work areas · Current infrastructure available(outlined above in Getting Signal Back to the Responders) · Power availability in each area to be protected Consider the options for location-and-capture with little transmission time from inmates: Method 1: Directional antennas and computer processed solutions Method 2: Multiple omni-directional detectors in small zones of pickup One example of our Hidden In Plain Sight (H.I.P.S.™) product line is this unit concealed in a common smoke detector housing that is common to see and no one suspects what is inside. These common Radio Call Boxes are perfect for retrofitting older facilities with no infrastructure as the Cell Phone Detection is covertly installed inside; uses the battery power & radio signals. THIS IS AN ONGOING AND CONSTANTLY CHANGING TECHNOLOGY SO PLEASE CALL US FOR ENGINEERED SOLUTIONS TO YOUR FACILITY-SPECIFIC QUESTIONS AS ONCE YOU BUY THEM THEY ARE RETURNABLE ONLY FOR DEFECTIVE REPAIR/ REPLACE 22826 Mariposa Ave. Torrance CA 90502
<urn:uuid:63914c78-6974-4037-b503-ca47815c1cee>
CC-MAIN-2022-33
http://www.cellbusted.com/HowItWorks.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.947222
3,712
2.59375
3
Mark Gertler: Figurative Painting and ‘Women in Love’ On the 23rd of June 1939, British figurative painter Mark Gertler gassed himself in his London studio. His suicide ended the period of the artist’s prolonged depression caused by growing financial difficulties, unfavourable reviews after the exhibition at the Lefevre Gallery, and the recent break up with his wife. He had also never fully recovered after the death of his mother as well as the painter Dora Carrington’s suicide in 1932, the two major female figures in his life. As an artist “Gertler himself had no imitators and formed no school. …[I]n his maturity he was a comparatively isolated figure. If he failed… it was not from complacency or settled picture-making’. He was, as Virginia Woolf noted at the time of his suicide, ‘a most resolute serious man: intellectual; fanatical about painting’. This points to a possible explanation for Gertler’s marginal position, his failure consistently to attain the ‘real stuff’ as he had hoped. Theory and effort cramped his instinctive, sensual life on canvas as illness and depression extinguished his personal vitality. In the end, the strict formalism adopted as a cure for nagging anxiety, proved fatally destructive.” (Richard Shone, William Roberts; Mark Gertler. London and Leeds, The Burlington Magazine, Vol. 134, No. 1071, June 1992) Born in December 1891 in London, Gertler was the youngest child of Polish Jewish immigrants. In 1906, he enrolled in art classes at Regent Street Polytechnic, but due to the family’s poverty, he was forced to quit his studies and start working for a stained glass company – a job he disliked very much. After coming third in a national art competition in 1908, and obtaining a scholarship from the Jewish Education Aid Society, he enrolled at the Slade School of Art, University College, London. There, he got acquainted with Paul Nash, Edward Wadsworth, C.R.W. Nevinson, Stanley Spencer, Isaac Rosenberg, and Dora Carrington, whom he loved obsessively and pursued relentlessly for many years. Unfortunately, Carrington, deeply in love with the homosexual writer Lytton Strachey, never fully reciprocated his feelings. Gertler’s unique personality and magnetic charm made him quickly a popular figure among London’s elite. He “impressed everyone with his exuberant vitality, his exotic beauty and his artistic gifts. Aldous Huxley portrays him as Gombauld in Chrome Yellow, ‘a black-haired young corsair of thirty, with flashing teeth and luminous dark eyes’.” Michael Holroyd, on the other hand, described his charismatic character as follows: “Tempestuous and aggressive in his behaviour, he gave the impression of having schooled himself in the rudiments of polite society only through a most supreme effort of the will that might disintegrate at any second. He plunged into every activity which took his fancy with sudden and unrestrained violence, and was an exacting friend, a demanding and jealous lover.” (Jeffrey Meyers, Painting and the Novel) It comes as no surprise that Gertler became an inspiration to his contemporaries such as the aforementioned Aldous Huxley or D.H. Lawrence, who would use Gertler’s overpowering persona as well as his highly individual art in their writing. For example, Lawrence, mesmerized by Gertler’s powerful painting Merry-Go-Round (1916), “informed Gertler that he had metamorphosed the painting of a whirligig into a gigantic frieze and used it in his latest novel, Women in Love.” (Meyers). Gertler’s Merry-Go-Round was perhaps his biggest masterpiece: “… the colour is almost unbearably harsh and strident. Gertler seems to have been determined to show how much he could unleash. …The holiday-makers are deliberately reduced to the same wooden state of rigidity as their steeds, the clouds above are as aggressively Cézanne as they. Everything is held, as though within some whirling metallic labyrinth, by a system of ellipses and verticals. This compels the artist to insist upon a series of redundant visual rhymes which, with relentless iteration, render the strange, mazed, tipsy reel of the fairground. It is a picture which certainly deserves to be respected; but which is more easily admired than loved.” (Meyers) Lawrence used Gertler as well as Carrington as models for his characters in Women in Love. Certain traits of Carrington can be identified in Minette, and Loerke is partly based on Gertler. “But the way in which Lawrence transforms his attractive friend into the corrupt and sinister Loerke provides a valuable insight into his creative technique. Merry-Go-Round provoked a highly emotional response from Lawrence, who did not separate the impact of the work itself from his feelings about Gertler as a person and an artist.” (Meyers). Lawrence’s fascination with Gertler was perhaps dictated by similarities of character and a background they both shared. “Volatile and exciting personalities, their lack of self-control, their tendency to be overbearing and possessive, to dominate and to wound their friends, are partly explained by their early poverty. For both men retained their regional accents and remained working-class outsiders in society, strongly attached to their families, especially their mothers, and always resentful of and uneasy with rich patrons.” (Meyers). Perhaps that is why Gertler and Lawrence were able to remain friends until Lawrence’s death in 1930, and even the episode of Lawrence’s maltreatment of Gertler in Women in Love did not affect their friendship.
<urn:uuid:4312a8a1-9d7f-4eb0-b785-ba3ded168503>
CC-MAIN-2022-33
https://artlark.org/2022/06/23/mark-gertler-figurative-painting-and-women-in-love/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.98275
1,259
2.71875
3
Dietary patterns and stomach cancer: A meta-analysis Investigation of the relationship between dietary patterns and some chronic diseases becomes appealing in nutrition epidemiology. Many studies reported potential associations between different dietary patterns and the risk of stomach cancer, however, a consistent perspective hasn't been established to date. Herein, we carried this meta-analysis to identify the associations between different dietary patterns and the risk of stomach cancer. A total of 23 studies met the inclusion criteria and were included in this meta-analysis. A decreased risk of stomach cancer was shown for the highest compared with the lowest category of a "healthy" dietary pattern [odds ratio (OR) = 0.69; confidence interval (CI): 0.53, 0.89; P = 0.005). There were evidence of the increased risk of stomach cancer in the highest compared with the lowest categories of Western-style pattern (OR = 1.59; CI: 1.25, 2.04; P = 0.0002) and alcohol-drinking pattern (OR = 1.37; CI: 1.11, 1.70; P = 0.004). The results of this meta-analysis indicate that healthy dietary pattern may decrease the risk of stomach cancer, whereas Western-style and alcohol-drinking dietary patterns may increase the risk of stomach cancer.
<urn:uuid:1f048793-3fd7-402f-9668-584f8c90a4a4>
CC-MAIN-2022-33
https://database.beerandhealth.eu/article/2404
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.934404
270
2.625
3
The average car or van in England is driven just 4% of the time, according to a new report by the RAC Foundation, meaning there is ample time for most drivers to charge electric vehicles. For the rest of the time the car or van is either parked at home (73%) or parked elsewhere (23%), for example at work, a pattern has barely changed in quarter of a century. The report suggests that with 18 million (65%) of Britain’s 27.6 million households having – or with the potential to have – enough off-street parking to accommodate at least one car or van there is a huge opportunity for charging electric vehicles at home. Breaking the numbers down: - Wales – 75% of households have – or could have – off-street parking and EV charging - England – 68% - Scotland – 63% - London – 44% The analysis is revealed in Standing Still – a new report by the RAC Foundation – which looks at data provided by the leading net zero data analytics consultancy Field Dynamics and the Ordnance Survey, as well as government statistics. Steve Gooding, the director of the RAC Foundation, said: “The average car is driven just one hour out of every 24, a proportion that is almost the same as it was back in 1995. “However, this lack of use does have one silver lining. It means that there is ample opportunity for recharging the next generation of electric vehicles, particularly at home, or at work – so making best use of our cars’ ‘down-time’ rather than us having to make a specific trip just to get refuelled. “There is clearly a lot of attention focused on providing a rapid public charging network to help address drivers’ range anxiety, but this data shows there is plenty of scope for slower, potentially cheaper recharging facilities to be installed at people’s homes, where the average car spends so much of its time.” Ben Allan, managing director of Field Dynamics, commented: “In the past, it mattered little where people parked their cars and vans, just as long as they were safe and close. However, how these vehicles are parked now can make a significant difference to our progress to Net Zero as that passive stationary time evolves to an active charging and network balancing session. This excellent piece of work by the RAC Foundation creates a tremendous baseline for the industry to build on, we are very proud to have been part of the work.”
<urn:uuid:ce805dd6-83c5-4eed-9d9c-97641c33a8b5>
CC-MAIN-2022-33
https://forecourttrader.co.uk/latest-news/average-car-or-van-in-england-driven-just-4-of-the-time-leaving-plenty-of-scope-for-charging/657845.article
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.970868
517
2.515625
3
What is the skin barrier? Your skin (epidermis) is made up of several layers, the outermost of these layers is called the skin barrier. This layer of skin is made up of strong skin cells that provide an essential defence to your body. Without this layer protecting you, all sorts of pollution and toxins would be able to get through. It also works to keep water inside of your body, allowing you to stay hydrated. Keeping this layer of skin healthy will enable you to achieve clearer, healthier skin. If its not treated properly, it can lead to skin issues like dryness and redness. Let's look into protecting our skin barrier more... What can damage the skin barrier? Your skin faces external factors every day, such as the weather, the environment and pollution, the products we use and even the pillows we sleep on! Here are some of the most common causes that can lead to a damaged skin barrier: - Over washing with chemical heavy products - You might think you are doing your skin a favour by keeping it squeaky clean, but over washing with harsh products that don't suit your skin type can lead to the skin being stripped of its natural oils. - Environment – A temperature that is too dry or too humid can play havoc on your skin barrier. - UV rays – Too much sun exposure is never a good thing. - Psychological and hormonal factors – If you are feeling stressed for example, that can manifest itself through the skin leading to breakouts and inflammation. - Diet and sleep - the amount of water we consume, our diet and how much sleep we get can all play a part in skin health How to tell if your skin barrier is damaged There are a few tell-tale signs that indicate whether your skin barrier is not working at its best. You may experience some of these skin conditions: - Dry skin - Itchiness and flakiness How to protect your skin barrier 1.Adopt a simple skincare routine Using too many chemical heavy products during your skincare routine could lead to a weakening of the skin barrier. Keep it simple, use a 3-6 step routine, and at the most basic level include a cleanser, antioxidant moisturiser and SPF. Use natural, toxin-free products so your skin has the best chance to protect itself. 2. Use plant oils Many plant oils have anti-bacterial, anti-inflammatory and antioxidant properties. Oils are also great for keeping skin moisturised and nourished. Some of the most effective plant oils are: - Jojoba oil – Found in our Invigorating Body Oil, Nourishing Face Oil, Beard & Shave Oil. - Argan oil – Found in our Hydrating Hand Cream and Rejuvenating Eye Balm - Almond oil - Found in Invigorating Body Oil, Nourishing Face Oil, Beard & Shave Oil, Hebridean Sea Salt Scrub, Marine Cleansing Balm and Invigorating Body Lotion - Coconut oil – Found in our Body & Hand Wash 3.Use products that contain antioxidants Antioxidants help to neutralise free radicals (unstable molecules that can damage cells) and work towards repairing the skin, minimising lines and wrinkles whilst helping your skin barrier to fend off environmental threats such as pollution. At ishga, our main ingredient of seaweed is packed full of polyphenol antioxidants to help you achieve healthy, nourished skin. Any skincare questions? Get in touch here
<urn:uuid:4ae10b41-931b-4ce9-ad6e-42e3b56bcfc8>
CC-MAIN-2022-33
https://ishga.com.au/blogs/news/skin-barrier-what-is-it-and-why-is-it-important
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.916577
737
3.0625
3
While taking care of patients, it is very important to address their spiritual and cultural needs. Studies in the nursing career have depicted a very positive connection between spirituality and the results of a treatment procedure. Spiritual needs are a very crucial aspect that needs to be taken care of while providing treatment to patients (Oakley et al., 2010; Joint Commission, 2005). Physical and spiritual health is equally important. Health tacticians are therefore supposed to ask about the spiritual needs and religious background of the patient (Akhatar, 2002). The main aim of this paper is to establish an effective evaluation procedure when caring for Muslim patients. Generally, there are very important aspects of Islam that are highly consulted before any treatment can be administered on them. General Muslim Care Aspects Open dialogue and excellent communication is a very important aspect of a successful culturally sensitive health care service delivery. Preferably, health care is highly recommended to be offered by people belonging to the sex of the patient. This has been made possible with the increasing number of male nursing professionals and many more females taking on medicine. Patients of the female gender have a very crucial privacy and modesty objective. In a number of cases, a close relative of the same sex could help the sick person to take a bath. Since Muslims wear clothes that do not show their body shape (Sheikh and Abdul, 2000), the attire in hospitals should be offered in a manner that meets such requirements. If that is not made possible, the patient could ask the advice of the hospital staff to bring along with them some suitable clothing. When taking care of a Muslim patient, the needless touching in between people of different sex is highly discouraged. The left hand specifically is considered unclean. Therefore, the right hand is preferred for use in administering treatment and in feeding. Concerning Muslim males, a beard is a very vital symbol of religion. Just like would be the case for any other sick person, it is always recommended that permission be sought before shaving all or part of the beard and should particularly be made by a man (University of Virginia Health System, 2003). A Muslim patient without freedom to move could carry out prayers as they seat or on the surface lying down. Providers of health care must be very much aware of such requirements and should not disturb the patient while praying (Hickman, 2006). Muslim patients could need additional or special help after duties in the toilet. It is of great importance that the Muslim patients are provided with the needed help to clean their bodies after emptying their bowels. It does not matter even if this would be carried out in a pan. The availability of a big jug in the toilet/bathroom is much welcome since Muslims make preference to washing with water that is running after visiting the toilet/washrooms. For Muslims, their holy day is Friday. Therefore, health practitioners should know that the sick Muslim patient could receive many visitors than what is normally anticipated. Handling Muslim Births For Muslims, a fetus of 120 days and above is a viable human being. If this viable creature either through an intra-uterine death or a miscarriage having reached the age of 120 days, it should be given a decent burial like any other grown up human being. Thus, a fetus falls a victim of such circumstances should be handed over to the parents for the conducting of a proper funeral. Abortion for Muslims can be allowed if the life of a mother is threatened by pregnancy. Some Muslim parents would prefer to bury the placenta and this should not be considered abnormal in case such request is made. It is very important for the newborn child to be given a prayer call with a recitation made in both years immediately after birth. Chances are that the parents could need a professional like a Mufti, an Imam or Sheik to carry out these acts (The Middle Eastern Community, 2006). It is a conventional religious ceremonial to shave off the newborn babies head seven days after the child was born or around that time. Circumcision is conducted on every male Muslim child (Kobeisy, 2004). The timing of such an event changes although it should be carried out before the child reaches puberty. The Islamic faith does not support female genital mutilation as practiced by some Muslims from Asia or Middle East. Therefore, health practitioners should be wary of these practices amongst Muslims from diverse cultural backgrounds in order to take care of every patient from the Muslim community. Dealing with Muslim Deaths and Organ and Blood Donation Death is regarded as an occurrence that has been predestined by Allah. It is the start of eternal life. The more religious families become, the more they appear unbecomingly accepting and calm by western culture. For Muslims, grieving is permitted for a maximum of three days. However, a widow may be allowed to mourn for about four months and ten days. Since death is seen as predestined by God himself, Muslims do not approve any health care that could hasten the death of a Muslim patient for whatever reasons, even in the most humane ones. In the event that a Muslim patient is in a coma, preference is made for the patient to face Mecca found in Australia that is in most cases approximately west-north-west having the right shoulder facing the same direction too (The Middle Eastern Community, 2006). It is very vital for Muslim patients to make a recitation of Qur'an or conduct prayers in the patient’s presence or in a nearby room. The right shoulder and the face of the deceased Muslim must be turned in the direction as stated. The entire body of the dead person should be covered with a sheet and must be held as little as it can be possible. The body should be handled with much respect solely by an individual of the same sex. No cross should be placed over the body of the dead person. Again, the body must not be washed since this would be required as a part of the final special religious festival prior to burial. Burials for Muslims are carried out not long after death. In fact it should be almost immediately. If possible, the burial should be conducted the same day the person died. The eyes must be closed; the lower jaw must be bandaged carefully to the head to make sure that the mouth does not gap. The body can then be straightened, while the feet are tied in one place together (Winter and Williams, 2002). Muslims freely accept transfusions of blood and transplants of different organs of human beings. Muslims are also permitted to donate organs and blood. Saving other people’s lives is very valued as a work of virtue. Having realized the ever-increasing number of illegal immigrants in out islands, a holistic health care approach should recognize that spiritual and health matters are interrelated for many patients. Maltese nurses are becoming more exposed to different patients with different cultures and religions. The fact that Malta is in the Mediterranean and a country is in the European Union, the health care system is exposed to a variety of people. In order to be in a position to carry out an accurate evaluation and offer sensitive and competent care, professionals of health care should take into account the spiritual and religious inclinations along with other cultural convictions and beliefs (Andrew and Valerie, 2009; Fowler, 2009). From the experiences during our clinical placement, we have come by varied situations where Muslim patients were not treated holistically, especially with regards to their culture and religion. We noticed that this may be the result of the lack of education amongst health care professionals. The main areas of concern included food, hospital clothing, gender issues (mixed health care staff and husband examination), guidance on spiritual matters and language barrier among others. Spiritual matters on death care, the role of priests in taking care of Muslim patients and time to prayer are very vital. Engaging the Muslim patient in the treatment process works on well through an informed consent where health care staffs are trained to deal with patients and their situations. Related Case Studies essays - How Will Astronomy Archives Survive the Data Tsunami? - Case Study 6-Employer /Employee Relationships - Demonstrating Effective Leadership - Ethics Case Study
<urn:uuid:6c2b630d-25f6-41c5-b4a6-84e28b205ad5>
CC-MAIN-2022-33
https://prime-essay.org/samples/case-studies/cultural-diversity-in-nursing-a-case-study-in-essay.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.959492
1,647
2.84375
3
A major trial, managed by University College London, has shown that a drug called Semaglutide injected into people once a week can have a major impact on people trying to lose weight. In fact some people on the trial lost more than a fifth of their body weight, whilst the average weight loss was 15kg. This has caused many to believe that this drug is a ‘game changer’ in the fight against obesity. The participants involved in the research -nearly 2,000 people in 129 centres in 16 countries, had a body mass index of 30 or higher. Some were given a weekly injection of Semaglutide, whilst others were given a placebo for 68 weeks. Those who received Semaglutide saw a greater reduction in weight, the average reduction in body weight was 14.9%, compared to 2.4% in the placebo group. In addition to the weight loss those who received Semaglutide also saw an improvement in their cardiometabolic risk factors and physical functions from baseline compared to the placebo group. The research was published in the New England Journal of Medicine. Semaglutide is already a drug used to treat type two diabetes. It works by suppressing appetite levels by acting like the hormone GLP1 that is naturally released in our bodies after we have eaten. So it works by making us feel full. In the trial people were give the drug at higher doses that those who take the drug for diabetes. Oral Semaglutide is already available in the EU under the brand name Rybelsus for the treatment of type 2 diabetes. Obesity is a huge cost to the NHS and affects the lives and happiness of millions. If obesity rates could fall then in the UK we would see a decrease in heart disease and diabetes. Obesity has also been linked to Covid 19 infections and deaths where it seems obese people have been more at risk. For a long time now, scientists have struggled with how to help people lose weight. There are currently 5 anti-obesity drugs used worldwide but their effect is limited due to the side effects. The most well known is phentermine which brings about a 7.5% weight loss but can only be taken for a short time. Research however shows that when patients stop the drug the weight can come back on. Aside from drugs the other way obesity has been treated is bariatric surgery. This can involve a number of different procedures including gastric bypass, gastric band and a gastric sleeve or a gastric balloon. This usually helps people lose 25-30% of their body weight but concerns around it is that its invasive and permanently alters the digestive system. As a surgical procedure it also doesn’t suit everyone and is expensive. It is important to note that participants in the study weren’t just given the drug alone. They also received advice on their diet and fitness. Those participants who received a placebo but also advice on diet and fitness lost an average of 2.6 kg so it is clear that the drug did have more effect that diet and fitness. But one of the biggest concerns is that Semaglutide may be too expensive for many. The lower dose used to treat diabetes for example is nearly $1,000 per month so a higher dose required to treat obesity could make it too expensive for wide use. It is also important to note that some participants have reported that now the trial is over and they are off the drug they are gaining weight again. So the question is, how can the drug change habits in the long term? A final point to make is that some participants did experience some side effects including nausea, diarrhoea, vomiting and constipation. It is also unknown what the long-term consequences may be of high doses of Semaglutide as the study tool place over 15 months. Semaglutide is not a drug that is routinely available and is still with the drugs regulator so cannot be easily prescribed. The view long term is that the drug will only be accessible via weight loss clinics and not something anyone can buy off the shelves. The makers-Novo Nordisk, have filed for US Food and Drug Administration and European Medicines Agency approval.
<urn:uuid:558a127e-cf70-472f-b0d2-67f45970a0ba>
CC-MAIN-2022-33
https://slimming.co.uk/articles/will-semaglutide-help-fight-obesity.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.975445
869
2.8125
3
Department of Energy Office of Environmental Management Visits WIPPFebruary 23, 2022 A Year of ProgressJanuary 31, 2022 Weaving the Fiber (Optics) of WIPP It’s been a long pull to upgrade the backbone of the communications system at WIPP. Workers will pull more than 137,000 feet of new fiber-optic line cable through conduit to connect WIPP buildings, including the Central Monitoring Room, to computer servers. The fiber-optic network, currently about 90 percent complete, promises to make the WIPP system faster, more reliable and more secure. All that remains is to connect the cable inside site buildings. The new cable won’t increase internet speed. It will boost performance of the site intranet, or internal network, between computers and servers because of the upgrade to single-mode, higher-bandwidth fiber, as well as to faster switches. WIPP has been operating on 10/100 Ethernet switches — that means a data transfer rate of 10 megabits per second to 100 megabits per second. The new switches are the latest standard, known as gigabit Ethernet, which is 1,000 megabits (or 1 gigabit) per second. First developed in the 1970s, optical fiber is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly thinner than a human hair. Fiber-optic technology transmits information — such as phone, TV and internet services — as pulses of light through the strands. An outer layer known as “cladding” wraps around the central strand and causes light to repeatedly bounce off the walls of the cable rather than leak out at the edges, enabling the signal to go farther. Fiber optic is preferred because of its higher data transfer rates (wider bandwidth) and transmission over longer distances (60 miles without in-line signal repeaters). Fiber optic is 20 times faster than cable. It is immune to electromagnetic interferences; has high electrical resistance so it can be used near high-voltage equipment; is lighter weight; and is difficult to tap — important in a high-security environment. Fiber-optic has revolutionized the telecommunications industry and has played a major role in the advent of the Information Age. Because of its advantages over electrical data transmission, optical fibers have largely replaced copper wire communication in backbone networks in the developed world.
<urn:uuid:3c2ffcc5-9e58-46d5-bb58-740268ed0bc5>
CC-MAIN-2022-33
https://wipp.energy.gov/wipp_news_20220217.asp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.93842
494
2.9375
3
1. Containing no matter; empty. 2. Not occupied; unfilled. 3. Completely lacking; devoid: void of understanding. See Synonyms at empty. 4. Ineffective; useless. 5. Having no legal force or validity; null: a contract rendered void. 6. Games Lacking cards of a particular suit in a dealt hand. a. An empty space. b. A vacuum. 2. An open space or a break in continuity; a gap. 3. A feeling or state of emptiness, loneliness, or loss. 4. Games Absence of cards of a particular suit in a dealt hand: a void in hearts. v. void·ed, void·ing, voids 1. To take out (the contents of something); empty. 2. To excrete (body wastes). 3. To leave; vacate. 4. To make void or of no validity; invalidate: issued a new passport and voided the old one. To excrete body wastes. [Middle English, from Old French voide, feminine of voit, from Vulgar Latin *vocitus, alteration of Latin vacīvus, vocīvus, variant of vacuus, from vacāre, to be empty; see euə- in the Appendix of Indo-European roots.] The American Heritage® Dictionary of the English Language, Fifth Edition copyright ©2022 by HarperCollins Publishers. All rights reserved. Indo-European & Semitic Roots Appendices Thousands of entries in the dictionary include etymologies that trace their origins back to reconstructed proto-languages. You can obtain more information about these forms in our online appendices: The Indo-European appendix covers nearly half of the Indo-European roots that have left their mark on English words. A more complete treatment of Indo-European roots and the English words derived from them is available in our Dictionary of Indo-European Roots.
<urn:uuid:cfc1e951-7b72-40db-acdf-7453e5670010>
CC-MAIN-2022-33
https://www.ahdictionary.com/word/search.html?q=%20VOID
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.743467
449
2.921875
3
Uncropped cultivated margins are generally arable field margins that are cultivated annually but not drilled, to support less competitive broad-leaved ‘weeds’ or arable plants, especially the rare species that are now the most threatened group of plants in the UK. This is the most effective measure to conserve these species. It is vital for the conservation of these species that perennial grass margins are not established on the remaining field margins where they occur. These plants need cultivation and protection from herbicides and fertilisers. As a group, arable plants include more species threatened with extinction than any other in the UK, with some species now confined to only a few sites. These rare plants are generally the least competitive weeds in the arable field margins and are not found on nutrient-rich soils where the weed spectrum is dominated by competitive grass weeds and cleavers. Many rare arable plants are now confined to the edges fields. Careful management of these margins can help them without creating a significant weed burden at the edge of the crop. Many of these plants also feed a unique array of insects and their seeds are food for declining farmland birds. Choose the best location - Select areas carefully to ensure they encourage less competitive arable plants and do not become infested with grass weeds. - Most of the rare and declining arable plants are found on light chalky or sandy soils. - The best sites are likely to be ones with a long history of arable cropping. - A survey of the weeds in field margins in June or July may uncover important sites. Create the cultivated margin - The area can be cultivated with the rest of the field, to a depth of 6” or 15cm and a fine seed-bed should be created, but then left undrilled and left undisturbed to naturally regenerate. - If rare species are present, then time the cultivation (spring or autumn) to suit the germination time of the plants. - Take steps to prevent the drift of pesticides or fertilisers onto the uncropped areas. - Do not spray the area with pesticides before the arable plants have set seed, and do not apply any fertiliser. - Annual cultivations are generally needed to prevent the build-up of perennial weeds. - Sometimes it is necessary to rotate the margins with arable cropping to control the build-up of competitive weeds: once replenished, the seed-bank of the rarer species is long-lived and can withstand many years with conventional cropping before returning to uncropped cultivated margin management.
