text
stringlengths
176
646k
id
stringlengths
47
47
dump
stringclasses
8 values
url
stringlengths
14
2.25k
file_path
stringlengths
125
141
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
236k
score
float64
2.52
5.13
int_score
int64
3
5
In Milache village, off the trail towards the Annapurna base camp of Nepal, a group of friends have come together to set up a learning space with the local communities to encourage literacy among their children. The ABC idea was sparked by one trekker’s experience of being constantly asked for chocolates by the children. Concerned for their future, he and his friends hope to transform the young lives belonging to the lowest caste by inspiring them to value knowledge and develop a reading habit. Thus, a learning space has been set-up, where children will get their well-deserved treats when they read and learn. “My ABC in Annapurna” is a children’s book created to aid the teaching of basic English skills. It’s designed to be relevant to the everyday lives of the children in Milache – what they see, experience and come in contact with on a daily basis. The book is presented with lively colours, forms and textural effects to attract the children’s eyes. The uniqueness of this book’s concept lies in the formation of the sentences by using the first letter of the 26 alphabets. Visually, each letter is also fused with the graphic representation itself.
<urn:uuid:4ff78f51-3810-446a-bab6-d92064e802bc>
CC-MAIN-2022-33
https://3nitydesign.com/project_abc.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.96865
265
2.78125
3
The government has pumped $43 million into an initiative designed to really get under our skin — from a geological standpoint. The money is going into AuScope, a nonprofit company designed to help governments, universities, and research and science agencies collaborate in their efforts to better understand Australia’s natural resources. AuScope will allow smoother access to a knowledge database that will mined for further research, passed along to industry and educators, and used to inform government policy. One of the specific goals of Auscope will be to get a clearer picture of Australia’s subsurface, using core sample taken down to about 2km. AuScope’s National Virtual Core Library will try to answer the question: What are we sitting on? It also will work to turn up the dials on geospacial research, tapping into satellite imaging to learn about the continent and its seas from far above. If nothing else, we should get some nifty 3-D models and video out of this. But what AuScope is really about is collaboration. In speech last month at Parliament House, AuScope board chairman Linda Kristjanson referred to it as “the ‘so-what factor’ of our capability.” Krisjanson said AuScope’s infrastructure allows researchers an “integrated context” to study issues such as climate change, groundwater resources, mineral and energy resources, land use, natural hazards, and the secure disposal of hazardous and non-hazardous waste. Innovation Minister Kim Carr said: “AuScope has been embraced enthusiastically because it allows resources and data to be shared across sectors. It will open innovative commercial developments in geothermal energy production and carbon dioxide geosequestration. “No single researcher, research institution, discipline or jurisdiction can provide the solutions,” Carr said. “But AuScope will increase the chances and opportunities.” Image by AuScope
<urn:uuid:f3c5e23f-bd51-4f1c-8bda-b705066902ce>
CC-MAIN-2022-33
https://anthillonline.com/43-million-earth-sciences-collaboration-gets-under-australias-skin/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.92811
398
2.6875
3
Do you own a bicycle? Then you should know that your bike tires must be in pristine condition. The pressure in your tires must be perfect for your bike to give you a smooth ride. If you have a tire with an inner tube and it becomes flat, it becomes unsafe. At a minimum, it is harder to pedal. You need to check your tires regularly and repair anything that needs it. At some point, you might need to remove your tire’s Presta valve core to repair it. But do you know how to remove Presta valve core? Read the rest of this article to find out how to take the Presta valve core out and put it back in. What is a Presta Valve Core? You need to understand the different parts of your bicycle if you intend to repair it yourself. That means you need to learn what a Presta valve core is before you try removing it from your tires. The Presta valve is a common valve type found in the inner tubes of some mountain bikes and most road bicycles with high-pressure tires. It’s made of an inside valve body and an outer valve stem. There may also be a lock nut in the valve so that the stem is secure at the wheel rim, and a valve cap to prevent leaking. But what does a Presta valve do? Presta valves allow for high air pressure while requiring a small hole in the wheel rim. This makes them ideal for road bikes, which need to be light and thin with tall tires. You can buy different lengths of this valve to suit your wheel rims. For now, let’s talk about how to take a valve core out of your tire. How to Remove Presta Valve Core? Now that you have learned about Presta valves, you can learn how to remove them. Follow the guide below to remove a Presta valve safely. Get the Right Equipment A Presta valve core is a tiny part of the valve that resides inside the tire valve of your bicycle. It helps pump air in or out of the bicycle tire swiftly and securely. If your tire is not inflating, the valve may be the problem. Before you start, gather the correct equipment. First, try using the Presta valve core remover tool that came with your bicycle. If your bike did not come with a valve core removal tool, or if you have lost it, you should be able to get a new one from most bike stores. You may need other tools if you don’t have the one which came with the bike. You can remove the Presta valve core using certain types of equipment. For instance, you can get any chain tool that you may have lying around your garage to remove the Presta valve core. Many people have found it hard to remove the valve core that way, but it can still work. People who have issues using a chain tool can use any small part tool or pliers. Just be sure that you got the correct tools for your bike! When you’re done gathering your tools, it’s time for you to get to work. Remove the Air from the Bike Tire Once you have your equipment, the next step is to release the air inside the bike tire. Many professionals say that you need to let the air out of the tire before removing the Presta core for a more secure process. While air is still escaping, rotate your Presta valve in the polar direction, or to the left so that it opens easily. After this, apply pressure on the top of the valve core so that air can come out of the bike tire. Touch the tip of your Presta core and keep applying pressure so that air comes out easily. Continue until the tire is completely deflated. Don’t apply too much pressure when letting the air out. Putting too much pressure on the valve core can easily damage it. Be patient. Don’t forget to close the tip of your valve when you’re done releasing the air inside the tire. Twist the Presta core clockwise or to the right to lock the valve core’s tip. Tighten the tip using pliers. Now, it’s time to move on to the next step: unlock the lock nut. Get the Lock Nut Off The next thing you’ll need to do is get the lock nut to unlock. Some Presta valve cores do not have this lock, but you can easily see the lock without having to fish it out on the ones that have it. You can skip on to the next step if your Presta valve core doesn’t have a lock nut on the outside of it. However, if your Presta valve core does indeed come with a lock nut, then you need to add this step and disconnect it. To remove the round lock nut, twist the lock nut until it comes off in your hands. No tools are required; this can be done by hand. Get Your Bike’s Valve Core Attached to the Tool After you’ve got the lock nut out of your way, you need to connect the tool to the valve core of your bike. Before you start using this tool, see if the tool has a small or a large part that’ll fit right into the core. To connect the tool to the valve, make the bike tire stand up straight. Put one hand on the tire’s valve core, and insert your tool with the other. After doing this, go immediately into the following step, which is much easier. Twist the Valve Core This is the easiest step of all. Twist the entirety of the valve core gently. Keep twisting till the valve comes off. How Do You Install a Presta Valve Core? Installing a Presta valve core is a straightforward process. It’s the opposite of removing a valve core. Start by reversing the same process you used on removing the Presta valve core. Rotate the valve core clockwise instead of counterclockwise. Keep twisting the valve core until it’s tight enough. Then use pliers to secure the valve core. That’s it! Now you know how to install the Presta valve core after removing it. Why Should You Regularly Check and Replace Tubeless Valve Cores? Whether you use a Schrader valve or a Presta valve, the goal of a valve core is to maintain pressure inside the tube of the tire so that you get the right traction and ride as smoothly as possible. The valve core of your tire controls the pressure, and the recommended pressure may vary depending on the kind of tire. Even though you might think that a valve core is too small to matter, it’s an essential part of the bike! Just like other parts of a bicycle need regular maintenance and repairs, a valve core needs to be checked regularly and needs to be replaced if it somehow gets damaged. You might need a new tube as well. This is particularly risky if you like mountain bikes. Specifically, riding on any mountain trails, even with an entry-level mountain bike, you might need to replace the valve core as it’s susceptible to getting damaged. If you get a flat tire, look at the valve core of your bicycle. However, it’s not obligatory to check the valve when you get a flat tire. Sometimes, your tire might get small leaks that you do not notice at first. If you ignore these leaks, they may continue letting the air out of your tire and start damaging the inner tube. If your destination is far away, this can be disastrous for you and your bicycle. Use any kind of tire sealant on the leaks to avoid letting out any more air. There’s an easy way to check if your valve core is intact using soap and water. Submerge your tire in soapy water. If there are bubbles, you’ve got leaks, and the core must be replaced. Remember, not every valve core is removable. Check if you’re getting a bike with removable valve cores or not before you purchase a bicycle, and always do routine maintenance on your valve core. Frequently Asked Questions Why Should I Use a Removable Valve Core? You should use a removable valve core so that you can maintain it. The thing with bicycles is that the parts might get damaged. Eventually, the valve core gets damaged as well. When your valve core gets damaged, and you need to replace it, it’ll be easier with a removable valve core. Can I Use a Cheap Valve Core in My Tubeless System? Simple answer is “yes.” You can use a cheap, generic valve core if you have a tubeless system. Why waste money on expensive valve cores when you can get the cheap ones from any bike shop? Does My Presta Valve Core Need to Be Tight? A Presta valve core should be tight. There is nothing called a valve torque. Simply tighten the Presta valve core until it’s completely secure. How Important Is the Size Of My Presta Valve? The size of a Presta valve core can be very important. Although there isn’t a difference in the diameter of most Presta valve cores, the length can be different. This length depends on the wheel where the valve is mounted. Why is My Presta Valve Coming Out? The core of your Presta valve may come out because of the thread. If the thread of your valve isn’t tight enough or has worn out, then the core of your Presta valve may come out repeatedly. At this point, you may need a new valve, if not a new tire. Removing a valve core is an easy, straightforward job. It’s very important to maintain the correct pressure in your bike tires. So how to remove Presta valve core when you need to work on it? Just follow the simple steps in this article, and you’re good to go. It should only take you a couple of minutes to finish removing the valve core from your tire. Now that you know how to do it, check your bike tires regularly!
<urn:uuid:2dfdf3e1-0282-46ff-9776-2206219f3bb3>
CC-MAIN-2022-33
https://bikesmarts.com/how-to-remove-presta-valve-core/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.926929
2,117
2.59375
3
- Research article - Open Access Identification and characterization of microRNAs in Phaseolus vulgaris by high-throughput sequencing BMC Genomics volume 13, Article number: 83 (2012) MicroRNAs (miRNAs) are endogenously encoded small RNAs that post-transcriptionally regulate gene expression. MiRNAs play essential roles in almost all plant biological processes. Currently, few miRNAs have been identified in the model food legume Phaseolus vulgaris (common bean). Recent advances in next generation sequencing technologies have allowed the identification of conserved and novel miRNAs in many plant species. Here, we used Illumina's sequencing by synthesis (SBS) technology to identify and characterize the miRNA population of Phaseolus vulgaris. Small RNA libraries were generated from roots, flowers, leaves, and seedlings of P. vulgaris. Based on similarity to previously reported plant miRNAs,114 miRNAs belonging to 33 conserved miRNA families were identified. Stem-loop precursors and target gene sequences for several conserved common bean miRNAs were determined from publicly available databases. Less conserved miRNA families and species-specific common bean miRNA isoforms were also characterized. Moreover, novel miRNAs based on the small RNAs were found and their potential precursors were predicted. In addition, new target candidates for novel and conserved miRNAs were proposed. Finally, we studied organ-specific miRNA family expression levels through miRNA read frequencies. This work represents the first massive-scale RNA sequencing study performed in Phaseolus vulgaris to identify and characterize its miRNA population. It significantly increases the number of miRNAs, precursors, and targets identified in this agronomically important species. The miRNA expression analysis provides a foundation for understanding common bean miRNA organ-specific expression patterns. The present study offers an expanded picture of P. vulgaris miRNAs in relation to those of other legumes. Small non-coding RNAs (sncRNAs) have been recognized as an important class of gene expression regulators. MicroRNAs (miRNAs) are ~21 nucleotide (nt) sncRNAs that regulate a multitude of biological processes in plants, including development, metabolism, stress responses, defense against pathogens, and maintenance of genome integrity . MiRNAs direct cleavage or translational inhibition of a specific messenger RNA (mRNA) based on base-pairing complementarity between the miRNA and the target mRNA. MiRNAs are derived from imperfectly matched stem-loop structures that are formed from single-stranded primary miRNA transcripts (pri-miRNAs). MiRNA genes are RNA polymerase II transcription units that give rise to pri-miRNAs . Pri-miRNAs are preferentially processed in the nucleus by an RNaseIII-type enzyme DICER-LIKE1 (DCL1) to release the precursor miRNAs (pre-miRNAs) . Most plant pre-miRNAs produce a single miRNA/miRNA* duplex; the exceptions are some miR159 and miR319 loci . These small RNA duplexes are subsequently 2'-O-methylated by the nuclear HUA ENHANCER 1 (HEN1) protein, preventing miRNA turnover, and are exported to the cytoplasm by the plant homolog of exportin-5 HASTY (HST) [5–7]. Finally, one of the strands of each duplex is incorporated into the RNA-Induced Silencing Complex (RISC) to guide gene silencing . RISCs contain a member of the ARGONAUTE (AGO) protein family to direct the endonucleolytic cleavage of target RNAs. AGO1 is the predominant carrier of plant miRNAs . Thus, miRNAs are used by RISCs as templates for recognizing complementary mRNA to regulate gene expression. Since the first plant miRNAs were reported in Arabidopsis thaliana in 2002, there has been an exponential growth of identified miRNAs in a diverse number of plant species . The miRNA database miRBase (release 16, Sept 2010) contains 15,172 microRNA loci from 142 species. Plant miRNA loci belonging to 43 species correspond to 22.4% of the total mature miRNA entries. The plant species with the most miRNA loci identified are Oryza sativa, Medicago truncatula, Arabidopsis thaliana, Physcomitrella patens, Glycine max, Sorghum bicolor, Populus trichocarpa, and Zea mays. These 8 widely studied plant model species contribute 65.8% of the plant mature miRNA entries. On the other hand, 15 plant species, including Phaseolus vulgaris, have fewer than 10 reported miRNA loci in miRBase. Identification of P. vulgaris microRNAs was first performed using an in silico approach . The eight miRNA loci reported for P. vulgaris in miRBase were identified by Arenas-Huertero et al. (2009) in different organs and growth conditions, although the first mature miRNA sequence ever cloned and characterized for P. vulgaris was pvu-miR399a . This group of eight miRNAs in miRBase comprises miR2118, miR159a, miR1514a, miR482, miR2119, miR166a, miR319c, and miR399a. Besides these miRNAs and their stem-loop precursors, another 19 mature miRNA sequences have been identified . In addition, Valdés-López et al. (2010) analyzed the expression of 68 miRNAs under several abiotic stress conditions in leaves, roots and nodules of P. vulgaris based on a hybridization approach using miRNA macroarrays. The macroarrays contained probes for 9 miRNAs previously reported for common bean, 24 conserved miRNAs also identified in other legumes and 35 miRNAs found in soybean [11, 13, 14]. The first studies to identify plant miRNAs employed the traditional Sanger sequencing method. This was also the case for the study performed by Arenas-Huertero et al. (2009) to identify miRNA sequences in Phaseolus vulgaris. Despite the Sanger sequencing method's usefulness and importance in scientific research, it has several limitations with regard to miRNA identification [15, 16]. For example, low-abundance miRNAs, such as many non-conserved miRNAs, are inefficiently detected by this small-scale sequencing method. Introduction of high-throughput next-generation sequencing (NGS) technologies has increased the number of miRNAs identified by allowing small RNA population analysis on a massive scale (RNA-seq). Deep-sequencing technologies have identified a larger number of novel miRNAs due to their ability to generate millions of reads with a determined length . Moreover, the population of short sequence reads produced allows the identification of differential processing of stem-loop precursors by DICER-LIKE1, and mature miRNA isoforms within and between species. Likewise, relative abundance associated with small RNAs estimated by these technologies has permitted a higher level of confidence for miRNA annotation. Legumes such as common bean are valuable crops for worldwide consumption because they are rich in protein and constitute a high calorie food source. Involvement of miRNAs in biological processes like nutrient balance, development, reproduction and plant-microbe interaction, makes its research crucial for improvement of staple crops. Up to now, identification and characterization of Phaseolus vulgaris miRNAs have been very limited. In this study, Illumina's sequencing by synthesis (SBS) technology was used to examine conserved, novel and species-specific common bean miRNAs comprehensively based on small RNA libraries generated from leaves, roots, seedlings and flowers. A detailed analysis of mature, mature-star (the complementary strand of the mature miRNA), isoforms and novel common bean miRNAs found in different organs is reported. Stem-loop precursors and target sequences for several common bean miRNAs were also determined from public databases. Overall, this work serves to extend our knowledge of the common bean miRNA population and to spotlight new miRNA variants found in different organs. It facilitates comparisons between common bean miRNAs and those found in other legumes and plants. Small RNA sequencing analysis In order to identify novel and conserved miRNAs in common bean, we generated four small RNA libraries from leaves (LL), roots (RL), seedlings (SL) and flowers (FL) using the Genome Analyzer II and the Illumina Cluster Station (Illumina Inc, USA). Small RNA sequencing yielded more than eighty million raw sequence reads (Table 1). After removing low-quality sequences, adapters, and small sequences (< 16 nt long), 79.5% of the raw reads were left. These remaining sequences represent 3,372,753 (LL), 4,187,414 (RL), 4,015,702 (SL), and 3,453,543 (FL) unique sequence tags. The small RNA length distribution (16-30 nt) of each library showed that the most abundant and diverse species were those 21-24 nt in length, a typical size range for Dicer-derived products (Figure 1). The 24 nt class was the most diverse in all four libraries, followed by the 21 nt class, which was the second most abundant class in the LL library (20%), and the third most abundant class in the SL (13.4%), RL (8%), and FL (10.8%) libraries. Filtering sequences for removal of non-coding RNAs such as tRNA, rRNA, snoRNA or snRNA was performed using the RNA families database Rfam because of the limited availability of P. vulgaris genome sequences. After removing miRNA sequences from Rfam, the remainder of the database (Rfam 10.0) was used to eliminate fragments corresponding to non-coding RNAs. Alignment against the four small RNA libraries was carried out using BLASTN and only perfect matches were removed from the libraries (Table 1). Identification of conserved miRNAs To identify conserved miRNAs in the common bean small RNA libraries, unique mature plant miRNA sequences were extracted from miRBase (Release 16). BLASTN and SSAHA2 (Sequence Search and Alignment by Hashing Algorithm) tools were used separately for alignment of small RNA datasets against mature miRNA sequences in search of previously reported miRNAs with exactly the same size and nucleotide composition [18, 19]. Both alignment tools found the same number of hits. MiRNAs that were detected in just one library or that totalled fewer than 15 absolute