<urn:uuid:a0ddca50-bdea-47c1-a92d-70468a7684bf>
CC-MAIN-2022-33
https://www.cfeonline.org.uk/environmental-management/cultivated-margins/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.92197
537
4.03125
4
“Sugar is a total waste of calories. I don’t touch the stuff.” “I have such a sweet-tooth. My day is grim without some sugar in it.” “Before I compete, I eat a spoonful of honey to boost my energy.” If you are like most of my clients, you are confused about the role of sugar in your daily sports diet. The anti-sugar media reports sugar is health-erosive, yet sports nutrition researchers claim sugar is performance enhancing. That might leave you wondering: Should I eat sugar or avoid it? To address this conflict, I’ve summarized a sugar debate published in 2018 in the Journal of Progressive Cardiovascular Disease. The article, critique, and editorial do a good job of examining the question: Have the ill effects of those toxic white crystals in your diet been over-emphasized? Here is some information to help you better understand the two sides to the Sugar Wars debate. Sugar is Evil (1) • Sugar is not an essential nutrient. Our bodies can make sugar (glucose) from the dietary fat and protein that we eat, or by breaking down our body’s muscle and adipose tissue. • The average American eats about 100 pounds of sugar per year; that’s 2 pounds a week and contributes abundant empty calories. • Populations with a high intake of added sugars tend to have health issues. Reducing added sugar to less than 10% of total calories reduces risk of overweight, obesity, and tooth decay. • Dietary sugar drives up blood sugar. Routinely consuming 150 sugar-calories each day (i.e., one can of soda) increases the risk of developing diabetes by 1%. Much of this sugar is hidden in packaged foods. • Metabolizing added sugar (with no nutritional value) requires vitamins and minerals. With very high sugar consumption (and low intake of other nourishing foods), one could become nutrient depleted. • Trading empty sugar calories for nutrient-rich calories is a no-brainer. Limiting sugar intake does not harm anyone. Sugar is OK for People Who Are Fit (2) • Sugar consumption increased from less than 10 lbs. per person per year in the late 1800’s to about 100 lbs. per person per year by World War II. Consumption remained relatively flat until 1980. Our health also improved between 1880 and 1980—so is it fair to say that the increase in sugar hurt our health? • Sugar (and starch—a string of sugar molecules linked together) is in breast milk, dairy foods, fruit, honey, potato, wheat, corn, quinoa, and all grains. People around the globe have consumed these “carbs” for years. So why now do sugar and starch suddenly become responsible for creating human obesity and diseases? • The fear-mongering terms of unhealthy, toxic and poisonous are simply unscientific. People who lack knowledge about physiology accept this disease-mongering, anti-sugar rhetoric. But the fact is no one food is healthy or unhealthy. • Our present state of poor health is not because our diets are unhealthy or that we consume sugar, but because we are physically inactive. Low levels of physical inactivity reduce our ability to metabolize sugar optimally, and that explains the true cause of obesity and metabolic diseases. • In terms of diabetes, blood sugar, not dietary sugar, matters. The rise in blood sugar that occurs after eating is not pathological but rather the failure of the muscles and liver to take up the sugar. That is, it’s not what you eat, but what your body does with what you eat. • Physical activity affects appetite and energy intake. If we are too inactive and live a sedentary lifestyle, energy intake gets dissociated from energy expenditure. We can easily eat more calories than we burn. Lack of physical activity negatively impacts metabolic health. • A maternal effect impacts both pre- and post-natal development. Children of inactive mothers are born increasingly predisposed to inherited childhood obesity and Type II Diabetes. This increases with each passing generation. Concluding comments (3) Lack of physical activity, more so than sugar, is the greater threat to our health. Given that so many people are overfat and underfit, a diet low in sugars and starches is likely a good idea for them. But for sports-active, fit people—who are at lower risk for heart disease, diabetes, and obesity—sugar and carbs are not toxic but rather a helpful way to enhance athletic performance. The one size diet does not fit all. No one is suggesting that athletes should eat more sugar, but rather understand that, as an athlete, you can embrace a sports diet that includes an appropriate balance of carbohydrate (sugars and starches) in each meal. Strive for a healthy eating pattern that includes 85% to 90% quality foods and 10% to 15% whatever. Some days, whatever might be an apple; other days, it might be a slice of apple pie. Addendum: If you are fearful sugar will harm your health, note that fear-mongering relies on cherry-picked scientific information that can prove what the messenger wants to prove. Fear-mongering messengers have created a general distrust of Big Food, and have shaped opinions that support raw foods, super foods, whole foods, organic foods, and clean eating. While a plant-based diet built on unprocessed foods with no added sugar is ideal, I commonly see athletes who take the advice to the extreme and eat “too clean” (orthorexia). That is not healthy, either. My suggestion: Enjoy a balanced variety of foods, in moderation. The US Dietary Guidelines recommend limiting added sugar to less than 10% of your total calories (about 250+ sugar-calories per day for an active woman who might require about 2,500+ calories a day) Enjoying a daily small sweet seems better than routinely “cheating” with sugar-binges. Does the age-old advice to enjoy a balanced variety of foods—with a sprinkling of sugar, if desired—seem a reasonable goal? This article is based on information from the Journal of Progressive Cardiovascular Disease (August, 2018) 1) DiNioloantonio JJ, O’Keefe JH. In critique of “In Defense of Sugar: The Nuance of Whole Foods. https://doi.org/10.1016/j.pcad.2018.07.006 2) Archer E. In Defense of Sugar. https://doi.org/10.1016/j.pcad.2018.07.013 3) Lavie CJ. Sugar Wars -Commentary From the Editor https://doi.org/10.1016/j. pcad.2018.07.007 Nancy Clark, MS, RD, CSSD (Board Certified Specialist in Sports Dietetics) counsels both casual and competitive athletes at her office in Newton, MA (617-795-1875). Her best selling Sports Nutrition Guidebook and food guides for marathoners, cyclists and soccer players offer additional information. They are available at www.NancyClarkRD.com. For her popular online workshop, see www.NutritionSportsExerciseCEUs.com. CoachUp is the safest and easiest way to find a coach for personalized training. With our 100% money-back guarantee and vetted coaches, anyone can achieve their full athletic potential. Find your perfect coach today and become the athlete you want to be!
<urn:uuid:ca8b183e-d91a-4ef5-8206-b1a9a614b74f>
CC-MAIN-2022-33
https://www.coachup.com/nation/articles/the-athletes-kitchen-the-debate-is-sugar-evil-or-ok-for-athletes
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.922123
1,581
2.578125
3
The Good Debt The Good Debt We learn at a young age about the nexus between good and evil. In that for good to exist there must be evil out there. This is played out in cartoons, movies and in real life. Disappointingly, we often don’t learn about the difference between good vs evil debt. Is there even such a thing as good debt? It’s a difficult subject to broach as often people don’t understand debt and how it can work for, or against them. They hear that debt is bad and so assume all debt is bad. When we as advisers try and have a conversation about debt it can come across as condescending. So here goes. Hopefully a not so condescending discussion about debt. Some types of debt can be beneficial. Businesses use debt all the time to generate revenue. They borrow money (often they refer to it as capital) to buy plant, machinery, hire staff or invest in technology. This is good debt. It creates income which should ideally be higher than the debt costs and the business generates more income to make greater profits for the shareholders that took the risk. There is a reward for the risk taken. The same can be applied to our personal lives. I good debt should increase your wealth over time as well as providing you with utility, that is fulfill a need for shelter, transport etc. Let’s look at some examples: - A mortgage to buy your home is a good debt. It provides shelter, stability, security and a sense of community. These are hard to put a price on. The property you buy should also appreciate in value over time. This type of debt should enable you to increase your wealth. - A student loan to pay for your education is a generally speaking good debt. It funds important educational items like books, course fees, accommodation and living expenses while you are at a stage of your life where you have little income coming in. In doing so you are improving your qualifications and future ability to earn an income. It may even pay for the odd drink or two, which I would argue helps develop important social skills!! - We are often asked “should I buy a property as an investment or invest in shares”. You can do both. Invest cash in a portfolio and take out a mortgage to buy an investment property. A mortgage to do this is a good debt. This is often referred to as leverage. There are some good advantages of buying an investment property using a mortgage. Here is a link to an old informational video we made about the advantages of an investment property mortgage. https://www.youtube.com/watch?v=gmRVSh5s_6k You should also make yourself aware of the risks which can be found here. https://www.youtube.com/watch?v=Ku0bQbnpNFM&t=147s We can also provide some modelling for you on this. - Using leverage to buy investments can produce higher returns. However, this comes with high risk due to greater volatility and tolerance for poor performance. It is human nature to want to get rid of something that is causing you stress. This is often the worst time to sell, especially if you have borrowed money to buy the assets. As the potential for higher returns come with the potential for higher losses. Not something for the faint hearted. Taking on a debt is a balancing act. Good debt, at good levels can be very productive in terms of building wealth. Taking on too much can jeopardize your wealth in periods of declining economic growth or a crisis. You can often hear this being referred to as the strength of your balance sheet. In periods of decline, ideally you don’t want your assets to be worth less than your debt. If this occurs and you lose an income, an asset is destroyed, liquidated etc you can find yourself in a very vulnerable position. With no wealth you won’t find any support from banks or lenders. In fact, they will want to reduce their exposure to further loss and look to sell assets they have security over. So if your net position (assets minus liabilities, loans, credit cards etc) is weak or low, look to improve your net position by paying down debt faster. Let’s now look at bad debt. Bad debt can be described as any debt you take out to purchase a depreciating asset. Think of things like cars, clothes, technology etc. These assets are often worth very little, very quickly. Between 1 and 10 years depending on the item. By taking debt to purchase them you are not improving your long-term financial health. Let’s look an example: - You have $10,000 saved and want to buy a car. You decide that none of the cars are suitable for you and get offered a finance deal for a further $20,000 at 6.99%. The total you will pay for that car will be $35,434, not the $30,000 that you signed up for. The car might be worth $5,000 after 5 years. This hasn’t improved your wealth at all. - Another aspect of debt is that it impacts on your ability to borrow. For example, recently a client looking to buy a home had about $60k worth of personal debt (credit cards and personal loans) The difference in how much they could borrow to buy their first home was almost $300,000. If you are serious about buying a home or an investment property it pays to think twice about whether you need the item, want the item or whether you can wait. If taking out debt seems like the only option, have a look at Sorted’s budgeting tool which you can find here https://sorted.org.nz/tool/budgeting-tool#/welcome They also have helpful guides to help gain control of your finances. Generally, anything involving money, the sooner you do it the better off you will be. Disclaimer: This is meant to be informative and engaging, hopefully not a cure for insomnia. Please don’t take this as personalised financial advice. Discuss your situation with an Advisor. This is where I need to say past returns are no guarantee of future returns. - Posted by Isbister - On June 2, 2021
<urn:uuid:ae8d7b50-d3bf-4a11-8d69-023ac43a32b2>
CC-MAIN-2022-33
https://www.isbister.co.nz/isbister-blog/the-good-debt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.967609
1,302
2.8125
3
Primary Four Malformations "Tetralogy" denotes a four-part phenomenon in various fields, including literature, and the four parts the syndrome's name implies are its four signs. This is not to be confused with the similarly named teratology, a field of medicine concerned with abnormal development and congenital malformations, which thereby includes tetralogy of Fallot as part of its subject matter. As such, by definition, tetralogy of Fallot involves exactly four heart malformations which present together: |A: Pulmonary Infundibular Stenosis||A narrowing of the right ventricular outflow tract. It can occur at the pulmonary valve (valvular stenosis) or just below the pulmonary valve (infundibular stenosis). Infundibular pulmonic stenosis is mostly caused by overgrowth of the heart muscle wall (hypertrophy of the septoparietal trabeculae), however the events leading to the formation of the overriding aorta are also believed to be a cause. The pulmonic stenosis is the major cause of the malformations, with the other associated malformations acting as compensatory mechanisms to the pulmonic stenosis. The degree of stenosis varies between individuals with TOF, and is the primary determinant of symptoms and severity. This malformation is infrequently described as sub-pulmonary stenosis or subpulmonary obstruction.| |B: Overriding aorta||An aortic valve with biventricular connection, that is, it is situated above the ventricular septal defect and connected to both the right and the left ventricle. The degree to which the aorta is attached to the right ventricle is referred to as its degree of "override." The aortic root can be displaced toward the front (anteriorly) or directly above the septal defect, but it is always abnormally located to the right of the root of the pulmonary artery. The degree of override is quite variable, with 5-95% of the valve being connected to the right ventricle.| |C: ventricular septal defect (VSD)||A hole between the two bottom chambers (ventricles) of the heart. The defect is centered around the most superior aspect of the ventricular septum (the outlet septum), and in the majority of cases is single and large. In some cases thickening of the septum (septal hypertrophy) can narrow the margins of the defect.| |D: Right ventricular hypertrophy||The right ventricle is more muscular than normal, causing a characteristic boot-shaped (coeur-en-sabot) appearance as seen by chest X-ray. Due to the misarrangement of the external ventricular septum, the right ventricular wall increases in size to deal with the increased obstruction to the right outflow tract. This feature is now generally agreed to be a secondary anomaly, as the level of hypertrophy tends to increase with age.| There is anatomic variation between the hearts of individuals with tetralogy of Fallot. Primarily, the degree of right ventricular outflow tract obstruction varies between patients and generally determines clinical symptoms and disease progression. Presumably, this arises from a unequal growth of the aorticopulmonary septum. The aorta is too large, thus "overriding," and this "steals" from the pulmonary artery, therefore stenosed. This then prevents ventricular wall closure, therefore VSD, and this increases the pressures on the right side, and so the R ventricle becomes bigger to handle the work. Other articles related to "primary": ... The succeeding phase of ootidogenesis occurs when the primary oocyte develops into an ootid ... In fact, a primary oocyte is, by its biological definition, a cell whose primary function is to divide by the process of meiosis ... In late fetal life, all oocytes, still primary oocytes, have halted at this stage of development, called the dictyate ... ... ALP = Australian Labor Party, L+NP = grouping of Liberal/National/LNP/CLP Coalition Parties (and predecessors), Oth = other parties and independents ... House of Representatives results and polling Primary vote TPP vote Seats ALP L+NP Oth ... ... Hazelwood Primary School Firs Farm Primary Oakthorpe Primary Palmers Green High School (Independent) St Michael at Bowes CE Junior Tottenhall Infant St Monica's RC ... Famous quotes containing the word primary: “Anyone who has obeyed nature by transmitting a piece of gossip experiences the explosive relief that accompanies the satisfying of a primary need.” —Primo Levi (19191987)
<urn:uuid:364dba5a-d96b-475b-b9b8-f56ba2fb4699>
CC-MAIN-2022-33
https://www.primidi.com/tetralogy_of_fallot/pathophysiology/primary_four_malformations
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.91484
1,019
3.125
3
Forrester part of team that discovers cats don't roam where coyotes are present In one of the largest studies of its kind, a volunteer-fueled camera trapping effort showed that where coyotes have moved in, cats are nowhere to be found. Smithsonian research associate and North Carolina State University zoologist Roland Kays wanted to know more about the extent of domestic cat hunting in residential areas, urban forests and protected natural areas. So from 2012 to 2014, Kays and several other Smithsonian researchers, including conservation biologist Tavis Forrester, coordinated hundreds of volunteers to set up motion-triggered camera stations to look at where cats were actually hunting. What they found, almost without exception, is that where coyotes are, cats aren’t.
<urn:uuid:066cafc3-3fd6-4688-81d6-ff942499dbea>
CC-MAIN-2022-33
https://www.switzernetwork.org/fellows-news/forrester-part-team-discovers-cats-dont-roam-where-coyotes-are-present?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.936352
157
2.703125
3
One-to-One Teaching vs. Working with a Group I have years of teaching experience and during my teaching years, I have been working with individual students and with different groups and would like to speak about the differences between teaching these two groups. This post was written by our TEFL certification graduate Meri V. Please note that this blog post might not necessarily represent the beliefs or opinions of ITTT. When I started my career I did it with teaching one to one student as it was easier and as I didn’t have teaching experience then I decided to start from individual students. Working with a private student Teaching individuals is easy as you are concentrated only on one student and you just need to find out his or her needs. We spent all your time with one student and you can see the progress easily. And it is somehow flexible. Dates and times of lessons can be adjusted to suit individual schedules. The informality of one-to-one lessons is also an advantage as it can be less stressful than group teaching and often less time-consuming about lesson planning and homework marking. In terms of teaching methodology, you have the opportunity to get to know your student and create lessons that are suited to their individual needs and preferences. You can collaborate more, encouraging the student to take an active role in their learning and become more self-directed. You can also be more flexible by responding to language points as they come up, even though they weren’t necessarily in your lesson plan. But of course, there are also disadvantages to teaching one to one. One practical disadvantage is that you may have to travel a lot from one lesson to another. Also, some investment of time may be needed in advertising and finding students. Another practical problem can be when students cancel lessons unexpectedly or don’t show up. Also, one-to-one teachers usually work on their own and this means that they aren’t able to exchange ideas with other teachers or engage in reflective professional talk that is such an important aspect of teacher development. Some students are reluctant to talk, while others love talking. Working with a group What about teaching groups is a different thing. Like you teach the same language but when you have a group it is a different way and you, as a teacher, need to involve all your students in the lesson. One can talk, the other can’t be interested, the third one doesn’t want to learn and many other problems. So what should the teacher do is to be professional and try to make activities that can cover all these problems? I remember when I was given my first class as a group, I entered the classroom and saw different people of different ages, and then I found out that they were of different levels too. So the first thing I did, I talked to them trying to understand what they want, why they want to learn English and then in my mind I Thought about motivational activities that could warm them up and all shall be included. So teaching groups we need to consider the age, the level, the motivation of each student, and if we don’t follow all these steps we shall have a failed lesson. Do you want to teach English abroad or online? Take a TEFL course! Of course, there are differences in teaching individuals and groups but one thing remains still, we need to know the needs of our students, consider their age and level, it doesn’t matter if we teach one student or a group of students. Speak with an ITTT advisor today to put together your personal plan for teaching English abroad! Send us an email or call us toll-free at 1-800-490-0531 to speak with an ITTT advisor today. - Why You Should Take Specialized TEFL Courses - 10 Tips When Teaching English as a Foreign Language to Children - 10 Pieces of Advice Every New TEFL Teacher Needs to Know - What’s Stopping You from Teaching English Abroad? - Teaching English Abroad: What's Next? - How To Advance In Your EFL Career - Top Tips for Taking an Online TEFL Course
<urn:uuid:6e9743de-4e58-48cc-bf46-f38a9a6470d2>
CC-MAIN-2022-33
https://www.teflcourse.net/blog/one-to-one-teaching-vs-working-with-a-group-ittt-tefl-blog/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00688.warc.gz
en
0.972698
859
2.515625
3
An educated and informed public is our nation's most powerful resource for meeting the challenges created by increasing environmental, economic, and social equity demands. Recognizing the importance of education, the President's Council on Sustainable Development (PCSD) established the Public Linkage, Dialogue, and Education Task Force (PLTF). PLTF's policy recommendations focus on education, access to information, outreach, and development of sustainable communities and a sustainable workforce; these are described in depth in the body of this report. The following summarizes how the Task Force achieved its first mandate - that of public outreach and dialogue. Through that process, which was consensus building in nature, the PLTF was able to accomplish its second mandate - the formulation of policy recommendations for consideration by the President. As consumers and producers, individuals make choices that cumulatively have local-, national-, and even global-scale impacts on societies, economies, and environments. Without education and outreach among the public, the societal consensus needed to redirect our nation toward a sustainable path cannot be attained. Education and outreach thus are necessary for a sustainable future. PLTF aimed its outreach to the public at large, with specific reference to the following key constituencies: youth of today are the nation's future. It is important that they acquire the substantive knowledge and skills needed to become responsible citizens who can help bring about sustainability in their homes, workplaces, and communities. - Business leaders and employees can have a significant effect on consumer and product choices which will ultimately affect - positively or negatively - our nation's ability to become more sustainable. - Federal, state, local, and Native American tribal policy makers and local community leaders are primary target audiences because their active leadership is essential. - Researchers and educators help youth and adults acquire the knowledge, skills, and attitudes necessary for sustainability. - Civil rights, religious, environmental, and nonprofit organizations are important links to community and grassroots The PLTF outreach effort encouraged fresh approaches to increase public dialogue; served as a catalyst for developing local, regional, national, and international sustainability agendas; facilitated the flow of information; and provided a central point for disseminating information on the Council's deliberations. To this end, - involved Council members in a variety of conferences, - identified and promoted dialogue among states and local regions that had developed sustainability plans or were in the process of doing so, - initiated demonstration projects that reached out directly to educate our nation's young people and teachers about sustainable development, and - distributed written information from and about the Council via print and electronic media. PLTF also hosted dialogues, roundtables, and fora around the country, thereby providing a valuable opportunity for the Council to hear about the lessons learned in local communities -- which are often considered the breeding grounds for innovative ideas on sustainability. Several landmark PLTF dialogues and fora are highlighted below: - In March 1995, approximately 200 people from across New England attended a public PCSD forum -- Achieving a Sustainable New England -- at Tufts University's Fletcher School of Law and Diplomacy in Medford, Massachusetts. The purpose of the forum, which PLTF co-hosted, was to inform citizens about PCSD's work and to hear testimony on issues related to New England's sustainability efforts. Citizens were invited to voice their hopes and concerns about New England's future and their ideas for achieving sustainable development in the region. Testimony -- which has now been compiled into a report, Achieving Sustainable Development in New England -- was given on regional issues, such as fisheries and defense diversification, that are affecting or promoting community sustainability. A public comment period followed the testimony, allowing environmental representatives, health officials, and citizen leaders from around New England to advise the Council. - An international roundtable, which included a diverse group of citizens from the San Francisco Bay Area, was hosted by PLTF to focus on international issues. Many of the topics discussed became the basis for a chapter on international leadership in the Council's report,1 and helped formulate the Task Force's action item on international education for sustainability. In particular, the participants noted that part of shifting to sustainability requires an examination of the root causes of the "global eco-crisis," including massive media, "techno-worship," and the lack of a geological time frame. Overcoming obstacles requires a global understanding of the effects that one country's actions and policies have on the health and well-being of another country, coupled with domestic solutions to unsustainable practices. The roundtable concluded that this was best achieved through a "think globally, act locally" credo -- a message to be explained and publicized through strong educational programs emphasizing individual, community, business, and national responsibilities to the global community. - In April 1995, the PCSD held a meeting in San Francisco which focused on education for sustainability. Part of that focus was to incorporate youth into all facets of the dialogue. A youth-led roundtable was held with local area youths to discuss issues and problems that were barriers to sustainability. Concerns were raised about increasing societal ills such as drugs, violent crime, teen pregnancy, lack of access to education and jobs, and the environmental degradation of the earth. The youth were hopeful that by continuing to talk and work together to find common solutions, a more sustainable environment could be created for future generations. Two youth representatives to the Council, James Hung (a PLTF member) and Amy Weinberg (a member of PCSD's Sustainable Communities Task Force) communicated the results of the forum to the Council members during the PCSD meeting. These -- and many more -- meetings, roundtables, dialogues, and other fora were central to shaping the Council's work and PLTF's policy deliberations: the goal was to make the Council's work as inclusive as possible. Thousands of people from multiple sectors responded to the Council's request for participation in the PCSD process. Participants drafted, reviewed, and commented on the work of the Council at each stage of development. They also shared project information, materials, and success stories -- all of which greatly enriched this process. The Task Force members took all the information from dialogues and roundtables, coupled with their personal and professional expertise, and embarked upon an ambitious process to develop policy recommendations. Their goal was to identify the potential policy areas that needed to be addressed and highlighted in the national sustainable development action strategy being developed by the PCSD. This process was unique in that it brought together the different components of education -- formal (K-12 and postsecondary); nonformal (media, museums, extension, and continuing education); workforce and vocational training, and outreach. Within each education component, a variety of education stakeholders were represented -- teachers, the private sector, NGOs and environmental organizations. This approach enabled a variety of innovative ideas to be represented and it fostered a sense of ownership of the product -- the recommendations for policies and associated action items. - The January 1995 education-related meeting kicked off PLTF's policy process. The focus of that meeting was on nonformal education. PLTF members heard from a variety of formal and nonformal educators about the benefits of linking the community to education efforts. To further their education for sustainability efforts, the Task Force hosted a community forum in Chattanooga which was moderated by a local student. - In February 1995, the Task Force led a forum sponsored by S.C. Johnson & Son, Inc., and hosted by the Global Rivers Environmental Education Network in Ann Arbor, Michigan. At the forum, a group of visionary leaders from academia, public relations firms, nonformal education programs, business, government, and non-governmental organizations gathered to formulate policy recommendations that looked beyond incremental educational reform to focus on lifelong learning emphasizing holistic relationships with the environment and communities. - In February 1995, PLTF members teamed up with a diverse group of educators from around the globe to participate in a workshop to develop principles of sustainability in higher education. This PLTF forum was hosted in Essex, Massachusetts, by Second Nature, a nonprofit organization that helps universities craft sustainability plans. The forum helped shape the Council's recommendations on higher education and sustainability and produced a booklet entitled Workshop on the Principles of Sustainability in Higher Education. - In March 1995, S.C. Johnson & Son, Inc., hosted a forum held in Washington, D.C., chaired by Madeleine Kunin, Deputy Secretary of the U.S. Department of Education. Educators and administrators attended this roundtable, whose purpose was to review the policy recommendations formulated at the Ann Arbor meeting and determine whether the paradigm shift outlined in those recommendations was realistic. There was consensus among the participants that the policies were on the right track for directing the nation's efforts at educating for sustainability. This report is a compilation of the consensus findings, including policy recommendations and suggested action items, arrived at through the efforts of the PLTF outreach and dialogue process. It expands upon recommendations in the PCSD report, Sustainable America: A New Consensus, by highlighting more examples and success stories of sustainability in action. This report also provides a resource guide, found in "Appendix C," to assist individuals and organizations in making new linkages to advance sustainability initiatives and programs. Table of Contents
<urn:uuid:aa10265f-0948-4950-9c8f-21926ff9516f>
CC-MAIN-2022-33
https://clintonwhitehouse5.archives.gov/textonly/PCSD/Publications/TF_Reports/linkage-intro.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.941599
2,099
3.265625
3
Perched 95 feet above the streets of downtown Philadelphia, Cira Green is no ordinary public park. A sea of Kentucky bluegrass and tall fescue flows across the football field-sized roof of a 12-story parking garage wedged between two gleaming residential towers in the city’s University District. Cira Green will help reduce flood control and storm water management costs by absorbing rain and snow. But it’s also expected to do more. The man who designed the grassy aerie, crisscrossed by walking paths, has another abiding objective. “We can share the cities with nature in a way that is engaging and keeps us connected to who we are as human beings, and as organisms on the planet,” says Charlie Miller MS’76 MS’82, founder and president of Philadelphia-based Roofmeadow, a firm that pioneered the design of living roofs—or “green roofs”—across the United States. “There’s a little bubble around you when you’re on a green roof,” he adds. “It gives you a sense of intimacy and security. Psychologically, the green also will be soothing to you.” But green spaces, including parks, are under siege. The United Nations reports that 66 percent of the world’s population—compared to 54 percent now— will live in urban areas by 2030. Further, the World Health Organization says that physical inactivity due to lack of access to recreational areas accounts for 3.3 percent of global deaths. Cira Green (which won the 2016 Philadelphia Design Award from the American Institute of Architects) and other green roof projects could be part of the solution.The roofs are commonplace in Europe, and they’ve been expanding in the U.S. since Miller launched Roofmeadow in 1997, when it became one of only two businesses of its kind in the country. “If you can provide a dozen green roofs in a big city, and you have enough parks connected by a necklace of green areas, you can start to reap psychological benefits,” Miller says. Green spaces are also credited with, at least incrementally, reducing cities’ heat island effect, which refers to localized warmer temperatures brought on by human activities. Through evapotranspiration, plants secrete water through the pores in their leaves, cooling the air in the process. Supporters note that there are other benefits: plants also filter the air, which improves air quality by using excess carbon dioxide to produce oxygen. Miller has designed more than 200 green roofs in 25 states—including Chicago City Hall, whose roof teems with 20,000 plants representing 150 species, many of them native to the prairie. Flora include shrubs, vines, and two trees, which provide a verdant home to a pair of beehives. Nineteen years ago, Miller’s idea struck some as daft, eliciting blank stares as he articulated his unusual vision. But it didn’t take long to find believers. High-profile clients now include the Baltimore Convention Center, Brooklyn Botanic Garden, the Kansas City Central Library, Chicago’s O’Hare International Airport, and the Los Angeles Museum of the Holocaust. “Charlie has pushed the boundaries of design,” says Ed Snodgrass, founder of Street, Md.-based Emory Knoll Farms, the first nursery in the country to exclusively grow and sell plants for green roofs. “He’s an innovative and creative designer who’s good at what he does because he’s always learning.” “He understands the whole assembly,” Snodgrass adds. “You’re dealing with a structure, waterproofing, draining, engineered medium, and plants. It’s a completely unique assembly compared to anything else.” A HIGHER PURPOSE Designing living roofs wasn’t always Miller’s career ambition. After graduating from the College of William and Mary with a degree in chemistry (“It turned out I loved chemistry, but I hated being a chemist”), he enrolled in the University of Utah’s highly regarded master’s program in geology and geophysics. His love for geology was informed by his experiences as a kid growing up in Lancaster County, Pa., where Miller thrilled to discovering limestone formations shot through with clear quartz crystals. “Things like that caught my attention,” he says. After obtaining his master’s, Miller worked as a field geologist for a year and a half with the Kennecott Copper Company and Getty Oil Minerals, both based in Salt Lake City. But there was one problem. “When I got married, my wife said I had to have a sedentary job,” he says. “So I went back to the University of Utah and got another master’s degree, in civil engineering.” A 1997 trip to Germany changed his career focus yet again. A German friend, a professor of environmental landscape design at the University of Pennsylvania, suggested that the pair travel to Berlin to check out the city’s Potsdamer Platz, a public square where high rises abound with green roofs. At that point the roofs had been a fixture in the city’s urban landscape for two decades. “I could see that not only was the business potential to do something like this great, but you also could do it on such a scale that you could change the hydrology of cities and begin to reverse some of the negative effects of development,” Miller says. “I came back from my encounter extremely energized and excited, and I thought naively that if I could just explain what I had seen and what the potential was to my fellow architects and engineers and developers, that this would sweep across the United States.” Instead, he notes, “I spent a decade just trying to educate people what a green roof is. That job is not done.” Back home in Pennsylvania, Miller wasted little time plotting his business venture. He began to mix his own soil substitute—or medium—often of light porous substances such as scoria or pumice. Laying plants and medium over a roof, after all, requires a delicate touch. Soil typically weighs 100 to 120 pounds per cubic foot; Miller’s homemade creation registers 60 to 75 pounds per cubic foot. He designed his first green roof, a 3,000-square-foot “freebie,” atop the Fencing Academy of Philadelphia, where the husband-wife proprietors lived in a penthouse apartment. He went on to design a 6,000-square-foot roof at an alternative medicine business in Hazleton, Pa. Then came Chicago City Hall. The big-name clients have continued ever since. A GROWING VISION Not all of Miller’s efforts lend themselves to foot traffic. In Chicago in 2006, he designed a green roof for Walmart, which sought to control storm water runoff at one of its stores. The retail giant has since added green roofs to two other Windy City stores, and to another in Portland, Ore., where the retailer worked with Portland State University to study roof impacts on everything from heat island effects to improving overall building performance. Green roofs are actually easier to maintain than their plant-free counterparts, says Don Moseley, Walmart’s senior manager of sustainable facilities. The roofs are planted with drought-tolerant sedum, a kind of succulent. Volunteer rose bushes sprouted at one of the Chicago stores, where a pair of geese raised their goslings amid the unlikely garden. The roofs have also proven durable; Miller guarantees them for 20 years. “The roofing membrane itself is quite protected by the soil and vegetation,” adds Moseley, “so there’s very little or any degradation as a result of ultraviolet rays from the sun.” Green roofs, which cost from $6 to $150 per square foot, typically are overlain with four to 12 inches of medium, Miller says. “Putting four or five feet of soil on top of a building is not really a green roof,” he says. “My business is built on systems that are lightweight and thin.” Another of Miller’s high-profile projects is Lakeside, a Brooklyn, N.Y., skating complex in the borough’s 149-year-old Prospect Park. Completed in 2013, a pair of pavilions totaling 30,000 square feet stand partly submerged in man-made hills, the roofs of which Miller topped with a mélange of trees, shrubs, perennials, and grasses. “It was a pretty big undertaking, and a pleasant surprise,” says architect Andy Kim, who designed the pavilions for award-winning Tod Williams Billie Tsien Architects. “Buildings on parkland usually don’t take risks like that; they go for safer solutions.” “What makes Charlie really useful and kind of unique is, he’s got an artistic design sense, but he’s also got a rigorous, highly pragmatic and sophisticated technical knowledge about that kind of construction,” Kim adds. “He shares what a lot of architects who are good share—a balance of traits that includes a sense of composition and the materials—but he also has the ability to execute something that will stick around for a long time.” A New York Times review said Lakeside “is all about the seamless integration of architecture and landscape,” calling it “subtly remarkable” and a work of contemporary architecture “that looks as if it has been here all the while, emerging from the land and integral to it.” “You can walk up the path for the first time and not quite know where the line is between the park and the top of the building,” says Kim, who lives nearby and takes his two children to the park’s pair of skating rinks. While thousands of green roofs now dot the United States, Miller doesn’t expect them to ever be as commonplace here as in Europe, where he says there is “an imperative to garden.” “There’s a devotion to horticulture, and there’s more faith in Europe in general to undertake large public programs with the expectation that it’s going to create a substantial public good,” he says. “There’s much more forbearance when it comes to establishing regulations and criteria that would result in city greening laws to be visually and hydrologically transforming.” That said, Miller helped to spawn a movement with a following all its own in America. There are now hundreds of green roof designers across the country, many of them “mom and pop” operations that take on smaller projects. Older and wiser, Miller says he’s driven these days by a Zen-like “spiritual imperative,” a different kind of evangelism than his early days in the business. “I always used to lead with the engineering side, as in ‘We can make our cities work again. We can make them absorb water, and we can cure nuisance flooding and all sorts of things using this technology. And, oh, by the way, they’re pretty,’ ” he says. “My company’s approach at this point is to say that you can have something on your home, on your business, in your city, or at your college that will be special and will create a unique environment that you will treasure. And it will allow you to understand what it is to be an urban dweller in a way that you may not have conceived it before.” —Andrew Faught is a California-based freelance writer who has written widely on issues and ideas in higher education. Web Exclusive Photo Gallery Web Exclusive Videos
<urn:uuid:9f5a36cf-984c-44ae-87c8-880e44399d23>
CC-MAIN-2022-33
https://continuum.utah.edu/web-exclusives/gardening-elevated/?replytocom=92
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.960486
2,522
2.84375
3
Español Português 中文 Tagalog Tiếng Việt 한국어 COVID-19. We’ve been residing with it for what in some cases seems like permanently. Specified the amount of deaths that have occurred from the sickness, it’s most likely not astonishing that some buyers are wanting at unconventional solutions, not authorized or approved by the Meals and Drug Administration (Food and drug administration). However this is understandable, make sure you beware. The FDA’s occupation is to diligently evaluate the scientific details on a drug to be absolutely sure that it is the two safe and sound and effective for a specific use, and then to make a decision regardless of whether or not to approve it. Employing any procedure for COVID-19 that is not authorized or approved by the Food and drug administration, until aspect of a clinical trial, can lead to severe damage. There seems to be a growing interest in a drug termed ivermectin to take care of humans with COVID-19. Ivermectin is often used in the U.S. to take care of or avert parasites in animals. The Food and drug administration has been given many reviews of sufferers who have demanded professional medical assistance and been hospitalized soon after self-medicating with ivermectin supposed for horses. Here’s What You Will need to Know about Ivermectin - Food and drug administration has not authorized ivermectin for use in managing or blocking COVID-19 in humans. Ivermectin tablets are authorized at really precise doses for some parasitic worms, and there are topical (on the pores and skin) formulations for head lice and pores and skin situations like rosacea. Ivermectin is not an anti-viral (a drug for managing viruses). - Taking huge doses of this drug is dangerous and can lead to severe damage. - If you have a prescription for ivermectin for an Food and drug administration-authorized use, get it from a legit source and acquire it specifically as prescribed. - Under no circumstances use medicines supposed for animals on on your own. Ivermectin preparations for animals are really unique from those authorized for humans. What is Ivermectin and How is it Made use of? Ivermectin tablets are authorized by the Food and drug administration to take care of folks with intestinal strongyloidiasis and onchocerciasis, two situations prompted by parasitic worms. In addition, some topical (on the pores and skin) types of ivermectin are authorized to take care of exterior parasites like head lice and for pores and skin situations this sort of as rosacea. Some types of ivermectin are used in animals to avert heartworm sickness and specific interior and exterior parasites. It’s significant to notice that these products and solutions are unique from the types for folks, and safe and sound when used as prescribed for animals, only. When Can Taking Ivermectin Be Unsafe? The Food and drug administration has not reviewed details to assistance use of ivermectin in COVID-19 sufferers to take care of or to avert COVID-19 however, some preliminary investigation is underway. Taking a drug for an unapproved use can be really dangerous. This is correct of ivermectin, much too. There’s a whole lot of misinformation around, and you may well have read that it’s alright to acquire huge doses of ivermectin. That is completely wrong. Even the levels of ivermectin for authorized employs can interact with other medicines, like blood-thinners. You can also overdose on ivermectin, which can lead to nausea, vomiting, diarrhea, hypotension (low blood tension), allergic reactions (itching and hives), dizziness, ataxia (challenges with harmony), seizures, coma and even death. Ivermectin Merchandise for Animals Are Unique from Ivermectin Merchandise for People For 1 matter, animal drugs are often hugely concentrated for the reason that they are used for huge animals like horses and cows, which can weigh a whole lot much more than we do—a ton or much more. These types of higher doses can be hugely harmful in humans. Furthermore, Food and drug administration reviews drugs not just for security and success of the energetic elements, but also for the inactive elements. Several inactive elements found in animal products and solutions are not evaluated for use in folks. Or they are incorporated in a lot increased quantity than those used in folks. In some cases, we never know how those inactive elements will have an effect on how ivermectin is absorbed in the human entire body. In the meantime, effective strategies to limit the distribute of COVID-19 continue to be to don your mask, stay at minimum 6 ft from others who never are living with you, wash arms commonly, and avoid crowds.
<urn:uuid:eb526159-b883-402c-ab8d-3c1b8bafc916>
CC-MAIN-2022-33
https://newssiiopper.co.uk/why-you-should-not-use-ivermectin-to-treat-or-prevent-covid-19.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.943477
1,058
2.640625
3
What is Hepatitis B? Hepatitis B is a vaccine-preventable viral liver infection that occurs upon contact with the Hepatitis virus. A leading killer disease, it causes the inflammation (swelling and reddening) of the liver, and other chronic liver conditions like cirrhosis (hardening or scarring), liver cancer, and even death. Sadly, despite affecting millions globally, the disease remains a silent killer due to its asymptomatic character and many infected persons not showing any symptoms. Hence, without checkups or tests like an HBV-DNA test, it might take years, or a liver failure, before patients discover that their liver is suffering an attack. Signs of a hepatitis B infection can range from mild to severe, depending on the individual. However, in most cases, symptoms never appear or only appear upon a patient’s condition worsening and becoming chronic. To avoid this and prevent late treatments, common hepatitis symptoms to note are: • Abdominal pain • Dark or brown urine • Joint pain • Loss of appetite • Nausea and vomiting • General weakness and fatigue • Yellowing of your skin and the whites of your eyes (jaundice) Hepatitis B transmits through direct contact with the hepatitis b virus via contact with infected blood, semen, or contaminated bodily fluids. This may occur during birth, unprotected sex, or while using unsterilised medical equipment, unsterilised needles, and sharing personal items such as razors, toothbrushes, nail clippers, and body jewelry. Which persons are at risk? Given that the Hepatitis B virus can survive outside the body for at least seven days, an unvaccinated person’s contact with the virus (via the transmittable routes discussed above) may lead to an infection. Also, you might be at risk if you have a job that exposes you to human blood or if you frequently travel to regions with high infection rates. Regardless, because the liver can regenerate by itself after damage, if an adult is infected, their body might fight it off, leaving them immune for the rest of their life. However, this is not always the case. Besides, if the infection occurs at birth, it results in chronic hepatitis. Diagnosing hepatitis with an HBV-DNA test. Although various tests (ultrasound, liver biopsy, e.t.c.) are carried out for an accurate hepatitis B diagnosis, doctors often request the HBV-DNA test. This is because the test uses a Polymerase Chain Reaction (PCR) technique that is highly sophisticated and accurate in measuring the hepatitis B viral load in the blood of chronically infected patients. Thus, it aids: - Early detection and quantification in patients with chronic hepatitis B infection. - Distinguishing of active from inactive hepatitis B Infection. - Monitoring of disease progression in chronic Hepatitis B infection. - Monitoring of response to anti-hepatitis B therapy. When/where to carry out the test You may need to carry out an HBV-DNA test at any Afriglobal Medicare near you if: - A doctor requests it. - You are experiencing multiple of the symptoms listed above. - You are carrying out a wellness check. For bookings, and speedy delivery of your HBV-DNA test results in five working days, do make your booking here. You may also call us on 016291000 or 016290998 or walk into any Afriglobal Medicare test centre near you.
<urn:uuid:c2ca268c-5d70-4346-8ac3-cfffdff9c379>
CC-MAIN-2022-33
https://www.afriglobalmedicare.com/hepatitis-b-symptoms-treatment-and-diagnosis-with-an-hbv-dna-test/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.891493
775
3.796875
4
To any passersby in their community, Aleta Baun comes across like any typical village woman engaged in weaving for a living. But the unassuming 52-year-old Indonesian is an environmental activist of the indigenous Molo people. She received the prestigious Goldman Prize in 2013 for her advocacy in protecting Mount Mutis in Timor, Indonesia against the destructive mining corporations. A culturally sacred site for the Molo, Mt. Mutis is home to species of bonsai eucalyptus trees endemic to the island. Aleta led in organizing and mobilizing her people resulting in the cessation of mine operations in Mt. Mutis in 2011. But their successful campaign was not without intense hardship and sacrifice. One night in 2006, hired goons of the mine companies hacked at Aleta with their machetes. She survived the attack. She hid for months in the forest with her two-month-old baby. The attack did not make her falter in their advocacy. In fact, their community has recognized the women’s leading role in the campaign against the mine companies — the women comprise the protest frontlines. They brave the threat of company goons and government forces while the men are left behind to attend to housework and child-care. “We recommend to all women who joined the movement to stay in the forest, and urged all men to mind the children and our house,” she told the journalist Febriana Firdaus in an interview. Like Aleta and her fellow Molo people, tens of thousands of communities continue to defend their land, resources, and rights across Asia. But they are facing peril in their struggle for environmental protection and natural resource conservation. A resource-rich and ecologically sensitive region Asia and its adjacent areas in the Pacific are known for its unique, diverse ecological systems, and bountiful natural resources. The continent is home to almost 60 percent of the world’s population. China and India alone account for the majority of this percentage. Biogeographically, the Asia-Pacific is divided into two major areas. The first region is continental Asia with its vast forest and agricultural lands. The second region is insular Asia which is dominated by marine ecosystems. The Asia-Pacific island countries of Indonesia, the Philippines, Taiwan, and Papua New Guinea fall onto this second group. The region also hosts some of the world’s “megadiversity” areas. The region is also one of the top destinations for extractive industries such as mining and logging. In Southeast Asia alone, a total $53 billion worth of major minerals was produced in 2012. Timber is also among Asia’s most coveted resources. Southeast Asia’s hardwood species such as teak (Tectona grandis of Myanmar and the Philippines’ Tectona philippinensis) are among the world’s most prized timber. With so much biodiversity and unique ecosystems holding economically valuable natural resources, Asia is an alarming hotspot of biodiversity loss. The region’s ecosystems are facing massive environmental degradation and pollution resulting to high biodiversity loss. For example, Southeast Asia’s forests are among the world’s largest biodiversity areas but are now facing danger because of the expansion of industrial agriculture such as palm oil and rubber plantations. In the 2017 study of the Asian Development Bank, six (6) of the 37 which have the highest deforestation rates in the Asia and the Pacific come from the Southeast Asian countries. These are Timor Leste, Cambodia, Indonesia, Lao, Myanmar and Papua New Guinea. Researchers from the Duke University and the University of Maryland in the United States found a 53 percent increase in the total forest area loss in the tropics from 2001-2012. 73 percent of that deforestation occurred in South America and Southeast Asia. Despite this abundance of biodiversity and natural resources, the Southeast Asian people do not benefit from these resources nor have their use of their resources resulted in their peoples’ economic progress. Based on 2012 data, 37 percent of Myanmar’s population was unemployed while 26 percent of its population lived below the poverty line. In East Timor for example, 20% of the national population is unemployed, while 49.9 percent live below the poverty line. Yet the irony is that Myanmar hosts some of the world’s enviable deposits of gold, copper, jade, and precious stone, on the other hand, on the other hand, has significant potential oil deposits, and even with its single known oil field manages to earn $100 million per month. Much remains to be desired from the levels of poverty its population experiences. A 2013 study shows that 75 percent of the Philippine population belongs to the “lower classes,” which already include income poor and food-poor families. A common thread binds Southeast Asia: poverty and lack of modern industry amid the abundance of a natural resource base. Countries in Southeast Asia largely have no means to process these resources for domestic benefit. The capital invested, technologies used, and the profits reaped by local and transnational extractive and pollutive industries do not stay in their host countries even as the environment and people are devastated in the process. Some call this phenomenon the ‘resource curse.’ Environmental defenders under threat As communities and people’s movements across Asia organize in defense of their lands, environment, and natural resources against plunder and exploitation, they face threats and violence from corporations and governments. Pushing for various destructive but profitable projects, governments and corporations often deploy private and state armed forces against any hindrance. In 2017, human rights watchdog Global Witness reported that there is an increasing trend of human rights violations against environmental defenders over the last decade. Global Witness said that 2016 was the deadliest year for environmental defenders when there were at least four killings recorded every week. Who are the environmental defenders? They are the common people who work for the nurturing and protection of our environment. They are those who defend ecosystems as it is their source of subsistence and livelihood. Peasants, indigenous people, fisherfolks, women and children, workers, and professionals—anyone who advocates and works for the conservation, protection, and wise utilization of our resources—are environmental defenders. Global Witness said several countries in Asia have seen increasing human rights violations in relation to environmental advocacy and people’s defense of their resources. Out of the 24 countries they studied, 7 countries were from Asia. Among these countries are the Philippines and India, which are the second and fourth most dangerous place in the world for environmental defenders, respectively. In India, just last May, paramilitary and police forces shot and killed 13 people in Tamil Nadu who were among the thousands of people protesting the pollution caused by British mining giant Vedanta’s copper smelting plant which was operating in their area. No one has been held accountable for the incident, with the police even blaming the protesters for the conflict. The entry of extractive projects like mining, large dams, and industrial plantations have led to the displacement of communities away from their homes and livelihood. People also suffer the consequent environmental degradation and pollution from these projects, adversely affecting their health and culture. From clandestine death squads to formal military and paramilitary troops, governments use militarization and violence as investment guarantees to ruthlessly impose corporate interest veiled as national interest on the people. In the Philippines, at least 69 percent of suspected perpetrators of the killing of environmental defenders were state armed forces citing their mandate to protect destructive projects they call “vital installations” and “flagship projects.” Anti-mining activists in Myanmar have been convicted with imprisonment and heavy labor for “sedition.” Indonesian courts have also recently used various obscure and draconian laws to prosecute environmental advocates, covering at least 157 individuals in 2017. Across many Asian states, internal security programs go hand in hand with laws that ease the entry of investors engaged in resource plunder, upholding the environmentally-destructive globalization policies of privatization and liberalization of the commons. Environmental defenders who are at the forefront of community struggles thus face a myriad of threats. Aside from outright assassination and massacres, their adversaries also employ threats and harassment, illegal arrest and detention, and trumped-up charges to discourage them to continue their advocacy. These attacks not only violate the democratic rights of advocates and people but also greatly undermine efforts to protect and conserve the environment and its natural resources.
<urn:uuid:369ec8c2-99eb-42f5-a9a5-5a250f5c7e58>
CC-MAIN-2022-33
https://www.bulatlat.com/2018/07/10/peril-southeast-asias-environment-defenders-part-1-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.956925
1,727
2.515625
3
This parasite is Braunina cordiformis! Keep in mind final time how we mentioned it was coronary heart formed? Nicely, cordiform means coronary heart formed, so its scientific identify is definitely based mostly on its form! This parasite is the one species within the household Brauninidae and is discovered within the fundic (foremost) and pyloric stomachs and duodenal ampullae. It’s thought that the membrane like construction surrounding the physique of the parasite protects the parasite from the acidic nature of the abdomen. These flukes connect to the mucous membrane within the abdomen in bottlenose dolphins. They trigger injury by pulling on the gastric wall and inflicting the connective tissue beneath to stay out, damaging the the wall’s tissue and the cells within the mucous layer and inflicting continual gastritis. Nevertheless, the extent of injury is unknown and there seems to be little or no different damaging results. Posted by fall intern, Adrienne V-H. Dans, S. L., Reyes, L. M., Pedraza, S. N., Raga, J. A., & Crespo, E. A. (1999). Gastrointestinal helminths of the dusky dolphin, Lagenorhynchus obscurus (Grey, 1828), off Patagonia, within the Southwestern Atlantic. Marine Mammal Science, 15(3), 649-660. Romero, M. A., Fernandez, M., Dans, S. L., Garcia, N. A., Gonzalez, R., & Crespo, E., A. (2014). Gastrointestinal parasites of bottlenose dolphins Tursiops truncates from the intense southwestern Atlantic, with notes on weight loss plan composition. Illnesses of Aquatic Organisms, 108, 61-70. Beron-Vera, B., Crespo, E. A., Raga, J. A., & Fernandez, M. (2007). Parasite communities of widespread dolphins (Delphinus delphis) from Patagonia: The relation with host distribution and weight loss plan and comparability with sympatric hosts. The Journal of Parasitology, 93(5), 1056-1060. Melo, O. P., Ramos, R. M. A., & Di Beneditto, A. P. M. (2006). Helminths of the marine tucuxi, Sotalia fluviatilis (Gervais, 1853) (Cetacea: Delphinidae), in northern Rio de Janeiro State, Brazil. Brazilian Archives of Biology and Expertise, 49(1), 145-148. Beron-Vera, B. Pedraza, S. N., Raga, J. A., de Pertierra, A. G., Crespo, E. A., Alonso, M. Okay., & Goodall, R. N. P. (2001). Gastrointestinal helminths of Commerson’s dolphins Cephalorhynchus commersonii from central Patagonia and Tierra del Fuego, 47, 201-208. Hrabar, J., Bocina, I., Kurilj, A. G., Duras, M., & Mladineo, I. (2017). Gastric legions in dolphins stranded alongside the Jap Adriatic coast. Illnesses of Aquatic Organisms, 125, 125-139. Lombardini, E., Haetrakul, T., Kuit, S. H., Chansue, N. (2019). Gastric Braunina cordiformis and a overview of helminth parasitism within the finless porpoise (Neophocaena phocaaenoides). Brazilian Journal of Veterinary Pathology, 12(1), 24-26.