appearances in all libraries combined were removed (Additional file 1). In total, 109 conserved miRNAs (Table 2) belonging to 29 families were identified in common bean. Fourteen of the conserved miRNAs were mature-star miRNAs (Table 3). Ten were detected in just two libraries, twenty five in three libraries, and seventy four in all four libraries. Twenty five of the families detected are highly conserved among plant species (Figure 2). Nine conserved families identified in common bean, including miR156, miR159, miR319, miR160, miR166, miR171, miR408, miR390 and miR395, were present in the common ancestor of all embryophytes . Additionally, the miR396 family identified in all tracheophytes, and a pair of miRNA families detected in seed plants, miR397 and miR398, were present in P. vulgaris. Another nine identified are present in all angiosperm lineages: miR162, miR164, miR167, miR168, miR169, miR172, miR393, miR394, and miR399. The miR2111 family, which has been identified only in eudicot species, and the miR2118 family which has been found in monocots and in Fabaceae, were also identified in common bean. Finally, among the deeply conserved miRNA families detected, miR157, closely related to miR156, is present in Brassicaceae, Solanaceae, Malvaceae and Fabaceae. Four other, less conserved miRNA families that were identified have been reported mainly in legumes, specifically in Glycine max. This is the case for miR1511, which had been previously detected only in soybean, although recent P. vulgaris miRNA studies pointed out its presence in common bean [13, 14, 21, 22]. Here, it was confirmed that soybean and common bean share exactly the same sequence for this miRNA and that it is one of the most abundant miRNAs in these legumes (Table 2). The miR1514 and miR2119 families have been reported exclusively in legumes such as Glycine max, Medicago truncatula and Phaseolus vulgaris. Surprisingly, miR1515 was reported only in two species: G. max and Citrus Sinensis. The P. vulgaris miRNAs with the most reads in all four libraries (ath-miR159a, mtr-miR319, ath-miR156a, ath-miR166a, zma-miR166c*, ath-miR396a, osa-miR167d, pvu-miR2118 and ath-miR167d) generally corresponded to the most abundant miRNAs detected in legumes like M. truncatula, G. max, and in other plants like Vitis vinifera[23–25]. It is worth noting that among these ten most abundant miRNAs there is a mature-star miRNA gma-miR166a-5p that has also been highly detected by both deep sequencing and microarray expression analysis in the shoot apical meristem (SAM) of soybean . Also, it has been demonstrated that gma-miR166a and its mature-star miRNA have different expression patterns in the SAM, suggesting that they may play different roles in regulating leaf development . The high number of reads detected for other mature-star sequences found in this study may also imply particular regulatory roles of gene expression conditioned by these small RNAs since inhibitory activity of mature-star species has been reported in animals and plants (Table 3) [27, 28]. The miRNA families comprising the most miRNAs in common bean are miR156, miR159, miR166, miR167, miR169, miR319 and miR396. These highly conserved families, which generally have the most abundant miRNAs, have variable numbers of loci among the model legumes G. max and M. truncatula (Table 4) (miRBase, release 16). According to mature miRNA sequence differences, the predicted numbers of loci for P. vulgaris miRNA families have a higher Pearson's correlation coefficient with the numbers of loci reported for soybean (0.78) than with those identified in M. truncatula (0.21). Identification of miRNA isoforms Small non-coding RNAs such as microRNAs were initially thought to have a specific sequence of a defined length. Identification of more miRNAs from different species has revealed that there is variation in pre-miRNA processing. The miRBase (release16) dataset for plant miRNAs consists of small sequences of 17 (.08%), 18 (.13%), 19 (.88%), 20 (9.96%), 21 (67.06%), 22 (13.85%), 23 (1.10%), and 24 (6.91%) nucleotides in length. Ebhardt et al. (2010) demonstrated that a fifth of the annotated Arabidopsis thaliana miRNAs (miRBase, release 14) have a stable miRNA isoform of one or two nucleotides longer . Also, several studies have revealed that the biological function of miRNA isoforms may differ from the function of their previously reported miRNAs due to differential associations with AGO proteins [30, 31]. The legumes M. truncatula and G. max, which account for the majority of entries for the Fabaceae family in miRBase, present mature miRNA sequences ranging from 20-22 and 19-24 nucleotides in length, respectively. With the aim of identifying P. vulgaris miRNA length isoforms and species-specific miRNA variants, all small RNA sequences remaining from previous analyses were aligned against miRBase, allowing at most two mismatches and/or two nucleotides in length difference. The total number of variants found for each library (Table 1) was subjected to a filter that consisted of choosing variants that had a total number of reads 50% greater than the number of total reads of their reference miRNA previously reported, so that low-abundance and probable non-functional variants were discarded. MiRNA isoforms were classified as length variants, non-conserved miRNA variants, or conserved miRNA variants (Table 5). Seven variants based only on length were detected. In all four P. vulgaris libraries, the 21-nt variant of gma-miR1511 is clearly predominant. In the case of the variant for gso-miR482a, it was highly expressed in the flower (FL) and root (RL) libraries. Unexpectedly, a variant for miRNA mtr-miR171c, a miRNA that was absent in all libraries, was detected mainly in flower. The high abundance of pvu-miR482* in common bean compared with other plant species was previously corroborated by northern blot . As Table 5 shows, the high number of reads detected for this mature-star miRNA in all organs was produced by the 21-nt variant and not by the one reported in miRBase. As mentioned before, some miR159 and miR319 loci produce two miRNA/miRNA* duplexes. This was the case for the P. vulgaris miR159a stem-loop. The variant for pvu-miR159a.2 that is found closer to the loop is mainly a 19 nt miRNA, and its number of reads does not equate to the abundance of pvu-miR159a.1. The length variant gma-miR4376 increases the number of P. vulgaris miRNA families identified in this study because of its high number of reads. The miR4376 family had been identified only in soybean (Figure 2), and was registered in miRBase as a 22 nt miRNA . The group of non-conserved miRNA variants contains nine variants from eight non-conserved miRNA families (Table 5). Considering the number of reads and that mature-miRNA homologs may present one or two mismatches, another three common bean miRNA families were identified: miR1510, miR479, and miR2199. For the miR1510 family, two variants were identified that can be produced from the same locus. This family has been reported only in soybean and M. truncatula, and was proposed to be conserved in common bean due to a 20 nt isoform [13, 14, 23]. The variant of csi-miR479, a miRNA detected in Citrus sinensis, Vitis vinifera, Populus trichocarpa and Gossypium hirsutum was particularly abundant in roots [25, 32–34]. Interestingly, in this study two variants with the same length were detected for mtr-miR2199, one that was detected in all four libraries (A17 > G) and the other (C12 > T) expressed mostly in roots. A previous study in M. truncatula where this family was detected, reported the mature miRNA as the variant A17 > G and the genome derived-hairpin as A17, which accounts for its annotation in miRBase with an adenine in position 17 . The miRNA sequence conserved in Lotus japonicus was the variant A17 > G also found in P. vulgaris. The ten miRNA variants classified in the conserved miRNA variants group constitute candidates for new miRNAs of previously identified miRNA families (Table 5). The miRNA candidates with the most reads were the variants of osa-miR156l, csi-miR393, sly-miR171c, and mtr-miR169p. Identification of stem-loop precursors Plants have a more diverse population of sncRNAs than do animals mainly because of particular RNA polymerases. A criterion that supports miRNA annotation is the identification of a stem-loop precursor from which the duplex of miRNA/miRNA* is excised. A search for potential miRNA precursors involves secondary structure prediction analysis of genomic DNA or EST (Expressed Sequence Tag) sequences that match perfectly with determined miRNAs. Although plant miRNA stem-loops are more variable in length and structure than are animal pre-miRNAs, several characteristics are conserved among plant precursors. To identify common bean stem-loop precursors, miRNAs from Table 2, Table 3, Additional file 1, and Table 5 were aligned against all P. vulgaris ESTs and GSSs (Genomic Survey Sequences) from NCBI in search of perfect alignments. EST and GSS candidates were subjected to secondary structure prediction analysis using the mfold program with its default parameters . Only the lowest energy structures were selected as described by Reinhart et al. (2002). Secondary structure prediction analysis of P. vulgaris sequences resulted in the identification of eleven new stem-loop precursors belonging to eight conserved miRNA families (Figure 3 for an example and Additional file 2 for complete set). The precursor for the miR171 family was the precursor for the variant of ctr-miR171 (pvu-isomiR171c). The other miRNA families with a precursor identified were: miR166, miR167, miR156, miR157, miR398, miR408, and miR168. Taking into account previously reported P. vulgaris precursors, a total of 39 miRNAs can be predicted by the processing of common bean precursors, including pvu-isomiR171c (Additional file 2) . The miRNAs ath-miR319c, osa-miR156k, gma-miR156f, ath-miR398a, and gma-miR482a-3p, discarded because they appeared in just one library or gave rise to fewer than 15 reads in all libraries, aligned perfectly with their respective precursors. Pvu-miR482*, aly-miR168a* and gma-miR166a-5p were also found in the precursor sequences. Therefore, common bean isoforms pvu-isomiR159a and pvu-isomiR482* were most likely derived also from these precursors. Identification of novel microRNAs From previous analyses, P. vulgaris miRNAs identical to those already present in miRBase or close homologs were identified. Numerous studies have described novel miRNAs in several plant species based on small RNA high-throughput sequencing results. However, this analysis is usually performed based on a reference genome that allows for mapping of a given small RNA to a genomic location and retrieval of adjoining sequence to help with secondary structure prediction of a miRNA precursor. In the present study, the sequencing reads remaining after removing known miRNAs were employed to scan the collection of ESTs and genomic sequences available from NCBI and PlantGDB in search of potential miRNAs using the miRDeep software . This program searches for those small RNAs present in the sequencing reads that can be mapped to a given reference sequence. Selected sequences are searched for their potential RNA secondary structure to identify those that can be folded as hairpin structures typical of plant miRNA precursors. Additionally, the mapped small RNAs should be located in the stem region of the folded RNA, and a higher probability score is awarded to a given candidate if there are sequencing reads corresponding to the predicted miRNA* region. The analysis for identification of novel miRNAs was carried out with 95030, 74759, 87956 and 65741 unique sequences from the leaf, root, seedling and flower small RNA libraries, respectively, and a total of 124894 ESTs and genomic sequences. A total of 29 candidates for new miRNA precursors were identified (Figure 4 for examples and Additional file 3 for complete set of candidate miRNAs). Four of the candidate precursors included reads for a mature miRNA and a putative miRNA* and the other 25 had only reads consistent with the predicted mature miRNA. The small number of ESTs and amount of genomic data available for P. vulgaris limits the number of candidates recovered by this analysis. The forthcoming availability of a complete genome should reveal a more comprehensive picture of the miRNA genes present in the common bean genome. Identification of miRNA targets in the genus Phaseolus Plant miRNAs typically have higher sequence complementarity with their target mRNAs compared with miRNA-target interactions in animals . MiRNA target prediction in plants is based on this high degree of complementarity between miRNAs and targets . Many plant miRNA:mRNA duplexes exhibit paired nucleotides in the microRNA 5' region. However, some conserved plant miRNA-target interactions with unpaired nucleotides in the 'seed' region have been identified, for instance miR398a-CSD2 and miR396a-GRL7/GRL8/GRL9 in A. thaliana. In this study, the RNAhybrid program as described by Alves et al. (2009) for prediction of Phaseolus miRNA targets was used (See methods) . RNAhybrid predicts the energetically most favorable miRNA:mRNA hybrids according to user preferences . All Phaseolus ESTs (NCBI) were evaluated as targets of miRNAs from Table 2, Table 3, and Table 5. Identification analysis for P. vulgaris miR390 non-coding transcript target TAS3 was done separately (See methods) . Once miRNA:mRNA hybrids were obtained, ESTs were aligned against plant sequences of the UniProt Knowledgebase (UniProtKB) (release 2011_01) using BLASTX for annotation. Target prediction analysis identified 194 ESTs annotated as established target gene families in plants (Additional file 4). Thirty seven ESTs were previously reported by Arenas-Huertero et al. (2009) and most are ESTs with small minimum free energies (MFEs) (data not shown). The conserved miRNA families for which conserved targets were found are: miR156/miR157, miR160, miR164, miR167, miR168, miR169, miR171, miR172, miR319, miR393, miR395, miR397, miR398 and miR408. The number of ESTs found for each gene family are: SBP(7), ARF(18), NAC(1), AGO1(1), NFY(14), SCL(2), AP2(8), TCP(6), TIR/F-box-AFB(5), ATP sulfurylases(14), Laccases(1), COX/SOD(66) and Plastocyanins(11). The miR156 and miR157 families share the same target EST sequences for Squamosa Binding Proteins (SBP). The MFEs for the conserved miRNA:mRNA hybrids range from -35.0 to -51.2 kcal/mol. Finally, among conserved miRNA targets, three ESTs homologous to AtTAS3, a target of miR390 family were identified (Additional file 4). In addition, 325 ESTs as putative targets for P. vulgaris conserved miRNAs, mature-star sequences and miRNA isoforms were identified (Additional file 5). Target prediction analysis for novel candidate miRNAs generated candidate targets for ten novel miRNAs represented by 177 ESTs (Additional file 6). Organ-specific expression of P. vulgaris miRNA families Specific miRNA expression patterns are proposed to be a consequence of tissue-specific, cell-specific and/or stress-specific regulatory elements in promoters of plant microRNA (MIRNA) genes [43–45]. The expression of some conserved MIRNA genes and the relative abundance patterns of mature miRNAs in different organs or in different developmental stages are essential for proper cell differentiation and organ developmental regulation. Modification of MIRNA gene expression leads to severe developmental defects. Understanding expression patterns of microRNAs in plant organs is necessary to discern miRNA-mediated regulatory pathways. The frequency of miRNAs detected by high throughout sequencing methods serves for relative miRNA expression estimation . Moldovan et al. (2009), comparing Arabidopsis root miRNA frequencies against leaf and whole plant reads represented in the Arabidopsis Small RNA Project database (ASRP), found that most miRNA families have organ-specific expression [47, 48]. To explore organ-specific miRNA expression in Phaseolus vulgaris, the open-source R/Bioconductor software package DESeq was employed [49, 50]. The DESeq package, supported by a model based on negative binomial distribution, estimates variance-mean dependence in count data from high-throughput sequencing assays and tests for differential expression. The miRanalyzer tool bases its differential expression module on the DESeq package and has been used to test for miRNA differential expression [51, 52]. To explore organ-specific expression for miRNA families as a whole, frequencies for miRNAs of the same family were pooled together for each library and employed as input data. The five miRNAs that aligned perfectly with precursor sequences and were discarded because they appeared in just one library or totalled fewer than 15 reads in all libraries, as well as those newly identified from the isoform analysis, were also considered. Mature-star miRNAs were discarded. Count data was transformed with the DESeq package and hierarchical cluster analysis (HCA) was performed (Figure 5, see methods). MiRNA families were clustered in two major groups: the group with fewer miRNAs consists of miRNA families that were abundantly expressed in all four libraries, and the other group contains miRNA families with differential expression patterns among organs. The accumulation patterns of miRNA families in leaf and root organs were more similar to each other than to the other two samples. The most abundant families of the analysis, especially in seedlings, were miR159, miR319, miR396, miR166, miR408, and miR482. The miR159 family has previously been reported as an abundant and widespread family in all plant organs. It is important to mention that the expression of miR319 was abundant in all organs except for leaf (Figure 5). Similar to miR319, in this study miR396 was less abundant in leaf than in the other three organs. Other quite abundant miRNA families were: miR1510, miR164, miR167, miR169, miR157 and miR156. Interestingly miR1510, a miRNA family detected only in legumes, was found in all four libraries. In the group of families with a particular expression pattern, miR2119, miR2111, and miR479 were highly accumulated specifically in one organ. MiR2119 was detected especially in roots. This expression pattern correlates with previous northern blot analysis of roots, leaves, immature embryos and dry embryos from P. vulgaris. Expression of miR2111 was observed mainly in roots and miR399 was only slightly expressed in leaves. Both miRNAs are induced under phosphorus (P) limiting conditions [12, 53]. The miR479 family was preferentially expressed in seedlings. On the other hand, there were some interesting families that were poorly expressed in one particular organ. For example, miR168 was poorly expressed in seedlings, miR1515 in leaves, miR2199 in roots, miR394 in leaves, miR4375 in roots, and miR397 in flowers. Finally, HCA showed that miR395 was poorly expressed in all four small RNA libraries, consistent with its induction upon low sulphate conditions . Identification of microRNAs in species with or without fully sequenced genomes has been revolutionized by high-throughput sequencing methods. High-throughput sequencing miRNA analysis in Phaseolus vulgaris will facilitate more particular and specific bean miRNA studies as well as legume sncRNAs research in this rapidly growing field. Although deep-sequencing experiments have become the major source supporting microRNA annotations, technical variations, transcript length bias and mapping bias have been reported with this approach for transcriptome analysis of coding RNAs (mRNAs) [17, 55, 56]. Studies to elucidate the number of miRNA molecules sequenced from a small RNA library are still needed for more accurate small RNA profiling studies. In terms of reads, the small RNA libraries sequenced here yielded a larger number of total raw reads to work with than did many other studies in which plant miRNAs have been identified; however, the total number of reads of identified miRNAs, including non-abundant and miRNA isoforms, constitutes only 0.047% of total raw reads. Further studies are needed to understand to what extent the 24-nt class representing siRNA populations, usually the most abundant and diverse class of sncRNAs sequenced in small RNA libraries, masks miRNA populations. Also, coverage analyses with fully sequenced genomes are needed to elucidate sequenced sample proportions of small non-coding RNAs such as tRNA, rRNA, snoRNA or snRNA. Most miRNA families identified in this study in P. vulgaris are evolutionarily conserved in Fabaceae, particularly in the best-studied plants M. truncatula and G. max. MiRNA family miR157 has not been reported in these two legumes, probably because of the similarity of its sequence to that of miR156. Other miRNA families not reported in miRBase in G. max and M. truncatula are miR397 and miR408. The only Fabaceae where miR408 has been previously found was Arachis hypogaea. One miRNA of the bean miR397 family with the same sequence as ath-miR397 was detected herein with 7416 reads in total, so it is likely to be present in other legumes as well. MicroRNA miR2199 has been reported in miRBase only for M. truncatula and the variant found here for this miRNA in all four libraries of P. vulgaris was previously reported as miRS1 by Arenas-Huertero et al. (2009) because mtr-miR2199 was not yet reported. As well as in Lotus japonicus, the A17- > G (miRS1) variant was found in peanuts (Arachis hypogaea L.) [35, 57]. It is interesting that miRNA families such as miR1511, miR1514 and miR1515 first detected in soybean, have not been found in other legumes besides P. vulgaris. In this regard, other miRNA families reported specifically in soybean (gma-miR1524, gma-miR1532, gma-miR1526, gma-miR1516 and gma-miR1513 and gma-miR1508) were detected by Valdés-López et al. (2010) using a hybridization approach (macroarrays) under several abiotic stress conditions in leaves, roots and nodules of P. vulgaris. These miRNAs from soybean were not detected by high-throughput sequencing, with the exception of two reads for gma-miR1508. In the Valdés-López et al. (2010) analysis, expression was detected for miRNAs miR1524, miR1526, miR1532 and miR1508 in common bean plants grown under sufficient nutrient conditions or stressed conditions. Family miRNAs gma-miR1513 and gma-miR1516 were detected only under stressed conditions. In addition, expression was detected in the macroarrays for an oligonucleotide probe designated as pvu-miR1509. This probe was based on a variant detected by Arenas-Huertero et al. (2009) that was not detected here because it has more than two mismatches with the reference miRNA gma-miR1509. The miR170 family, for which Valdés-López et al. (2010) detected expression in P. vulgaris, was neither found in this study. MiR170 is very similar to miR171, so it is possible that the macroarray probes hybridized with the same miRNA family. MiRNA variants are considered to be a consequence of inaccuracies in Dicer pre-miRNA processing. Smaller variants with missing bases and low frequencies are viewed as degradation products or pyrophosphate sequencing errors. Herein, small RNA sequences from libraries were classified as miRNA isoforms only if they were similar to a reference miRNA reported in miRBase and had a significantly greater number of reads compared to those found for the reference miRNA in all four organs. From this isoform identification analysis, four more miRNA families (miR1510, miR2199, miR4376 and miR479) were added to the total number of conserved miRNA families identified in common bean. All of the variants found here for these four families were highly abundant in all four libraries. It is probable that miR1510 and miR2199 miRNA families are part of the P. vulgaris miRNA population, based on the two variants identified for each of these two families, along with their conservation in other species (see results) and previously experimental expression analyses [13, 22]. Another family highly likely to be present in common bean is the miR4376 family. The variant found here for miR4376 was very abundant in common bean and has only one nucleotide missing relative to its reference miRNA found in soybean. On the other hand, further experimental and genomic sequences analyses are still needed to validate the variant identified in common bean for the miR479 family, which has two nucleotides missing and one mismatch compared with its reference miRNA csi-miRNA479. That is also the case for other less conserved miRNA families identified based on the isoform analysis, like miR858, miR2597, miR894 and miR1310. Most of the reference miRNAs for these less conserved miRNA family variants were poorly or not detected in the libraries. In plant and animal microRNAs, 3' heterogeneity is the most frequent length variation. Most of the variants identified from the length variant group exhibit 3' heterogeneity. Sequence length heterogeneity for plant microRNAs has been proven to be essential for correct plant development and environmental responses. It is known that miR168 in Arabidopsis thaliana is produced in length variants of 21 and 22 nucleotides . A decrease in abundance of the 21 nt variant reduces miR168 homeostasis and leads to developmental defects. The large number of reads detected for some variants in P. vulgaris suggests significant regulatory roles like detected for miR168 in A. thaliana. Using the pre-miRNA of pvu-miR482 (Figure 4) as an example, three variants generated for "mature-star" miRNAs (5p) and two variants generated for the mature miRNAs (3p) were observed. Considering the number of reads found for these variants, mature-star sequence variants were by far greater in abundance than their corresponding mature sequence variants. In particularl two mature-star sequence length variants, one previously reported in miRBase as pvu-miR482* of 22 nucleotides and the other here denoted as pvu-isomiR482* of 21 nucleotides, had 1641 and 1207244 total reads respectively. It is important to take into account that sequences for reference miRNA gso-miR482a and its highly abundant variant pvu-isomiR482a were detected, and that these variants necessarily have to be excised from another stem-loop precursor not yet identified. For this reason, it is possible that the variants pvu-miR482* and pvu-isomiR482* were generated from different loci, as actually happens for the two miR168 variants in A. thaliana. In addition to miRNAs previously reported in other plants and those present in closely related species such as soybean or Medicago, common bean may encode species-specific miRNAs. To address this question, sequencing reads were explored using the miRDeep algorithm . Those candidates were favoured where in addition to a mature miRNA present in the stem region of the hairpin precursor, there was also evidence of a miRNA* sequence recovered. Next, candidate miRNAs having a plausible stem-loop precursor but without any miRNA* sequences in the libraries were obtained. It will be interesting to see to what extent these candidates can be confirmed as genuine miRNAs and whether they are involved in biological processes specific to P. vulgaris. As in other examples shown here, the availability of a fully-sequenced genome will provide a more complete picture of novel miRNAs. Currently, microarray hybridization approaches, real time quantitative PCR (RT-qPCR) analyses and high-throughput sequencing technologies are widely used microRNA profiling methods. MiRNA regulatory functions in different organs, different stress conditions, and different developmental stages are still unknown. MiRNA profiling studies are important first approximations to analyze miRNA functions according to their different expression patterns. In this work miRNA expression was analyzed in order to find important differences in miRNA family expression levels within common bean organs. Biological replicates are essential to determine if differences observed are caused by conditions and not just by experimental variations. Because of this, cluster analysis was employed. The DESeq package allows users to work without replicates with the caveat that the test will lose strength. It assumes that most transcripts will have approximately the same levels within replicates under the different conditions, and that the estimated variance should not change too much. Experiments designed to explore miRNA and mRNA expression are subjected to many different technical and biological biases. Nevertheless, differential processing of stem-loop precursors, small RNA duplexes, and, in general, miRNA biochemical properties challenge expression analysis methods usually used to analyze mRNAs. The majority of conserved miRNA families identified were expressed in all organs at different levels. Conserved miRNA families seem to be transcribed in almost all plant organs. Which of those conserved miRNAs have an essential role in legumes for certain developmental stages or stress responses is not completely understood. Perhaps less conserved miRNAs families that are highly abundant in legumes such as miR1510, miR1511, miR1514, miR1515, miR2118 and miR2199, play essential roles in characteristic processes of legumes such as nodulation, as altered expression of miR482 and miR1515 has been proven to increase soybean nodulation . The present study contributes, together with previous common bean miRNA studies, to characterizing the P. vulgaris miRNA population. It represents a unique analysis of P. vulgaris miRNAs performed with high-throughput next-generation DNA sequencing (NGS) technologies. Shortly, full genome sequence and transcriptome datasets from different P. vulgaris cultivars will be available. The analysis of novel common bean genome sequence information will benefit from the tools presented here to expand important small RNA research needed in this critical worldwide crop. 109 miRNAs belonging to 29 conserved families in Phaseolus vulgaris were identified using high-throughput sequencing. In addition, twenty six miRNA isoforms were characterized. MiRNA variant analysis identified four highly abundant miRNA families. Eleven new stem-loop precursors belonging to eight conserved miRNA families were determined. Thirty nine miRNAs identified can be explained by processing of characterized common bean precursors. In addition, twenty nine novel miRNA candidates were predicted based on small RNA reads and precursor prediction. Evidence for miRNA* sequences for four of these precursors was found. Target prediction analysis identified 157 new Phaseolus ESTs as established miRNA target genes in plants. Candidate targets for miRNA families derived from Phaseolus ESTs were proposed. The common bean miRNA families identified were differentially expressed in leaves, roots, seedlings and flowers. This work provides an important global view of conserved and novel Phaseolus vulgaris miRNAs, their precursors and their targets. Plant material and growth conditions Phaseolus vulgaris L. cv. Negro Jamapa and cv. Pinto Villa were used in this study. Common bean (cv. Negro Jamapa) seeds were surface sterilized by an initial treatment with 100% ethanol for 1 min, rinsed with sterile water, and treated with 20% sodium hypochlorite for 5 min. Sterilized seeds were transferred to sterile trays containing wet paper towels. Trays were covered with foil and held at 28°C for 72 hours until seed germination. Sprouts then were transferred to small plastic pots containing vermiculite watered with B&D solution supplemented with 8 mM KNO3. Incubation was performed in a chamber with 16 h of light and 8 h of dark at 28°C. Plants were watered every third day until organ collection. Roots (15 d old) and flower buds (35-40 d old) were collected in liquid N2 and stored at - 80°C. P. vulgaris cv. Pinto Villa seeds were surface-sterilized in 50% (v/v) sodium hypochlorite and 0.5% (v/v) Tween-20 for 3 min, and rinsed with distilled water for 10 min. Seeds were transferred to trays containing wet paper towels. Whole seedlings 1-4 days old were collected in liquid N2 and stored at -80°C. For leaf collection, 4-day-old seedlings were transferred from trays to plastic pots containing 40% vermiculite, 30% Metro-Mix soil and 30% Agrolite. Once the first trifolium appeared, plants were kept well-watered. A pool of leaves from 10 and 20 days old was harvested for RNA purification. RNA isolation and small RNA library sequencing Total RNA was isolated from frozen roots, seedlings, flower buds and leaves using the Trizol reagent according to manufacturer's instructions (Invitrogen, Carlsbad, CA). The RNA Integrity Number (RIN) was larger than seven and the 28S/18S ratio was larger than 1.6 for all sample organs. Ten micrograms of each sample (roots, flower buds, seedlings, and leaves) were prepared for Deep Sequencing following Illumina's Small RNA alternative sample preparation protocol v1.5. Small RNA fragments ranging from 18-30 nt were selected for the construction of the small RNA libraries. Complementary DNA libraries were separately Single Read-sequenced using the Genome Analyzer IIx (GAIIx)(36 bp) and the Illumina Cluster Station (Illumina Inc, USA) at the Instituto de Biotecnología (Universidad Nacional Autónoma de México). Small RNA sequencing analysis Raw reads from the Illumina Pipeline 1.4 for the four small RNA libraries were cleaned of sequence adapters, low quality tags and small sequences (< 16 nt long). Quality analysis per cycle was performed for each library. Later, sequences were converted to FASTA format grouped in unique sequence tags with their respective frequencies. The R/Bioconductor software package ShortRead (version 1.10.4) was used for RNA sequence length distribution analysis . Mature miRNA sequences from miRBase (release 16) were removed from the RNA families database (Rfam 10.0). Libraries were aligned against miRNA cleaned Rfam database using BLASTN. Exact matches identified with a Perl script for parsing blast results were then removed from libraries. Identification of conserved, isoform, and novel miRNAs Mature and mature-star miRNA sequences from plants were extracted from miRBase (release 16). Sequences were grouped into unique sequences with a reference miRNA identifier. Small RNA libraries cleaned with the Rfam database were aligned against the unique mature and mature-star miRNA sequences using BLASTN and SSAHA2 (version 2.5.3). Alignment results were processed to obtain small RNA sequences that corresponded exactly in size and nucleotide composition to reported plant miRNA sequences. MiRNAs that were detected in just one library or that totalled fewer than 15 absolute appearances in all libraries were separated. Correlation coefficient analysis was done with the number of loci reported in miRBase (v.16) for Medicago truncatula and Glycine max, and the number of possible loci for P. vulgaris based on mature miRNA differences. With the purpose of identifying miRNA isoforms, sequences left from Rfam and miRBase filters that presented a total frequency higher than 10 in all libraries were BLASTN aligned against miRBase (mature and mature-star plant miRNA sequences) allowing at most two mismatches and/or two different nucleotides in length. The total number of variants found for each library was subjected to an abundance filter which consisted of choosing variants that had a total number of reads 50% greater than the total reads of their reference miRNA previously reported. If no reference miRNA for a variant was previously detected in all libraries, the variant with the highest frequency was considered. Isoforms detected for conserved miRNAs that belong to a miRNA family were analyzed to discard the possibility of being simply another miRNA of the same family. MiRNA isoforms were classified as length variants, non-conserved miRNA variants or conserved miRNA variants. Identification of novel miRNAs was performed with sequencing reads that remained after known miRNAs and miRNA isoforms were removed. EST and genomic sequences available from NCBI and PlantGDB were used to search for potential miRNAs using the miRDeep software . Novel miRNA candidates were further aligned against nucleotide and protein NCBI databases to discard possible RNA degradation products. Identification of stem-loop precursors and targets To identify stem-loop precursors, P. vulgaris ESTs and GSSs http://www.ncbi.nlm.nih.gov/projects/dbEST/; http://www.ncbi.nlm.nih.gov/projects/dbGSS/from NCBI were aligned against mature miRNAs, mature-star sequences and miRNA isoforms (Table 2, Table 3, Table 5 and Additional file 1) . Sequence candidates with 100% coverage and identity were tested with the secondary structure program mfold for pre-miRNA structures . Only the lowest energy structures generated for each sequence candidate were analyzed. Target prediction analysis was performed for all ESTs of the genus Phaseolus from NCBI. EST sequences of the genus Phaseolus were confirmed to be targets of mature miRNAs, mature-star sequences and miRNA isoforms (Table 2, Table 3, and Table 5) using the RNAhybrid program (version 2.1) as described by Alves et al. (2009). Potential EST targets were then aligned against plant sequences of the UniProt Knowledgebase (UniProtKB) (release 2011_01) using BLASTX for annotation. Identification analysis for common bean miR390 non-coding transcript target TAS3 was done separately. The AtTAS3 (locus: AT3G17185.1) sequence from the Arabidopsis Information Resource (TAIR) was used for BLASTN alignment against Phaseolus ESTs. Later, miR390 conserved binding sites were analyzed on EST candidates. Only novel mature and mature-star miRNA sequences detected in the libraries were used for target prediction analysis. Organ-specific expression analysis As first step for organ-specific expression analysis, frequencies of miRNAs of the same miRNA family were added. MiRNAs considered for this analysis were the conserved miRNAs (Table 2), the five miRNAs from Additional file 1 that aligned with common bean stem-loop precursors, and the new four miRNA families proposed from the miRNA isoform study. Mature-star sequences were not considered. To test for miRNA differential expression the open-source R/Bioconductor software package DESeq was used . The effective library size for all small RNA library data was estimated with the estimateSizefactors function. This function is used to normalize frequencies of transcripts in relation to library sizes. Then, estimateVarianceFunctions was used to predict the variance from the mean for each organ sample. Within these functions, the method = "blind" parameter for comparisons without replicates was employed. Eventually the count data was transformed with the getVarianceStabilizedData function such that its variance becomes independent of the mean producing a homoscedastic version of the data. Heatmap was performed using the tool heatmap.2 from the gplopts package of open source R software. Hierarchical cluster analysis was performed with the hclust function from the stats package. Mallory AC, Vaucheret H: Functions of microRNAs and related small RNAs in plants. Nat Genet. 2006, 38 (Suppl): S31-S36. Lee Y, Kim M, Han J, Yeom KH, Lee S, Baek SH, Kim VN: MicroRNA genes are transcribed by RNA polymerase II. EMBO J. 2004, 23 (20): 4051-4060. 10.1038/sj.emboj.7600385. Kim VN: MicroRNA biogenesis: coordinated cropping and dicing. Nat Rev Mol Cell Biol. 2005, 6 (5): 376-385. Bologna NG, Mateos JL, Bresso EG, Palatnik JF: A loop-to-base processing mechanism underlies the biogenesis of plant microRNAs miR319 and miR159. EMBO J. 2009, 28 (23): 3646-3656. 10.1038/emboj.2009.292. Yu B, Yang Z, Li J, Minakhina S, Yang M, Padgett RW, Steward R, Chen X: Methylation as a crucial step in plant microRNA biogenesis. Science. 2005, 307 (5711): 932-935. 10.1126/science.1107130. Li J, Yang Z, Yu B, Liu J, Chen X: Methylation protects miRNAs and siRNAs from a 3'-end uridylation activity in Arabidopsis. Curr Biol. 2005, 15 (16): 1501-1507. 10.1016/j.cub.2005.07.029. Park MY, Wu G, Gonzalez-Sulser A, Vaucheret H, Poethig RS: Nuclear processing and export of microRNAs in Arabidopsis. Proc Natl Acad Sci. 2005, 102 (10): 3691-3696. 10.1073/pnas.0405570102. Hammond SM, Bernstein E, Beach D, Hannon GJ: An RNA-directed nuclease mediates post-transcriptional gene silencing in Drosophila cells. Nature. 2000, 404 (6775): 293-296. 10.1038/35005107. Baumberger N, Baulcombe DC: Arabidopsis ARGONAUTE1 is an RNA Slicer that selectively recruits microRNAs and short interfering RNAs. Proc Natl Acad Sci. 2005, 102 (33): 11928-11933. 10.1073/pnas.0505461102. Reinhart BJ, Weinstein EG, Rhoades MW, Bartel B, Bartel DP: MicroRNAs in plants. Genes Dev. 2002, 16 (13): 1616-1626. 10.1101/gad.1004402. Sunkar R, Jagadeeswaran G: In silico identification of conserved microRNAs in large number of diverse plant species. BMC Plant Biol. 2008, 8: 37-10.1186/1471-2229-8-37. Valdés-López O, Arenas-Huertero C, Ramírez M, Girard L, Sánchez F, Vance CP, Luis Reyes J, Hernández G: Essential role of MYB transcription factor: PvPHR1 and microRNA: PvmiR399 in phosphorus-deficiency signalling in common bean roots. Plant Cell Environ. 2008, 31 (12): 1834-1843. 10.1111/j.1365-3040.2008.01883.x. Arenas-Huertero C, Pérez B, Rabanal F, Blanco-Melo D, De la Rosa C, Estrada-Navarrete G, Sanchez F, Covarrubias AA, Reyes JL: Conserved and novel miRNAs in the legume Phaseolus vulgaris in response to stress. Plant Mol Biol. 2009, 70 (4): 385-401. 10.1007/s11103-009-9480-3. Subramanian S, Fu Y, Sunkar R, Barbazuk WB, Zhu JK, Yu O: Novel and nodulation-regulated microRNAs in soybean roots. BMC Genomics. 2008, 9: 160-10.1186/1471-2164-9-160. Morin RD, O'Connor MD, Griffith M, Kuchenbauer F, Delaney A, Prabhu AL, Zhao Y, McDonald H, Zeng T, Hirst M, Eaves CJ, Marra MA: Application of massively parallel sequencing to microRNA profiling and discovery in human embryonic stem cells. Genome Res. 2008, 18 (4): 610-621. 10.1101/gr.7179508. Moxon S, Jing R, Szittya G, Schwach F, Rusholme Pilcher RL, Moulton V, Dalmay T: Deep sequencing of tomato short RNAs identifies microRNAs targeting genes involved in fruit ripening. Genome Res. 2008, 18 (10): 1602-1609. 10.1101/gr.080127.108. Kozomara A, Griffiths-Jones S: miRBase: integrating microRNA annotation and deep-sequencing data. Nucleic Acids Res. 2011, D152-7. 39 Database Altschul SF, Gish W, Miller W, Myers EW, Lipman DJ: Basic local alignment search tool. J Mol Biol. 1990, 215 (3): 403-410. Ning Z, Cox AJ, Mullikin JC: SSAHA: a fast search method for large DNA databases. Genome Res. 2001, 11 (10): 1725-1729. 10.1101/gr.194201. Cuperus JT, Fahlgren N, Carrington JC: Evolution and functional diversification of MIRNA genes. Plant Cell. 2011, 23 (2): 431-442. 10.1105/tpc.110.082784. Joshi T, Yan Z, Libault M, Jeong DH, Park S, Green PJ, Sherrier DJ, Farmer A, May G, Meyers BC, Xu D, Stacey G: Prediction of novel miRNAs and associated target genes in Glycine max. BMC Bioinformatics. 2010, 11 (Suppl 1): S14-10.1186/1471-2105-11-S1-S14. Valdés-López O, Yang SS, Aparicio-Fabre R, Graham PH, Reyes JL, Vance CP, Hernández G: MicroRNA expression profile in common bean (Phaseolus vulgaris) under nutrient deficiency stresses and manganese toxicity. New Phytol. 2010, 187 (3): 805-818. 10.1111/j.1469-8137.2010.03320.x. Szittya G, Moxon S, Santos DM, Jing R, Fevereiro MP, Moulton V, Dalmay T: High-throughput sequencing of Medicago truncatula short RNAs identifies eight new miRNA families. BMC Genomics. 2008, 9: 593-10.1186/1471-2164-9-593. Song QX, Liu YF, Hu XY, Zhang WK, Ma B, Chen SY, Zhang JS: Identification of miRNAs and their target genes in developing soybean seeds by deep sequencing. BMC Plant Biol. 2011, 11: 5-10.1186/1471-2229-11-5. Mica E, Piccolo V, Delledonne M, Ferrarini A, Pezzotti M, Casati C, Del Fabbro C, Valle G, Policriti A, Morgante M, Pesole G, Pè ME, Horner DS: Correction: High throughput approaches reveal splicing of primary microRNA transcripts and tissue specific expression of mature microRNAs in Vitis vinifer. BMC Genomics. 2010, 11: 109-10.1186/1471-2164-11-109. Wong CE, Zhao YT, Wang XJ, Croft L, Wang ZH, Haerizadeh F, Mattick JS, Singh MB, Carroll BJ, Bhalla PL: MicroRNAs in the shoot apical meristem of soybean. J Exp Bot. 2011, 62 (8): 2495-2506. 10.1093/jxb/erq437. Okamura K, Phillips MD, Tyler DM, Duan H, Chou YT, Lai EC: The regulatory activity of microRNA* species has substantial influence on microRNA and 3' UTR evolution. Nat Struct Mol Biol. 2008, 15 (4): 354-363. 10.1038/nsmb.1409. Devers EA, Branscheid A, May P, Krajinski F: Stars and Symbiosis: MicroRNA- and MicroRNA*-Mediated Transcript Cleavage Involved in Arbuscular Mycorrhizal Symbiosis. Plant Physiol. 2011, 156 (4): 1990-2010. 10.1104/pp.111.172627. Ebhardt HA, Fedynak A, Fahlman RP: Naturally occurring variations in sequence length creates microRNA isoforms that differ in argonaute effector complex specificity. Silence. 2010, 1 (1): 12- Mi S, Cai T, Hu Y, Chen Y, Hodges E, Ni F, Wu L, Li S, Zhou H, Long C, Chen S, Hannon GJ, Qi Y: Sorting of small RNAs into Arabidopsis argonaute complexes is directed by the 5' terminal nucleotide. Cell. 2008, 133 (1): 116-127. 10.1016/j.cell.2008.02.034. Vaucheret H: AGO1 homeostasis involves differential production of 21-nt and 22-nt miR168 species by MIR168a and MIR168b. PLoS One. 2009, 4 (7): e6442-10.1371/journal.pone.0006442. Xu Q, Liu Y, Zhu A, Wu X, Ye J, Yu K, Guo W, Deng X: Discovery and comparative profiling of microRNAs in a sweet orange red-flesh mutant and its wild type. BMC Genomics. 