<urn:uuid:a9850dfd-0350-4571-9b2d-cced32a7173d>
CC-MAIN-2022-33
https://www.dirus.xyz/marine-mammal-parasite-of-the-month-october-2021-reply-nationwide-marine-life-heart/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.70319
809
3.375
3
The first organized indoor hockey games were played by school children in Battle Creek, Michigan in 1962. The program was developed by Tom Harter, Director of Civic Recreation. The program was so successful that it is now played in school systems throughout the USA, Canada, and in many other countries. Beside the above, when did hockey start playing indoors? On March 3, 1875, indoor ice hockey makes its public debut in Montreal, Quebec. Also, where was the first indoor street hockey game introduced? On March 3, 1875, the first recorded indoor ice hockey game took place at the Victoria Skating Rink in Montreal, Quebec. Also know, where did the first organized floor hockey games take place? The first organized United States floor hockey tourna- ment was held in 1976 in Michigan. Since this time floor hockey has gained in popularity. Many schools (junior high schools, high schools, colleges and universities) have embraced the game. Floor hockey is a non-contact sport. Considering this, what country invented indoor hockey? History. Indoor hockey developed in Germany during the 1950s, quickly spreading to other European nations.Various museums offer evidence that a form of the game was played by the Romans and Greeks as well as by the Aztecs several centuries before Columbus arrived in the New World. The modern game of hockey emerged in England in the mid-18th century and is largely attributed to the growth of public schools, such as Eton. - Who invented the game of hockey? - When did street hockey start? - When was the indoor ice rink invented? - When was the first organized game of hockey? - What is indoor hockey called? - Did Vikings invent hockey? - What was hockey originally called? - Why is hockey called hockey? - What year was ice hockey started and where? - Who is known as the father of hockey? - What changed in floor hockey in 1963? - What countries did street hockey originate from? - When was the floor hockey listed under the Special Olympics games? - Who invented indoor ice rinks? - When was ice skating first invented? - Who invented the ice skate? - Does India play indoor hockey? - What sport was floor hockey made up from? - Where is floor hockey most popular? - Where did ice hockey originate first? - Did Canada invent hockey? - Was field hockey invented before ice hockey? - What are the 3 types of hockey? - Who is the greatest hockey player ever? - When did India win World hockey Cup? - When was the ball used for the first time in the floor hockey? - What is the name of the line that divides both offensive and defensive players in floor hockey? - How many periods are played in a floor hockey game? - When did sport companies begin making street hockey equipment? - Is floor hockey and ice hockey the same? Who invented the game of hockey? The development of the modern version of organized ice hockey played as a team sport is often credited to James Creighton. In 1872, he moved from Halifax, Nova Scotia to Montreal, bringing skates, hockey sticks, and a game with a basic set of rules with him. When did street hockey start? Road hockey is believed to have begun when roads started getting paved in wealthier parts of North America, around the turn of the 20th century. When was the indoor ice rink invented? First Indoor Hockey Ice Rink Variations of both curling and hockey had been played for many generations prior to the naming of the playing area, but the origins of the modern, indoor ice rink can be traced back to Montreal, where the first organized indoor game was played at the Victoria Skating Rink in 1875. When was the first organized game of hockey? THIS WEEK IN HISTORY: The world’s first organized hockey game was played on March 3, 1875 | Channels – McGill University. What is indoor hockey called? Did Vikings invent hockey? Canadian sports fans are in shock and Canada 150 celebrations have been thrown into a state of turmoil after a recent archeological discovery determined that hockey, a centrepiece of our cultural and national identity, wasn’t invented in Canada but rather brought here by Vikings from Denmark, who landed in northern … What was hockey originally called? The game of hockey has been said to be modeled after what was actually referred to as hurley, hurling, bandy, shinty or shinny – according to the SIHR. Why is hockey called hockey? The name hockey likely comes from the French word hoquet, which is a curved shepherd’s hook. A french ball and stick field game called ‘hoque’ would be brought to England, where it would sometimes be played on ice. What year was ice hockey started and where? Early organization. The first recorded public indoor ice hockey game, with rules largely borrowed from field hockey, took place in Montreal’s Victoria Skating Rink in 1875 between two teams of McGill University students. Who is known as the father of hockey? — Frederick Arthur Stanley, Lord Stanley of Preston, Earl of Derby, Canada’s Governor-General in the late 1800s and a loyal fan of hockey whose donation to the country in 1893 forever changed the game. What changed in floor hockey in 1963? In 1963, several sports brands introduced plastic sticks and pucks to withstand indoor and outdoor use. What countries did street hockey originate from? The sport originated in the streets of Canada, and is currently played in over 60 countries worldwide. Street hockey is played with the same sticks that are used for ice hockey, and there is variations of the sport in which either a ball or a puck is used for game play. When was the floor hockey listed under the Special Olympics games? Floor hockey was introduced as a Special Olympics sport in 1970. Floor hockey is a family of indoor hockey games, usually in the style of ice hockey, that are played on flat floor surfaces, such as a basketball court. Who invented indoor ice rinks? The world’s first mechanically frozen ice rink was the Glaciarium, opened by John Gamgee in a tent in a small building just off the Kings Road in Chelsea, London, on 7 January 1876. In March, it moved to a permanent venue at 379 Kings Road, where a rink measuring 12.2 by 7.3 metres (40 by 24 ft) was established. When was ice skating first invented? Ice skating probably developed in Scandinavia as early as 1000 bce, the first skates being made from shank or rib bones of elk, oxen, reindeer, and other animals. It is not known when the metal runner was introduced, but early Dutch prints depict skates with metal blades. Who invented the ice skate? According to a study done by Federico Formenti, University of Oxford, and Alberto Minetti, University of Milan, Finns were the first to develop ice skates some 5,000 years ago from animal bones. This was important for the Finnish populations to save energy in harsh winter conditions when hunting in Finnish Lakeland. Does India play indoor hockey? The 5-a-side indoor format is being tried upon to revive both of those aspects. Wednesday could well mark the start of a new chapter in the rich history of Indian hockey. For the first time ever, a 5-a-side national championship organised by Hockey India (HI) will be played in Pune from October 26 to 30. What sport was floor hockey made up from? Floor Hockey is adapted from the games of ice hockey and ringette. Floor Hockey is played in a rink, but the surface is made of wood or concrete, not ice. The athletes use wooden poles (without blades) as the sticks and the pucks are large felt discs with an open center. Where is floor hockey most popular? Field hockey is most popular in Europe, Africa, Asia, and Australasia. India has been a powerhouse in the sport for the longest, and it has a massive following. However, Belgium, which is currently the highest-ranked team globally, and other European areas could rival them for the widest support base. Where did ice hockey originate first? In 2008, the International Ice Hockey Federation (IIHF) officially declared that the first game of organized ice hockey was played in Montreal in 1875. Many also consider ice hockey’s first rules to have been published by the Montreal Gazette in 1877. Did Canada invent hockey? The modern sport of ice hockey was developed in Canada, most notably in Montreal, where the first indoor game was played on March 3, 1875. Some characteristics of that game, such as the length of the ice rink and the use of a puck, have been retained to this day. Was field hockey invented before ice hockey? Modern field hockey pre-dates ice hockey by a few years in the mid-19th century. Precursors to hockey have been recorded by a number of ancient civilizations, dating back as much as 4,000 years. What are the 3 types of hockey? Air hockey is played indoors with a puck on an air-cushion table. Beach hockey, a variation of street hockey, is a common sight on Southern California beaches. Ball hockey is played in a gym using sticks and a ball, often a tennis ball with the felt removed. Box hockey is a schoolyard game played by two people. Who is the greatest hockey player ever? Wayne Gretzky shattered long-standing records, notably scoring an unprecedented 894 goals. He also earned four Stanley Cups with the Edmonton Oilers (1984–85, 1987–88) and was named the NHL’s MVP nine (!) times (1980–87, 1989). When did India win World hockey Cup? India also won the World Cup in 1975. India’s hockey team is the most successful team ever in the Olympics, having won a total of eight gold medals – in 1928, 1932, 1936, 1948, 1952, 1956, 1964 and 1980. When was the ball used for the first time in the floor hockey? United States of America In 1962 one of the first variants of organized indoor hockey games took place in Battle Creek, Michigan. Tim Harter was responsible for refining the rules of the game in which a ball was used. What is the name of the line that divides both offensive and defensive players in floor hockey? Centerline – Line across the center of the court, dividing line in which defensemen and forwards cannot cross. How many periods are played in a floor hockey game? GAME TIME 4.1 Each game will consist of 3 periods (12 minute running clock). 4.2 A two-minute interval will separate each period. 4.3 In the last two (2) minutes of the third period, the time will be stopped for penalties and face-offs. When did sport companies begin making street hockey equipment? Street hockey, which was played on the pavements, used, modified ice hockey equipment, but this equipment did not hold up. In 1963, a few sport companies began developing plastic sticks and pucks that could be utilized both indoors and outdoors on smooth surfaces. Is floor hockey and ice hockey the same? On grass and with sure-footing, field hockey players utilise the turf to play direct passes and run around to make space on the large field. In ice hockey, they play on an enclosed rink, so players can intentionally dump the puck behind the opposition goal and skate up to it as well as play direct passes.
<urn:uuid:24d2ba55-0959-4d66-998e-6a6436a95b06>
CC-MAIN-2022-33
https://www.dnaofsports.com/hockey/when-was-the-first-indoor-floor-hockey-game-introduced/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.975957
2,428
2.9375
3
What are Currency Derivatives & Its Meaning? Currency derivatives are contracts that derive their value from their underlying asset, the currency. Unlike a forward contract, a currency derivative contract is standardized through a foreign regulatory exchange with an intermediary clearing house. Being traded in the regulated market, the agreement involves minimal counterparty risks as it must honour the rules and regulations of the foreign exchange. Currency derivatives contracts can be of two types – futures and options. Both contracts are margin-based, which means traders place a small portion of the contract value as an initial margin with the exchange. Currency derivatives help protect against price volatility of the underlying asset in the future and are widely used by traders as a risk management financial instrument. Types of currency derivatives: Currency derivatives contracts can be of two types. The trader often combines the two types to manage their portfolio risk consistently: Futures:In this type of contract, the traders lock in a specified price for a particular currency to buy or sell at a future date, regardless of the price of that currency in the open market at that time. Options:Like futures, options allow counterparties to buy or sell the currency asset at a pre-decided price at a future date. But unlike futures, the counterparties may choose not to trade by the time the contract expires. Thus, options give the rights to buy or sell, but not the obligation. Options, in turn, are of two types: Call option:This gives the owner the right to buy the underlying asset at a future date and a pre-decided price, but not obligated. Put option:Opposite the call option, the put option gives the owner the right to sell the underlying asset at a future date and a pre-decided price, but not the obligation to do so. Additional read: What are Strike and Premium in an options contract? Advantages of currency derivatives: Currency derivatives are financial instruments that help in adapting to market fluctuations through: Hedging:Traders can monitor their risk exposure by combining options and futures to protect themselves from the price volatility of the foreign currency’s exchange rates. Speculating:Traders can monitor the direction of the price movement of the currency asset in the future and take appropriate positions. Arbitrage:Traders make money on the price difference between foreign exchanges for a particular currency by buying on one exchange and selling through another. Leverage:Traders usually pay only a small margin (5% - 10%) of the total contract value to get exposure to a more significant capital that they otherwise would not have access to. Disadvantages of currency derivatives: Despite being a fundamental instrument in modern finance, currency derivatives carry inherent risks of: High volatility:Though derivatives contracts are designed to hedge market risks (and often profit on the hedge), derivatives are inherently highly volatile. Their risk assessment may not be total despite the hedging. Thus, they need excessive monitoring, which makes the contract very complex. Incorrect speculation:Price discovery of an underlying asset in the future requires complex speculations, and false speculations may lead to heavy losses. Leverage:Currency derivatives, especially futures, involve a small margin of the overall contract value. If currency movement is not speculated in the right direction, the margin may drop rapidly below minimum levels leading to immediate margin top-up. Counterparty risks:There is a possible chance that in currency derivatives contracts, especially in options, the buyer or seller may choose not to exercise their rights, leading to losses to either party. The derivatives market has modernized finance by opening up the capital market to variously sized businesses. As an underlying asset, a country’s currency has great potential to link a small margin to a much bigger capital. It is, however, not without the risks of systemic failures – like the prolonged downfall of the pound post-Brexit. ICICI Securities Ltd. ( I-Sec). Registered office of I-Sec is at ICICI Securities Ltd. - ICICI Centre, H. T. Parekh Marg, Churchgate, Mumbai - 400020, India, Tel No : 022 - 2288 2460, 022 - 2288 2470. The contents herein above shall not be considered as an invitation or persuasion to trade or invest. I-Sec and affiliates accept no liabilities for any loss or damage of any kind arising out of any actions taken in reliance thereon. The contents herein above are solely for informational purpose and may not be used or considered as an offer document or solicitation of offer to buy or sell or subscribe for securities or other financial instruments or any other product. Investments in securities market are subject to market risks, read all the related documents carefully before investing. The contents herein mentioned are solely for informational and educational purpose.
<urn:uuid:2b893546-966b-4a23-a8a0-d7daab17cce0>
CC-MAIN-2022-33
https://www.icicidirect.com/ilearn/currency-commodity/articles/what-are-currency-derivatives-introduction
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.919572
1,024
2.96875
3
This chapter presents an inclusive analysis of notable techniques carried out on modeling of dielectric resonator (DR)-antenna using numerical methods in last more than two decades. Dielectric resonator antenna (DRA) has created its individual existence in antenna engineering because of its captivating characteristics like; small size, low loss, high efficiency, wide bandwidth, three-dimensional design flexibility as compared to conventional antennas, etc. The DR antennas are being widely modeled using numerical methods nowadays. The triple-folded intention of this chapter is to: (1) give an overview on DRA modeling using single and hybrid numerical methods, (2) give a compressive review of notable numerical modeling researches carried out on DRAs and (3) give some favorable future concentration for the antenna researchers in order to apply the numerical methods on some innovative geometries of DRAs. - dielectric resonator antennas - numerical modeling The term DR (dielectric resonator)-antenna or some time DRA (dielectric resonator antenna) is derived from dielectric, resonator, and antenna, simultaneously. It is basically an antenna in which a dielectric material resonates at a certain frequency. The word dielectric resonator (DR) was firstly used by Richtmyer long back in mid-1939s. The idea of using DR as a radiating element i.e. antenna in cylindrical shape had been firstly accepted in mid-1983s . DR-antennas have several interesting advantages like; small size, large power handling capacity, less dissipation loss, high efficiency, compatible to any 3-D shape, etc. which make them more popular than that of the traditional antennas. The power handling capability, less loss, and high efficiency are mainly because of the low loss tangent and permittivity of the dielectric resonator while the three-dimensional design flexibility is the function of number of controlling parameters of the resonator’s fundamental shapes like; radius for hemispherical shape, height to radius ratio for cylindrical shape and depth/width as well as length/width ratio for rectangular shape . However, because of the advanced simulation and mechanical tools available, different shapes like; hollow cylindrical, conical, hexagonal, triangular, etc. shapes as shown in Figure 1 are available nowadays. The mathematical methods used for modeling of DRAs are broadly classified as analytical methods and numerical methods. Up to 1940, the classical methods were widely used for solving the narrow range of electromagnetic (EM) problems only because of complex geometries and mathematical complexities. However, in the mid-1960s, due to the availability of relatively high speed computers, the numerical methods have been supported in their implementation to the EM problems . Since then, numerical methods have taken the place of analytical methods due to numerous advantages, like; lesser computational time, economic for labor purpose, etc. The proposed chapter describes only the three numerical methods: FDTD (finite difference time domain), FEM (finite element method), and MOM (method of moment) which are being widely used for DRAs modeling. In context to this, here different researches carried out on numerical modeling of DRAs in last more than two decades are disused. 2. Dielectric resonator and its antenna characteristics The gradual development of modern communication systems from microwave-to-millimeter wave had given a chance to Long et al. to investigate dielectric resonator (DR) as a radiator, as a better solution to avoid unnecessary radiation loss, conduction loss, and lower efficiency of conventional microstrip/waveguide antennas at higher frequencies. In course of time, the applications of DRs are not limited to only millimeter but are widely used in microwave and radio frequency ranges also now-a-days. This is because of its several attractive physical characteristics, like 3D-design flexibility, high/low Q-factor, light weight, low cost, ease of excitation, etc. as well as several improved performances in terms of bandwidth, gain, etc. as discussed in the previous section. Initially, the dielectric resonator was invented in the form of a high Q-factor element specifically used for filters and oscillators . Because of the high Q-factor, the amount of energy stored was much more than the amount of energy lost, which made it to be used as an energy storage device. Once the Q-factor is low, the working is vice versa i.e. the energy radiated is much higher than the energy stored . As per Long et al. , when a DR (of low Q-factor) is placed on a metallic ground surface with unshielded surroundings and an excitation is applied to it, then the discontinuity of the relative permittivity at the resonator surfaces plays an important role. It enables the radio waves bounce back and forth in between the resonator boundary and called as standing electromagnetic wave, means it resonates as well as creates chances of reflection but cannot radiate. It is well known that the resonator walls designed to be transparent to radio waves. Once, the resonator is excited at proper resonating mode, the radio waves start penetrating the resonator boundary and radiate into space. The desired resonating mode can be achieved by proper positioning of dielectric resonator, ground plane, feed, and slot. Moreover, the field distribution inside the resonator as well as the radiation pattern in the space, are distinct depending upon the resonating mode at which the resonator is excited. These modes are mainly divided into three different modes, like transverse electric (TE), transverse magnetic (TM), and hybrid electromagnetic (HEM) modes [3, 4]. Generally, for rectangular DRAs, the fundamental modes are considered to be TEx111, TEy111, and TEz111, respectively. For hemispherical DRAs, these are considered as TE111 and TM101. Similarly, for cylindrical DRAs, these modes are considered as TE01, TM01, and HE11/EH11 [3, 4]. 3. FDTD modeling of DRAs The Finite-Difference-Time-Domain method is one of the popular methods in context of electromagnetic scattering. From historical point of view; the finite difference time domain method was first developed by Yee in 1966 . Later on, it has been extended to electromagnetic three dimensional cases with steady state excitation and also considered to be one of the feasible alternatives to those frequency domain methods. Apart from this, FDTD method has been recognized to be one of the most effective numerical methods in the study of metamaterial-based structures. In 1990, this FDTD method became one of the popular methods of choice for electromagnetic problem analysis, because of several advantages like: ease of understanding, short development time, and explicit type nature . This method has been successfully implemented in different electromagnetic problems like; scattering of antenna (microstrip patch antenna, dielectric resonator antenna), microstrip circuits, etc. However, for the convenience of the readers, few general steps of using FDTD method for DRA modeling are further illustrated in this section. 3.1. Few general steps for FDTD implementation on DRAs Generally the FDTD method is formulated by considering the differential form of Maxwell’s two curl equations which describe the propagation of electric as well as magnetic fields in any medium, which can be uniform, homogeneous, and isotropic. In addition to this, the medium is assumed to be lossless i.e., null volume currents or finite conductivity. Thus, the Maxwell’s curl equations can be written as described: Here and . For the solution of this type of partial differential equation by FDTD method, a first order finite difference scheme can be used for both time as well as space. 3.2. Step 1: field in time and spatial domain As the field is discretized in both space and time domain, hence the practical calculation space is also divided into number of small cubes as shown in Figure 2(a). Here each small cube Δx × Δy × Δz of the problem is known as cell size. 3.3. Step 2: Yee’s algorithm For a three-dimensional case, the six field locations are considered as interleaved in space as shown in Figure 2(b). Here each small cells are known as FDTD unit cell . The E-field is calculated at each midpoint of small FDTD cell and for convenience purpose the H-field can be calculated at each spatial locations between two adjacent E-fields. The field component of x-direction can be written as; Similarly, the field components for y- and z-direction for both electric and magnetic fields can be easily determined. It should be noted here that if the E-field is calculated at nΔt, the H-field is calculated at (n + 0.5)Δt, for which Yee’s algorithm is also known as leapfrog algorithm. 3.4. Step 3: estimation of cell size and time step It is obvious that in FDTD method, finer cell is taken by assuming constant field over a cell. However, the size of the cell depends upon the wavelength of the material. Smaller cell size gives better accuracy. In case of high permittivity dielectric material, the non-homogeneous type cell-size can be used. After fixing the cell-size, the time step can be taken as per Courant-Fricdrich-Lewy stability condition . 3.5. Step 4: dielectric resonator antenna analysis A DR-antenna can be a three-dimensional dielectric geometry of any shape along with conducting feed and ground plane. The FDTD method assumes perfect conductor approximation for microstrip line/patch/ground plane whereas perfect dielectric approximation for substrate as well as dielectric resonators. In FDTD modeling, the fundamental parameters like; permittivity, permeability, and conductivity are assigned to respective cells in the computational domain to form the objects. Microstrip line/patch/ground plane are generally considered as two-diemensional geometry. Hence the tangential E-field component must be null (0) on the surface. Thus, it can be modeled by applying the boundary conditions on the respective planes of the proper cells. Then, the non-perfect conductor cells like: substrate, dielectric resonator or air, are assigned with respective permittivity (εr). For air εr will be unity, for substrate and DR the permittivity (εr) value can be taken as per the modeling requirement. But for a stacking case, the average value of the interfaces of two/multi dielectric constant can be assigned . 3.6. Step 5: source signal and feed modeling For excitation of the dielectric resonator, the different waveforms like: plane wave, modulated pulse, etc. can be applied. However, in view of smooth waveform, the Gaussian pulse type excitation is preferably used which is mentioned in Eq. (7). In practical case, signal is given to the feed line through SMA connector. This feeding in FDTD approach can be modeled by assigning several electric area within the area along the thickness/height of the substrate which just comes under the strip. Then if the pulse is generated, the fields in the three-dimensional structure can be computed for successive steps until the steady state arrives. Thus, the input impedance (Zin) of the dielectric resonator antenna is calculated easily using Eq. (8) 3.7. Step 6: boundary conditions During the analysis of EM problems, it is necessary to truncate the computational domain by a virtual boundary. In addition to this, the boundary should be absorbing one in order to absorb all the radiation to avoid reflection which may causes errors. Hence, it is termed as absorbing boundary condition (ABC) which can be of either Mur’s ABC or Berenger’s Perfectly Matched Layer (PML) . However, PML is best ABC in terms of accuracy . The above basic steps shows the advancement in computational electromagnetics using FDTD which enabled many researchers for modeling several complex problems based on DRAs. Some notable researches carried out based on this approach in last decade are discussed here. In 1994, Shum and Luk have analyzed a rectangular DR-antenna fed by a microstrip line through an aperture made on ground plane using FDTD method for calculating the return losses. Again, have analyzed dielectric ring resonator antenna with an air-gap using the FDTD method for improving the impedance bandwidth of the antenna by adjusting the air-gap spacing. A cylindrical dielectric antenna with a dielectric coating has been analyzed using FDTD method for observing the effect of the relative permittivity of the coating material on the impedance bandwidth of the antenna. Then, again have analyzed a cylindrical DRA operating at the fundamental broadside mode using FDTD method for observing the impact of the feed position, probe length, and the dielectric constant on input impedance. Shum and Luk have presented a FDTD numerical method for modeling probe-fed cylindrical DR antenna for computing the input impedance of the antenna operating in HEM11δ mode. Chen et al. have analyzed a probe-fed section-spherical DRA using FDTD technique. The mutual coupling between aperture-coupled cylindrical DRAs has been analyzed using FDTD . The aperture-coupled CDRA on a thick ground plane has been investigated using the FDTD method for reducing the coupling from feed-line to the antenna by increasing the thickness of the ground plane . A cross-shaped DRA designed for circular polarization has been analyzed via conformal FDTD method . Kamchouchi and Kayar have demonstrated FDTD method for simplifying the sophisticated radiation problems. Semouchkina et al. have used FDTD method to study the resonant modes in DR-antenna. The in detail study of inter-element coupling phenomena based on a FDTD technique utilizing Berenger’s PML boundary conditions and geometrical symmetries has been presented by Gentili et al. . A Microstrip-slot coupled rectangular DRA operated in fundamental TE111 mode has been investigated numerically and experimentally . Top-hat monopole antennas loaded with radial layered dielectric has been analyzed using FDTD method for computing input impedance of the antenna structure more accurately . Zhang et al. have investigated a probe-fed DRA element operating in a waveguide environment with application to spatial power combining amplifier arrays using FDTD technique. The radiation pattern and input impedance of the strip-fed rectangular shaped DRA have been computed numerically using FDTD method . Nomura and Sato have proposed a combined method of topology optimization and FDTD method for wideband DR-antenna design. Mohanana et al. have investigated a microstrip line excited compact rectangular DRA using FDTD method. FDTD method has been used to calculate the input impedance of the cylindrical DR-antenna with different dimensions . Li et al. have studied a differentially fed RDRA using FDTD method for the fundamental TE111 mode at 2.4 GHz, with a bandwidth of 10.4%. Li and Leung have analyzed a differentially fed rectangular DRA using FDTD method. Thus, the several cases of DRAs have been described using FDTD in this section. Yao et al. have presented an efficient two-dimensional FDTD method for analyzing the parallel-plate dielectric resonator. A Pawn DRA has been investigated in time domain for predicting about 122% impedance bandwidth . Dzulkipli et al. have used a simulation technique based on FDTD to analyze mutual coupling effects in reflectarray environment. Gupta and Gangwar have presented numerical analysis of input impedance, return loss, and radiation characteristics of a strip excited triangular shape DRA (TDRA) using FDTD technique. Thus, several cases based on different shapes of DR-antennas have been successfully resolved. 