2010, 11: 246-10.1186/1471-2164-11-246. Lu S, Sun YH, Shi R, Clark C, Li L, Chiang VL: Novel and mechanical stress-responsive MicroRNAs in Populus trichocarpa that are absent from Arabidopsis. Plant Cell. 2005, 17: 2186-2203. 10.1105/tpc.105.033456. Pang M, Woodward AW, Agarwal V, Guan X, Ha M, Ramachandran V, Chen X, Triplett BA, Stelly DM, Chen ZJ: Genome-wide analysis reveals rapid and dynamic changes in miRNA and siRNA sequence and expression during ovule and fiber development in allotetraploid cotton (Gossypium hirsutum L.). Genome Biol. 2009, 10: R122-10.1186/gb-2009-10-11-r122. Jagadeeswaran G, Zheng Y, Li YF, Shukla LI, Matts J, Hoyt P, Macmil SL, Wiley GB, Roe BA, Zhang W, Sunkar R: Cloning and characterization of small RNAs from Medicago truncatula reveals four novel legume-specific microRNA families. New Phytol. 2009, 184 (1): 85-98. 10.1111/j.1469-8137.2009.02915.x. Zuker M: Mfold web server for nucleic acid folding and hybridization prediction. Nucleic Acids Res. 2003, 31: 3406-3415. 10.1093/nar/gkg595. Friedlander MR, Chen W, Adamidi C, Maaskola J, Einspanier R, Knespel S, Rajewsky N: Discovering microRNAs from deep sequencing data using miRDeep. Nat Biotechnol. 2008, 26: 407-415. 10.1038/nbt1394. Wang XJ, Reyes JL, Chua NH, Gaasterland T: Prediction and identification of Arabidopsis thaliana microRNAs and their mRNA targets. Genome Biol. 2004, 5 (9): R65-10.1186/gb-2004-5-9-r65. Jones-Rhoades MW, Bartel DP: Computational identification of plant microRNAs and their targets, including a stress-induced miRNA. Mol Cell. 2004, 14 (6): 787-799. 10.1016/j.molcel.2004.05.027. Alves L, Niemeier S, Hauenschild A, Rehmsmeier M, Merkle T: Comprehensive prediction of novel microRNA targets in Arabidopsis thaliana. Nucleic Acids Res. 2009, 37 (12): 4010-4021. 10.1093/nar/gkp272. Krüger J, Rehmsmeier M: RNAhybrid: microRNA target prediction easy, fast and flexible. Nucleic Acids Res. 2006, W451-W454. 34 Web Server Allen E, Xie Z, Gustafson AM, Carrington JC: MicroRNA-directed phasing during trans-acting siRNA biogenesis in plants. Cell. 2005, 121 (2): 207-221. 10.1016/j.cell.2005.04.004. Megraw M, Baev V, Rusinov V, Jensen ST, Kalantidis K, Hatzigeorgiou AG: MicroRNA promoter element discovery in Arabidopsis. RNA. 2006, 12 (9): 1612-1619. 10.1261/rna.130506. Parizotto EA, Dunoyer P, Rahm N, Himber C, Voinnet O: In vivo investigation of the transcription, processing, endonucleolytic activity, and functional relevance of the spatial distribution of a plant miRNA. Genes Dev. 2004, 18 (18): 2237-2242. 10.1101/gad.307804. Válóczi A, Várallyay E, Kauppinen S, Burgyán J, Havelda Z: Spatio-temporal accumulation of microRNAs is highly coordinated in developing plant tissues. Plant J. 2006, 47 (1): 140-151. 10.1111/j.1365-313X.2006.02766.x. 't Hoen PA, Ariyurek Y, Thygesen HH, Vreugdenhil E, Vossen RH, de Menezes RX, Boer JM, van Ommen GJ, den Dunnen JT: Deep sequencing-based expression analysis shows major advances in robustness, resolution and inter-lab portability over five microarray platforms. Nucleic Acids Res. 2008, 36 (21): e141-10.1093/nar/gkn705. Gustafson AM, Allen E, Givan S, Smith D, Carrington JC, Kasschau KD: ASRP: the Arabidopsis Small RNA Project Database. Nucleic Acids Res. 2005, D637-D640. 33 Database Moldovan D, Spriggs A, Yang J, Pogson BJ, Dennis ES, Wilson IW: Hypoxia-responsive microRNAs and trans-acting small interfering RNAs in Arabidopsis. J Exp Bot. 2010, 61 (1): 165-177. 10.1093/jxb/erp296. Anders S, Huber W: Differential expression analysis for sequence count data. Genome Biol. 2010, 11 (10): R106-10.1186/gb-2010-11-10-r106. Gentleman RC, Carey VJ, Bates DM, Bolstad B, Dettling M, Dudoit S, Ellis B, Gautier L, Ge Y, Gentry J, Hornik K, Hothorn T, Huber W, Iacus S, Irizarry R, Leisch F, Li C, Maechler M, Rossini AJ, Sawitzki G, Smith C, Smyth G, Tierney L, Yang JY, Zhang J: Bioconductor: open software development for computational biology and bioinformatics. Genome Biol. 2004, 5 (10): R80-10.1186/gb-2004-5-10-r80. Hackenberg M, Rodríguez-Ezpeleta N, Aransay AM: miRanalyzer: an update on the detection and analysis of microRNAs in high-throughput sequencing experiments. Nucleic Acids Res. 2011, W132-W138. 39 Web Server Dhahbi JM, Atamna H, Boffelli D, Magis W, Spindler SR, Martin DI: Deep sequencing reveals novel microRNAs and regulation of microRNA expression during cell senescence. PLoS One. 2011, 6 (5): e20509-10.1371/journal.pone.0020509. Pant BD, Musialak-Lange M, Nuc P, May P, Buhtz A, Kehr J, Walther D, Scheible WR: Identification of nutrient-responsive Arabidopsis and rapeseed microRNAs by comprehensive real-time polymerase chain reaction profiling and small RNA sequencing. Plant Physiol. 2009, 150 (3): 1541-1555. 10.1104/pp.109.139139. Kawashima CG, Yoshimoto N, Maruyama-Nakashita A, Tsuchiya YN, Saito K, Takahashi H, Dalmay T: Sulphur starvation induces the expression of microRNA-395 and one of its target genes but in different cell types. Plant J. 2009, 52 (2): 313-321. Frith MC, Wan R, Horton P: Incorporating sequence quality data into alignment improves DNA read mapping. Nucleic Acids Res. 2010, 38 (7): e100-10.1093/nar/gkq010. Oshlack A, Wakefield MJ: Transcript length bias in RNA-seq data confounds systems biology. Biol Direct. 2009, 4: 14-10.1186/1745-6150-4-14. Zhao CZ, Xia H, Frazier TP, Yao YY, Bi YP, Li AQ, Li MJ, Li CS, Zhang BH, Wang XJ: Deep sequencing identifies novel and conserved microRNAs in peanuts (Arachis hypogaea L.). BMC Plant Biol. 2010, 10: 3-10.1186/1471-2229-10-3. Li H, Deng Y, Wu T, Subramanian S, Yu O: Misexpression of miR482, miR1512, and miR1515 increases soybean nodulation. Plant Physiol. 2010, 153 (4): 1759-1770. 10.1104/pp.110.156950. Broughton WJ, Dilworth MJ: Control of leghaemoglobin synthesis in snake beans. Biochem J. 1971, 125 (4): 1075-1080. Morgan M, Anders S, Lawrence M, Aboyoun P, Pagès H, Gentleman R: ShortRead: a bioconductor package for input, quality assessment and exploration of high-throughput sequence data. Bioinformatics. 2009, 25 (19): 2607-2608. 10.1093/bioinformatics/btp450. We thank the Unidad Universitaria de Secuenciación Masiva de DNA (UUSMD) of the Universidad Nacional Autónoma de México (UNAM) for sequencing services. We also are grateful to the Instituto de Biotecnología-UNAM for giving us access to its computer cluster. Financial support for this research was provided by the International Atomic Energy Agency (research contract No. 16601/R0), Consejo Nacional de Ciencia y Tecnología 83324 and Programa de Apoyo a Proyectos de Investigación e Innovación Tecnológica IN214909-3 grants. The authors declare that they have no competing interests. JL and PP conceived of and coordinated the study. PP wrote the manuscript. PP, MS and LP carried out the bioinformatic analyses. GE and JL carried out plant growth, RNA extraction and preparation, and helped drafting the manuscript. JL, AA and FE participated in its design, helped to draft the manuscript and provided intellectual suggestions. All authors read and approved the final manuscript. Electronic supplementary material Additional file 1: Conserved miRNAs detected only in one library and/or with fewer than 15 reads. MiRNAs in common bean identified in leaves (LL), roots (RL), seedlings (SL) and flowers (FL) detected in just one library and/or with fewer than 15 total reads. (XLSX 15 KB) Additional file 2: Stem-loop miRNA precursors in common bean. EST fragments (new conserved pre-miRNAs) and fragments of stem-loop sequences reported in miRBase (v. 16) for P. vulgaris where aligned against miRNA sequences (blue sequences). Count data number represents the total number of reads in all four libraries. Count data number represents the total number of reads in all four libraries. (PDF 71 KB) Additional file 3: Novel miRNAs detected in Phaseolus vulgaris. Novel miRNAs in common bean identified in leaves (LL), roots (RL), seedlings (SL) and flowers (FL) using miRDeep. (XLSX 16 KB) Additional file 4: Predicted conserved targets in Phaseolus . Predicted conserved miRNA targets based on ESTs of the genus Phaseolus. GenBank accession numbers are used for EST identification. Calculated MFEs (kcal/mol) using RNAhybrid are shown. MiRNA families 156 and 157 share the same predicted conserved targets. MicroRNA sequences in 3'-5' sense were used to represent miRNA:target pairing. Crosses (x) and asterisks (*) denote one-nucleotide wobbles and mismatches, respectively. G:U base pairing is not considered a mismatch (|) (XLSX 18 KB) Additional file 5: Predicted Putative targets in Phaseolus . Predicted putative miRNA targets based on ESTs of the genus Phaseolus. GenBank accession numbers are used for EST identification. Calculated MFEs (kcal/mol) using RNAhybrid are shown. MicroRNA sequences in 3'-5' sense were used to represent miRNA:target pairing. Crosses (x) and asterisks (*) denote one-nucleotide wobbles and mismatches, respectively. G:U base pairing is not considered a mismatch (|) (XLSX 27 KB) Additional file 6: Putative targets for novel miRNAs identified in Phaseolus . Predicted putative targets for novel miRNAs in common bean based on EST of the genus Phaseolus. MicroRNA sequences in 3'-5' sense were used to represent miRNA:target pairing. Crosses (x) and asterisks (*) denote one-nucleotide wobbles and mismatches, respectively. G:U base pairing is not considered a mismatch (|) (XLSX 18 KB) About this article Cite this article Peláez, P., Trejo, M.S., Iñiguez, L.P. et al. Identification and characterization of microRNAs in Phaseolus vulgaris by high-throughput sequencing. BMC Genomics 13, 83 (2012). https://doi.org/10.1186/1471-2164-13-83 - Common Bean - miRNA Family - miRNA Sequence - Plant miRNAs - Mature miRNA Sequence
<urn:uuid:591887b6-e339-4a85-9e3d-be5d81885803>
CC-MAIN-2022-33
https://bmcgenomics.biomedcentral.com/articles/10.1186/1471-2164-13-83
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.921278
16,861
2.6875
3
When it comes to your family, you do not need a special moment to celebrate. You can take the opportunity of thousands of things to express your love to the little ones. Make sure that your kids know that they are loved and cared for by you. According to Jonah Engler, you may know that you love your children more than anything in the world, but what is more important is that even they should know that they are important. They should know that they are worthy of love and that their parents love them the most. This can be done by little gestures of love that can help them in understanding this. While you may know how important your children are to you, let them know by listening to them. Whenever they express something, learn to listen to it and be interested in whatever they are saying. You need to ask their opinions and encourage them to express their thoughts and ideas. This will help them feel confident and worthy. Whenever there is a family decision that they can understand, make sure that they are a part of it. It can be as little as deciding to order something at a restaurant, or it can be about deciding on the furniture for their room. Let them help you out with these things. Remember, their opinion matters. You need to make sure that you maintain a structure in your house as the kids are known to thrive with a consistent approach. You need to fix the child’s bedtime, and the meal time should be allotted. Wake them up at the same time every day and get them involved in their extra-curricular activities too. You also need to make sure there is a time set for homework so that you do not have to run after it regularly. You need to learn to hug, cuddle, or hold their hands sometimes. High-five them, or just lay together while watching TV. Connect with them in order to show them that you love them. Be there for them in general and share the moments of affection with them. Spoil your little ones with hugs and kisses and let them know that their parents love them more than anything else in the world. Pack up a lunch that they love and hide some quotes or loving notes for them in the lunchbox. It can be in the form of a poem, a riddle, or anything that will remind them of you and help them know that you love them. According to Jonah Engler, it is very important that your children understand that their parents love them. You can express your love with these small gestures and allow them to feel the love through them.
<urn:uuid:daf6b502-a71d-4dd5-94f6-5b67bf164b89>
CC-MAIN-2022-33
https://jonahengler.net/4-ways-to-show-your-kids-love-as-per-jonah-engler/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.98185
523
2.53125
3
It is true that a photocatalytic unit can inactivate microorganisms captured on the catalyst’s surface. However, in reality, existing photocatalytic units have a low rate of capturing (filtering) microorganisms, and a significant number of microorganisms pass through this unit. Hence, it has a low decontamination rate. Many manufacturers avoid this problem by installing devices that have a high capture (filtration) class before the photocatalytic units. But in this case it should be understood that the majority of microorganisms will settle on the filters and remain active, thus not entering the photocatalytic unit and not being inactivated. Thus, existing photocatalytic units either lack inactivation on the filters, which is contrary to SanPiN requirements, or have a low filtration (and air decontamination) efficiency. Additionally, photocatalytic units always contain UV lamps, and this significantly increases power consumption and maintenance service costs. The Tion active HEPA filtering technology is free of these disadvantages, since they always provide high-efficiency filtration in accordance with the regulations, and also inactivate microorganisms on the filters. At the same time, Tion units do not contain UV lamps, which significantly reduces equipment maintenance costs.
<urn:uuid:76aea00b-886a-4a7a-8ed5-c69739f2f336>
CC-MAIN-2022-33
https://tion.global/products-for-healthcare
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.919502
260
2.703125
3
Why horse riding is a good exercise? Riding is a total body workout. Your legs, arms and core work together to control and communicate with the horses. Really, riding is a partnership sport; the rider and the horse support and guide each other. Just like dancing or ice skating with a partner, horse and rider communicate through body language and touch. What are the benefits of riding a horse? Physical benefits of horseback ridingStrengthened muscles. Horseback riding is an isometric exercise that targets specific muscle groups and helps maintain strength. Improved coordination. Improved posture. Relieved stress. Improved mood. Why is horse back riding a sport? Competition. Sport often means there is a competitive side to an activity, and horseback riding definitely provides the opportunity for that. Even if it appears that the horse is being judged, the horse is rarely better than the trainer or rider who prepared it. Why is horse riding dangerous? Horse-riding is a hazardous activity. Each year, horse riders are injured, hospitalized or killed as a result of horse-related accidents and injuries. Whilst injury can occur simply from handling horses [4,5,6,7], falling from a horse constitutes a dangerous fall from height, possibly at speed. What is the safest horse sport? Can a horse kill you? A horses’ kick is powerful; it can break bones and most certainly kill you. Some people believe their horse is a chronic kicker and accept its bad behavior. But there is an underlying cause, and if nothing is done to discipline the animal, the problem will worsen, and someone is likely to get hurt. How do they kill horses? Typically, a penetrating captive bolt gun or gunshot is used to render the animal unconscious. The blow (or shot) is intended to kill the horse instantly or stun it, with exsanguination (bleeding out) conducted immediately afterwards to ensure death. What to do if a horse chases you? Turn and confront, never run. Remember humans are predators, he is a prey animal, but when you run you become a prey animal too and lower down his pecking order. Turn straight around, wave your arms at him and chase him away, I usually find that eye contact and a growled ‘how dare you do that to me!’ Why does a horse kick at you? Message: “I feel threatened.” At its most primal level, the equine kick is a defensive weapon. Horses in the wild can and often do repel predators by lashing out with their hooves. This response is instinctive so, depending on the situation, you may see it with even the most placid and agreeable horses. How do you punish a horse? Remain calm so that the horse will respond to your behavior in a positive manner. Use your voice. When your horse needs to be disciplined, remain calm, and say a simple, but firm, “No.” Do not shout at the horse. Use this command consistently, and the horse will begin to understand that this means it needs to behave. Can horses sense fear in a person? Now researchers have found that horses also can smell human emotions. Dr. Antonio Lanatá and his colleagues at the University of Pisa, Italy, have found that horses can smell fear and happiness. The researchers theorized, “We know that horses perform unexpected reactions when being ridden by a nervous person. How do you know your horse loves you? To know if your horse loves you, you have to learn how to observe and interpret the movements and positions of his ears. If he has loose and relaxed ears around you, it’s a sign that he feels comfortable with you. Another positive sign is that the horse keeps its ears slightly back when being ridden. How do you make a horse Love You? Make Your Horse Love You By Spending Time With ThemTake a Walk and Explore New Areas With Your Horse. Stand With Your Horse As They Graze. Groom Your Horse. Take Relaxing Pleasure Rides. Don’t Train Your Horse When You’re Emotionally Compromised. Stay Calm When Training Or Riding Your Horse. How do horses show love to humans? Humans cuddle, a horse will nuzzle. Our first reaction with a horse is often to touch their face as a sign of affection. This is a gesture that horses are unfamiliar with, as they do not “touch” in the same way we do. Reversely, horses are fond of licking and kissing, which can make a human feel uncomfortable. Do horses like hugs? Sharing body contact is one of the main ways horses share affection. Since horses don’t have hands to hold or arms to give hugs, gentle leans and even “neck hugs” express their love. How do I bond with my horse? 7 ways to bond with your horse (without riding!)Try mutual grooming with your horse. There are many things you can learn by watching your horse. Try positive Reinforcement. Go for a walk. Play with your horse. Try agility with your horse. Chill out. Try online showing. What sounds do horses make when they are happy? The sound that a horse makes is called a neigh. A horse’s happy neigh is sometimes a greeting to other horses. You can use neigh to talk about the noise your horse makes, also known as a whinny or a bray.
<urn:uuid:683fa28a-57a7-4356-a368-09b0ed94b0af>
CC-MAIN-2022-33
https://wildpartyofficial.com/why-horse-riding-is-a-good-exercise/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.954192
1,143
2.78125
3
Constipation is one of the most common digestive complaints. In general, constipation is when someone goes to the toilet less often than usual, or find it difficult to pass a stool. In older people, the bowel muscles become weaker, their appetite decreases and some people may take medicines that affect the bowels. This is why elderly people are also prone to constipation. It is fairly common for children to suffer from constipation but it usually clears up within a few days. Always consult your GP if symptoms are persistent and/or severe. Constipation is often experienced by people when they are travelling or on holiday. This is because their normal routine is interrupted and the biological clock is disrupted. Unfamiliar surroundings, different toilets and change of diet are all contributing factors. Sometimes straining may be ineffective and no motion is passed. Bloating, nausea, even vomiting may occur. Straining may cause piles and rectal bleeding. Chronic (long-term) constipation can lead to a number of problems. Always consult your GP if you suffer from the following: - Blood in the stools. - Excessive tiredness and lethargy. - Unintentional weight loss. If these approaches fail, taking a laxative to stimulate the bowel muscles may be of benefit. These should only be used as a temporary measure. Talk to your pharmacist about any medication you are taking to find out if it may be causing constipation. Laxatives work in one of four ways: - Bulk laxatives (such as bran, sterculia) provide fibre in a concentrated form. They increase weight and volume of the stools whilst they are in your intestines, thus stimulating your bowels to move faster. They have to be taken with plenty of water and it can take several days before they have any effect. They are the most approrpriate type of laxative for long term use. - Stimulant laxatives (such as senna and bisacodyl) work by increasing contractions of the bowel and can cause tummy cramps. They can work within a matter of hours and are usually taken at night to produce a morning bowel action. This type of laxative is inadvisable for long term use and should not be used in children. - Osmotic laxatives work by retaining fluid in the bowel, which then softens the faeces. They can take two to three days to work. - Faecal softeners such as docusate sodium lubricate and soften the stool, making them easier to pass and can act within a day. Children should not be given laxatives without first consulting your GP or pharmacist. You should never take laxatives on a regular basis unless advised to do so by your GP. Constipation can rarely be a sign of a more serious disease, if you are in any doubt consult your GP. - Eat plenty of fibre such as bran, wholemeal bread, fruit and vegetables. - Have a regular routine in the morning and allow your bowels time to work. - Reduce your intake of processed food. - Drink more water and avoid caffeine, alcohol and fizzy drinks. - Keep active by exercising regularly. - When travelling, consider taking bran supplements, drink bottled water and avoid sitting still for too long. The information provided on this website does not replace medical advice. If you want to find out more, or are worried about any medical issue or symptoms that you may be experiencing, please contact our pharmacist or see your doctor.
<urn:uuid:16c184e8-508f-4d58-a7c5-2c4292961787>
CC-MAIN-2022-33
https://www.hamptonhealthpharmacy.co.uk/health-advice/constipation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.93918
779
3.0625
3
8.2.1. Simulation Scripts The simulation scripts reduce the number of files that you need to compile separately before simulating a design. These scripts are located in three separate folders under the <project directory>\<varitation_name>_sim directory, each named after the names of the simulation tools. The example designs also provide equivalent scripts after you run the .tcl script from the project located in the \<variation_name>_example_design\simulation directory. The order of the files in the simulation scripts is important. Ensure that you maintain the files in order, to avoid error messages and warning messages during simulation. If you choose not to use the Intel-generated simulation scripts in your simulation environment, you must maintain the specified file order when compiling the memory controller with the user-generated simulation script. Did you find the information on this page useful?
<urn:uuid:28861f62-3d3d-4109-9fe2-952a770683ef>
CC-MAIN-2022-33
https://www.intel.com/content/www/us/en/docs/programmable/683385/17-0/simulation-scripts-31282.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.866092
189
2.625
3
What causes LGS? There are many causes of seizures that can evolve into LGS. In most but not all cases, a cause can be found. Finding it can take extensive testing. In some cases, more than one cause is found. Causes of LGS may include: - Infection during pregnancy - Genetic abnormality - Low oxygen or blood flow to the brain (e.g. Hypoxic Ischemia or HIE) - Brain infection (e.g. meningitis, encephalitis) - Traumatic brain injury (e.g. stroke) - Early brain radiation - A lack of essential nutrients to keep brain cells healthy - A toxic buildup that results in brain cell dysfunction - Prenatal infection. Viruses can infect the fetus during pregnancy. Blood tests and eye exams can usually detect prenatal infection. - Brain infection early in life. Brain infections can lead to brain injury and a severe seizure disorder like LGS. Is the MRI normal in those with LGS? About 2 out of 3 of those with LGS have abnormal brain imaging at the time of diagnosis. Having an abnormal MRI is often associated with a poorer LGS outcome. Can LGS evolve from other epilepsy syndromes? Yes, LGS can also develop from other epilepsy syndromes such as West Syndrome, Tuberous Sclerosis Complex, and Ohtahara Syndrome. The risk factors for developing LGS include: - Early life seizures that are treatment-resistant - Structural abnormalities seen on the MRI - Brain injuries at birth or in early childhood (e.g. lack of oxygen, stroke, tumors) - Mutations in any of the more than 150 epilepsy-related genes (e.g. TSC1, SCN2A, SCN1A, CDKL5, Dup15q, Trisomy 21, TSC1) - Infantile spasms - The presence of more than one seizure type - Epileptic encephalopathy syndromes such as West, Ohtahara, etc. - Developmental slowing or regression - Failure of >2 anti-seizure treatments Having all of these risk factors does not mean someone will develop LGS. It means they are at high risk of developing LGS. We do not know why some with these risk factors develop LGS and some do not. Watch: LGS: What we know. What we are learning. Elaine Wirrell, MD, Director of Pediatric Epilepsy at Mayo Clinic gives an overview of how diagnostic and treatment options for Lennox-Gastaut Syndrome have changed over the years and the importance of understanding the cause of your loved one’s LGS. Watch: Causes of LGS and What They Mean 2019 LGS Foundation Family Conference in Seattle, Washington, Tracy Dixon Salazar, Ph.D. – CAUSES OF LGS AND WHAT THEY MEAN Thank you to the Child Neurology Foundation for allowing us to adapt this article for this site. Authors: Shaun Ajinkya, MD; Elaine Wirrell, MD, Mayo Clinic – Rochester, Minnesota Reviewed: April 2021 The information here is not intended to provide diagnosis, treatment, or medical advice and should not be considered a substitute for advice from a healthcare professional. Content provided is for informational purposes only. LGSF is not responsible for actions taken based on the information included on this webpage. Please consult with a physician or other healthcare professional regarding any medical or health-related diagnosis or treatment options.
<urn:uuid:63ce900b-f159-4f70-97ab-17f97b333ba4>
CC-MAIN-2022-33
https://www.lgsfoundation.org/about-lgs-2/what-causes-lgs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.914961
745
3.078125
3
Two recent attempts to ban antibiotics used in the U.S. for growth promotion in livestock are being fueled by recent politically motivated actions in Europe and are not based on science. The United Nation's World Health Organization (WHO) has recommended that the use of antibiotics for growth promotion be discontinued, after reviewing Denmark's ban. The WHO presumes that the ban will increase “consumer confidence” in meat products and that “likely” human health benefits will occur, says the Coalition for Animal Health (CAH), coordinated by the Animal Health Institute. A recent article on the European ban on growth-promoting antibiotics and its consequences for human and animal health was published in the Journal of Antimicrobial Chemotherapy. It says Europe's removal of antibiotics has led to a major increase in animal disease as well as antibiotics also used in human medicine. The article cites published reports that the ban has not reduced the prevalence of resistant enterococcal infections in humans. CAH adds that the Denmark experiment “has jeopardized the health and well-being of its livestock, but has not demonstrated an improvement in human health.” In a second move against antibiotics, Senators Ted Kennedy (D-MA) and Olympia Snowe (R-ME), along with three members of the House of Representatives, have proposed legislation to ban routine feeding of eight classes of antibiotics to animals. “The bill introduced by Senators Kennedy and Snowe is even less appropriate now than when a similar bill was introduced last year,” states a news release from CAH. “In the past year, the Food and Drug Administration has introduced new requirements for animal drug sponsors to demonstrate that antibiotics used will not contribute to antibiotic resistance. This science-based risk assessment will be applied to all new and existing products, not just the few compounds singled out in this legislation.” CAH adds the Agriculture Department has also launched a new program to “produce meaningful data on the relationship between antibiotic use and antibiotic-resistant bacteria on raw meat.” Evidence demonstrates the U.S. approach to approving and using antibiotics based on science is working, says CAH. The rates of resistant foodborne bacteria in humans, the incidence of bacteria on raw meat and the levels of foodborne illness in the U.S. are all dropping, according to government reports.
<urn:uuid:f5fbc445-4797-4045-b7a5-5ef8e7b890b0>
CC-MAIN-2022-33
https://www.nationalhogfarmer.com/mag/farming_antibiotics_siege
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00088.warc.gz
en
0.950384
480
2.5625
3
Children may evaluate opposites in writing, describing a summer time day’s actions versus a winter day’s. Usually, looking at the topic sentence of every body paragraph is an efficient way to form a easy list of your main points. The web page headers must be placed on the left aspect of the paper and the page numbers must be placed on the proper how to write a explanatory essay of the paper. The title ought to be center aligned and will have a maximum of 12 characters. All the abbreviations within the title should serve free research paper purpose and must first be written in full. Every day, cases of harassment and bullying occur, and this is mostly mediated by romina turco dissertation web. The complete, regular quotation isnât included in the main part of the project as a outcome of it might be too distracting for the reader. We want the reader to concentrate on our work and analysis, not get caught up on our sources. The second type of quotation, referred to as an âin-text quotation,â is included in the primary half, or physique, of a project when a researcher makes use of a quote or paraphrases info from one other supply. See the next part to find out how to create in-text citations. Imagine how troublesome it would be to understand the various parts of a source if we didnât all observe the same guidelines! Of course, the exact number of paragraphs required in the text will rely upon the number of factors the student needs to make and the number of topics being in contrast and contrasted. On common, students have to finish one educational assignment every alternate day. The sheer quantity of stress and overlearning will sooner or later kill any desire to realize information. What is extra, college students say that your time spent on essays has an insignificant impact in your grades. Your professor might provide you with hints on what theyâre in search of. If you simply write down the fundamentals of the task, you could miss out on some key points. For example, your professor could hint at a most well-liked topic or give tips that might lead to a higher rating. An essay outline is especially helpful for people who are novice writers, however even the old pros use outlines. It is often best to write down your introduction when you’ve completed the principle body of the essay, so that you’ve a great understanding to the topic area. Psychology is a science so you must support your ideas with proof . If you might be discussing a principle or analysis examine make positive you cite the supply of the knowledge. An explanatory essay isn’t as typical because it sounds. You should select that subject or subject you feel keen about, solely that you can do it justice. Our imaginative and prescient is to be the company that greatest acknowledges and serves the needs of worldwide college students around the globe. One way to think of the conclusion is, paradoxically, as a second introduction as a result of it does actually include most of the similar features. While it does not must be too long â four well-crafted sentence ought to be enough â it may possibly make or break and essay. Hopefully this example not solely provides one other example of an effective physique paragraph but additionally illustrates how transitional phrases can be used to differentiate between them. Of course, every essay task is completely different and itâs essential to be conscious of that. If certainly one of these steps isnât relevant to the essay you’re writing, skip it and move to the subsequent one. Research as a lot as possible, collecting the related particulars in bullet factors that you just take while studying. If you are given free rein to decide on your topic, use this time to brainstorm attainable concepts and select one that you are genuinely excited about. This will make the method of researching and writing more participating for you. This sort of expository essay is meant to describe a place, an expertise, or an idea by appealing https://www.americanidea.org/new.htm to the senses. The subject might be anything from a concrete object like an animal, metropolis, or tree, or it can be an abstract concept, corresponding to relationships, love, or freedom. Even when youâre not required to write down a synopsis or submit one, the process of doing it is important. Identify the topic of the essay and define the key phrases. If you discuss with the procedures and findings of a research, this exhibits knowledge and understanding. When you are writing an evaluation paragraph use the PEC system. It is very important to elaborate in your evaluation. Don’t just write a shopping list of transient evaluation points. The subsequent table mentioned within the text could be Table 2, and so forth. Provide supply info and any extra notes directly beneath the picture, determine, desk, or music. Also, as a substitute of writing the authorâs name twice in each citations, use three hyphens. For more info on the works-cited listing, refer to âHow to Make a Works Cited Page,â which is discovered below. The works-cited listing ought to be double-spaced as nicely.
<urn:uuid:ce1358a6-0ced-4b0a-bd0a-064e7b32076e>
CC-MAIN-2022-33
http://www.advest-uae.com/a-full-guide-on-explanatory-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.933137
1,060
2.515625
3
By Bridget Johnson Bali is bracing for the worst as Mount Agung, which spewed ash on 21 Nov. followed by an eruption of magma four days later, is indicating it’s not done. The eruption thus far has turned tens of thousands of Indonesians into evacuees and temporarily closed Ngurah Rai International Airport. And while some tourists see selfie opportunities, locals remember how 1,600 people were killed in Agung’s 1963 eruption. It’s a good time to think about preparation for dealing with our homegrown magma dispensaries. Mount St. Helens blew its top in 1980, shooting an ash cloud 12 miles high that rained down as far away as Minnesota and instantly devastating 230 square miles in the blast zone, 57 people were killed and the upper 1,300 feet of the mountain was pulverized – and the volcano hasn’t gone to sleep Scientists have pinpointed 169 active volcanoes in the United States; some of those are in no-man’s land, but at least 55 pose a high or very high risk to people. “There are many volcanoes that are threatening due to factors such as tectonic setting, population density, eruption frequency, and potential to erupt again,” USGS geologist Wendy Stovall said in 2014, noting that the combination of these variables makes “high threat” volcanoes “uniquely dangerous.” These volcanoes include Lassen Peak and Mount Shasta in Northern California, the Long Valley Caldera near Yosemite in Central California, Crater Lake Caldera in Oregon, Washington’s Mount Baker and Mount Rainier (beside Seattle), and Mount Hood near Portland. On the dormant list, there’s the feared Yellowstone viral supervolcano that could blanket much of the U.S. in ash. When Mount St. Helens blew its top in 1980, shooting an ash cloud 12 miles high that rained down as far away as Minnesota and instantly devastating 230 square miles in the blast zone, 57 people were killed and the upper 1,300 feet of the mountain was pulverized – and the volcano hasn’t gone to sleep, as scientists note a “baby volcano” grows within. It was also the costliest disaster in U.S. history. According to the U.S. Geological Survey’s Volcano Hazards Program, Alaska and Hawaii experience persistent rumblings including the tourist draws of Kilauea, with active eruptions that began in 1983 and 2008, and the more recently awakened Mauna Loa, which began giving off warning signs that drew the attention of researchers in 2014 with the volcano alert level raised the following year. The Great Sitkin Volcano in the Aleutian Islands gave off seismic hints for months before shooting off a hearty steam plume on 22 Nov. that raised the alert level. Other Aleutian volcanoes shoot ash so high that they pose an aviation risk. Alerts regarding a specific volcano’s activity level are compiled by scientists at one of the USGS volcano observatories (Alaska, Hawaii, Cascades, California and Yellowstone), with a distinct report prepared for the aviation sector. Color-coded alerts are green (the volcano is relaxing, no eruption), yellow (the volcano is starting to get antsy), orange (the volcano may be getting ready to erupt or is erupting with little ash emission), or red (all hell is breaking loose or is about to). However, most U.S. volcanoes are not well-monitored and some are not monitored at all. The unmonitored volcanoes are in the Mariana Islands, Colorado, New Mexico, Arizona, Utah and Idaho, as well as many throughout California, the Pacific Northwest and Alaska. Senators from Alaska, Washington and Hawaii have been pushing for the establishment of a National Volcano Early Warning and Monitoring System that would coordinate the work of the volcano observatories, establish a 24/7 national volcano watch office, modernize U.S. volcano monitoring and more. The dangers posed by a volcanic eruption include more than the thick ash, gas, landslides and lava flows. Fast-moving mudflows, or lahars, as seen clocking some 90 mph off Mount St. Helens, will engulf whatever’s in their path. Pyroclastic flows are a searing hot, speedy, totally destructive variety pack of lava blocks, pumice, gas and ash. Whereas Los Angeles issues alerts for choking stews of smog, the constantly belching Kilauea creates vog – a cocktail of volcanic gases reacting with atmospheric elements. The greatest areas at risk from volcanic pollution are downwind from the erupting vents, and both medically compromised and healthy people can suffer respiratory effects. (In Cameroon back in 1986, 1,200 people were killed by volcanic gas after an under-lake eruption.) Crops have also been damaged by Kilauea’s gas, underscoring volcanic risk to agriculture and the nation’s food and water supply. The USGS stresses that preparedness requires all hands on deck. Scientists detect the first unrest, but from there it could be as short as a matter of days before an eruption of varying degrees. Federal, state and local officials need to upgrade or add necessary detection equipment as well as develop and prepare residents for evacuation plans and keep residents apprised during volcanic activity of closures, shelters, emergency aid and health precautions, cleanup of ash that can paralyze city services, and more. Businesses and residents should stay informed about their local volcanic hazards and evacuation routes (taking into account downwind and downslope dangers, as well as vulnerable valleys), work with local officials as indicated on volcano preparedness (such as businesses scheduling an educational safety session with employees and a public safety official who can answer questions), and stockpile supplies to be self-sufficient for at least two weeks. Some things to add in that emergency kit? A respirator mask or face mask, gloves and goggles, along with sheeting and tape to cover doors and windows when the ash is really falling. Maintain security and threat awareness via Gate 15’s free daily paper, the Gate 15 SUN and learn more about Hostile Events Preparedness and our HEPS Program here. Gate 15 provides intelligence and threat information to inform routine situational awareness, preparedness planning, and to penetrate the decision-making cycle to help inform time-sensitive decisions effecting operations, security, and resources. We provide clients with routine cyber and physical security products tailored to the individual client’s interests. Such products include relevant analysis, assessments, and mitigation strategies on a variety of topics. Bridget Johnson is a Senior Risk Analyst with Gate 15 and a veteran journalist whose news articles and analyses have run in dozens of news outlets across the globe. Bridget first came to Washington to be online editor at The Hill, where she wrote The World from The Hill column on foreign policy. Previously she was an opinion writer and editorial board member at the Rocky Mountain News and nation/world news columnist at the Los Angeles Daily News. Bridget is a Senior Fellow specializing in terrorism analysis at the Haym Salomon Center. She is an NPR contributor and has contributed to USA Today, The Wall Street Journal, National Review Online, Politico, New York Daily News, The Jerusalem Post, The Hill, New York Observer, Washington Times, RealClearWorld and more, and has myriad television and radio credits. Bridget is Washington Bureau Chief for PJ Media. Follow Bridget on Twitter: @Bridget_PJM Featured image, Joe Carini, Getty Images, via the Huffington Post, “What Happens When The World’s Largest Volcano Erupts Again?” 20 May 2014, https://www.huffingtonpost.com/2014/05/20/mauna-loa-volcano-eruption_n_5354376.html Bali, 1963, photo source: AP, via news.com.au, “More than 120,000 flee Bali’s Mt Agung volcano,” 29 Sep 2017, http://www.news.com.au/travel/travel-updates/incidents/more-than-120000-flee-balis-mt-agung-volcano/news-story/81855902500330bd49403975d1bf83bf
<urn:uuid:9af58ea6-52ef-49de-81f2-d36aa0c168ec>
CC-MAIN-2022-33
https://gate15.global/volcano-preparedness-essential-before-one-of-americas-molten-mounts-blows-its-top-again/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.938228
1,746
2.8125
3
SAMUEL PIERPONT LANGLEY (1834-1906) SIGNED CARD, “Autograph of S. P. Langley”, on a card 4.25 x 1, by the American astronomer, physicist, inventor, and aviation pioneer. He was Secretary of the Smithsonian Institution, where he founded the Astrophysical Observatory; professor of astronomy at the University of Pittsburg; and director of the Allegheny Observatory. He invented the bolometer which was first used to make the first calculations on the greenhouse effect. He also attempted to make a working piloted heavier-than-air aircraft. His models flew, but his two attempts at piloted flight were not successful. The boldly signed card is in fine condition, with minor age toning.
<urn:uuid:64c7829f-e774-41f3-b972-128bda432354>
CC-MAIN-2022-33
https://historymakersautographs.com/products/samuel-p-langley-signed-card-astronomer-aviation-pioneer-inventor-physicist
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.963608
166
2.640625
3
The 2nd topic in “History in Historical Novels” that I discussed in my 1st zoom event was the innovative Federal Theatre Project, funded by Congress through the WPA. Like many people during the Great Depression, unemployment was rampant in the arts. Theater professionals were out of work as no one had money to attend commercial theater. One of the exemplary programs of FDRs New Deal was a trio of programs: Federal Arts, Writing, and Theater Projects. Each one of these supported out of work people in the arts, paying a weekly salary of $23 and change. Theater professionals were thrilled to have a regular wage and to be able to keep up their professional skills. The FTP hired 12,000+ unemployed people in its heyday. The ebullient Hallie Flanagan was hired to direct this nation-wide project, even though she had been an academic and theater professionals were skeptical about her. To everyone’s surprise in the theater world, she succeeded beyond expectations, attracting 1000s of audience viewers all over the country, charging less than a dollar. Audiences loved the immediacy of the performances and the local character of the productions of the Living Newspaper, which the protagonist Miriam worked for in 1938. Her first job took her cross-country to the San Fernando Valley in CA to interview drought and dust bowl migrants in the growing fields, spearheading her new career, an offshoot of her earlier attraction to theater and acting. Miriam and the fictionalized Hallie Flanagan became close friends for life, a relationship that led to Miriam’s becoming a “woman of substance.” Here is a poster of Injunction Granted created by the Federal Arts Project for the Theatre Project’s performances.