4. Method of moments for DRAs modeling Method of moments is sometimes known as moment method (MM). It is considered to be the oldest method in terms of deriving point estimators. The name “method moments” is mainly originated from Russian literature. In western literature, the method of moments has been firstly attributed by Harrington , however it became much popular in electromagnetic modeling after the work by Harrington . In course of time MOM has been successfully applied to several practical EM problems like radiation caused by thin-wire elements and arrays, scattering problems, analysis of microstrip and lossy structures and later on for DRA also. So in this context, the modeling of dielectric resonator antenna with some basic steps is clearly discussed in this section. Moreover some published articles of DRA modeling based on this method is also summarized here. 4.1. Few general steps for MOM implementation on DRAs The integral equations (IE) techniques are quite effective in providing exact solution for dielectric structure modeling. During the modeling of homogeneous system, the integral equations (IE) can be expressed in terms of tangential component of fields (both electric and magnetic) at the media interface only. The equivalence principle is normally used for the solution of scattering problem by using MoM. 4.2. Step 1: representation of field(s) in terms of θ and ϕ Magnetic field and electric field can be expressed in term of scalar and vector potential by considering position r in θ and ϕ direction for three-dimensional problem as : 4.3. Step 2: formulation of electric and magnetic potential using Green’s function The electric potential due to a point current For inside DR (i.e. r < a): For outside DR (i.e. r > a): Here the and are the electric potential and magnetic potential in directed point current, respectively whereas β can be either θ or ϕ. : related to Legendre function of order m and degree n. and represents the spherical Bessel functions of the first kind and spherical Hankel function of the second kind respectively. After applying the boundary condition as well as for E-field and as well as (is taken by considering the θ directed current) for H-filed at (r = r’ = a) for both θ and ϕ direction four sets of equation relating where and are the spherical Bessel function and spherical Henkel function, respectively, K is the ratio of wave number and permittivity, and 4.4. Step 3: formulation of E-field and H-field using Green’s function The total E-field because of θ directed and φ directed point currents can be found from potential Green’s function. By substituting the values of and (for inside as well as outside cases) in Eqs. (10-15), it can be obtained : Like this , and can be obtained . The function and have different forms for E-field inside (r < a) and outside (r > a) of the dielectric resonator (Figure 3). Then with Green’s function for the solution of the current (either in the feed probe/feed line/patch/strip etc.) can be found/solved by using MoM. 4.5. Step 4: solution of current using MoM This Method of Moment solution can be well understood by taking an example (as shown in Figure 3). Let in this figure the β (either θ or ϕ) directed E-field , , are produced by θ directed excitation strip current , patch current and φ directed patch current respectively. Now, by imposing the boundary condition, so that total E-field must vanish on the conducting excitation strip, we get; Which can be expressed in terms of Green’s functions, i.e. Here, SA and SB are the surfaces of the excitation strip and parasitic patch respectively, which can further be expressed as: Here: and (unity). , , and . Now these currents can be expanded using MoM and resulted as: where, , , and are PWS basis functions . Similarly two more equations can be obtained by enforcing the boundary conditions, like; After the current vector is obtained from Eq. (31), the input impedance can easily be calculated from . Further, here for equivalent spherical DR while 0.5 for hemispherical DR. Then, the remaining current vectors , together along with can be used to calculate the radiation fields of dielectric resonator antenna. Thus, few general mathematical steps are discussed here for implementation of method of moments which are quite useful and simple. The use of this method for analyzing some DRAs in last decades is further summarized here. Analysis of the disk antennas above the grounded dielectric substrate has been carried out using moment method . The input impedance of a cylindrical DRA excited by an aperture slot has been computed using MOM method together with an efficient matrix solution algorithm . Leung and Luk have studied an aperture-coupled hemispherical DRA using MM method for broadside TE111 mode. An aperture-coupled hemispherical shaped DR-antenna operating at the end-fire TE221 mode has been studied using MOM method together with Green’s function . Liu et al. have analyzed a DRA based on the electric and magnetic field integral equations using MM method. The Green function technique together with the MM method has been used to determine the equivalent magnetic current in the slot of slot-fed DRA with/without a backing cavity . Kishk et al. have done a numerical study of split cylindrical DRAs on a conducting ground plane excited by a coaxial probe excited in HEM11 and HEM12 modes based on MM method. Then MOM-based surface integral equation solver for studying arbitrarily shaped aperture coupled DRAs has been developed . Chow and Leung have investigated the input impedance of the cavity-backed slot-coupled DRA excited by a slender strip using the MM method. The MOM method with piecewise sinusoidal (PWS) basis and testing functions has been used for analyzing a circularly polarized DRA excited by a spiral slot . A rigorous analysis has been done for the excitation of hemispherical type DR-antenna loaded by a circular disk using MOM . Baghaee et al. have analyzed a probe-fed rectangular DRA on a finite ground plane using MOM. A rigorous analysis of the slot-coupled hemispherical dielectric resonator top-loaded by a conducting cap has been presented using MOM . Eshrah et al. have proposed excitation of DRAs by waveguide slots as a substitute to traditionally used excitation mechanism as well as to enhance bandwidth and to control the power coupled to the DRA using MOM method. The coaxial-aperture-fed hemispherical DRA has been analyzed using MOM method . Lam and Leung have analyzed U-slot excited DRA with a baking cavity using the MOM. Ge and Esselle have analyzed the aperture coupled DRA using MOM method. Borowiec et al. have used MOM approach for analyzing a cavity backed, slot excited DRA. Abdulla and Chakraborty have analyzed hemispherical DRA excited with a thick slot at the short circuited end of waveguide using MM method. For a hemispherical DRA, the integral of the admittance matrix corresponding to the homogeneous Green’s function has been evaluated by expressing the homogeneous Green’s function in terms of a double summation using MM method . Broad wall longitudinal slot coupled hemispherical DRA has been analyzed using MOM . Thus, the moment method has been successfully applied on several cases of DRAs. Thus, several cases of DRAs have been resolved using moment method in this section. 5. Modeling of DRAs using FEM Engineering domain is one of vastest system, where mathematical model is one of the suitable alternative for describing the behavior of the whole system in a constructive manner. Finite element method is one of those mathematical modeling technique, initially used for structural analysis during 1960–1970s. However its introduction with electromagnetic scattering problems in 1980s is well documented in . Initially it was mainly based on static, quasi-static, and guided wave problems. In course of time this was highly appreciated for microwave and millimeter-wave system optimization as well as for EM radiation means for antenna. In addition to this, the finite element method (FEM) is one of the numerical tool to have the approximate solution which can be used in general purpose computers and thus increased the usability. In FEM, mainly the problems are divided into different sub domains, known as finite element which causes the problem to have many number of finite element patches , and in context to this, now this method is considered to be one of the finest method in computational electromagnetics mainly for antenna modeling, with evidence of good number of publications in electromagnetic domain. However the basic steps of modeling of dielectric resonator antenna (three dimensional structure), is discussed in this section. 5.1. Few general steps for FEM implementation on DRAs The procedure of implementing FEM for modeling of a dielectric resonator antenna is quite different than those for microstrip patch antennas. The way of defining discretization of the finite volume as well as the boundary condition is quite important in FEM modeling. For smooth understanding, the basic approaches of FEM in context of DRA modeling some basic mathematical steps are elaborated here. 5.2. Step 1: formulation of basic fields For any electromagnetic problem, first we need to define the field. As here DR-antenna is a three dimensional structure, so let us assume a three-dimensional scattering problem as shown in Figure 4(a), having finite volume V with of permittivity ε and permeability μ surrounded by an area of volume V∞ of permittivity ε0 and permeability μ0 at a finite distance of S. When electromagnetic wave input having angular frequency (ω) is applied then it starts scattering. The electromagnetic filed inside the volume V (E1, H1) and outside volume V (E2, H2) can be written in terms of vector differential wave equations for a source free region . Where K = Free space wave number. Here three-dimensional FEM can be applied for the solution of fields inside the volume V, whereas a surface integral equation (which is a solution for the fields in V∞) is then applied to provide a necessary boundary constraint on the surface for the finite element solution. Now, it is the task to solve Eqs. (32) and (33) which is inside the volume, using three-dimensional FEM. In context of this, the corresponding functional of Eqs. (32) and (33) is highly desired. With little mathematics (using vector identity and applying divergence theorem) the corresponding functional of Eqs. (32) and (33) for the entire domain V + V∞ can be written as : Here, the subscript 1 on both E and H has been dropped for convince. Also, 5.3. Step 2: finite element discretization and surface integral formulation for fields The finite volume V of the DR can be subdivided into numbers of three-dimensional elements which can be either tetrahedral, rectangular prisms, or a triangular prisms or even better isotropic elements (as shown in Figure 4(b)) that depends upon the applications and geometry type. However, within each element the field can be expressed as; Here; n is the number of nodes, is the interpolation function, and , in the fields at the ith node. Substituting Eq. (41) into Eq. (39) or Eq. (40) and applying Rayleigh-Ritz procedure the system of liner equations can be obtained . Now applying three-dimensional finite element discretization to Eq. (39) results in the matrix equation; where is the electric field nodes interior to the surface S; is the tangential electric field at the nodes on S; is the tangential magnetic field at the nodes on S, is the matrix having three dimensions. In close observation to Eqs. (41) and (42), it is clear that, they do not form a complete system and this can be achieved by developing matrix equation relating to and , hence the Finite element surface integral formulation can be applied as follows: For a finite domain V bounded by a surface S, the electric field and magnetic field inside, in the form of incident electric field can be expressed as : After discretizing the above equation on the surface S, a matrix equation comes in the form: where is the tangential incident electric field at the node on S, and again denotes a matrix of three dimensions. Now the combination of Eqs. (42), (43), and (45) form a complete system in order to solve the nodal fields. For modeling of DRAs, these basic steps of FEM method has also been utilized but the referenced literature on it is very much limited. However some of the collected articles are discussed here. Fargeot et al. have used DR antenna with a non-destructive method based on FEM for characterizing material. A microstrip-coupled cylindrical DRA excited in the HE11δ mode has been investigated theoretically as well as experimentally using FEM . Neshati and Wu have proposed a microstrip-slot coupled rectangular DRA using FEM. A probe fed rectangular DRA supported by finite ground plane and operated in TE111 mode has been analyzed numerically using FEM method . Analysis of waveguide fed DRA has been carried out using FEM . 6. Hybrid numerical methods for DRAs modeling The basic steps for FDTD, MoM, and FEM have well discussed in previous sections. However, in this section several cases of DRAs modeling have been discussed using a combination of more than one numerical method like: combination of MOM with others methods and the combination of FEM with others methods, respectively. The moment method (MM) has been combined with FDTD for analyzing a rectangular DRA over a finite ground plane with microstrip slot excitation and for analyzing a DRA fed by a microstrip line coupled with DR through a narrow aperture in a ground plane , respectively. Again, the moment method has been combined with mode matching method for studying the scattering problem of the probe-fed hemispherical DR antenna utilizing a conducting conformal strip excitation operated in the fundamental TE111 mode . A new excitation scheme employing a conducting conformal strip has been analyzed for DRA excitation operated in fundamental mode TE111 using mode-matching method . Few cases of DRAs have also been modeled using a combination of FEM and other numerical methods, which are discussed here. The hybrid combination of FEM and conventional dielectric waveguide model (CDWM) has been used for studying a probe-fed rectangular DRA supported by a ground plane theoretically and experimentally, simultaneously . The FEM has again been combined with finite integral method (FIT) for analyzing a novel “C”-shaped DRA as well for reducing the mutual coupling between two identical cylindrical DRAs mounted on a conducting hollow circular cylindrical structure in E-plane and H-plane coupling, respectively. A reflectarray mounted on or embedded in cylindrical and spherical surfaces has been analyzed using finite integration method and transmission line method at 11.5 GHz for satellite applications . Again Dhouib et al. have reported the analysis of aperture-coupled and microstrip proximity coupled DRAs using transmission line method. A hybrid combination of FEM and finite integration method (FIT) has also been used for analyzing an electrically small and high permittivity “C” DRA . The FEM has been combined with FDTD for designing multi-segment DRA and for structural mechanics analysis of DRAs , respectively. 7. Electron paramagnetic resonance resonator types and effects In general electron paramagnetic resonance (EPR) is a spectroscopy tool used in different emerging areas of physics, chemistry, and biology for the characterization of paramagnetic species [81, 82, 83]. In general there are some specific types of EPR resonators, say wave-guide resonator, microstrip resonator, dielectric resonator, and transmission line resonator . Unlike traditional EPR waveguide cavities operating in the transverse electric TE mode, on which both longitudinal and transverse dimensions scale with frequency, transmission-line resonators operating in the transverse electromagnetic (TEM) mode have their resonant frequency set only by the longitudinal dimension and the effective relative permittivity of the medium (εref) which ultimately results in shorter transverse dimensions than half wavelength . As per the conventional EPR systems i.e. using wave guide cavities as well inductive detection have a sensitivity limitation to near 1011 spins/GHz1/2, which is inadequate for studying samples having smaller number of spins. On the other hand if we see, dielectric resonators (DR) which are made of a single crystal/ceramic material with comparatively high dielectric constants with low loss have better sensitivity of EPR than those conventional ones. It can also achieve sensitivity nearly 5 × 108 spins/G . Apart from this, the small size of the DR also helps in using it as the central part of mini-EPR, while the absence of background signals gives more degrees of freedom for precise recordings of EPR spectra. As per different kind of shapes can be actualized in a DR in order to store and analyze samples. It can be noted that more no of shapes helps in storing and analyzing more number of samples simultaneously. However the modeling work of making different types of shapes as well as their effect on resonator characteristics can be well developed by the numerical methods discussed in previous sections. Richtmyer RD. Dielectric resonators. Journal of Applied Physics. Jun. 1939; 10:391-398 Long SA, Mcallister MW, Shen LC. The resonant cylindrical dielectric cavity antenna. IEEE Transactions on Antennas and Propagation. May 1983; 31(3):406-412 Mongia RK, Bhartia P. Dielectric resonator antennas—A review and general design relations for resonant frequency and bandwidth. International Journal of Microwave and Millimeter-Wave Computer-Aided Engineering. Jul. 1994; 4(3):230-247 Dash SKK, Khan T, De A. Modelling of dielectric resonator antennas using numerical methods: A review. Journal of Microwave Power and Electromagnetic Energy. 2016; 50(4):269-293 Yee KS. Numerical solution of boundary value problems involving Maxwell's equation in isotropic media. IEEE Transactions on Antennas and Propagation. 1966; 14:302-307 Inan US, Marshall RA. Numerical Electromagnetics: The FDTD Method. Cambridge: Cambridge University Press; 2011 Kumar AVP. Development of a novel wideband cylindrical dielectric resonator antenna [PhD dissertation]. Cochin, India: Dept. of Electronics, Cochin Univ. of Science and Tech; 2008 Jan Mur G. Absorbing boundary condition for the finite-difference approximation of the time-domain electromagnetic field equations. IEEE Transactions on Electromagnetic Compatibility. 1981; 23:377-382 Berenger JP. A perfectly matched layer for the absorption of electromagnetic waves. Journal of Computational Physics. 1994; 114:185-200 Shum SM, Luk KM. Characteristics of dielectric ring resonator antenna with an air gap. IET Electronics Letters. Feb. 1994; 30(4):277-278 Shum SM, Luk KM. Numerical study of a cylindrical dielectric-resonator antenna coated with a dielectric layer. IEEE Transactions on Antennas and Propagation. Apr. 1995; 142(2):189-191 Shum SM, Luk KM. FDTD analysis of probe-fed cylindrical dielectric resonator operating in fundamental broadside mode. IET Electronics Letters. Jul. 1995; 31(15):1210-1212 Shum SM, Luk KM. FDTD analysis of probe-fed cylindrical dielectric resonator antenna. IEEE Transactions on Antennas and Propagation. Mar. 1998; 46(3):325-333 Twu Chen H, Cheng YT, Ke SY. Probe-fed section-spherical dielectric resonator antennas. In: Proceedings of the IEEE Asia Pacific Microwave Conference, vol. 2. Nov. 1999. pp. 359-362 Guo YX, Luk KM, Leung KW. Mutual coupling between rectangular dielectric resonator antennas by FDTD. IEE Proceedings—Microwaves, Antennas and Propagation. Aug. 1999; 146(4):292-294 Guo YX, Luk KM, Leung KW. Characteristics of aperture-coupled cylindrical dielectric resonator antennas on a thick ground plane. IEE Proceedings—Microwaves, Antennas and Propagation. Dec. 1999; 146(6):439-442 Farahat N, Yul W, Mittra R, Koleck T. Cross-shaped dielectric resonator antenna analysis using the conformal finite difference time domain (CFDTD) method. In: Proc. IEEE Antennas and Propagation Society Int. Sym, vol. 3; Boston, MA, USA. Jul. 2001. pp. 549-552 Kamchouchi HE, EI-Kayar YG. Finite difference time domain solutions for the dielectric resonator antenna problems with different feeding signals. In: Proc. IEEE 18th Nat. Radio Science Conf; Mansoura. Mar. 2001. pp. 63-70 Semouchkina E, Semouchkin G, Caol W, Mittra R. FDTD analysis of modal characteristics of dielectric resonator antennas. In: Proc. IEEE Antennas and Propagation Society Int. Sym. Vol. 4. 2002. pp. 466-469 Gentili GB, Morini M, Selleri S. Relevance of coupling effects on DRA array design. IEEE Transactions on Antennas and Propagation. Mar. 2003; 51(3):399-405 Neshati MH, Wu Z. Microstrip-slot coupled rectangular dielectric resonator antenna: Theoretical modelling & experiments. In: Proc. IET 12th Int. Conf. on Antennas and Propagation; March 2003, Conf. Pub. No. 491. Vol. 2. pp. 759-762 Paran K, Kamyab M, Tabatabaei NA. FDTD analysis of top-hat monopole antennas loaded with radially layered dielectric. International Journal of Engineering-Transactions A: Basics. 2004; 17(3):251-262 Zhang Y, Kishk AA, Yakovlev AB, Glisson AW. FDTD analysis of a probe-fed dielectric resonator antenna in rectangular waveguide. In: Proc. IEEE/ACES Int. Conf. on Wireless Communications and Applied Computational Electromagnetics. Apr. 2005. pp. 371-375 EI-Deen E, Zainud-Deen SH, Sharshar HA, Binyamin MA. The effect of the ground plane shape on the characteristics of rectangular dielectric resonator antennas. In: Proc. IEEE Antennas and Propagation Society Int. Sym; Albuquerque, NM. Jul. 2006. pp. 3013-3016 Nomura T, Sato K. Topology design optimization of dielectric resonator antennas using finite-difference time-domain method. In: Proc. IEEE Antennas and Propagation Society Int. Sym; Albuquerque, NM. Jul. 2006. pp. 1317-1320 Mohanana P, Mridula S, Paul B, Suma MN, Bijumon PV, Sebastian MT. FDTD analysis of rectangular dielectric resonator antenna. Journal of the European Ceramic Society. 2007; 27(8–9):2753-2757 Zainud-Deen SH, EI-Doda SI, Awadalla KH, Sharshar HA. The relation between lumped-element circuit models for cylindrical dielectric resonator and antenna parameters using MBPE. Progress in Electromagnetics Research. 2008; 1:79-93 Li A, Leung KW, Sheng XQ. Differentially fed rectangular dielectric resonator antenna. In: Proc. IEEE Global Symp. on Millimeter Waves; Nanjing. Apr. 2008. pp. 157-160 Li B, Leung KW. On the differentially fed rectangular dielectric resonator antenna. IEEE Transactions on Antennas and Propagation. Feb. 2008; 56(2):353-359 Yao B, Zheng Q, Peng J, Zhong R, Li S, Xiang T. An efficient 2-D FDTD method for analysis of parallel-plate dielectric resonators. IEEE Antennas and Wireless Propagation Letters. Aug. 2011; 10:866-868 Ganguly D, Das S, Rojatkar A, Guha D. Ultra-wideband pawn DRA: Time domain studies. In: Proc. IEEE Indian Antenna Week; Kolkata. Dec. 2011. pp. 1-4 Dzulkipli NI, Jamaluddin MH, Gillard R, Sauleau R, Ngah R, Kamarudin MR, et al. Mutual coupling analysis using FDTD for di- electric resonator antenna reflectarray radiation prediction. Progress in Electromagnetics Research B. 2012; 41:121-136 Gupta A, Gangwar RK. Analysis of conformal strip feed triangular dielectric resonator antenna using FDTD method. In: Proc. IEEE Int. Conf. on Computational Electromagnetics; Hong Kong. Feb. 2015. pp. 92-94 Harrington RF. Field Computation by Moment Methods. Malabar, FL: Krieger; 1968 Harrington RF. Matrix methods for field problems. Proceedings of the IEEE. 1967; 55:136-149 Harrington RF. Time Harmonic Electromagnetic Fields. New York: McGraw-Hill; 1961 Ng HK. Rigorous analysis of the hemispherical dielectric resonator antenna with a parasitic patch [PhD dissertation]. Hong Kong: Dept. of Electronics Engg. City Univ; Oct 2003 Leung KW, Ng HK. Dielectric resonator antenna fed by displaced conformal strip. Microwave and Optical Technology Letters. 2001; 29:185-187 Kishk AA, Zunoubi MR. Analysis of the dielectric disc antennas above a grounded dielectric substrate. In: Proc. IEEE Antennas and Propagation Society Int. Symp. Dig; Chicago, IL, USA. Jun 1992. pp. 2171-2174 Junker JP, Kishk AA, Glisson AW. Input impedance of an aperture coupled dielectric resonator antenna. In: Proc. IEEE Antennas and Propagation Society Int. Symp. Dig; Seattle, WA, USA. Jun 1994. pp. 748-751 Leung KW, Luk KM. Moment method solution of aperture-coupled hemispherical dielectric resonator antenna. In: Proc. IEEE Antennas and Propagation Society Int. Symp. Dig., vol. 2; Seattle, WA, USA. Jun. 1994. pp. 752-755 Leung KW, Luk KM. Moment method solution of aperture-coupled hemispherical dielectric resonator antenna using exact modal Green's function. IEE Proceedings - Microwaves, Antennas and Propagation. Oct. 1994; 141(5):377-381 Liu Z, Hewa WH, Michielssen NDE. Moment method based analysis of dielectric-resonator antennas. In: Proc. IEEE Antennas and Propagation Society Int. Symp., vol. 2; Orlando, FL, USA. Jul. 1999. pp. 806-809 Chow KY, Leung KW, Luk KM, Yung EKN. Input impedance of the slot-fed dielectric resonator antenna with/without a backing cavity. IEEE Transactions on Antennas and Propagation. Feb. 2001; 49(2):307-309 Kishk A, Glisson AW, Junker GP. Bandwidth enhancement for split cylindrical dielectric resonator antenna. Progress in Electromagnetics Research. 2001; 33:97-118 Liu Z, Chew WC, Michielssen E. Numerical modeling of dielectric-resonator antennas in a complex environment using the method of moments. IEEE Transactions on Antennas and Propagation. Jan. 2002; 50(1):79-82 Chow KY, Leung KW. Cavity-backed slot-coupled dielectric resonator antenna excited by a narrow strip. IEEE Transactions on Antennas and Propagation. 2002; 50:404-405 Qian ZH, Leung KW, Chen RS. Analysis of circularly polarized dielectric resonator antenna excited by a spiral slot. Progress in Electromagnetics Research. 2004; 47:111-121 Ng HK, Leung KW. Frequency tuning of the dielectric resonator antenna using a loading disk. In: Proc. IEEE Antennas and Propagation Society Int. Symp, vol. 1. Jun. 2004. pp. 1086-1089 Baghaee RM, Neshati MH, Mohassel JR. Moment method analysis of probe-fed rectangular dielectric resonator antennas with a rigorous source modeling and finite ground plane. In: Proc. IEEE Asia-Pacific Conf., vol. 5. Dec. 2005. pp. 4-7 Ng HK, Leung KW. Frequency tuning of the dielectric resonator antenna using a loading cap. IEEE Transactions on Antennas and Propagation. Mar. 2005; 53(3):1229-1232 Eshrah IA, Kishk AA, Yakovlev AB, Glisson AW. Theory and implementation of dielectric resonator antenna excited by a waveguide slot. IEEE Transactions on Antennas and Propagation. Jan. 2005; 53(1):483-494 Leung KW, So KK. Analysis of the coaxial-aperture-fed dielectric resonator antenna. In: Proc. IEEE Antennas and Propagation Society Int. Symp.; Albuquerque, NM. Jul. 2006. pp. 2503-2506 Lam HY, Leung KW. Analysis of U-slot-excited dielectric resonator antennas with a backing cavity. IEE Proceedings - Microwaves, Antennas and Propagation. Oct. 2006; 153(5):480-482 Ge Y, Esselle KP. The analysis of a rectangular dielectric resonator antenna using the method of moments. In: Proc. IEEE Antennas and Propagation Society Int. Symp.; Salt Lake City, UT, USA. Vol. 3. Jul. 2000. pp. 1454-1457 Borowiec R, Kucharski AA, Slobodzian PM. Slot excited dielectric resonator antenna above a cavity - Analysis and experiment. In: Proc. IEEE Int. Conf. on Microwaves, Radar & Wireless Communications; Krakow. May 2006. pp. 824-827 Abdulla P, Chakraborty A. Rectangular waveguide-fed hemispherical dielectric resonator antenna. Progress in Electromagnetics Research. 2008; 83:225-244 Kakade AB, Ghosh B. Efficient technique for the analysis of microstrip slot coupled hemispherical dielectric resonator antenna. IEEE Antennas and Wireless Propagation Letters. 2008; 7:332-336 Abdulla P, Singh YK, Chakraborty A. Theoretical and experimental study on broad wall slot coupled dielectric resonator antennas. In: Proc. IEEE Asia Pacific Microwave Conf.; Singapore. Dec. 2009. pp. 2750-2753 Jin JM. The Finite Element Method in Electromagnetics. New York: John Wiley & Sons Inc; 1993 Kwon YW, Bang HC. The Finite Element Method Using MATLAB. New York: CRC Press; 1997. ISBN 0-8493-9653-0 Jin J, Liepa VV, Volakis JL. Finite Element Methods for Electromagnetic Scattering. Ann Arbor, MI: Radiation Lab., Dept. of Elect Eng and Comp Science, The Univ. of Michigan; 1989 Oct. p. 868 Zienkiewicz OC, Taylor RL, Zhu JZ. The Finite Element Method: Its Basis and Fundamentals. Burlington, MA: Elsevier Butterworth-Heinemann; 2005 Fargeot S, Julien-Vergonjanne A, Guillon P. Dielectric resonator antenna for material characterization. In: Proc. IEEE Conf. on Precision Electromagnetic Measurements Dig; Braunschweig, Germany. Jun. 1996. pp. 70-71 Drossos G, Wu Z, Davis LE. Theoretical and experimental investigations on a microstrip-coupled cylindrical dielectric resonator antenna. Microwave and Optical Technology Letters. Apr. 1999; 21(1):18-25 Neshati MH, Wu Z. Finite element analysis & experimental studies of microstrip slot coupled rectangular dielectric resonator antenna. In: Proc. IEEE Int. Conf. on Microwave and Millimeter Wave Technology. Aug. 2004. pp. 118-121 Neshati MH, Wu Z. Numerical modeling and experimental study of probe-fed rectangular dielectric resonator antenna (RDRA) supported by finite circular ground plane. International Journal of Engineering-Transactions A: Basics. Sept. 2004; 17(3):269-280 Sheng XQ, Leung KW, Yung EKN. Analysis of waveguide-fed dielectric resonator antenna using a hybrid finite element method/moment method. IEE Proceedings - Microwaves, Antennas and Propagation. Feb. 2004; 151(1):91-95 Shin J, Kishk AA, Glisson AW. Analysis of rectangular dielectric resonator antennas excited through a slot over a finite ground plane. In: Proc. IEEE Antennas and Propagation Society Int. Symp; Salt Lake City, UT, USA. Vol. 4. Jul. 2000. pp. 2076-2079 Ge Y, Esselle KP. Microwave dielectric-resonator antenna analysis and design. In: Proc. IEEE Asia Pacific Microwave Conf; Sydney, NSW. Dec. 2000. pp. 1473-1476 Chen ZN, Leung KW, Luk KM, Yung EKN. Electromagnetic scattering from the probe-fed hemispherical dielectric resonator antenna. In: Proc. IEEE Antennas and Propagation Society Int. Symp. Dig., vol. 2; Baltimore, MD, USA. Jul. 1996. pp. 1410-1413 Leung KW. Conformal strip excitation of dielectric resonator antenna. IEEE Transactions on Antennas and Propagation. Jun. 2000; 48(6):961-967 Neshati MH, Wu Z. Rectangular dielectric resonator antennas: Theoretical modelling and experiments. In: Proc. IEE Int. Conf. on Antennas and Propagation, vol. 2; Manchester. Apr. 2001. pp. 866-870 Rotaru MD, Sykulski JK. Design and analysis of a novel compact high permittivity dielectric resonator antenna. IEEE Transactions on Magnetics. Mar. 2009; 45(3):1052-1055 Zainud-Deen SH, Malhat HA, Awadalla KH. Reduction of mutual coupling between two dielectric resonator antennas mounted on a circular cylindrical ground plane. In: Proc. IEEE Antennas and Propagation Society Int. Symp.; Toronto, ON. Jul. 2010. pp. 1-4 Zainud-Deen SH, EI-Shalaby NA, Malhat HA, Gaber SM, Awadalla KH. Dielectric resonator antenna reflector—Rays mounted on or embedded in conformal surfaces. Progress in Electromagnetics Research C. 2013; 38:115-128 Dhouib A, Stubbs MG, Mongia RK, Lecours M. TLM analysis of rectangular dielectric resonator antennas. In: Proc. IEEE Antennas and Propagation Society Int. Symp. Dig., vol 1; Newport Beach, CA, USA. Jun. 1995. pp. 782-785 Rotaru M, Sykulski JK. Numerical investigation on compact multimode dielectric resonator antennas of very high permittivity. IET Science, Measurement and Technology. May 2009; 3(3):217-228 Rashidian A, Forooraghi K, Tayefeh MR. Design algorithm of multi-segment dielectric resonator antennas (MSDRAs). In: Proc. IEEE Int. Conf. on Microwave and Millimeter Wave Technology. Aug. 2004. pp. 134-137 Nomura T, Sato K, Nishiwaki S, Yoshimura M. Topology optimization of multiband dielectric resonator antennas using finite-difference time-domain method. In: Proc. IEEE International Workshop on Antenna Technology: Small and Smart Antennas Metamaterials and Applications; Cambridge. Mar. 2007. pp. 147-150 Geifman IN, Golovina IS. Electromagnetic characterization of rectangular ferroelectric resonators. Journal of Magnetic Resonance. 2005; 174:292 Geifman IN, Golovina IS. Optimization of ferroelectric resonators for enhanced EPR sensitivity. Concepts in Magenetic Resonance. 2005; 26B:46 Golovina I, Geifman I, Belous A. New ceramic EPR resonators with high dielectric permittivity. Journal of Magnetic Resonance. 2008; 195:52 Torrezan AC, Mayer Alegre TP, Medeiros-Ribeiro G. Microstrip resonators for electron paramagnetic resonance experiments. Review of Scientific Instruments. 2009; 80:044702 Golovina IS, Kolesnik SP, Geifman IN, Belous AG. Novel multisample dielectric resonators for electron paramagnetic resonance spectroscopy. Review of Scientific Instruments. 2010; 81:044702
<urn:uuid:658cba45-b4cd-4bd2-b54a-2e563f217b32>
CC-MAIN-2022-33
https://www.intechopen.com/chapters/64373
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.849397
12,280
3
3
Kobe beef, originating in Kobe, Japan, refers to meat from Wagyu cattle. "Wa" means things that are Japanese and "gyu" means cattle or beef. One reason Kobe beef is so desired is because of the high level of marbling in the meat. Kobe beef can be found in American restaurants, but Kobe-style beef is also available in the U.S. Kobe-style beef comes from Wagyu cattle cross-bred with Angus cattle and was created to meet consumer demand. Video of the Day Menus may not specify where the Kobe beef originated, but both Japanese Wagyu and American-style Kobe beef are similar in nutrient content. According to My Fitness Pal, a 4-ounce serving of Japanese Kobe beef is approximately 280 calories, compared to 330 calories in a 4-ounce serving of American Kobe-style beef. Kobe beef, like many meats, is a good source of protein, providing 22 grams per Wagyu serving and 18 grams per American-style serving. Protein performs many important functions in your body, such as repairing and building tissues, and is found in every cell. Iron is an essential mineral because your body uses it to make the part of red blood cells that carries oxygen to your tissues, called hemoglobin. Thus, eating foods rich in iron such as Kobe beef is important. Each serving of Kobe beef provides approximately 10 percent of the recommend daily value of iron, regardless of the type. Kobe beef contains more fat than other cuts of beef. Wagyu Kobe beef contains 20 grams of fat and 8 grams saturated fat. American Kobe beef contains 28 grams of fat, 11 grams saturated fat and 1.5 grams trans fat per serving. But in moderation, this beef can fit into your healthy diet. In fact, your body needs some fat to protect organs, insulate your body and provide energy for exercise. There is a modest amount of sodium naturally in Kobe beef. Wagyu Kobe beef contains approximately 60 grams of sodium while American Kobe beef contains 75. Although some people are salt-sensitive and need to watch their sodium intake, your body does require some sodium. In fact, sodium helps maintain fluid balance, plays a role in cooling your body when you sweat and helps transmit nerve impulses.