<urn:uuid:f00af4c4-4cef-411d-90c8-7bca17e89c02>
CC-MAIN-2022-33
https://karmakitaj.com/federal-theatre-project-during-the-great-depression/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.978649
358
2.5625
3
When I was young, we had a piano in the dining room which slowly, over the course of a few years, refused to be tuned. By the end of its short life, it was sounding less like a classic upright and more like a honky-tonk piano from a saloon bar. Sadly, we didn’t realise the cause of its rapid demise until it was too late. It was all to do with humidity. Few of us realise how important humidity is in the home and how it can affect our health. It’s not just a rogue piano-destroying force; overly damp air and overly dry air can pose their own unique problems, both to our surroundings and to our health. Why is Indoor Humidity Important? Humidity in indoor environments can have a huge impact on our wellbeing. Relative humidity describes how much water vapour is in the air, compared to how much it could hold if saturated. It’s why the air feels heavy just before it’s about to rain - it’s holding a lot of moisture. Ideally, our indoor spaces should have a relative humidity of around 50%, but how many of us actually have a hygrometer handy to keep tabs on our air quality? Our ignorance on the subject as a nation means that many households put up with general health complaints that could be easily solved by better humidity in their indoor spaces. Problems with High Humidity High humidity is a common issue in the UK as our increasingly well-insulated homes trap more and more moisture indoors, leading to the build-up of condensation and mould on our walls and windows. Our lack of regularly warm weather also means we tend to dry our clothes indoors, which again contributes to an excess of moisture inside. All living things need moisture and warmth to live, so highly humid interiors create the perfect breeding ground for mould and dust mites. The growth of mould and bacteria in these conditions can be serious, especially for people with respiratory conditions or allergies. Problems with Low Humidity Low humidity can also pose a problem in winter and can even be worsened by certain types of heating system. Of course, we tend to turn up the heating during the colder months but this can lead to a sensation of dry air once the house has warmed up. Symptoms of low humidity include cracked and itchy skin, as well as irritated eyes and nasal passages. The mucus and moisture in our noses provide the essential function of pre-filtering the air as we breathe it in, removing allergens and unwanted bacteria before it has a chance to wreak havoc. If the air around us is warm and dry, we lose those vital layers of protection. It’s a contributing reason we often get ‘colds’ in the height of summer - the dry air from fans and air conditioning create the perfect environment for viruses to thrive. How to Deal with Low Humidity Low humidity can be exacerbated by certain heating systems, especially ones that work through convection. As convection transfers heat by making the air warm, it can also make it rather dry. This can make your eyes feel dehydrated, your nose sore and skin chalky - not the most appealing of combinations! If these symptoms sound familiar, here are some simple, cost-effective ways to deal with low humidity. Create Your Own Diffuser An age-old method is to place a bowl of water near your heater, which gradually evaporates as the room heats up. This was actually the method used to keep piano no.2 in working order – we kept a small bowl of water inside the base which humidified the inner workings, topping it up every few weeks like an oversized pet. Houseplants are a great way of humidifying a space because they add moisture to the air and purify it at the same time. The water-releasing process of plants makes them an effective way of keeping drier interiors more comfortable. They also improve mental wellbeing in the form of reduced stress and improved mood - not to mention they’re not too shabby to look at! Purchase a Humidifier Room humidifiers are fairly inexpensive and can be an effective way of humidifying particularly dry spaces around the home. Some even come with built-in humidistats to help regulate the water vapour in the air. Consider Updating Your Heating If humidity is a particular issue in your home, or you have a piano or two worth preserving, making the switch to a heating system that makes use of radiant heat is one of the best preventative methods available. How does radiant heat work? Radiant heat is what we feel when the sun comes out from behind a cloud, or the comforting tingle when we stand in front of a fire. Totally safe, we emit radiant heat all day long - in fact, it’s pretty vital for our wellbeing! When a space is adequately heated with radiant warmth, people will often feel comfortably warm even if the air temperature is comparably low. As radiant heat travels through the air rather than warming it directly, heaters that use this form of warmth will have less of an effect on room humidity. I have low humidity - how will radiant heat help? Radiant heat does not rely on the air to transfer warmth, so it is not manipulated in the same way it is when convection’s in action. Stabler air is better air - gradually increasing the humidity in your home through the above methods, coupled with a radiant system, will lead to a more comfortable living environment. Not to mention, less air aggravation means less dust particles are spread around your spaces - great for people with allergies and general home cleanliness. I have high humidity - how will radiant heat help? Radiant heat can also prevent the formation of condensation, which can occur when warm air comes into contact with a cold surface. Appliances that use radiation discourage moisture because surfaces are kept warm, so any water vapour in the air is kept in the air, rather than gathering on walls and windows. What heating systems make use of radiant heat? Infrared panels are the best choice if you’re looking to switch to an entirely radiant heating system, as they provide 100% of their warmth via radiation. They come in the form of slim, units that are installable on both walls and ceilings, for a heating solution that can blend in conspicuously or stand out depending on your interior design. The Ecostrad Opus iQ is an excellent choice if you’re planning to delve into the world of infrared panels. With a WiFi optimised receiver built-in, it can be operated straight from the comfort of your smartphone. Set a 24/7 schedule, change temperatures, and connect your panel to a smart speaker direct from the Ecosystem app - an ideal choice for any modern household looking to revamp their heating. As most electric radiators give off a third of their warmth in the form of radiation, users can turn their thermostats down and still feel warm, helping to improve the relative humidity in their rooms at the same time. We recommend the Ecostrad iQ Ceramic, which uses ceramic plates to emit a greater amount of radiant heat than typical electric radiators. The iQ Ceramic is able to create 50% of its heat in the form of radiation, making it a superb fit for homes that suffer from humidity problems. Its heat-retentive core also makes this electric radiator exceptionally efficient to boot, a great choice for any household looking to keep running costs to a minimum. Humidity & Home Heating Managing the humidity in your home can go a long way toward improving your health. High humidity may be known for encouraging bacterial growth, but low humidity can be just as troublesome by making us more prone to infection. There are lots of simple ways to deal with humidity issues, and if you’re committed to breathing easy in your own home, switching to a radiant heating source like infrared panels may be the answer.
<urn:uuid:1b2d120b-615a-433c-854c-1709c6a4894a>
CC-MAIN-2022-33
https://www.electricradiatorsdirect.co.uk/news/does-heating-affect-humidity-in-the-home/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.937491
1,762
2.578125
3
What Do Dental Hygienists Do? We have a great team of hygienists – they are fun, friendly and knowledgeable. They are a key part of the care and advice that we provide but not everyone has seen a hygienist before. So what’s it all about……? What is a dental hygienist? Dental hygienists and therapists are specially trained to treat gum disease AND to help you prevent problems occurring in the first place. What do they do in a dental practice? The hygienist’s main job is to prevent and treat gum disease – an important part of this is cleaning your teeth. You may have heard this called “scaling and polishing”. Their most important role though, is showing you the best way to keep your teeth free from plaque. Plaque is a white sticky coating that is constantly forming on your teeth. Plaque is made of bacteria which live on the sugars in the things we eat. If it’s not brushed off properly, it starts to build up – your gums start to react to it (bleeding gums), they can begin to get infected and the plaque can get harder, until it forms tartar which you can’t brush off yourself. Your teeth may develop decay and your gums can get quite sore. Bad breath and loose teeth can also become a problem. Hygienists can help clean off plaque and tartar. They can help you prevent plaque build-up by giving you advice about your diet, your cleaning techniques and the best kit to use (the right size tooth brush, dental floss, tape). Can a hygienist prevent dental disease? This is what hygienists are all about. Cleaning your teeth, removing tartar and showing you ways to prevent it coming back will go a long way towards slowing the progress of gum disease. Their diet advice and other preventive measures can slow down the rate of tooth decay. Regular visits will help build up your confidence – because our hygienist will have seen you over a period of time she can easily see where further help is needed. Who gets gum disease? Gum disease can start when you are a child but chronic gum disease is normally only a problem for adults. Some people are more likely to have gum disease than others: - Crooked teeth are more difficult to keep clean, so the gums supporting them might be prone to gum disease. - Smoking makes gum disease worse. Quitting will make a big difference to the health of your mouth (and in general) so our hygienists can advise on how to stop - Certain drugs and medicines can affect your gums: ask us about these - Diabetes and some other diseases can reduce a person’s resistance to gum disease People with these conditions need to be especially careful about their mouth hygiene - Existing gum problems can be made worse by hormonal changes due to pregnancy or oral contraceptives. Once again, good hygiene is important What can I do to help the hygienist? You can do a lot to help yourself and the hygienist between visits. The hygienists will have shown you how to remove plaque and how to clean between your teeth (perhaps with floss, tape or interdental brushes). - Brush your teeth last thing at night and at least once during the day – use a fluoride toothpaste - Cut down on sugary food and drink - Chewing sugar free gum for 10 minutes or so after meals can also help (chewing gum makes your mouth produce saliva which cancels out the acid produced by your mouth whilst eating). Call us now to see how our hygienists can help.
<urn:uuid:58a8620e-1fc1-4f7c-806e-298c1ca52fe1>
CC-MAIN-2022-33
https://www.faceatardenhouse.co.uk/2014/06/26/what-do-dental-hygienists-do-arden-house-dentist-cheltenham-arden-house-dentist-in-cheltenham/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.947016
778
3.109375
3
A standard measuring cup holds just one-half pint of liquid or half a pound of butter or sugar, or one-fourth pound of Hour. A level cup of any material is all the cup will hold. Fats should be packed solid or weighed. The cups are marked to indicate halves, fourths,g and thirds. Kitchen equipment should include at least two of these cups. Measuring spoons come in sets containing tablespoons, half tablespoon, teaspoon, half and quarter teaspoons. The standard tablespoon or teaspoon may be used, but be sure measurements are level.
<urn:uuid:105cd06c-d258-4ca7-a057-e5293859f4f9>
CC-MAIN-2022-33
https://www.forgottenbooks.com/en/books/MrsDeGrafsCookBook_10012875
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.79739
195
2.828125
3
Cannabis has been proposed as a substitute for opioids as it is considered much safer as it is easily assimilated. Moreover, it has a low toxicity. Nonetheless, some intake methods are safer than others. For instance, smoking cannabis contains the same kind of cancer substances that are found in tobacco smoking. In addition, many heavy cannabis smokers develop bronchitis. In short, the dangers of smoking cannabis are similar to the dangers of smoking tobacco. Consequently, many cannabis users are looking for other intake methods that are safer such as edibles and vaping. Vaping is not only safe but also a very efficient method with a high bioavailability. The Danger of Smoking Cannabis: Health Related Issues According to Lung.org, smoke is harmful to health no matter if it is marijuana or tobacco. Lung.org states, “whether from burning wood, tobacco or marijuana, toxins and carcinogens are released from the combustion of materials. Smoke from marijuana combustion has been shown to contain many of the same toxins, irritants and carcinogens as tobacco smoke”. In addition, cannabis is not smoked the same way as tobacco. Cannabis smokers inhale more deeply than tobacco smokers, which means more exposure to tar, which is a carcinogenic substance created after the combustion of plant material. Furthermore, smoking cannabis causes chronic bronchitis. The dangers of smoking cannabis are mainly caused by tar and carcinogens present in the combustion of any plant material. In addition, there are studies stating that marijuana smoking delivers at least four times more tar to the lungs than tobacco smoking. This is mainly caused by two reasons, firstly, cannabis is smoked without filters and secondly, cannabis smokers tend to inhale more deeply than tobacco smokers. Hence, the production of tar is greater than in tobacco smoking. In short, anything you inhale that comes from the combustion of plant material is harmful to your lungs. Smoke harms your lungs in many ways, for example, it kills cells that protect your lungs from dust and germs, irritates your lungs causing the accumulation of mucus and it also weakens your immune system. The dangers of smoking cannabis are sufficiently harmful to consider switching to alternative and healthier inhalation methods such as vaping. Why Should I Vape Cannabis Instead of Smoking it? Vaping cannabis is a safer alternative to smoking cannabis. In addition, vaping cannabis is a fast delivery intake method. According to recent studies, vaping has a higher bioavailability than any other intake method. Vaping ensures that up to 56% of the cannabinoid content will enter your bloodstream. Furthermore, other studies mention even a higher bioavailability. Moreover, vaping does not produce carcinogens that are commonly found in tobacco or cannabis smoking. Nonetheless, there is some controversy about vaping, but until now, no studies have proved its negative health effects. What we can say is that vaping is much safer than smoking, especially because there is no production of tar. Vaping does not create the toxins that will harm your lungs. Furthermore, vaping cannabis will not cause cough or phlegm associated with bronchitis like smoking cannabis. It is a much safer alternative that will give you the same satisfaction or even more. As mentioned above, the bioavailability of vaping, in other words, the amount of cannabinoids that enter your bloodstream, is much higher in vaping than in smoking and/or bongs. The dangers of smoking cannabis exist. There is a common misconception that cannabis smoking is not harmful. However, it is as harmful as tobacco smoking. Therefore, other inhalation methods such as vaping (both cannabis vape juices and dry-herb) is a healthier alternative. In addition, it is even more effective than smoking with a higher bioavailability. The problem is not the substance but the use we make of it. In the same way that nicotine itself is not proven to have harmful health effects; cannabis is similar. The problem lies in the inhalation method since smoking produces harmful chemicals and substances that harm our body, such as tar. How Can I Vape Cannabis? So now you know a bit more about the dangers of smoking cannabis and that’s why you have decided to switch to vaping cannabis. Perhaps you are a bit lost, so let’s explain how vaping cannabis works. There are many methods to vape cannabis, but the most common ones are vaping cannabis e-liquids and vaping dry-herb (cannabis buds). There are many types of cannabis e-liquids, for example, full-spectrum cannabis e-liquids, cannabis isolates, CBD-rich e-liquids, THC-rich e-liquids. The same applies to dry-herb vaporizers. Ispire utilizes a unique coil system, the ducore, which is a dual ceramic coil that offers superb e-liquid absorption. Furthermore, you can find both disposable and refillable tanks. A refillable tank allows you to add your preferred e-liquid while disposable tanks are convenient, and you will just dispose them once you finish vaping them. If you just want to vape and you don’t want to tinker with coils, tanks, wicks etc, then a disposable pod is a very convenient solution for you. It’s simple, easy and effective. On the other hand, a refillable pod or tank is a good option if you want to try different cannabis e-liquids or if you want to make your own cannabis oil. Dangers of Smoking Cannabis: Conclusion Cannabis smoking produces tar and carcinogens the same as smoking tobacco. Moreover, cannabis smokers inhale more deeply, which means more tar in each puff. Smoking and vaping enter your bloodstream through the lungs and that’s why they are considered very fast and effective intake methods. However, smoking is harmful because of the combustion of plant material. Instead, vaping does not produce these harmful substances and is therefore a safe and efficient method. In addition, its bioavailability is higher than any other method.
<urn:uuid:b6bdd999-a6f7-4983-9e13-ed1d733638fb>
CC-MAIN-2022-33
https://www.getispire.com/blogs/blog/why-vaping-is-safer-than-smoking
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.946266
1,235
3
3
Midwifery professionals plan, manage, provide and evaluate midwifery care services before, during and after pregnancy and childbirth. They provide delivery care for reducing health risks to women and newborn children, working autonomously or in teams with other health care providers. Tasks include ? planning, providing and evaluating care and support services for women and babies before, during and after pregnancy and childbirth according to the practice and standards of modern midwifery care providing advice to women and families and conducting community education on health, nutrition, hygiene, exercise, birth and emergency plans, breastfeeding, infant care, family planning and contraception, lifestyle and other topics related to pregnancy and childbirth assessing progress during pregnancy and childbirth, managing complications and recognizing warning signs requiring referral to a medical doctor with specialized skills in obstetrics monitoring the health status of newborns, managing complications and recognizing warning signs requiring referral to a medical doctor with specialized skills in neonatology monitoring pain and discomfort experienced by women during labour and delivery and alleviating pain using a variety of therapies, including the use of pain-killing drugs reporting births to government authorities to meet legal and professional requirements conducting research on midwifery practices and procedures and disseminating findings such as through scientific papers and reports planning and conducting midwifery education activities in clinical and community settings. Midwife, professional / Educator, midwife/Practitioner, midwife Similar O*NET Careers (USA) : Source Of Info: Source: Pakistan Bureau of Statistics, PSCO-2073
<urn:uuid:86bdd3cc-ec50-4e57-bf5b-e41bf8f8e35e>
CC-MAIN-2022-33
https://www.tucareers.com/pscocareers/2222
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00088.warc.gz
en
0.936871
346
2.546875
3
This paper discusses the development of democracy in England, specifically addressing the interaction between parliament, capitalists, and the masses during the early nineteenth century, and how these interactions lead to a more democratic England; however, the focus will be on entertaining the theory ‘What else could have heralded Democracy during this time?’ Thoughts on a Democratic England The early nineteenth century saw England at the cusp of a radical change, socially, politically, and economically. The advent of the Industrial Revolution had drastically transformed the mental and physical landscapes of the time; factories were sprouting left and right, people were flooding into the cities to work, and entrepreneurs kept the thriving businesses alive. Gradually the topic of Human rights arose, and cities clamored for representatives in Parliament, while the idea of universal suffrage arose, men voicing out desires to vote in order to improve the condition of life. As history shows, after much conflict – riots, deaths, political upheavals- the internal tension in the nation gave way to a greater amount of freedom and Democracy among the citizens. But what if these internal forces had not simmered and seethed, causing uproar and promoting change like they did? Would the outcome then have been similar? Let us examine the conditions of the time, and assess whether present forces of that day could have instigated change, as the conflict between social classes did. The first and seemingly obvious alternative would be a Revolution. During that time –the early 19th Century- the memories of both the French and the Irish (against the English) Revolutions were still fresh in men’s minds; this coupled with the inequities prevalent in the new, Industrialized society, would have galvanized rebellion and caused men to bear arms against the Capitalists who coveted the lion’s share of the profits as well as the Parliament, who denied men representation, votes, and a say in the great scheme of things. The second alternative would be Education. This was a time when newspaper and the printed page thrived. Aside from news, many works of entertainment were printed in the weekly papers, by writers such as Charles Dickens. The Literacy rate was increasing, and as people were no longer scattered but concentrated in the cities, thus quickening the dissemination of information, the Media could, theoretically, have spearheaded a movement for change. Inevitably though, these two alternate theories would have eventually coincided with the ideas which opened this paper, namely Social Conflict. For Democracy ultimately dwells in the hearts and minds of men, and, as such, all socio-political and economic movements begin and end in the realm of social strife. Why Work with Us Top Quality and Well-Researched Papers We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree. Professional and Experienced Academic Writers We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help. Free Unlimited Revisions If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support. Prompt Delivery and 100% Money-Back-Guarantee All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed. Original & Confidential We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services. 24/7 Customer Support Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance. Try it now! How it works? Follow these simple steps to get your paper done Place your order Fill in the order form and provide all details of your assignment. Proceed with the payment Choose the payment system that suits you most. Receive the final file Once your paper is ready, we will email it to you. No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services. No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system. Admission Essays & Business Writing Help An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you. Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian. If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.