<urn:uuid:85c46294-d1d9-4e71-badf-67e14c014538>
CC-MAIN-2022-33
https://www.livestrong.com/article/171027-kobe-beef-nutrition-facts/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.948361
470
2.546875
3
Sharing tools is the alternative to investing in equipment. It allows to use expensive machines or tools without having to buy them. There are three main ways of sharing tools: sharing websites, tool libraries and shared workshop spaces. Sharing websites are not specifically made for tools and allow you to borrow a tool you need from people in your neighborhood. Famous examples are Peerby or Streetbank, although different websites are more active in different places. Tool libraries are popular in US cities, and basically just extend the book library model to tools. Look for similar initatives in your area, and you may be surprised. Finally, there are shared workshop, like FabLabs, TechShops, Makerspaces and countless local initiatives that go under different names. In these workshops you pay a membership fee in exchange for the possibility to use tools and digital fabrication machines, trainings, and the possibility to interact with other designers and makers. Find the one nearest to you before you invest in that expensive machine. Examples on Superuse.org Examples on Harvestmap.org
<urn:uuid:9253bbc4-0ef7-4d84-b2c7-75749614729f>
CC-MAIN-2022-33
https://www.woodguide.org/guide/shared-tools/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00088.warc.gz
en
0.922155
234
2.65625
3
Also called a Pap test, is a procedure to test for cervical cancer in women. A Pap smear involves collecting cells from your cervix — the lower, narrow end of your uterus that’s at the top of your vagina. For more info visit http://www.webmd.com/women/guide/pap-smear An x-ray that allows a qualified specialist to examine the breast tissue for any suspicious areas. The breast is exposed to a small dose of iodizing radiation that produces an image of the breast tissue. For more info visit http://www.cancer.gov/types/breast/mammograms-fact-sheet A test that allows your doctor to look at the inner lining of your large intestine (rectum and colon). He or she uses a thin, flexible tube called a colonoscope to look at the colon. A colonoscopy helps find ulcers, colon polyps, tumors, and areas of inflammation or bleeding. For more info visit http://www.webmd.com/colorectal-cancer/colonoscopy-16695 Also called a lipid panel or lipid profile — is a blood test that can measure the amount of cholesterol and triglycerides in your blood. A cholesterol test can help determine your risk of the buildup of plaques in your arteries that can lead to narrowed or blocked arteries throughout your body (atherosclerosis). High cholesterol levels usually don’t cause any signs or symptoms, so a cholesterol test is an important tool. High cholesterol levels often are a significant risk factor for heart disease. For more info visit http://www.emedicinehealth.com/cholesterol_tests/article_em.htm
<urn:uuid:ac4c275a-f9c0-443f-a2d7-7fd45357154b>
CC-MAIN-2022-33
http://www.waynewomensclinic.com/recommended-screening-tests/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.876024
351
2.546875
3
Storytelling in a visual way Here are notes from the graphic design, visualization breakout session with Ruth. Super short. We were drawing. There were folks in the group who took pictures of some of the illustrations that could be useful. How to make things more memorable, make it stick. By using images in note-taking and documenting stories, it makes it stick and makes the story more memorable. It's a good practice to get over the creative block and allow yourself to draw continuously, draft, and make mistakes. It's a process. - Draw five nouns (not in words) that describe what you do. - Draw five verbs
<urn:uuid:0fb75344-70e5-41f4-ae22-86cb70e71641>
CC-MAIN-2022-33
https://catechfest.aspirationtech.org/index.php?title=Storytelling_in_a_visual_way
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.963151
140
3.015625
3
Satellites from NASA and the US National Oceanic and Atmospheric Administration (NOAA) are monitoring the eruption of Volcan de Fuego (Volcano of Fire) in Guatemala that has killed at least 69 people since it started erupting on 3 June 2018. The Visible Infrared Imaging Radiometer Suite (VIIRS) onboard the joint NOAA/NASA Suomi National Polar-orbiting Partnership (Suomi-NPP) satellite captured an imagery) of the eruption and resulting ash plume emitted by the volcano. Such satellite images can be utilised by civil authorities, scientists and the local population to understand where pyroclastic flows, a high-density mix of hot lava blocks, pumice, ash and volcanic gas, are moving in order to avoid disaster. Just before noon on 3 June, the Volcan de Fuego, which is located approximately 50 kilometres southwest of Guatemala City, produced an explosive eruption that sent ash billowing thousands of metres into the air. A deadly mixture of ash, rock fragments, and hot gases rushed down ravines and stream channels on the sides of the volcano. Since these pyroclastic flows often move at speeds of greater than 80 kilometres per hour, they easily topple trees, homes, or anything else in their path. Thus over 3,000 people have been evacuated from the area and Guatemala’s main international airport was forced to close. The eruption of Volcan de Fuego was the largest in more than four decades. In addition to ash, the volcanic plume contains gaseous components invisible to the human eye, including sulphur dioxide. The gas reacts with water vapour to produce acid rain and can affect human health, irritating the nose and throat when breathed in. Satellite sensors such as the Atmospheric Infrared Sounder (AIRS) onboard NASA’s Aqua satellite and the Ozone Mapping Profiler Suite (OMPS) on the Suomi NPP satellite are continuing to make frequent observations of sulphur dioxide in the area. A Geostationary Operational Environmental Satellite operated by NOAA, GOES-East, also captured images of the eruption from space. Volcan de Fuego is one of Central America’s most active volcanoes. Earlier this year, NASA satellites captured images of a 31 January 2018 eruption by the volcano, which shot an ash plume 6,500 metres above sea level. This article was contributed by Jack Kavanagh, UN Online Volunteer mobilized through www.onlinevolunteering.org.
<urn:uuid:ff58f591-3470-49d7-a59f-64eab2fce897>
CC-MAIN-2022-33
https://commons.un-spider.org/news-and-events/news/nasa-and-noaa-satellites-monitor-deadly-guatemala-volcano-eruption-0
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.927404
517
3.84375
4
In an extensive collaborative effort, the library went public, searching for Darwin's notebooks that had been missing since 2001. Institutions worldwide, the international trade and the press disseminated the library's appeal back in November 2020 to find these items of historical value; one of the notebooks contains Darwin's famous 1837 "Tree of Life" sketch. A short while ago, an anonymous gift bag with an envelope was placed on the floor outside the librarian's office with a note "Librarian - Happy Easter - X". The envelope contained the notebooks wrapped in cling film. The library has now officially announced the safe return of the notebooks which will be displayed among other items at an exhibition "Darwin in Conversation" (opens 9 July). "ILAB booksellers across the world were absolutely delighted to learn of the return of the Darwin notebooks. We were also inspired by Cambridge University Library taking the non-traditional, and no doubt somewhat uncomfortable, approach of publicly announcing their loss which undoubtedly contributed to their return. ILAB applauds Dr Jessica Gardner and her colleagues at the Cambridge University Library for taking this path and hopes that other institutions learning of their success will follow in their footsteps." Sally Burdon, ILAB President Cambridge University Library writes: "Their return comes 15 months after Cambridge University Librarian Dr Jessica Gardner launched a worldwide appeal for information, in partnership with Cambridgeshire Police and Interpol. The notebooks were returned anonymously to the Library on March 9, 2022, and are in good condition, with no obvious signs of significant handling or damage sustained in the years since their disappearance. They were returned in a bright pink gift bag containing the notebooks’ archive box and inside a plain brown envelope addressed to the University Librarian with the printed message: "The sole aim of our public appeal was to have the manuscripts safely returned to our safekeeping and I am delighted to have had such a successful outcome in such a relatively short space of time. "The notebooks can now retake their rightful place alongside the rest of the Darwin Archive at Cambridge, at the heart of the nation’s cultural and scientific heritage, alongside the archives of Sir Isaac Newton and Professor Stephen Hawking. "Everyone at the Library was incredibly touched by the response to our appeal and to know that so many others felt the same sense of loss we did only reaffirmed our decision to ask the public for their help. "We believe that decision has had a direct bearing on the notebooks being returned and we’d like to take this opportunity to give the public our heartfelt thanks. "That’s why we’re also thrilled to be able to be able to put the notebooks on display this summer, to give everyone the opportunity to see these remarkable notebooks in the flesh. "They may be tiny, just the size of postcards, but the notebooks’ impact on the history of science, and their importance to our world-class collections here, cannot be overstated." Dr Jessica Gardner, Cambridge University Librarian The full article can be accessed here: https://www.cam.ac.uk/stories/... For all security-related matters, please never hesitate to contact the ILAB Secretariat and make active use of the recently relaunched ILAB Missing Books Register: www.missingbooksregister.org These collaborative efforts can make a very practical contribution to finding missing antiquarian material, stopping it from circulating, and discouraging theft in the first place.
<urn:uuid:6cbb358f-77ab-4ac2-83aa-53c152cdc91f>
CC-MAIN-2022-33
https://missingbooksregister.org/article/cambridge-announces-the-safe-return-of-the-darwin-notebooks
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.948666
715
2.515625
3
Racial Equity Tools Glossary August 27, 2021 Words and their multiple uses reflect the tremendous diversity that characterizes our society. Indeed, universally agreed upon language on issues relating to racism is nonexistent. It is essential to achieve some degree of shared understanding, particularly when using the most common terms. In this way, the quality of dialogue and discourse on race can be enhanced. From Racial Equity Tools. MP Associates, Center for Assessment and Policy Development, and World Trust Educational Services, December 2020.
<urn:uuid:fe016f1d-cc87-4d86-b3b0-8841209cd633>
CC-MAIN-2022-33
https://nonprofitresources.ca/resource-library/racial-equity-tools-glossary/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.899218
101
3.328125
3
New York – The UN General Assembly adopted a historic resolution on Thursday, declaring access to a clean, healthy and sustainable environment a universal human right. The resolution was proposed by a group of countries, with Slovenia playing a significant role. The resolution was adopted by 161 votes in favour, none against and eight abstentions. It was welcomed by UN Secretary-General, Antonio Guterres, who labelled it “an important tool for accountability and climate justice”. “The well-being of people around the world and the survival of future generations depends on the health of our planet,” Guterres tweeted. Acting as co-leader of the process, Slovenia played a significant role in adopting the resolution, said the country’s Ambassador to the UN Boštjan Malovrh. “The resolution is a key milestone for the entire international community in connecting environment and human rights, thus strengthening hope for new generations,” Malovrh said. “The resolution declares access to a clean, healthy and sustainable environment a universal human right on a global level and broadens the framework of human rights protection to some of the most burning issues of the 21st century,” Slovenian Foreign Ministry said in a press release. “It does not directly create new obligations for states but it dictates future global standards and it will serve as encouragement for activities in the future,” the ministry added. Apart from Slovenia, the resolution was proposed by Switzerland, Costa Rica, Maldives and Morocco. The proponents launched the process to link human rights with environment in 2011 in the UN Human Rights Council. Last year the Human Rights Council adopted a text similar to that passed in New York today. UN High Commissioner for Human Rights Michelle Bachelet said the world had never faced such a large scope of threats to human rights. Air pollution causes 13 deaths a minute globally, while deterioration of natural environments and biodiversity threatens cultural identity of societies, she said.
<urn:uuid:3855abd8-1a4c-468c-a8b4-bfaea5ea147c>
CC-MAIN-2022-33
https://sloveniatimes.com/un-adopts-environmental-resolution-co-sponsored-by-slovenia/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.923466
405
3
3
August 15, 2016 Unearthing trackers of the past: Computer scientists reveal history of third-party web tracking For over two decades, consumers have used the internet to research, shop, make friends, find dates and learn about the world with the click of a mouse or a few keystrokes. But as we've surfed and tweeted, third-party watchers have also been watching—and learning—about us. When you open a website, your browser doesn't just talk to the site you've intended to visit. The site may contain "third parties"—other embedded websites that your browser also talks to such as advertisers, website analytics engines or social media widgets—which can observe your browsing behavior. Often these companies use this information for innocent—albeit sometimes intrusive—applications like targeted advertisements or personalized content. But third party web trackers raise questions about user privacy, as they can identify users as they visit multiple sites, pick up a person's trail and potentially construct a comprehensive profile based on web behavior. At the USENIX Security Conference in Austin, Texas, a team of University of Washington researchers on Aug. 12 presented the first-ever comprehensive analysis of third-party web tracking across three decades and a new tool, TrackingExcavator, which they developed to extract and analyze tracking behaviors on a given web page. They saw a four-fold increase in third-party tracking on top sites from 1996 to 2016, and mapped the growing complexity of trackers stretching back decades. "Third-party tracking started quite early in the history of the web," said Adam Lerner, a graduate student in the UW Department of Computer Science & Engineering who presented the team's findings at the conference. "People are becoming more concerned about the potential impact of third-party web tracking, but we lacked a comprehensive history of how trackers—and the types of information they collect—have evolved over time." Lerner and fellow doctoral student Anna Kornfeld Simpson set out to fill the gaps in our understanding of tracking, working with computer science and engineering assistant professor Franziska Roesner and associate professor Tadayoshi Kohno of the UW Security and Privacy Laboratory. Roesner and Kohno previously studied third-party web tracking techniques, including developing an early taxonomy of the basic approaches that many cookie-based trackers employ. "Tracking behavior ranges from something 'forced,' like a pop-up window, to something more 'vanilla' like a third-party cookie that tracks the user," said Kohno. "Until now, we didn't have the tools to understand how these approaches have changed since the earliest days of the web. Now we can see how the quantity and variety of trackers has grown, and how some approaches have fallen out of favor while others are on the rise." The project was no small feat, since no one has been systematically collecting information about tracking over time. To overcome this limitation, TrackingExcavator gathers data from an extensive, open-access archive of websites known as the Wayback Machine, which preserves website content as far back as 1996. This complex reconstruction occupied much of the team's time over the past year, but the end result is a historical overview of third-party tracking trends for top internet sites from 1996 to 2016. They quantified the increase of third-party web tracking and illustrated the emergence of different tracking techniques over time. In 1996, the average number of third-party requests on top websites was less than one. Ten years later, that number rose to about 1.5. Today, the average top website has an average of at least four third-party trackers looking at user activity. The team stresses that these numbers are likely underestimates, since not all websites are fully archived. They also found that today individual trackers cover a much larger fraction of the web. Before 2003, no single tracker could observe browsing behavior on more than about 5 percent of the most popular sites. That number increased to 10 percent by 2007. Today, many popular trackers have expanded their coverage to at least 20 percent of sites, while one third party—Google Analytics—is on over a third of the most popular sites. These findings are important to understanding the effects of tracking on privacy, since tracking users on more sites allows trackers to develop a more detailed and intimate picture of their behavior. This 20-year historical perspective paints a clear picture of how third-party tracking has evolved with the rise and fall of different techniques, advances in technology, and our increasing reliance on the web in our lives. In general, third parties are watching and collecting information. How we may feel about that remains to be seen. "Without contextualizing today's tracking behaviors in the history of the web, we don't know whether users should have growing concerns about their privacy or whether privacy advocates are crying wolf. Moreover, we can't assess whether media outcries, policy discussions or changing browser defaults are having an effect," said Roesner. "Our work gives us the tools to answer these questions. And our findings suggest that web tracking should remain an area of concern for privacy advocates."
<urn:uuid:be9c1075-98aa-44b5-8173-f6070274b491>
CC-MAIN-2022-33
https://techxplore.com/news/2016-08-unearthing-trackers-scientists-reveal-history.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.940351
1,130
2.5625
3
Suture technique affects both early and late wound complications. Sutures (or stitches) are typically applied using a needle with an attached piece of thread and are secured with surgical knots. Suturing a wound is an important surgical skill to learn and become competent in. How to suture a wound. Suture and staple removal timing of removal. Make sure the needle clamp locks in place. Place the closed needle driver along the axis of wound between the two ends of the suture. Suture extrusion, wound dehiscence, stitch abscess, and granuloma formation were all observed. The third is to have, a physically appealing scar as opposed to a disgusting mass of tissue. Prepare the wound for suturing by cleaning out any debris with water. This technique leads to a securely closed wound. Suturing is a term used to describe the closing of a wound, artery, or part of an organ using a specific needle and thread. •discuss different types of wound healing techniques and assessments •identify different suture types and uses in the clinical setting •discuss several wound considerations and/or complications that can arise during A common question after you suture a wound for a patient is, “how long do these need to be in for? well, if you choose an absorbable suture, they will dissolve on their own without removal. After showering, dry the area well and begin wound care as listed above. The use of different suture techniques depends on various factors, including the type of wound, its location, skin thickness, wound tension and cosmetic considerations. There are different techniques of suturing and the extent of difficulty varies from one another. The rate of incisional hernia is lower if the suture length: Wound eversion allows the tension of the suture to be placed farther away from the primary closure point. Do not submerge your suture site in the bathtub, hot tub, pool or lake; Interrupted sutures are individual sutures; The ideal suture is the smallest possible to produce uniform tensile strength, securely hold the wound for the required time for healing, then be absorbed. Polyglactin 910 sutures had a higher cumulative incidence of suture extrusion than polysorb sutures did (31% vs 19%). The second is to try to stop the wound from bleeding. After a stitch is made, the material is cut and tied off. Drop the suture needle on the sterile field and close the empty needle holder. The main reasons for placing a suture are to stop bleeding and inhibit infections from making. A good resultant scar begins with a properly designed incision, gentle and atraumatic handling of tissues, selection of the… In this article, we will list the basic suture tray setup and suturing kit. Clean out as much blood as possible. Wound suturing and closure is important in order to:. Wound length ratio is 4 or more. This will make your surgical site prone to infection. Pull the suture through the wound and leave a tail approximately 1 inch (2.5 cm) long at the initial entry site. If you want to minimize scarring impact on the skin, more complicated and complex suturing techniques are implemented. This suture technique uses several strands of suture material to close the wound. Pull all the thread out of the suture kit. Use your needle driver to grab the needle. It is placed so that the suture is more superficial away from the wound edge. You must consider these aspects first and foremost in your decision to close or not to close a wound. The surgical suture is used to hold body tissues together after injury or surgery. Wound closure aftercare wound healing is primarily done by the body's own regeneration mechanisms, the reformation of collagen and the reknitting of the skin on a cellular level. Medical experts will choose the right suture based on the type of wound, its location, and even the thickness of the patient’s skin. Each one gets tied off individually. If you thought that suturing is a uniform process and is applied on all kinds of wounds, you are wrong. This is done with the knowledge that a facial wound has barely begun to gain tensile strength at the time of suture removal. The greek father of medicine, hippocrates, described suture techniques, as did the later roman aulus cornelius celsus. Use the tissue forceps to expose the side of the wound you’ll begin the suture on. If an oral antibiotic was prescribed please take it as directed until it is gone. The first is to prevent infection from entering the wound. A majhi presented by dr. However, a high ratio should not be achieved by suturing with a stitch length of 5 cm or more as this is associated with an increase in the … The cumulative incidence of suture extrusion over 5 weeks ranged from 10% to 33%. How to suture a wound? The aims of suturing a wound are clear and easy to manage. Hold the two sides of the wound closed with your less dominant hand and stitch with the other, starting in the middle. The buried horizontal mattress suture is used to eliminate dead space, reduce the size of a defect, or reduce tension across wounds 6). 12 basic surgical techniques, sutures, and wound closure diego marré, tomas gantz, alex eulufi abstract learning the principles and mastering the techniques of wound closure and suturing are essential to every surgical trainee, regardless of specialty. Like other needlework, suturing can involve a variety of stitching techniques. The second step in evaluating the time frame for wound closure is to decide if the laceration should be closed at all based on it’s appearance. As an amateur, the best suture to learn is the simple interrupted suture. Ipseet mishra history of wounds initially, wounds were left open herbal balms and ointments a south american method of wound closure involved using large black ants east african tribes ligating blood vessels with tendons strips, and closing wounds with acacia thorns pushed through the wound by 1000bc, indian surgeons were using. A detailed description of a wound suture and the suture materials used in it is by the indian sage and physician sushruta, written in 500 bc. “ primary closure ” refers to wounds that are sutured to close the defect. Nurses should have a comprehensive understanding of the relevant anatomy and underlying structures, and the expertise to determine that suturing, rather than other methods of. (repeat for each throw described below.)
<urn:uuid:65e2c6d9-0d30-4a46-9ad4-5c5d1c40df0f>
CC-MAIN-2022-33
https://unugtp.is/how-to-suture-a-wound/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.940193
1,391
3.078125
3
Geoscientists find that shallow wastewater injection drives deep earthquakes in western Texas In a newly published paper, Virginia Tech geoscientists have found that shallow wastewater injection — not deep wastewater injections — can drive widespread deep earthquake activity in unconventional oil and gas production fields. Brine is a toxic wastewater byproduct of oil and gas production. Well drillers dispose of large quantities of brine by injecting it into subsurface formations, where its injection can cause earthquakes, according to Guang Zhai, a postdoctoral research scientist in the Department of Geosciences, part of the Virginia Tech College of Science, and a visiting assistant researcher at the University of California, Berkeley. The findings appear in the May 10 edition of the journal Proceedings of the National Academy of Sciences. Joining Zhai on the paper are Manoochehr Shirzaei, an associate professor of geosciences at Virginia Tech, and Michael Manga, a professor and chair of Berkeley’s Department of Earth and Planetary Science. In the U.S. Department of Energy-funded study, the team focused on the Delaware Basin in western Texas, one of the most productive and unconventional hydrocarbon fields in the United States. Since 2010, the basin has experienced a significant increase in shallow wastewater injection and widespread deep seismicity, including the recent 5.0 magnitude event near Mentone, Texas. Most of the earthquakes were relatively small, but some have been large and widely felt. “It is quite interesting that injection above the thick, overall low-permeability shale reservoir can induce an earthquake within the deep basement, despite a minimal hydraulic connection,” Zhai said. “What we have found is that the so-called poroelastic stresses can activate basement faults, which is originated from the fluid injection causing rock deformation.” Poroelasticity is the resulting interaction between fluid flow and solid deformations within a porous formation, here sandstone. “This finding is significant because it puts poroelastic stresses in the spotlight as the main driver for basinwide earthquakes in the Basin,” said Shirzaei, who is also an affiliated faculty member of the Virginia Tech Global Change Center. Yet, predicting the amount of seismic activity from wastewater injection is problematic because it involves numerous variables, one of which is injection depth, Zhai said. Although it is well known that fluid pressure increase due to deep injection is the dominant reason for the recent seismicity increase in the central and eastern United States, it is still questionable exactly how shallow injections cause earthquakes. During the study, the team looked at how varying amounts of injected brine perturbed the crustal stresses deep under the Delaware Basin and how these disturbances lead to earthquakes on a given fault. Added Zhai, “Fluids such as brine and natural groundwater can both be stored and move through rocks that are porous.” The trio used data analytics and computer modeling to mimic the large volume of fluid extraction from shale reservoirs from more than 1,500 shale production wells during 1993 to 2020, with 400 wells injecting brine in sandstone formations from 2010 to 2020. To make the scenario realistic, the model included the mechanical properties of rocks in the Delaware Basin, Shirzaei said. The team found that the basinwide earthquakes mainly occur where the deep stress increases because of shallow injection. This means there is a causal link between deep earthquakes and shallow fluid injection via elastic stress transfer. “The deep stress change is sensitive to shallow aquifer properties, especially the hydraulic diffusivity, which describes the ease of fluid flow in porous medium,” Manga said. “One question to ask is why some areas that host lots of shallow injection lack seismicity. Our approach offers a way to investigate other significant factors that control induced earthquakes.” In addition to human interventions, the tectonic settings themselves also help predetermine the magnitude and liklihood of the earthquake, Shirzaei said. This study and future work will provide a viable way to assess induced seismic hazards, combining natural and human factors. The ultimate goal: to minimize the hazards from disposing of wastewater during natural gas production until long-term, renewable energy technologies become available to all. “As the future energy demands increase globally, dealing with the enormous amount of coproduced wastewater remains challenging, and safe shallow injection for disposal is more cost-efficient than deep injection or water treatment,” Zhai said. “We hope the mechanism we find in this study can help people rethink the ways induced earthquakes are caused, eventually helping with better understanding them and mitigating their hazards.”