<urn:uuid:a528ce37-9d42-406c-941c-5986d88717af>
CC-MAIN-2022-33
https://achieveressays.com/thoughts-on-a-democratic-england/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.958216
1,191
3.515625
4
|Based on the literature articles that have reviewed, I have assumed that the following hypotheses are successful: 1. Acculturative stress has a positive relationship with depression. High acculturative stress to the host country would experience more depression. 2. Both attachment anxiety and avoidance would be positively associated with acculturative stress. High attachment anxiety and avoidance would cause more acculturative stress and depression. 3. Self-concealment has a negative relationship with acculturative stress and depression. Higher levels of self-concealment would make higher acculturative stress and depression. 4. Social self-efficacy has a positive relationship with acculturative stress and depression. High social self-efficacy would probably get less acculturative stress and depression. 5. Orientation class makes a good effect on reduce international students’ acculturative stress, attachment, depression, and self-concealment, and enhance their self-efficacy. The effect of Orientation class on the stress of International students. In recent academic year, according to the Institute of International Education in 2004, there are about 570,000 international students coming from all over the world that enrolled in U.S. institutions of higher education. Among international student, students from Asian countries represent more than half, and the second largest group is those students from Europe. The number is raising fast now. At the same time, many issues of them are raising on college campus. They experienced and are experiencing and struggling with many difficulties, challenging tasks and stresses in U.S., because of the differences in academic and social norms between the host culture and the home culture. Considering more and more of them moving and acculturating to the U.S. society, for avoiding the negative psychological problems would influence and would affect the environment of society and college in U.S., their acculturative, academic and life stresses are generally referred to be concerned by college international office. Orientation class as a special class opened oriental to international students for helping them adapt as soon as possible in college in U.S., because more and more international student come over here for study and they meet and encounter a lot of difficulties and problems, such as social integration, problems in daily life tasks, homesickness, role conflicts, academic concern, depression and other psychological symptoms during their daily life. The purpose of this investigation is to study the influence of the psychological problem among international students from various regions. Specially, how orientation class can help them deal with their acculturative stress. Statement of the Problem The topic here is the effect of orientation class on the acculturative stress of international students. The independent variable is “orientation class”, and the dependent variable is “acculturative stress”. According to the statistic from present data, the number of international college students in the 2007 academic year totaled about 1,070,000 individuals. With this number of international student, high level of concern in college has raised, because many international students showed that they have some psychological problems when they entered a new environment. From the old study and present study, it reported the same thing about the stress of the international student. Through a lot investigation, 1) acculturative stress, 2) attachment, 3) depression, 4) self-concealment, and 5) social self-efficacy are the main factors that caused the psychological problems of the international students. Based on the old definition (Smart & Smart, 1995), acculturative stress is a psychological impact of adapting to a new culture. It has traditionally been considered as the process by which individuals understand and incorporate values, beliefs, and behaviors of the host culture in the context of the values, beliefs, and behaviors of the culture of origin (Berry, 1980). In addition to the old one, a recent acculturation research started to highlight the process of mutual change involving both cultural group in contact (e.g., Berry, 1997, 2001; Bourhis, Moise, Perreault, & Senecal, 1997). Take those international student in U.S. as an example, their situation of adaptation are concerned by many psychologists. They worried more about how the international students adapt to the host culture, so they made a lot research and wrote them down for providing these students some good strategies to manage the difficulties and bad experiences that come from acculturation (e.g., Mori, 2000; Sodowsky &Lai, 1997; Winkelman, 1994). Researchers have reported that the reasons that cause the acculturative stress are 1) English fluency, 2) social support satisfaction, and 3) social connectedness. For most international students, language difficulties tend to be the most challenging issue during their new life (Mori, 2000), because bad or limited English skills would affect their academic performance, and academic difficulties in turn would affect their psychological adjustment (Lin and Yi, 1997). It is also a barrier that keeps the international students from socially communicating with American peers well (Hayes and Ling, 1994), which would higher their acculturation stress, especially for those students who have had high academic achievement in their home countries. Beside language difficulties, dissatisfaction of social support is another kind of barrier that may also hinder international students from building up close relationships with American students (Mallinckrodt and Leong, 1992) and may has a significant influence on their psychological mental. A deep sense loss of social support is a big symptom when leaving their home countries, which may make them feel that it is hard to establish a good social support system in the U.S. as well as in the home countries. They may feel dissatisfied with their new social relationships in the U.S. and at the same time, they may loss their self-esteem, happiness and confidence. The result would be they become more and more anxious, alienated, or even disoriented in the unfamiliar environment (Pedersen, 1991). Mallinckrodt and Leong (1992) found that the importance of social support among international students and the quality of the social support system had not only a direct but also an essential effect on international students’ psychological stress. So they had a conclusion that social support, especially from one’s academic program, is a good contribution to the benefit of international students. That means how satisfied international students are with their social support system may influence their levels of acculturation stress. To better understand how well international students’ relationship with others in a new and unfamiliar cultural environment, it should understand their sense of social connectedness in their social support system with their satisfaction first. “Social connectedness is defined as an aspect of the self that manifests the subjective recognition of being in close relationship with the social world (Lee and Robbins, 1995, 1998)” (Christine J. Yeh & Mayuko Inose, 2003). Therefore, a person who has high sense of social connectedness can be more easily set up a relationship with others and participate in social groups and activities, whereas another person who lack social connectedness would be more likely to experience low self-esteem, anxiety and depression (Lee and Robbins, 1998). Together with social support, it may contribute to international student’s acculturation stress. There some experimental studies indicated that attachment has a positive relationship with seeking social support from both the home countries and from new friends in the U.S and has a negative relationship with stressful life events and psychological symptoms of distress (H.-J.Chen, Mallinckrodt, & Mobley, 2003). Adult secure attachment normally appears a more open and benevolent consideration of imagined culturally unfamiliar others, and a broader base of supportive new friendships in a new culture environment. It consists of two factors, anxiety and avoidance (Brennan, Clark, & Shaver, 1998). Adult attachment anxiety involves an excessive need of approval from others and a fear of interpersonal rejection or abandonment, whereas attachment avoidance involves an excessive need for self- reliance and a fear of interpersonal intimacy or dependence (Wand, Chia-Chih D.C. and Mallinckrodt, Brent, 2006). To international students, depression seems that it would happen easily every day in their new life. They are become more sensitive, emotional and impulsive than they were in their home countries. Living and studying by themselves make them involving in every details of life, which is a big pressure to them at that young age ( from 16 to 20), especially those who start to learn how to live independent after leaving their families and friends and have not any broad experience before. The symptoms come from the new culture that they move to and the maturity level that they have, such as interpersonal stress, low self-esteem, racial or ethnic discrimination, disappointment, resentment, anger, sadness, physical illness, and other symptoms of culture shock, when they found a big difference between their high expectation and low reality. However, several previous investigators have noted that those students with high acculturation would experience greater when they become more familiar with the norms of the host culture. It may be should consider possible gender and regional group membership differences when self-concealment is mentioned in this paragraph. Specially, its difficult professional definition would probably make people confused, but what it really appears is not so unfamiliar. Many international students can’t help doing like this, when they find what happen to them is a shameful, painful, distressing and embarrassing thing, they would rather than avoid letting other people know, for instance, shame on telling friends their interpersonal conflict with other people, and keep their intimate relationship with a romantic partner as a secret. They are unwilling to tell people their personal information, because they don’t want to burden others with their concerns and problems, or they may think that would be make other people look down upon them. Of course, different level of self-esteem or personality could make difference among international students. However, according to some investigation, most female international student who come from countries based on a communal or collectivistic cultures would choose to depress themselves and shield themselves from others, in other words, they neither choose social support resources, such as their family and friends nor mental health services as their subject to address their concerns or fears. In a sample of African, Asian, and Latin American international college students, except self-concealment, another potential mediating factor that would be examined in the relationship between acculturation stress and depression is self-efficacy. It is also an aspect of effective social skills, which may be an unavoidable factor that related to some international student’s acculturation and adjustment experiences. “Self-efficacy refers to a willingness to initiate behavior in social situations (Sherner & Adams, 1983).” It is also a challenging problem that international students will experience more potential spoken communication difficulties and differences in cultural values than their American counterparts. For example, in U.S. assertiveness, independence, and self-reliance are viewed as three main values in society, conversely, in those international students’ countries that based on a communal or collectivistic cultures, connectedness and interpersonal relationships are their main society values. Thus, when an international student interact with an American student, they might be experience some difficulties, such as psychological or social distress that come from different cultural values. Statement of Hypothesis This special study will focus on whether orientation class in college has any effect on international student’s stress or not, so English fluency, attachment, depression, self-concealment, and social self-efficacy will be used as a measurable tool for measuring a sample of international student’s acculturation stress who come from three geographic regions after taking orientation class. The goal of orientation class is to reduce international students’ acculturative stress, attachment, depression, and self-concealment, and enhance their self-efficacy. Two group of international student who enrolled in two public universities, Oregon University and Western Oregon University. The University of Oregon is a world-class teaching and research university located in the beautiful Willamette valley of Oregon. It has 20,394 students and five percent of them are international students, the number of which is about 1,024.7. Western Oregon University is a public-serving institution and is home to nationally-renowned Teaching Research Institute located in Monmouth-Independence area. It has 4,900 students and currently has approximately 120 international students enrolled. Among those international students, 60 international students are chosen randomly for doing this investigation. Of 60 participants, 34 (56%) students were from Oregon of University and 26 (44%) were from Western Oregon University. The sample included 33 (55%) women and 27 (45%) men. The participants’ mean age was 21.05(SD=4.59, range=18-23 years). With regard to home country, 36 (60%) identified themselves as coming from mainland China, 9 (15%) from Taiwan, 8 (13.4%) from Africa, 4 (6.6%) from Japan, and 3(5%) from Germany. The sample include 56 (93.3%) undergraduate students and 4 (6.7%) graduate. The Acculturative Stress Scale for International Students (ASSIS) (Sandhu and Asrabadi, 1994) was developed in order to assess the adjustment problems of international students. I t is a 36-item scale using a 7-point Likert scale (1=Strongly disagree to 7=Strongly aggress). The ASSIS consists of the following subscales: Perceived discrimination (eight items), Homesickness (four items), Perceived hate (five items), Fear (four items), Stress due to change (three items), Guilt (two items), and Miscellaneous (10 items). The total score was used for data analysis. The SCS is a 10 item, 5 point (1= Strongly disagree, 5= Strongly agree), Likert-type measure that assesses individual’s tendency to conceal personal information that is negative or distressing. According to Larson and Chastain (1990), self-concealment is related to, but is conceptually and empirically distinct from, self-disclosure. Total scale scores range from 10 to 50, with higher scores indicating greater self-concealment. The SSES is a six-item, 5-point (1=Strongly disagree, 5=Strongly agree), Likert-type subscale that measures individuals’ willingness to initiate and persist in behavior in social situations. Total scores for the SSES range from 6-30, with higher scores suggesting greater levels of social self-efficacy. The CES-D is a 20-item, 4-point (0=Disagree, 1=Partly disagree, 2=Partly agree, 3=agree), Likert-type instrument that serves as a preliminary screening of depression. The CES-D is one of the most widely used depression inventories, and it consists of items taken from previously developed depression scales (Radloff & Locke, 1986). The total score for the CES-D is the sum of the numerical values for each of the items endorsed. The range of scores is 0 to 60, with higher scores indicating more frequently reported depressive symptoms. Scores of 16 or higher on the CES-D are considered “cases” of depression. In this study, it uses the Posttest- Only Control Group Design. It requires two groups of students, each of which is formed by random assignment, exposed to the different treatments, and posttested. In this study, treatment is orientation class, one group will be taking orientation class for one term, and another group will not be taking orientation class. Both groups are post-tested at the end of the study, may be at the end of one term. Post-test scores are then compared to determine the effectiveness of the treatment, to identify the effectiveness of the orientation class. The study participants were recruited from two university campuses, and all of them are admitted freshmen. After explaining the purpose of the study and inviting them to participate in the study by completing the surveys. At OU, of 200 international student volunteers who agreed to participate in the study, 34 students were randomly selected. And at WOU, of 60 international student volunteers who agreed to participate in the study, 26 were randomly selected. The study was described to participants as “a survey study investigating international student’s stress”. Before a new term starts, organized these thirty international students together, and randomly divided them into two groups, each of which is 30 students. One of these two groups will be taking an orientation class for one term, and every one of them should take the class once a week and no one can be absented with any reason. Another group will not be taking an orientation class for one term, but they can take any other classes. Next during about three months, the international students who were taken the orientation class will be acculturated by listening to several lectures from a teacher of international office. The content of the lecture included learn about valuable campus resources and receive their student ID cards, such as Visa, Job on campus, writing center, how to use library, American Law, and how to apply for financial aid in school. Each class focusing on different content and the international students will be giving one lecture for a week. In addition, they will be guiding to and showing how to use the computer in the library to find out the book they expect to borrow or to read, how to print out materials, how to go to writing center for tutoring by a teacher, how to register online and how to go to the website for booking a study room in library and so on. Another group of students who were not taken the orientation class would study without any treatment. After one term was completed, 30 international students with orientation class and 30 international students without orientation class are provided separately the same several questionnaires to complete 4 questionnaires in 60 minutes. Finally, collected the questionnaires and analyze the information that they were offered. Of the 60 students, 240 questionnaires were completed and turned in. According to the score, they are classified in two groups, one with higher scores, and another one with lower scores. The stress score from two groups were collected and compared to identify the effect of orientation class on the stress of international students in college. The mean score of the international students with orientation class is 95.8667, and the mean score of the international students without orientation class is 74.2333. Thus, the effect of orientation class in college on the stress of international student has been identified. Inferential statistics (null hypothesis) In this study, the null hypothesis is there is no significant difference between the mean of stress score of the international students who were taken the orientation class and the mean of stress score of the international students who weren’t taken the orientation class. The t = 10.478 with p<.000 of this test, and df = 58. The value of the t is much higher, so the null hypothesis was rejected. The reason is that there are difference existing between the international students who were taken the orientation class and the international students who weren’t taken the orientation class. Through analyzing and cooperation, the original hypothesis was identified and supported by the research result. International students who take orientation class will experience less stress than those who do not take. The test score of the students who took the orientation class after one term is much higher than those who didn’t take. The result of this study will be used in college as a good example for opening orientation class in college. L.R. Gay & Peter Airasian (2000) Educational Research: Competencies for Analysis and Application. Sixth edition. Christine J. Yeh & Mayuko Inose (2003) International Student’s reported English fluency, social support satisfaction, and social connectedness as predictors of acculturation. Counseling Psychology Quarterly, Vol. 16, No.1, pp. 15-28. Constantine, Madonna G. & Okazaki, Sumie (2004) Self-Concealment, Social Self-Efficacy, Acculturative Stress, and Depression in African, Asian and Latin American International College Students. American Journal of Orthopsychiatry, Vol.74 Issue 3. P230-241. 12p. Wang, Chia-Chih D.C. & Mallinckrodt, Brent (2006) Acculturation, Attachment, and Psychosocial Adjustment of Chinese/Taiwanese International Students. Journal of Counseling Psychology, Vol. 53 Issue 4, P422-433, 12p.
<urn:uuid:110b35f1-351b-4376-98ae-bc24ba11d5ac>
CC-MAIN-2022-33
https://atelim.com/based-on-the-literature-articles-that-have-reviewed-i-have-ass.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.953623
4,346
2.65625
3
|کد مقاله||کد نشریه||سال انتشار||مقاله انگلیسی||ترجمه فارسی||نسخه تمام متن| |4429408||1619824||2012||10 صفحه PDF||سفارش دهید||دانلود رایگان| A practical approach to calculate 222Rn daughter dose rates to terrestrial wildlife is presented. The method scales allometrically the relevant parameters for respiration in different species of wildlife, allowing inter-species calculation of the dose per unit radon concentration in air as simple base-and-exponent power functions of the mass. For plants, passive gas exchange through the leaf surface is assumed, also leading to specific power relationships with mass.The model generates conservative predictions in which the main contributor to the dose rate of target tissues of the respiratory system is from α radiation arising from 222Rn daughters. Tabulated 222Rn DPURn values are given for 69 species used by the England & Wales Environment Agency for habitats assessments. The approach is then applied to assess the authorised discharges of 222Rn from sites in England, demonstrating that, from a whole-body dose perspective, the biota considered are protected from effects at the population level. ► Allometric method developed to calculate radon daughter doses to 69 species of terrestrial wildlife. ► Model satisfactorily compared with previous studies of lung dose rates for mammals. ► The main contributor to the dose rate of the respiratory system is internal α-radiation from the 222Rn daughters. ► Air immersion is the principal contributor to the external dose rate. ► Assessment for 7 authorised sites in England suggests that wildlife populations are adequately protected from the anthropogenic radon emissions considered in this study. Journal: Science of The Total Environment - Volumes 427–428, 15 June 2012, Pages 50–59
<urn:uuid:3d7d707a-9a7d-43c9-9f1f-70e34035f017>
CC-MAIN-2022-33
https://daneshyari.com/article/4429408
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.811787
447
2.859375
3
Switzerland: Country Report Keywords:COVID-19, pandemic response, risk communication, Switzerland, PAN-FIGHT Product of the research project Fighting pandemics with enhanced risk communication: Messages, compliance and vulnerability during the COVID-19 outbreak (PAN-FIGHT). Other PAN-FIGHT reports published by UiS: United Kingdom Country Report, Germany Country Report and Sweden Country Report. Switzerland is a Confederation composed of 26 state-like bodies referred to as Cantons. As a federal system, Switzerland’s governance of health-related matters is normally managed at the Cantonal level. At the onset of the COVID-19 outbreak, the Federal government opted to centralize the response by enacting the 2016 Epidemics Act. This Epidemics Act gives latitude to the Federal government to declare a health crisis to be an “extraordinary situation”, allowing it to take conservatory measures. On 16 March 2020, the Federal Council acted unilaterally in by deciding to implement the strictest measures ever to be taken on a national level during a time of peace, with measures including “semi-lockdowns,” closures of schools, bars, restaurants, and non-essential shops, among others. As of June 2020, Cantonal governments regained more localized control over the management of the pandemic. In addition to the Epidemics Act, the Swiss parliament passed the Federal COVID-19 Act on 25 September 2020. The Federal COVID-19 Act added additional regulations and limitations to the Federal Council’s powers and responsibilities in managing the epidemic so that the regular legal channels, such as the Swiss parliament, would not be overlooked for future decision-making. Prior to the COVID-19 pandemic, Switzerland had one preparedness plan primarily related to potential influenza pandemics, the latest Swiss Influenza Pandemic Plan established in 2018. This pandemic plan found legal basis in the Swiss Epidemics Act (2016) and had clearly delineated responsibilities delegated between different levels of governance (federal and cantonal) and different health authorities and actors. However, the Influenza Pandemic Plan did not foresee a crisis that would be long-lasting and instead included provisions for short-term mitigation measures. Early on in the epidemic, several measures in the Plan were put in place, such as a "semi-lockdown" on 16 March 2020. All shops, restaurants, and bars were closed, while food stores and health establishments, such as pharmacies, hospitals, and clinics, remained open. Work from home policies were put in place and were mandatory whenever possible. The government innovated by developing measures that went further than the Pandemic Plan's measures for two aspects. First, the Swiss National COVID-19 Science Task Force (SN-STF) was created at the end of March 2020 as an ad hoc response to the COVID-19 pandemic that was not planned in any of preparedness plans. Second, on 16 March 2020, the Federal Council established border controls between Switzerland and Germany, France and Austria. It also imposed entry bans into Switzerland, with some exceptions, for people coming from these three countries and Italy. This measure regarding restriction on borders was decided unilaterally by the Federal Council, and was further extended to all Schengen countries on 25 March 2020 (FederalCouncil, 2020e). All levels of government were directly engaged in broadcasting similar prevention messages to encourage the population to comply with sanitary and mitigation measures and did so by mobilizing traditional forms of media, such as television, radio, newspapers, poster and billboard campaigns. They also engaged with Swiss residents through Internet channels via online news outlets and social media platforms. The Federal Council participated in widely followed weekly press conferences to inform the Swiss population about the most current decisions and developments. Furthermore, the Swiss Federal government launched a large economic package aimed at providing financial support to most of those who have lost earnings (employees, employers, business owners, and independent workers). Most of subsidies cover 80% of the loss of earnings and were paid out with a maximum of 196 CHF (Swiss francs) per day.
<urn:uuid:d95979b2-5661-4e47-b1b9-4532ad99de3c>
CC-MAIN-2022-33
https://ebooks.uis.no/index.php/USPS/catalog/book/96
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.96459
846
2.640625
3
This site is one chapter out of the book… Educators Guide to Preventing and Solving Discipline Problems by Mark Boynton and Christine Boynton. This is the first chapter in the book and it talks about how to develop a student teacher relationship and how best to avoid bad student teacher relationships. This is mainly in regards to when teachers ask questions to students. How should the teacher handle these situations to develop the best student teacher relationship. It also addresses how to discipline students constructively and fairly. This book gives some examples of things to think about or do in regards to disciplining a student correctly without breaking your bond you are trying to develop. Teachers want to show they care about the students individually and they want to eliminate causes for stress and frustration. There is some great examples and advice about how to approach student teacher relationships and how to maintain them. This blog was talking about a case study that this person did or observed. This study wanted to know if student teacher relationships improve when they share similarities. This study was on a small scale but found positive results. They made both teachers and students take this survey. They then paired up into groups teachers and students. In some groups only the students knew the similarities in another only the teachers knew the similarities and in still another they both knew. Then of course there was the control group in which no one knew anything. They found that when either side knew of a similarity it helped improve at least one side of the relationship if not both sides. When people learn they have the same interests or same commonalities it helps build a relationship. Thats how we get friends or build relationships with family members so why should the relationship between students and teachers be any different. I think this blog was very interesting and i think as teachers we should also fill out the survey and then if everyone is ok with it go over it as a class and see who shares our same interests. This could help build not only good relationships with the teacher and students but student to student as well. This video gives some good examples and reasons as to why this teacher feels that creating a comfortable learning environment is key in the classroom and to building positive relationships. If you create an environment in which learning is fun, where you are not going to yell or scold students publicly then it creates for a better relationship and a better classroom atmosphere. Students can be extremely sensitive and by getting on their level and paying attention to them, you as the teacher are making their life easier and helping them be more comfortable. When someone is comfortable they feel they can be more open, they can be themselves without worry of judgment and constant criticism. Every student wants to feel safe and by meeting students where they are at, by making the classroom fun students will feel safe enough to contribute, to be engage and to build a positive relationship with their teacher.