<urn:uuid:f8f2cfaf-65c7-42a6-afc8-b63182724fe1>
CC-MAIN-2022-33
https://vtx.vt.edu/articles/2021/05/science-fracking_earthquakes_west_texas_zhai_Shirzaei.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.943813
955
2.984375
3
Creating landscapes that inspire social change Students learn to create art and design with the power to change the world, placing themselves within the “landscape” itself and mustering all their senses, knowledge and experiences to see through to the essence of that place. The Landscape Design major defines “landscape” as a place where the problems and possibilities of the world we live in intersect with the history and natural environment of the land in various ways. The projects undertaken in this program span diverse areas of expression and depend on the differing backgrounds of the individual students. Courses aim to foster real-world leadership in the cultural and artistic fields through practical study. The program curriculum includes landscape and architectural design, socially-engaged public art and documentary projects, urban planning, and public workshops. A strong emphasis is placed on fieldwork as the basis for creating and proposing new “landscapes” through wide-ranging modes of expression.
<urn:uuid:cc30abc6-1db1-4cea-85a3-4a63256569ec>
CC-MAIN-2022-33
https://www.akibi.ac.jp/en/department/landscape
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.926345
202
2.515625
3
This week’s Torah portion opens with the call, “You shall be holy!” This commandment obligates us to examine what holiness is. Is it a feeling? An experience? The explanation for this commandment to be holy is, “for I, the Lord, your God, am holy.” If holiness is a divine trait, we must figure out how a person can become holy like God. Many definitions have been given for the term “holy.” Among the most famous of those who researched this was Rudolf Otto, a German philosopher and theologian, who wrote a book called The Idea of the Holy where he tried to define the term and the manner in which holiness is experienced by man. In his opinion, holiness is a combination of two forces: fear of the sublime, expressed on a low level simply as fear, and on a higher level as a sense of glory and splendor, and the longing to get closer to the thing because of its wondrous charm. There could be truth in such a definition, but it is hard to connect it with the commandment “You shall be holy!” How can a person not only be exposed to holiness, and not only yearn for it, but become holy himself? THE KEY to grasping the concept of holiness in Judaism is the understanding that holiness is indeed a divine trait, and therefore cleaving to God is the way to attain holiness. In Rabbinic literature, we find several ways in which cleaving to God can be actualized and thus make a person holy. In the Talmud, the sages wondered about man’s ability to cleave to God: “Is it possible to cleave to the Divine Presence? Isn’t it written: ‘For the Lord your God is a devouring fire’!” God is compared to fire. Can someone cleave to fire without getting burned? How can a physical man be close to God? And the sages answer: “Rather, this verse teaches that anyone who marries his daughter to a Torah scholar, and one who conducts business on behalf of Torah scholars, and one who utilizes his wealth to benefit Torah scholars with his property in some other way, the verse ascribes to him credit as though he were cleaving to the Divine Presence” (Ketubot 111). Elsewhere, the sages ask a similar question and give a different answer: “Is it actually possible for a person to follow the Divine Presence?... Rather, the meaning is that one should follow the attributes of the Holy One, blessed be He. Just as He clothes the naked... so, too, should you clothe the naked. Just as the Holy One, blessed be He, visits the sick... so, too, should you visit the sick. Just as the Holy One, blessed be He, consoles mourners... so, too, should you console mourners. Just as the Holy One, blessed be He, buried the dead... so, too, should you bury the dead” (Sota 14). The sages of the midrash propose a third way of cleaving to God: “Is it possible for flesh and blood to go up to the Heavens and cling to the Divine Presence?... Rather, the Holy One, blessed be He, from the very beginning of the creation of the world, only occupied Himself with plantation first.... You also, when you enter into the land, only occupy yourselves with plantation first” (Leviticus Rabbah 25). We have, therefore, three means of cleaving to God: connection to the Torah, acts of loving-kindness, and being occupied with developing the world. These are different expressions of divine holiness. The Torah is the word of God to humanity, the manner in which man is exposed to the eternal values of the Creator; acts of loving-kindness, thinking of others and assisting the weak are ways of walking the path of God; and developing the world, what the sages of the midrash demonstrate through the example of planting fruit trees, makes man a partner of God in the continued existence of the world. It is therefore no surprise that under the title of “You shall be holy” in this week’s parasha, we find a very varied list of commandments. Indeed, there are many ways to attain holiness. In every commandment that one fulfills, one can cleave to God and thus become holy. In Judaism, holiness is not an experience; it is an action – says Jewish scholar Steven Kepnes. A person can be holy when he follows God’s ways, connects to the Torah, performs acts of loving-kindness for others, and acts on behalf of the world’s continued existence. ■ The writer is rabbi of the Western Wall and holy sites.
<urn:uuid:f7a4301a-0da8-4e02-b46c-32716d54c266>
CC-MAIN-2022-33
https://www.jpost.com/judaism/torah-portion/article-705427
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00088.warc.gz
en
0.952904
1,020
2.796875
3
Muong Ethnic Group Found predominantly in Hoabinh Province, the male-dominated Muong live in quell, grouped into uong. Each muong is overseen by lang. Though their origins lie close to the ethnic-Vietnamese and nowadays they are difficult to distinguish, the Muong have a rich culture and are more similar to the Tai. The women ware long skirts and short vest-like blouses while the men traditionally wear indigo tops and trousers. They are known for producing notable folk literature, poems and songs, much of which has been translated into Vietnamese. Musical instruments such as the gong, drums, panpipes, flutes and two-stringed violin are popular with the Muong. They too cultivate rice in paddies, though in the pas sticky rice was a staple part of their diet.
<urn:uuid:93c01682-af97-4895-85a0-837bc8e3df2c>
CC-MAIN-2022-33
http://www.e-travelvietnam.com/MuongPeople.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.971572
169
2.828125
3
NEW E-ASSESSMENT MODEL FOR DISTANCE LEARNING COURSES: THE TALOE EXPERIENCE The TALOE (Time to Assess Learning Outcomes in E-learning) EU-funded project approaches the e-assessment concept by using technology for assessing students’ learning. The project is building on the foundations of previous developments on this issue, an existing tool for the Alignment of Learning Outcomes and Assessment, the ALOA model, which uses the revised version of Bloom’s Taxonomy to establish the link between the LOs and general assessment methods. The TALOE project uses the same methodology but adapted to the specific context of e-learning and e-assessment. The main goal of TALOE is to develop a web-based platform to help teachers and trainers decide on the e-assessment strategies to use in their online courses. This tool is aimed to raise teachers’ awareness about the variety of e-assessment strategies in order to achieve better quality of the learning process. TALOE assumes that a teacher/trainer will describe the learning outcomes of the course or module and then use the TALOE webtool online to analyse them and provide the most appropriated e-assessment strategy that is consistent with the set of intended learning outcomes. In order to achieve this, the TALOE consortium has: - conducted desk research and selected innovative e-assessment practices that take advantage of the use of technology; - developed a web-based tool that is easy to use by the stakeholders; - tested the implementation of the tool with real case studies; - promoted the TALOE tool among the communities of stakeholders who have accepted to test the webtool and give feedback During the EDULEARN session, the TALOE webtool will be presented and demonstrated, so participants can see how it works.
<urn:uuid:176d8bfb-78a5-4b5f-bd85-636e518f0fc5>
CC-MAIN-2022-33
https://library.iated.org/view/SOEIRO2015NEW
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.911135
389
2.734375
3
What are the most dangerous and common insect bites for children? Your children play around bugs constantly, but it can be scary to see a bug bite on them and not know what type of bug it was or if it was a dangerous bug. Most bug bites do not pose a serious threat, but there are a few you should be aware of. As a result, we’re providing you with a guide on the most dangerous and common types of bug bites. You’ll also learn the signs for these bites and what you can do for relief in mild bug bite cases. What are the Most Dangerous Bug Bites for Children? The worse bug bites for children are usually from ones that are venomous or bugs that inject harmful diseases or bacterium as well as stings from bees, wasps, and other venomous creatures. That said, your child could be allergic to certain bugs, which can be very dangerous. Harmless Bites, Dangerous Bites, and Stings There’s a difference between harmless bug bites, venomous bug bites, and stings from insects. Most bug bites won’t cause serious issues. A few species can inject venom, parasites, or diseases when they bite you. Also, your child could be allergic to the bug and this will cause anywhere from a mild to a severe reaction. Stings, on the other hand, can have severe side effects and cause anaphylaxis shock if your child is allergic to the insect. The majority of bugs that bite such as mosquitos, ticks, fleas, kissing bugs, bed bugs, flies, or beetles do not inject venom into the victim. A few bugs can inject your child with a parasite. For instance, the kissing bug bites around the mouth and eyes while you’re asleep, and it may inject its victim with Trypanosoma Cruzi a parasite that can be life-threatening. Ticks can also leave behind a bacterium called Borrelia burgdorferi and it causes Lyme disease. We discuss the signs and symptoms for bug bites later in this article and what you should do if you suspect your child has been bitten. Bugs that do inject venom when they bite are ants and spiders. These kinds of bites can be extremely dangerous for your child or anyone else. Many children are allergic to ant bites, and some spiders such as the Brown Recluse or Black Widow can be fatal if the victim is not treated soon. While many people think of bees, wasps, and hornets, and yellow jackets bite, they actually sting and bite sometimes. The bite can be painful but is usually harmless. A sting, on the other hand, may cause an allergic reaction, which could be severe and even fatal. We’ve discussed quite a few bugs, such as bees, ants, spiders, and so forth, but these aren’t necessarily the most common bug bites that child may experience. Children play in around your home with little regard to their surroundings which makes them vulnerable to certain bugs more than other types of bugs. What are the Most Common Bug Bites for Children? Children are commonly bitten by different types of bugs, but they’re the ones found in play-areas or inside your home. The most common types of bug bites your child may get are: - Ants: They’re in your child’s sandbox and in the grass where they play. More than likely, your child will at some point sit in, stand by, or run through an ant bed. We discuss the signs and symptoms you should be concerned with later in the article, but ants are usually harmless. Their bites, although painful and itchy, do not cause severe issues in most cases. - Spiders: This is one of the bites you do need to worry about. Children love to play in dark areas, crevices, and other spots where spiders love to hide like under your porch. Many spider bites are harmless but it’s not safe to risk it. If you think your child was bitten by a spider, take them to the doctor immediately. - Bees, Wasps, Yellow Jackets, & Hornets: The only thing you need to worry about with this group of insects is whether or not your child is allergic to them. Their stings and bites are painful but won’t cause serious issues unless someone is allergic to their venom. - Fleas & Ticks: Their bites can be annoying, but it is rare for them to cause severe medical issues. Ticks can transfer several types of diseases, but there’s no way to know if your child has one until months after they’ve been bitten. If you live in an area with a lot of ticks, keep an eye on your child for symptoms that are associated with Lyme disease, Rocky Mountain Spotted Fever, and several others. - Flies: Their bites are painful and itchy but harmless. - Mosquitos: In several countries, they only cause discomfort and some inflammation if your child is allergic to mosquitos. They can carry parasites and diseases in other countries though. - Chiggers: This little red bug causes little red spots all over your skin that can itch severely, but they do not cause any medical problems. - Bed bugs: They are nocturnal, come out while you’re sleeping, then suck your blood. You’ll know you have bedbugs if you go to bed fine and wake with red spots all over your body, particularly in areas where your skin is exposed. Signs Bug Bites in Children and How to Treat Them The signs and symptoms vary depending on the bite or sting, but you should be aware of them. In some instances, there’s no major concern and in other cases, you may need to seek medical attention. Signs of an allergic reaction This is your biggest threat because not many bug bites are fatal, but allergic reactions can be life-threatening or cause severe side effects. Allergic reactions may be swelling, redness, or a rash around the bite or sting. An allergic reaction can also be more critical, such as flushing, hives, intense itching, trouble breathing, swelling in the face, throat, or eyes, trouble swallowing, rapid pulse, or dizziness. If you suspect your child is having a severe allergic reaction, get medical help immediately. You can use an antihistamine for children and creams with hydrocortisone or antihistamine as well as calamine lotion and oatmeal baths to help with minor allergic reactions and inflammation. Signs of a Bite Bug bites usually look about the same for mosquitos, fleas, bed bugs, and ticks. They leave behind small red circular marks that are painful or itchy. You can use child-safe topicals like calamine lotion, hydrocortisone creams, or antihistamine medication to help with the itching from these bites. You might also want to consider a pain reliever. Signs of a Sting or Venomous Bite Most bee stings will not cause serious issues, but they can be painful. Bees, wasps, hornets, and yellow jackets leave a tiny red mark where they’ve stung you and may leave behind a stinger (bees and yellow jackets) that you need to remove before treating. With bee stings, you use the same creams and an antihistamine as we suggested above. Ant bites show up as small, red pumps with a pus pocket and those too can be treated with creams, pain relievers, and antihistamines. Do not pop ant bites no matter how bad they look it can cause an infection. Spider bites are another serious concern. Although some spiders won’t cause any real harm, several species can cause severe health issues and even death. If you did not see what kind of spider bit your child but suspect a spider bite, take them to the doctor. It’s always best to be precautious rather than waiting it out. Can I Prevent Bugs from Biting or Stinging My Child? It is almost impossible to keep your child from getting bit by bugs, but you can prevent many bites by using topical bug repellent. There are plenty of DIY repellents that are made with essential oils, different kinds of vinegar, and other natural ingredients as well as over the counters sprays and creams that will repel bugs. You can also protect your child from bugs by treating inside and outside your home for pests. We have a detailed article on home remedies for repelling and killing common pests around your home. Bug bites can look nasty and even be scary, but they are rarely serious. The biggest threat is whether or not your child is allergic to a bug’s bite. Bug bites aside from spider bites can usually be treated at home with a pain reliever, antihistamines, and creams. Finally, you can protect your child and home with bug repellent.
<urn:uuid:f482e08b-f34a-416c-912e-97c086cd678b>
CC-MAIN-2022-33
https://pestdefenseguide.com/what-are-the-most-dangerous-and-common-insect-bites-for-children/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.942308
1,865
2.765625
3
Write an Op-Ed In the recent protests, military and police officers have been using rubber bullets, tear gas, and other forms of force against peaceful protestors. What are the short-term and long-term health impacts of rubber bullets and tear gas? What repercussions might this have on public health at large? - Writer must be a paid member of PfCJR - Remain under 750 words - Answer this month’s question - Share your perspective on the topic - Due by January 19, 2020 PROTESTS ABOUT POLICE BRUTALITY ARE MET WITH WAVE OF POLICE BRUTALITY ACROSS U.S. The Guardian: “The nationwide anti-police brutality protests sparked by the killing of George Floyd in the US have been marked by widespread incidents of police violence, including punching, kicking, gassing, pepper-spraying and driving vehicles at often peaceful protesters in states across the country. The actions have left thousands of protesters in jail and injured many others, leaving some with life-threatening injuries.” COLUMBUS LOOKS INTO DEATH OF OHIO STATE GRAD WHO ATTENDED DOWNTOWN PROTESTS The Lantern: “The city of Columbus is reviewing the death of an Ohio State graduate who died after being exposed to chemical agents while attending protests in downtown Columbus, Ohio. The city of Columbus is looking into possible connections with Columbus protests and Grossman’s death, according to a tweet from the city Wednesday. The city also said the Columbus Fire Department does not have a record of emergency medical services transporting her to any area hospitals.” Not sure how to write an op-ed? Check out this op-ed training webinar! It provides tips for writing effective and engaging op-eds, specifically with regard to health care and physicians issues. This webinar was co-hosted by one of our partners, Doctors For America, and Families USA. Click here to watch the webinar. Have any other questions? Reach us at our social media or the email contact listed below.
<urn:uuid:2ae747b6-cc04-4ec2-a707-a4272603fe40>
CC-MAIN-2022-33
https://pfcjreform.org/write-an-op-ed-for-pfcjr-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.940058
452
2.90625
3
Self-identity refers to the psychological and theoretical perceptive of a person and the constant regard that he holds for his very subsistence. Self-identity of a person can also be seen as the awareness and thoughtfulness of his own self. The concept of self-identity is completely different from that of self-consciousness, which refers to concern about ones self. Self-identity of a person comprises physical, psychosomatic, and social facets that are persuaded by the habits, ideas, attitudes and belief of a person. In this world where competition is increasing at a tremendous speed, each and every human being is trying hard in order to carve out a forte for himself. In order to straighten his means an individual is trampling the relationships that at one point of time were of great importance to him. It is only money that is of great importance to him. In this way he has deliberately formed a void between the society and his own self. The possible reason that has made this sort of attitude prevalent in the society is that society is constantly ignoring the causes and is laying stress on the symptoms of the failure. This way an individual allows the growth of various pessimistic feelings that comprises lust, jealousy, sloth and gluttony. These features are incorporated within his identity and serve to explain the kind of human being he is. The growing competition makes him devoid of all the feelings of humanity and constantly pushes him to the negative aspect. Man who is regarded as a social animal has completely lost his values in the ongoing rat race for success and prosperity. In this he has even lost his true and accurate worth. As a person mainly focuses on the mind and often ignores the thoughts and feelings. It is often seen that its effect on the society is drastic and painful. This attitude of a person often calls for a need to determine the positive and constructive side of your self and work towards in its development. The positive thoughts will lead to the emission of harmonious vibrations around you. This will hinder the growth of the downbeat energy that has been hampering an individual from adorning pleasant and blissful thoughts. In order to develop healthy relationship with the society and to relieve oneself from the pressure, a person needs to change his living style. This can be done by incorporating self-healing process that comprise yoga, meditation, naturopathy, aromatherapy, color therapy in his daily routine. They are non-invasive processes that do not require any surgeries and drugs. They aid a person in relaxing and rejuvenating from the stresses and anxiety. Yoga and meditation have been practiced by people since ancient times, so their reliability cannot be doubted. It is a soothing and calming process that enhances the concentration of a person. It helps a person to raise oneself from the measures of the world. Aromatherapy massages and oils have also been in practice from time in memorial. It also enhances the process of self-healing that forte helps a person in acquainting with the self that he had lost due to his excessive indulgence in the selfish means. The aromatherapy oils can also be mixed in the water for a stress beating experience. It also enables a person to be indifferent to the people surrounding him. This will also help him to overcome his materialistic advancement to life. These ways will definitely ensure success and advancement in life by banking on the positive facets and minimizing the unconstructive aspects.
<urn:uuid:7fd93e38-3ff4-4918-aa02-1a7d5b75fc34>
CC-MAIN-2022-33
https://shuteyemusic.com/striving-for-self-identity-in-society/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.98233
694
2.8125
3
32 pages, ages 4-7. HMH Books for Young Readers, 2018 People think, talk, and walk around. Plants do none of these things. So how can they be anything like us? Well, writes Bridget Heos, they can communicate with each other and wear sneaky disguises. And plants even wage war. In this addition to her “Just Like Us” series, she gives us an up-close look into the secret – and not so secret – lives of plants. What I like about this book: On each spread we get to see one specific way in which plants are similar to people. One spread focuses on what plants eat, another on the importance of drinking water. There are a couple spreads that detail how young seeds are sent on their way – some by hitching a ride, others by air or sea. David Clark’s vibrant and humorous illustrations are fun and engaging. A glossary and bibliography provide more for the curious kid. Check out the hands-on fall plant activities over at Archimedes Notebook It’s STEM Friday! (STEM is Science, Technology, Engineering, and Mathematics) Copyright © 2018 Sue Heavenrich All Rights Reserved.
<urn:uuid:158793f0-f455-4d1a-ba27-f469ef04d7a3>
CC-MAIN-2022-33
https://stemfriday.wordpress.com/2018/10/05/just-like-us-plants/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.926149
250
3.125
3
Dec 21, 2018 We have already covered the sense of sight, smell, and taste. Today’s behavioral economics podcast is all about the sense of hearing and sound. As a vocalist, avid music lover and podcaster, sound and the sense of hearing is very near and dear my heart. I talk about the basics of hearing and how the brain interprets signals from the ear. Then we move on to sounds, and the signals that sounds can send to our brains. Similar to the sense of smell, sound can have a huge impact on what the brain perceives. I share some fun studies and articles that involve music, pop culture, branding, and I even play some some branding sounds for you to guess. As always, everything ties back to how you can use sounds to make your business more appealing to your target market. - [04:48] Sound is basically just air. It hits the outside of our ears, which help to determine where a sound is coming from as sound waves bounce off of - [05:00] The ear canal then works like an amplifier on the way to the eardrum. - [05:12] The eardrum works like a physical drum by turning the air that hits it into a physical vibration which pass along to the tiny bones of the inner - [05:28] This causes the fluid of the inner ear to slosh around, stimulating tiny “hairs’ in the ear which move molecules around and send signals to the brain to be interpreted as sound. - [05:43] This is also what controls equilibrium and allows you to stand up and know the difference between what’s up and down. - [06:12] The cochlea translates sounds into electrical pulses and sends them to our - [07:09] Vibration of sound waves is at the core of sound and what we hear. - [07:49] Your body takes in a stimulus that needs to be interpreted by the brain to actually mean anything to you. - [08:27] Hearing has a similar ability to distract and take over everything the same way that - [08:49] A good smell can flag your brain in a positive way, and a bad smell can do the - [09:48] Sound has a similar impact on our ability to perform. - [11:48] Music is amazing and - [12:30] Every culture on Earth has been found to have some type of musical component. - [13:18] We truly are uniquely able to understand and create music and it impacts more than just - [13:41] Studies have shown that our bodies physically react to music in amazing ways. A quick tempo in a song will make our hearts beat faster. - [14:03] The body actually changes when music is played, which is pretty amazing. If you want to get pumped up before an important call – choose a great - [14:37] The easiest way to turn any sound into music is to repeat it. - [15:20] Our brains love repetition. Familiarity is favored and music is all about - [15:51] Music impacts our brains differently than words and it can actually help people to - [16:49] Studies have shown that restaurants playing faster music can turn more clientele than those who play slower music. - [17:39] Understanding how you make money can make it easy to pull the right levers. - [18:51] Studies have shown that stores need to carefully select music that matches the brand to encourage shoppers to stay in a store longer. - [19:18] Locations that played music that was a better fit increased time in a store by 22 - [19:51] The emotion of the music can impact the way the consumer feels about the brand they are interacting with. - [20:42] Everything leading up to the sale or conversation or price or item being sold matters more than the price or item itself. Everything matters. - [21:13] JINGLES: Sounds have a strong connection to memory, emotion and behavior and jingles associate brands into our brains in a different way than images or - [24:02] Sounds make or break movies. They say if you are ever watching a movie and get too scared to put it on mute. It completely changes the - [25:28] People truly can hear whether you're smiling or not (even if they can’t see you), and it makes a difference with how they interact with you. - [26:17] The study I have linked to found that the way a number is sounded out can impact the way the price is perceived – as being big or small – more than the mere number does alone. They did this by testing out the way words are formed – vowels and consonants to determine what is a “big” sound versus a small sound. - [28:05] This study found that “bigger” associations in the phonetics translated to a bigger price in the brain. Thanks for listening. Don’t forget to subscribe on Apple Podcasts or Android. If you like what you heard, please leave a review on iTunes and share what you liked about the show. Links and Resources:
<urn:uuid:e2847ca7-e8ab-45ea-b5bf-8936a13712e9>
CC-MAIN-2022-33
https://thebrainybusiness.libsyn.com/27-behavioral-economics-foundations-the-sense-of-hearing-and-sound
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.919407
1,245
2.828125
3
Effective combustion control key to emissions reductions 11 February 2020 Martin Thirsk, managing director of Energy Technology and Control – global leaders in the design and development of combustion controls and burner control technology – explains how effective combustion control can reduce emissions by up to 10% each year, saving industrial burner operators thousands in energy costs. Typically, combustion of 1m3 of natural gas in an industrial boiler produces 2.03kg of C02, and 1 kWh of electricity generated in a gas fired power station produces 0.420kg of C02. It is not unusual for an industrial burner/boiler to use in excess of 130,000 pounds of fuel per annum, directly emitting up to 15,700 tonnes of C02. If we add to that figure, the electricity used to power the burner fan, then the total C02 emissions caused by a single burner of this size can exceed 15,750 tonnes per annum. From an environmental perspective it obviously makes sense to aim for a reduction in CO2 emissions, there is however also a business case for this as reduced CO2 is usually a result of improved efficiency and fuel consumption. The electronic combustion controllers we produce at Energy Technology and Control are usually customised for each burner manufacturer. This ensures that the unique design features of each burner are fully realised. Integration of burner and boiler control into a small electronic controller removes the need for large cabinets or housing; this lowers capital cost and in turn improves space utilisation. When using an electronic controller, the low fire point can be set lower than the ignition point meaning that the turn-down ratio can be increased and burner on/off cycles and their associated cold air purges reduced. Savings of 5% have been reported on a burner that prior to conversion had an on/off frequency of approximately once every 10 minutes. If a plant does not run continuously then a second modulation control setpoint can be used to switch the boiler to a lower steam pressure or hot water temperature during periods of reduced activity. One manufacturer employing this approach used hot water for paint drying but the process was held on stand-by at night. I advised using a second boiler setpoint, which provided energy savings of approximately 10% per annum. When oxygen trim is employed oxygen levels can be trimmed to their optimum level. This process automatically and continuously compensates for the variables that affect efficient combustion. An adaptive trim system will contribute energy savings of approximately 3% per annum. Unfortunately air dampers can leak and even when fully closed the air flow can be significant. However combustion efficiency can be improved at low fire if the fan speed is reduced. By simply adding fan speed control, burner turn-down can be increased further without compromising low fire efficiency, and additional fuel savings can quickly be achieved. When an inverter is used to slow the speed of an ac electric motor, electrical energy savings result. For example, when a fan motor is slowed to half speed an 80% electrical energy saving is achieved and emissions at the power generation plant reduced. Electronic control facilitates direct driving of the fuel valves and air dampers resulting in no wear/backlash and on frequently modulating burners additional energy savings of up to 1% are common. More efficient combustion in industrial burners conserves fuel, lowers emissions, reduces plant operating costs and prolongs the life of the boiler plant. The benefits for the burner manufacturer include, full integration, better control, improved flexibility, increased performance, improved reliability, lower cost, simplified wiring and a reduction in storage space required. By reviewing your burner control strategy it is possible to achieve significant energy savings and substantially reduce outgoings.
<urn:uuid:ac4b0c87-85a8-4bf2-82a3-71018fdac764>
CC-MAIN-2022-33
https://www.ipesearch.co.uk/page_1149315.asp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.918903
769
2.890625
3
Latest Eyesight News SUNDAY, May 31, 2015 (HealthDay News) -- Changes in bacteria populations may be one reason why people who wear contact lenses are more prone to eye infections, a new study suggests. "Our research clearly shows that putting a foreign object, such as a contact lens, on the eye is not a neutral act," senior study investigator Maria Gloria Dominguez-Bello, a microbiologist at NYU Langone Medical Center, said in a Langone news release. "What we hope our future experiments will show is whether these changes in the eye microbiome of lens wearers are due to fingers touching the eye, or from the lens's direct pressure affecting and altering the immune system in the eye and what bacteria are suppressed or are allowed to thrive," she added. For the study, researchers took samples from nine daily contact lens wearers and 11 others who didn't use contact lenses. They found that the types of bacteria in the eyes of the contact wearers more closely resembled those found on eyelid skin than in the eyes of those who don't use contacts. Specifically, the researchers found that the eye surface had a greater variety of bacteria than the skin directly beneath the eye. They also found that the eyes of contact lens users had three times the usual levels of certain bacteria than the eyes of those who didn't use contact lenses. The findings were to be presented Sunday at the annual meeting of the American Society for Microbiology, in New Orleans. Findings presented at meetings are typically considered preliminary until they've been published in a peer-reviewed journal. "These findings should help scientists better understand the longstanding problem of why contact-lens wearers are more prone to eye infections than non-lens wearers," Dominguez-Bello said. That understanding could lead to better ways of preventing eye infections in contact lens wearers, the researchers said. -- Robert Preidt Copyright © 2015 HealthDay. All rights reserved. Health Solutions From Our Sponsors
<urn:uuid:7d5b7110-16ad-497e-90fe-3077388ea0cd>
CC-MAIN-2022-33
https://www.medicinenet.com/script/main/art.asp?articlekey=188740
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.954123
416
2.8125
3
The cold winter months may seem like a time when trees are resting but they are still hard at work under that appearance of dormancy. Roots will continue to grow as long as ground temperatures are moderate. To support root growth leave fallen leaves on the ground to provide your tree with natural mulch, just like you would find on the forest floor. If you can’t leave fallen leaves on the ground, consider running them over with the lawn mower to chop them up into smaller pieces. If that doesn’t work for you, at least make sure your trees have a 3″ layer of wood mulch around them to protect the roots from temperature fluctuations, to hold moisture in the soil, and to improve soil structure. Just don’t let leaves or mulch pile up against the trunk – that can lead to decay. Winter dormancy is a great time to plant trees and it’s the best time to prune most trees in Central Texas. Before you grab the saw and the pruners, take the time to ask yourself “Why am I pruning these trees?” Keep these goals in mind: - Remove dead and diseased wood. Make sure you can tell the difference between a dead branch and a live one during the winter (scratch the limb with your thumbnail if you aren’t sure – if it’s alive it will be green.) - Remove branches that are rubbing against a building or hanging low over a walkway or street. - Remove crossing branches that rub together and create wounds. Pruning for any other reason should be kept to a minimum. Consult your favorite tree care book or our Native Tree Growing Guide for Central Texas to learn how to make a proper pruning cut. We are still in the midst of a prolonged drought in Central Texas and your trees need water even though it’s not hot outside. Remember to water young or newly planted trees at least every 2 weeks and give mature trees a slow, deep watering each month that we don’t get a decent rain. The trees will thank you come spring! Tree Tips by Colleen Dieter, Owner of Red Wheelbarrow Landscape Consulting
<urn:uuid:96db62dd-9258-4bb5-b91e-7c678c563e1f>
CC-MAIN-2022-33
https://www.treefolks.org/2012/12/17/winter-tree-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00088.warc.gz
en
0.932886
449
2.546875
3
How Facebook's Crackdown On Data Scrapers and Automated Surveillance Tools Will Affect Social Media Research & Analytics Social media data scraping is arguably the most dynamic and largest dataset when it comes to real-world events and human behavior. For years, business experts and analysts have relied on this tool to extract and harvest information from platforms such as Facebook. This invaluable information produces representative samples to comprehend individual, group, and societal behavior. In addition, many industries reap the benefits found in online data, including insurance companies, risk management firms, e-commerce, media, marketing, finance, private investigators, and HR. However, in 2019 malicious actors used data scraping tools to discover and extract personal data from 530 million Facebook users on a global scale resulting in legal ramifications for privacy violations. Since then, the tech giant has cracked down on data scraping, introducing strict regulations prohibiting any automated crawlers, making it challenging to retrieve data. What is data scraping, and what do these new Facebook restrictions mean for your business intelligence? Can you still gather essential information on this platform while still in full compliance with the law? Read on to find out. What is Data Scraping? Data scraping, also referred to as web scraping, is the process of collecting data and content from the internet. This information is then saved to a local file and can be analyzed as needed. Basically, if you've ever copied something from a website and pasted it into an Excel file, you are data scraping, to a small degree. Typically, data scraping is completed by software applications or bots. These bots are tasked with visiting websites, finding relevant pages, and extracting and saving necessary data. The most common data types that organizations collect include text, images, product information, videos, competitor prices, and customer reviews. As the host of the most significant source of information on the planet, the internet has a plethora of data that is beneficial for businesses. Data scraping is used for a range of purposes, including: - Social media scraping - Lead generation - Competitor analysis - Contact information accessibility - Research and development - Brand monitoring - Extracting financial statements For example, Google uses web scraping to rank, analyze, and index content. On the other hand, insurance companies leverage data scraping to assist with claims assessments. The possibilities are seemingly endless, but there is also a dark side that comes with data scraping. Cybercriminals often use this technology to scrape out personal information in order to conduct scams, fraud, and extortion. Is Data Scraping Illegal? In general, data scraping is legal as there are no federal laws against it at the moment. But in saying that, there are rules that must be respected. This applies to publicly shared data, where the person who posted the information has chosen to make it public, you don't need to generate an account to access said data, and that the website doesn't block data scrapers. However, when it comes to Facebook, using automation to attain data from Facebook without receiving written permission to do so is a violation of its terms. In an attempt to curb data scraping on its platform, Facebook has enabled a dedicated External Data Misuse team of analysts, data scientists, and engineers exclusively focused on identifying, blocking, and deterring data scraping. According to Mike Clark, Director of Product Management at Facebook: "In short, we aim to make it harder for scrapers to acquire data from our services in the first place and harder to capitalize off of it if they do… Limits are only a first layer of protection, and we know that scrapers are determined to find new ways to get data. That's why we've also focused on developing other methods of identifying and deterring scraping. We won't go into all of them because we don't want to give a roadmap to scrapers seeking to evade our defenses, but one example is that we look for patterns in activity and behavior that are typically associated with automated computer activity and stop it." How do New Restrictions Affect Social Media Reporting? Facebook is still the preferred and leading social media platform in the world. For companies that rely on AI to gather data, doing business just got a lot harder. Because relying solely on artificial intelligence and data crawlers to obtain necessary information is very limiting. It could lead to major holes in investigations, both legal or insurance-based. So, is this the end of businesses looking for vital data on Facebook? No. Because luckily, there are social media screening professionals who think outside the box to get you the results you need to obtain accurate information to mitigate risk, reduce fraud and enable better decision making. Why isn't Social Discovery Impacted by Facebook Scraping Restrictions? Not all social media screening companies are created equally. We at Social Discovery embrace technology in all of its glory, but our experts don't just rely on these tools to uncover data online. We understand that you can’t rely on AI alone to produce a complete and accurate social media report. AI technology is great for scouring vast amounts of data quickly, but when it comes to analyzing data in context – artificial intelligence fails miserably. That’s where the human element comes in. And that’s what we at Social Discovery like to call the other AI – Accurate Intelligence. The process involves various stages of analysis, including thorough human quality control from three Social Discovery employees at three levels of expertise. It's safe to say that nothing gets passed us, no matter which platform we search. Social Discovery Helps You Achieve Accurate Social Media Intelligence The Social Discovery point of difference is that we aren't hitting and hoping. Instead, we utilize a tested and proven method of AI combined with human intelligence, which yields no false positives. Our strategy is layered, making it utterly unaffected by the latest Facebook data scraping restrictions. The result? Complete, curated and actionable reports each and every time.
<urn:uuid:4aa06656-1ef9-44b2-a54b-75e304b3b269>
CC-MAIN-2022-33
http://blog.socialdiscoverycorp.com/how-facebooks-crackdown-on-data-scrapers-and-automated-surveillance-tools-will-affect-social-media-research-analytics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.931611
1,222
2.625
3
Why Rules Matter Remember those carefree days of childhood games? It involved nothing more than rounding up a bunch of guys, improvising a broom handle as a bat, and hitting a pink rubber ball on the local baseball diamond of a park or school playground. The game was appropriately dubbed Stickball. For young girls, balance and coordination were tested in a casual game of Hopscotch, Ping Pong, or backyard Badminton. In the gameplay of boys and girls, there was always the friendly game of Tag, in which one child is designated as ‘it’ and must chase down the other players in an attempt to tag another to be ‘it’ next. All these childhood games had one objective: FUN! Rules were as casual as the play itself, subject to change at the whim of the one who was losing, often resulting in ‘the end of the game’ and hurt feelings — until tomorrow! All well and suitable for children, but persons with a sincere interest in sports competition, and the challenge to improve upon personal athletic skills, as well as learning to work with the skills of their teammates and the opposing team — the first rule to being a competitive athlete is that of following the rules! Rules To Begin The Play Before we get to the actual rules for playing a game, it is essential to remember those BWF (Badminton World Federation) standards (rules) regarding court dimensions, equipment used, and type of team play are permitted. - Playing Court: Competitive badminton is usually played indoors on a court 44 feet in length and divided equally in half by a net that is 5 feet 1 inch from the ground at ends and five feet at the center. There is a parallel centerline dividing the court on double sidelines. The court width is 20 feet for doubles games and 17 feet for a singles game. The area 6 feet 6 inches from the net is called the short service line, while for a doubles game, the service line runs across the court 13 feet from the short service line. The end lines of a court mark the singles’ service line. - Equipment: There is minimal equipment needed to play badminton, but the ‘devil is in the details’ involving correct size and weight and material composition of the birdie, the racquet, and the net and needs to comply with BWF regulations. Do not neglect wearing suitable badminton shoes that will provide good grip when running, jumping, and turning on the playing court. Proper shoes offer a cushion for the feet. In conjunction with good badminton shoes, do not forget a thick pair of cotton socks that absorb sweat and prevent feet from slipping inside shoes. A cotton wristband keeps the sweat from flowing onto the racquet grip, and a headband will absorb sweat and keep hair from hanging in the eyes. - Types Of Team Play: Badminton can be played as men’s singles, women’s singles, men’s doubles, women’s doubles, and mixed doubles — each team a man and woman. Only when playing casually, can two females play against two males. Top Five Game Rules In accord to the Badminton World Federation, the top five rules to remember when beginning a badminton competition: - Coin Toss: The winner of a coin toss gets to choose whether they want to serve or receive the birdie first OR which side of the court they want to start on. - Serving: The serve needs to carry diagonally across the court to his or her opponent to be a good serve. All serves must be hit underhand, below the waist. A serve that hits the net or does not cross over the net must be done again. Should the server step on the court boundary lines, that is a ‘fault’ and provides the opportunity for the opponent to serve. The score will indicate where the server is to stand. If the score is an even number, O, 2, 4, etc., the server is to stand from the right-hand side of the court. When a score is an odd number, the server stands on the left-hand side of the court. When playing doubles, if the server wins consecutive points, then the server can switch the service area. - The Net: At no time during the game shall a player touch the net with a racquet or body, nor should a player reach over the net to hit the birdie. - Scoring: A badminton match is comprised of three games. A score of 21 wins a game, and the player or team that wins two of the three games wins the match. If both teams are 20 (both have 20 points), the team getting a 2-point lead wins the game. If the score is 29-all the first team to reach 30 first wins the game. - Some of the ways a point is scored: - On every successful serve that starts a rally. - When the opponent(s) cannot return the birdie over the net. - The birdie goes out of the boundaries of the court. - The birdie does not clear the net, or if a player hits the birdie - twice with the racquet. - Interval and Change Of Ends: When the score for one player reaches 11 points, players are given a 60-second interval ‘break’ to discuss strategy with the coaches, rehydrate, dry sweat with a towel, or change shirts. There is also a 2-minute interval between each game, and in the third game of the match, when 11 points are reached, players change ends, which means to switch sides. A referee, seated in a tall chair, oversees the match being played to ensure the BWF laws, regulations, and statutes are being upheld. An umpire is present to judge service faults and player faults and reports to the referee. The referee can override the call of the umpire. The umpire is also responsible for keeping track of the score, announcing it after each point in the game. The service judge is responsible for providing new shuttlecocks to players, as needed, during a game and to watch that serves are performed correctly. As the name indicates, the line judges judge whether the birdie falls in or out of the court boundary lines. Single competitions require six officials: a service judge, four-line judges, two on each side of the court, and an umpire. With doubles competition, an additional two-line judges are assigned and positioned at the doubles service line. If you’d like to learn more about badminton, be sure to join us at our YouTube channel, BadmintonJustin. You can learn more training drills, tips and tricks, or just watch good badminton! Thanks for reading!
<urn:uuid:5bed60d0-cace-4a42-92fe-06f0aa3f5897>
CC-MAIN-2022-33
https://badmintonjustin.com/badminton-info/rockin-n-ruling-in-competitive-badminton/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.952721
1,417
2.90625
3
ECOLOGICAL ANALYSIS OF GELAM (Melaleuca cajuputi) ON PEATLAND IN SOUTH KALIMANTAN Until now the raw material of wood especially Gelam (Melaleuca cajuputi) for supporting the construction of housing and other infrastructures is increasingly demand in Indonesia. On the Island of Borneo that partly consists of peat swamps needs Gelam very large and continuous, particularly for residential development. Ecological aspects are very important for supporting the silvicultural strategies. The aim of this study is to analyze ecological aspects which are very influence especially physical and chemical soil properties and microclimate as well. The utilization of study is to determine the silvicultural strategies for continuing production and conservation of Gelam in the future. The method was used a field survey around Gelam forest and did collecting samples and measuring there. The results showed in South Borneo the potency of Gelam is only 2,9-7,1 m3/ha and decreasing yearly. Normally Gelam with a diameter <4 cm have been cut down, as well as > 30 cm. Gelam can grow on the peat swamp forest where the soil was low pH 3.5-3.9. Most of pH of soil in these areas was influenced by phyrite (FeS2 of 0.4-2.2% and highest of Fe 90-302 ppm. C organic in the soil was included low-moderate 5.5-10.0%. Result of soil physic analysis showed composition of sand, dust, and clay of 9 : 54 : 57 % respectively. Temperature and humidity around peat swamp forest areas where was found Gelam were 31-33oC and 63-73% respectively. Most of areas around Gelam were grown Gelam Tikus (Syzygium inophylla) and some kind of shrubs. Key words: Gelam, potency, ecological aspects, silviculture
<urn:uuid:33b67878-ce63-4043-bad3-b31b0783bbf9>
CC-MAIN-2022-33
https://journal.ipb.ac.id/index.php/jsilvik/article/view/15654
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.961924
405
3.296875
3
NASA has recently discovered what they think is the most distant object to ever be observed. This object is actually a galaxy named MACS0647-JD and it’s so far away that normally we wouldn’t be able to see it, even with our best telescopes. So, how are we able to see it then? Well, we lucked out, we got a little help from a cluster of galaxies known as MACS J0647+7015. Large celestial objects like galaxies have such large gravitational influence that they can actually distort and bend light passing near them. In the case of MACS J0647+7015, NASA was able to use this gravitational distortion as kind of a deep space magnifying glass. This effect is what enabled NASA to capture the light of this distant galaxy. The light of MACS0647-JD has taken nearly 13.3 billion years to reach Earth. We are essentially looking at an object from the theorized beginning of the universe (the big bang). This amazing discovery actually gets me thinking about the distances between objects in space and how long it takes for light to travel between them. What if we could somehow instantaneously appear 65 million light years away from Earth, and what if we had a telescope with us that was capable of zooming in all the way to the Earth’s surface. Would we see dinosaurs walking the Earth? Theoretically, yes, we should. This raises some fun ideas about what’s possible in the universe. What if we just went a fraction of our first trip away from Earth? Perhaps we only go far enough away to witness the early beginnings of human civilization and maybe we could just get it all on video. This video would be our exact history, nothing unchanged or lost from our true story. How amazing would that be? Assuming that in our hypothetical world we can travel to almost any distance, we could actually watch the beginning of our solar system. We could know truly how the Moon was formed and perhaps even watch our solar system form, maybe even watch the Milky Way form. Of course we would need to somehow move our camera closer to the objects we are observing at a relatively quick rate in order to watch the creation of large objects like the Milky Way form in a reasonable amount of time, basically a galactic time lapse. Just a little food for thought. To see a full article on the new discovery, head over to the official NASA post.
<urn:uuid:453897ff-400b-42a4-9496-f5027fa1314c>
CC-MAIN-2022-33
https://www.geekwithenvy.com/tag/news/page/21/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.957277
499
4
4
In his recent address to a journal, Bill Gates addressed his concern regarding pandemic and climate change. The world could witness some significant breakthroughs like a vaccine to combat the coronavirus and several others. Coronavirus is one such global crisis that has shaken the world like anything. And, regarding this, Bill Gates has to say something. He thinks, and this is true as well, that coronavirus is awful, but climate change could be worse. He further added, this global crisis has forced people from all over the world to leave their homes to change their business, and worse, many have lost their lives. But, I feel climate change could have a worse impact on the world’s status quo. Yes, I agree that to think of a situation like that now in the contemporary world is quite challenging. It is the need of the hour because once nobody thought COVID-19 would bring such mass destruction to humanity. It is the human tendency to look out for solutions to the problems that demand immediate attention. And, it is also the right thing to do when the pain is as severe as COVID-19. But, it is the need of the hour to look at the other way around. Our mismanagement has evolved COVID-19, and we all are witnesses of the witness of it. It keeps these facts in mind if we look around and analyze the rising temperature, global warming, and abnormal seasonal changes. It hints us towards only one thing: the destruction it can bring along with it. “We need to bring this pandemic to a close” The only possible way to avoid the worst climate outcomes is to increase our efforts now, or it would be too late. Now that we are slowly and steadily moving ahead and controlling a novel coronavirus’s effects, we also need to act now to avoid climate change. We should be very attentive and predictive regarding the issues that we can witness in the future and act accordingly. To begin the process, we can start it by eliminating greenhouse gas emissions. There is this news in the air that the world will emit a lesser greenhouse effect because the economic activity has slowed down. It is good, but we cannot ignore the fact that it is situational, and we need to make this a priority to avoid climate change. The importance of the fight against climate change has been overstating. To put it in more simple words, it is not less than any year; we are still on the track to emit 92 percent as much of the carbon we emitted last year. It is not remarkable how much carbon emission will go down year but how low will it go because of the pandemic. To add on how can, we ignore the fact that this reduction is coming at the highest cost, and this is just not the viable solution to tackle it. There are a lot of things to be taken care of if we look into the data. There are things that we cannot afford to ignore. We have witnessed a lot of damage, and we are certainly not able to see more in recent times. The only possible way to combat any such tragedy is the cautious attention and revolutionary changes in our way of being. In simple, we could do the following things: Take full proof initiatives for developing countries. Anything and everything through which the world goes through impacts the impoverished and developing countries the most. We still do not know what shall be the exact amount of loss that shall be caused by COVID. But we know for sure that it shall hurt the developing countries. Therefore, it is of utmost importance that we take up the initiative and do something about it. Amidst all this, we cannot forget the impact of climate change it can bring. We all must be very reddy. Unlike the COVID-19 for which we would possibly be having a vaccine by next year, we must be very ready for any other problem. And, for this to happen, we shall have to start working now. As far as climate change needs are concerned, we cannot have a two-year plan. It can take even decades, so the hour’s need is to be very cautious because the situation is very alarming. Let science and innovations collectively lead the way. By now, we are quite sure that no matter how much we would help/. Ant, but we cannot stop the economy and cannot control the technology to advance. All we can do is bring out the necessary changes because only this would help.
<urn:uuid:f3eebc31-3fb1-4ed8-a48c-03d522bbbb38>
CC-MAIN-2022-33
https://www.infomance.com/bill-gates-warns-climate-change-is-dangerous-and-a-harder-problem-than-the-pandemic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.971168
925
2.71875
3
Radiation Exposure Status Definition - MilitaryDictionary.org radiation exposure status 1.) Criteria to assist the commander in measuring unit exposure to radiation based on total past cumulative dose, normally expressed in centigray. - also called RES In the United States, military vocabulary is standardized by the Department of Defence. These terms are used by the United States Army, Navy, Air Force, and Marine Corps. Term Classification: operations Department of Defence, Dictionary of Military and Associated Terms Term sourced from JP 3-11: Operations in Chemical, Biological, Radiological, and Nuclear Environments, updated October 2013 View source document This term is marked as active and was last updated in 2015 Random Military Term
<urn:uuid:f3583c93-6384-4659-b938-aee4280c27cd>
CC-MAIN-2022-33
https://www.militarydictionary.org/term/radiation-exposure-status
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.918026
154
2.828125
3
How did Charlotte Brontë create the character of Jane Eyre? Was Villette really based on a doomed love affair in Brussels? How much of the real author is in these novels? If you have read Charlotte Brontë’s books, you will have asked yourself these questions. The biography Charlotte Brontë: A Life by Claire Harman provides some fascinating answers. This is the first biography of Brontë I have read and I wish I had read it sooner. Harman tells the enthralling story of the family whose losses, grief, hardship, isolation and disappointments populate the novels of the three sisters – Charlotte, Emily and Anne. It is impossible to write about Charlotte without writing about the family, and particularly about Emily, Anne and brother Branwell. Everyone knows the headline facts about the Brontës – Haworth parsonage, mother and siblings dying, Branwell’s addiction, and the imaginary kingdoms of Angria and Dondal in which the children lose themselves. But Harman makes the history accessible, telling the life of Charlotte in chronological order starting briefly with her father Patrick. There are clear references to real life appearing in the novels and Harman casts light on the writing process of Charlotte and her sisters. For a novelist, this is required reading. Some of Charlotte’s experiences written about in letters appear directly in her novels, along with paragraphs lifted from journals and lines and passages lifted from works earlier abandoned. Harman extensively quotes Elizabeth Gaskell – who wrote the first biography of Charlotte Brontë published in 1857, based largely on Charlotte’ letters sent to her friend Ellen Nussey – and Charlotte’s correspondence with friends and her London publisher. It is a tragic story but Harman is never over-sentimental. She is excellent at pairing characters, incidents and emotions in the novels with Charlotte’s real life. A must read for any novelist who is a fan of the Brontë novels. BUY THE BOOK And if you’d like to tweet a link to THIS post, here’s my suggested tweet: CHARLOTTE BRONTË: A LIFE by Claire Harman #bookreview https://wp.me/p5gEM4-3Xi via @SandraDanby
<urn:uuid:e11f8beb-c15d-4d19-bc16-2bdbb157da8f>
CC-MAIN-2022-33
https://www.sandradanby.com/bookreview-charlotte-bronte-a-life-by-claire-harman-books-writerslife/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.926429
474
2.875
3
Nestled in the western foothills of Taiwan’s Central Range, Sun Moon Lake is a world unto itself, renowned for both its natural beauty and cultural heritage. Each day casts the lake in a different light, and every so often, some claim, the mountains that tower above it take the shape of two dragons fighting over a pearl. Although today Sun Moon is Taiwan’s largest alpine lake, the area was once home to two separate bodies of water. Back in the 1930s when Taiwan was a colony of Japan, the Japanese erected a dam on one of the lakes to generate hydroelectric power. The operation, over time, raised the water level to create Sun Moon Lake in its current form: round like the sun at its eastern end and curved like the crescent moon at its western end. Hugging the 35-kilometer shoreline is a pedestrian-bike path, in addition to a quiet two-lane highway. Misty mountains, lush growth and floating pontoon islands have landed this twisting trail on lists of the most scenic cycling trails in the world. Many a boardwalk extends out over the water, and boat tours depart every 30 minutes from three main piers. The village of Shueishe, about 70 minutes from Taichung, provides access to the lakeside path and road. Visitors can easily reach Shueishe by bus or taxi, and bicycles are available for rent near the visitor center. Shuttles regularly depart Shueishe for major destinations along the lake. A cable car runs from the base of the lake to the Formosan Aboriginal Culture Village, delighting riders with panoramic views of the lake and mountains. Part cultural village, part amusement park, the site pays homage to the scenic area’s aboriginal origins and features everything from traditional song and dance performances to a roller coaster. The Thao people were the first to inhabit the region, followed by the Han majority. Today both groups live in the area, each influencing the other while maintaining their separate identities. The Thao culture is strongly influenced by a regard for ancestors, and the tribe believes Lalu Island, in the middle of the lake, to be the home of their ancestral spirits. Multiple scenic hiking trails weave through the mountains past exotic flora and storied temples. Built into a hill on the north side, Wenwu Temple boasts sweeping vistas of the lake from its back terrace. Asia’s largest stone lions guard this Confucian temple, and sculpted shrubs decorate its gardens. Three hundred and sixty-six steps, nicknamed the “Stairway to Heaven” and representing the days of the year, ascend to the temple. Wind chimes inscribed with blessings dangle from the guardrails and glisten in the sunlight. Xuanzang Si, at the southern edge of the lake, shelters some of Asia’s most precious Buddhist relics, known as si-li-zi. These pebble-like crystals are believed by the devout to be the remains of Xuanzang, the Tang dynasty-era monk who made a 17-year journey to India to obtain Buddhist scripture. A separate shrine houses the gold-encased remains of a monk whose body, according to legend, refused to decay upon death. Half a mile down towards the lake is Xuangang Temple, known in particular for its delicious tea eggs, which are boiled in a mixture of soy sauce and tea leaves. A little farther to the east atop Shabalan Mountain towers Ci’en Pagoda, or “Pagoda of Filial Virtue.” Chiang Kai-shek, former president of the Republic of China for whom Sun Moon Lake was a cherished vacation spot, erected the monument in honor of his mother. In the spring season, the trail leading up to the pagoda ignites with fireflies. A climb to the top promises a magnificent view. Though host to over six million visitors every year, Sun Moon Lake nevertheless preserves pastoral qualities and a magic all its own.
<urn:uuid:5bf9ff5e-5378-4833-9c76-65e9bdee8d71>
CC-MAIN-2022-33
https://www.smithsonianmag.com/sponsored/sun-moon-lake-taiwan-180951633/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00088.warc.gz
en
0.938409
828
2.796875
3