<urn:uuid:28094573-3306-4cfd-86d3-9cdf4b2ac6fe>
CC-MAIN-2022-33
https://edsc658-458.community.uaf.edu/2015/10/14/student-teacher-relationships-3/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.975142
568
3.1875
3
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) Ground meat, called mince or minced meat outside North America, is meat finely chopped by a meat grinder or a chopping knife. A common type of ground meat is ground beef, but many other types of meats are prepared in a similar fashion, including pork, veal, lamb, goat meat, and poultry. Ground meat is used in a wide variety of dishes, by itself, or mixed with other ingredients. It may be formed into meatballs which are then fried, baked, steamed, or braised. They may be cooked on a skewer to produce dishes such as adana kebabı and ćevapi. It may be formed into patties which are then grilled or fried (hamburger), breaded and fried (menchi-katsu, Pozharsky cutlet), or braised (Salisbury steak). It may be formed into meatloaves or pâtés and baked. It may also be used as a filling or stuffing for meat pies and böreks, and also as stuffing. It may be made into meat sauce such as ragù, which in turn is used in dishes like pastitsio and moussaka, or mixed with sauce and served on a bun as a sloppy joe sandwich. It may also be cooked with beans, tomatoes, and/or spices to make chili con carne. In the Indian subcontinent, minced meat is used in a variety of dishes such as a stewed or fried curry dish of minced beef, mutton (i.e., goat meat or chevon) or other kinds of meat with green peas or potatoes. It usually includes ghee/butter, onions, garlic, ginger, chilis, and spices. Minced meat is called keema or qeema in the Indian subcontinent. Keema can be grilled on a skewer and is then called seekh kebab, or it is used as a filling for samosas or naan. Ground meat has food safety concerns very different from whole cuts of meat. If undercooked, it can lead to food poisoning. In a whole cut from an animal, the interior of the meat is essentially sterile, even before cooking; any bacterial contamination is on the outer surface of the meat. This is why, for example, it is typically safe for humans to consume steak that is cooked "rare" in such a way that the interior of the cut remains red in colour - the searing of the exterior of the meat is enough to kill any bacteria on the surface. However, when meat is ground, bacterial contamination from the surface can be distributed throughout the meat. If ground beef is not well cooked all the way through, there is a significant chance that enough pathogenic bacteria will survive to cause illness. Moreover, the warming will speed the reproduction of bacteria. Undercooked Jack in the Box hamburgers contaminated in this manner were responsible for four deaths and the illness of hundreds of people in 1993. To ensure the safety of ground meat distributed through the National School Lunch Program, food banks, federal food and nutrition programs, the United States Department of Agriculture has established food safety and quality requirements for the ground beef that it purchases. A 2010 United States National Research Council report reviewed the scientific basis of the Department's ground beef safety standards, evaluated how the standards compare to those used by large retail and commercial food service purchasers of ground beef, and looked at ways to establish periodic evaluations of the Federal Purchase Ground Beef Program. The report found that although the safety requirements could be strengthened using scientific concepts, the prevention of future outbreaks of food-borne disease will depend on eliminating contamination during production and ensuring meat is properly cooked before it is served. - Hindustani: क़ीमा (Devanagari), قیمہ (Nastaliq), (pronounced [ˈqiːma]); Bengali: কীমা. - Platts, John (1884). A Dictionary of Urdu, Classical Hindi, and English. London: W. H. Allen & Co. p. 797. ISBN 81-215-0098-2. - Oxford English Dictionary, s.v. - Committee on the Review of the USDA E. coli O157:H7, "Farm-to-Table Process Risk Assessment", Slaughter Module in Escherichia coli O157:H7 in Ground Beef: Review of a Draft Risk Assessment, 2002, The National Academies Press, Washington, DC. - Honikel, K. O., "Minced Meats", in Encyclopedia of Meat Sciences, Jensen, W. K., et al., eds., 2004, Elsevier, New York. - Case Study: Jack in the Box E. coli crisis - : National Research Council report An Evaluation of the Food Safety Requirements of the Federal Purchase of Ground Beef Program - The report in Brief An Evaluation of the Food Safety Requirements of the Federal Purchase of Ground Beef Program
<urn:uuid:25b633f2-737d-4777-a3b1-5684f84fa461>
CC-MAIN-2022-33
https://en.m.wikipedia.org/wiki/Keema
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.923064
1,106
3.1875
3
Cucumber is known as one of the best foods for health. In addition, cucumber (Cucumis sativus Latin language) is one of four types of the most widely planted vegetables besides tomatoes, onions and cabbage. Also, cucumber benefits for health have been widely used for body care and treatment. Cucumbers contain many vitamins and minerals the body needs every day, namely vitamin B1, vitamin B2, vitamin B3, vitamin B5, vitamin B6, folic acid (vitamin B9), vitamin C, potassium, calcium, magnesium, iron, phosphorus, and zinc (Zn). Cucumbers are low in calories, just 15 calories per 100 grams of cucumber. Cucumber skin is a good source of fiber which helps aid digestion and a healthy digestive system. Here are 10 health benefits of cucumber : Cucumber contains 95 percent water to keep your body hydrated and eliminate toxins. In addition, cucumber also has most of the vitamins that the body needs in a day. 2. Skin and hair care Cucumber skin, can be used as medicine skin irritation. You can also use it as a face mask or reduce the swelling of the eyes. Silicon and sulfur contained by cucumbers can help stimulate hair growth. 3. Against cancer Cucumbers contain lariciresinol, pinoresinol, and secoisolariciresinol. All three lignans may reduce the risk of some cancers, such as breast, uterus, and prostate. 4. Cleaning the house Cucumbers can be used as cleaning the mirror. You can use it to scrub the bathroom mirror or window of the house. In fact, cucumbers can also fix squeaky hinges that often you know. Simply rub cucumber on a squeaky hinge. 5. Relieve bad breath Take a slice of cucumbers and press it to your palate with the tongue for 30 seconds. Phytochemcials cucumbers capable of killing bacteria in the mouth, causing bad breath. 6. Treating diabetes, lower cholesterol, and blood pressure control Cucumbesr juice contain a hormone needed by the cells of the pancreas to produce insulin is beneficial for diabetic patients. The researchers found that the compound, called sterols, the cucumber can help reduce cholesterol levels. Cucumbers also contain a lot of potassium, magnesium and fiber. It works effectively to regulate blood pressure. 7. Helps lose weight and digestion Cucumbers are known as a low-calorie and rich in water. Therefore, the cucumbers are ideal diet for people who want to lose weight. In addition, the cucumbers are also regarded as as a remedy chronic constipation 8. Serving as Diuretic The water content in cucumbers is a diuretic that helps discharge toxins (poisons) and metabolic wastes from the body through urine. Eating cucumbers regularly to help dissolve gallstones or kidney stones. 9. Strengthens The joint Cucumbers are a good source of silica intake, especially in the skin, which is known to help improve joint health by strengthening the ligaments networks that are connecting joints. 10. Relieve Uric Acid Pain Cucumbers contain vitamin A, B1, B6, C, and D, folate, calcium, magnesium and potassium, which can relieve the pain uric acid by lowering uric acid levels in the blood.
<urn:uuid:17120f79-a607-4451-afa3-1655d535e209>
CC-MAIN-2022-33
https://sabtrends.com/2017/02/17/health-benefits-of-cucumber/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.930463
723
2.6875
3
(Editor’s Note: as part of our Author Speaks Series, you can enjoy below a stimulating excerpt from the new book The Brain Advantage: Become a More Effective Business Leader Using the Latest Brain Research). Brain-imaging techniques allow researchers to witness the brain’s activity reflected in a rainbow of colors on a computer screen. When brain cells are highly active ”working harder” the result shows up as brighter colors on the computer screen. Brilliant reds and yellows indicate brain areas that are most active. In contrast, the blues and greens on a scan show a quieter, less active brain. What would we expect to find if we examined the brain scans of people with high versus average IQ scores? We might picture the active brain of an Einstein as a hotbed of smoldering colors ”but we’d be wrong. Neurologist Richard Restak summarized a UCLA study that compared individuals with high IQs to those with average IQs. Restak wrote, The researchers started off with the seemingly reasonable idea that ‘smarter brains work harder, generate more energy, and consume more glucose. Like light bulbs, the brains of bright people were expected to illuminate more intensely than those of dimwits with a reduced wattage. What they discovered instead was exactly the opposite. Higher IQ people had cooler, more subdued brain scans “while their less intellectually gifted counterparts lit up like miniature Christmas trees.. Why would smarter brains work less hard? [Read more…] about The Brain Advantage: Train your Autopilot…and how to turn it off
<urn:uuid:60560521-3ecb-477e-9a7d-dc328f9441b1>
CC-MAIN-2022-33
https://sharpbrains.com/tags/autopilot
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.929262
321
2.6875
3
According to the ROS documentation: “The Robot Operating System (ROS) is a set of software libraries and tools for building robot applications. From drivers to state-of-the-art algorithms, and with powerful developer tools, ROS has what you need for your next robotics project.” As the definition in the documentation states that the ROS contains a wide variety of tools and libraries. Some of these tools are for development purposes (3D simulation, data visualization, etc.) and some of them are for the core application (motor control libraries, device drivers, etc.). ROS has a structure that consists of nodes and provides publish/subscribe mechanism between the nodes through topics. These nodes can have development or application purposes as mentioned above, and they can run on different computers while communicating through the network connection. This structure gives us the ability to deploy our control software on a Raspberry Pi and monitor or control it from our development computer. In this blog post, we will be installing ROS on Raspberry Pi and preparing it for projects that we are going to build in the future. 1. Install Ubuntu 20.04 LTS Server on Raspberry Pi We will be using Ubuntu 20.04 LTS Server OS to run ROS2 on Raspberry Pi. You can find Ubuntu 20.04 LTS Server installation guide in this post. 2. Install the required packages These packages probably going to be already installed with Ubuntu Server, but it wouldn’t harm to be sure. sudo apt update sudo apt install curl gnupg lsb-release 3. Add ROS repository to the sources list We need to add the ROS key and the ROS repository source to our system to be able to reach ROS packages with the apt package manager. sudo curl -sSL https://raw.githubusercontent.com/ros/rosdistro/master/ros.key -o /usr/share/keyrings/ros-archive-keyring.gpg echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/ros-archive-keyring.gpg] http://packages.ros.org/ros2/ubuntu $(source /etc/os-release && echo $UBUNTU_CODENAME) main" | sudo tee /etc/apt/sources.list.d/ros2.list > /dev/null sudo apt update 4. Install ROS2 Packages We are going to install the “base” because we don’t want the GUI tools. This version includes only communication libraries, message packages, and command-line tools. This step is going to take a while depending on the internet speed and the Micro SD card performance. sudo apt install ros-galactic-ros-base -y 5. Set up the environment automatically at beginning of every session In order to be able to use ROS command line tools, we need to source the setup script of that ROS installation before. So the easiest solution for this is to add the source command to the .bashrc, it will get ready at the beginning of every session. echo "source /opt/ros/galactic/setup.bash" >>~/.bashrc exec "$SHELL" 6. Test your installation In order to test our installation, we need to install demo nodes to make them talk to each other, so we can be sure that our installation is complete. These packages are installed in the “desktop” package of ROS 2 but not included in the ” base” package, so we need to install them with the following commands. sudo apt install ros-galactic-demo-nodes-cpp sudo apt install ros-galactic-demo-nodes-py After the installations, we need to open another terminal and SSH to our Raspberry Pi again -so we will have two terminal sessions connected to the Raspberry Pi with SSH. From one of them run the following ros2 run demo_nodes_py listener And from the other terminal run this command ros2 run demo_nodes_cpp talker As soon as you start the talker node, the listener and talker nodes should be able to communicate with each other. One of these nodes are written with C++ and the other one is written with Python so we can confirm that the nodes written with both of the languages supported by our installation. 7. What is next? To be able to run ROS nodes on different computers we need to install ROS on all of them. Also, to be able to use your development computer to run some nodes which can control or monitor your Raspberry Pi nodes, you need to install ROS on your development computer too. You can follow the guides that I have shared below: - ROS Installation on Debian Linux (Ubuntu): https://docs.ros.org/en/galactic/Installation/Ubuntu-Install-Debians.html - ROS Installation on Mac: https://docs.ros.org/en/galactic/Installation/macOS-Development-Setup.html - ROS Installation on Windows: https://docs.ros.org/en/galactic/Installation/Windows-Install-Binary.html I strongly recommend using Ubuntu on your development computer for compatibility and wide community support and please don’t forget to install the “desktop” version not the “base” version.
<urn:uuid:8b1ddd10-9e62-4572-918b-fab5426aa1d3>
CC-MAIN-2022-33
https://singleboardblog.com/install-ros2-on-raspberry-pi/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.862304
1,137
3.078125
3
What do big pigs, beluga whales, and macaws all have in common? They all worked in the same movie, of course! In a behind-the-scenes video on SlashFilm.com (courtesy of The SoundWorks Collection), we get to hear about how each of the unique sound patterns for all the dinosaurs and technology were created, from the Ankylosaurs, to the Gyrospheres, to the Raptor pack. Sound designer Peter Horner and sound editor/designer Al Nelson explain how each of the dinosaurs got their unique sounds, especially Indominus Rex, the latest and not-quite-ready asset for the park. Because she’s part-raptor, part-rex, the deep, bellowing roar we’ve heard in the other movies and come to associate with the T-Rex just wasn’t going to cut it. Like the cause for creating Indominus Rex, something new was needed for the fans. However, the team had a leg-up thanks to Gary Rydstrom, the original sound designer for the dinosaurs in the Jurassic Park movies, credited for creating the T-Rex roar. Big pigs and walruses were used to incorporate the sound of the T-Rex, while dolphin squeaks and monkey howls were used to represent the Velociraptor within the fifty-by-fourty hybrid. The sound effects for the Mosasaurus are explained, too. Dinosaurs aren’t the only the things that’ve evolved in the park. The technology to keep up with the containment of the beasts and to keep the public entertained has turned from fake footprints in clay for the kids to play with to holographic dinosaurs that serve as good distractions for running away from a rogue raptor (looking at you, Echo…). The sound of the gyrospheres (large spinning pods that roll through the Apatosaurus valley and hilariously chaperoned by a virtual Jimmy Fallon) was created by using various frictional sounds of glass and other materials, and the various experiments done are shown in the video. The sound team for the Jurassic Park/World has baffled us for a space of fifteen years, and have hopefully prepared us for the day when we may very well have a Jurassic Park built on an island off the coast of Costa Rica where twenty-thousands visitors flock per day to see the creatures from our past. The guttural roars and clicking of sharp claws on kitchen floors had us shaking in our cinema seats fifteen years ago, and without a doubt, we’re doing it again this year.
<urn:uuid:bd4114be-795f-4445-b1b3-f8a8e25353ae>
CC-MAIN-2022-33
https://thefandom.net/all-you-need-to-know-what-a-dinosaur-sounds-like-is-a-walrus-and-an-enthusiastic-sound-guy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.944616
537
2.75
3
Safety Tips for Walking Your Dog(Last Updated On: August 7, 2019) Walking your dog is important so as to keep your dog entertained, healthy and energized. This daily exercise will allow your dog to explore the surroundings. A daily walk is necessary so as to uplift your dog’s energy and to give it an opportunity to socialize with other animals and also human beings. Puppies need about thirty minutes of daily exercise to keep them energized. Some breeds require more exercise than others. However long your dog needs to stay outside, it’s important to take every precaution to ensure you have a safe walk. Below are some safety precautions you should take to ensure every walk is successful. 1. Get a quality leash and collar A collar is a piece of material which is put on the neck to help control your dog. The recommended type is the flat collar, that is made with a buckle closure. The collar should not be too tight because it can choke them. A collar that fits properly is that which you should be able to get two fingers underneath it. A good leash should be appropriate for your dog’s size and physical strength. You should be able to handle the leash safely. It should be about 4 to 6 feet long. It should also be of good quality so that it can prevent your puppy from running away. Check on the equipment regularly to replace the faulty collars and leashes in case they have gotten rusty or damaged. If your dog is aggressive or has behavioural issues, go for the front clip harness and avoid the back clip one because it offers little. Instead, opt for a front-clip one. 2. Ensure your dog has identification Make sure that your dog’s tags are current. Your tags should have your current contact information and your dog should be wearing an ID at all times. Your dog should also wear a microchip because sometimes it can lose its collar. 3. Carry poop bags Carry a small disposal bag to help you pick up the dog’s waste because it may contain harmful parasites such as roundworms. These pathogens can be harmful to human and animals. Carry several bags before going for your walk. 4. Carry water for your dog Always want to carry water in a water bottle for your dog in case it gets too hot. This water will help keep your dog hydrated. Carry treats also for your dog. These treats will help in keeping the dog refocused and drive his attention away from distractions. 5. Start off slow You should start with 10-15 minute walks and gradually continue to increase their walk time. 6. Stay on sidewalks when walking your dog Always use a sidewalk when walking your dog in order to prevent your dog from being hit by the fast-moving vehicles. 7. In dim lighting, wear reflective clothes Some drivers have a difficulty seeing the dogs during dusk and dawn because the sunlight is dimmer. Ensure both you and your dog have worn reflective clothing before going out at night or very early in the morning. 8. Carry a flash light for night time walking Night time is not a recommended time to walk your pet, but one can get busy with life or the weather is favourable at night. Always have a flashlight while walking your dog at night so that you can see your surroundings. 9. Check the weather Check the weather forecast to know how the weather in order to protect your dog from harsh weather conditions. Never walk your dog when there is a thunderstorm or snowstorm. You can dress your dog in heavy clothing to protect it from cold temperatures. Ensure to check the path way and make sure it’s not too hot for the dog’s paws. If it’s hot for you then it’s definitely too hot for your dog’s paws. 10. Avoid objects that can hurt your dog’s paws While walking, your dog’s paws can be hurt by sharp objects such as glass, rocks, plastics etc. Another way you can protect your dog’s paws is by buying the specially made shoes for dogs or you can create a simple shoe at home. 11. Avoid walking multiple dogs at once It is advisable to only walk 1 dog at a time. Walking the dogs with leashes that split such that 2 dogs can be walked on the same leash offers little control and it is never recommended. If you have two dogs to walk at the same time, ensure that you offer complete control of both dogs and also you should be aware of the possible dangers of walking multiple dogs at the same time. 12. Avoid the Retractable Leash During Dog Walks When it comes to choosing the right leash for your dog, avoid going for the retractable leashes. Retractable leashes cause many problems compared to the other leashes. The length of these retractable leashes are difficult to maintain especially in places where there is high traffic. Retractable leashes are known for hurting dogs and humans. Holding onto the leash to control your dog while he is moving can easily cause severe burns to your hands. Retractable leashes are definitely a poor choice of leashes for normal walks, but in certain situations for example, in the beach they can be convenient. It’s always much easier to maintain control of your dog using a traditional leash other than using retractable one. Don’t allow the possible hazards stop walks altogether. Consistency, taking control and a leashed dog reduces most dangers. Before you go for walks with your dog, visit your veterinarian for check-ups and recommendations especially for those that have issues with their joints or bones and puppies whose bones are immature. Exercise can sometimes be painful to both the young and the old dogs. Request your veterinarian to outline the appropriate exercise for your dog. Your dog may need a massage or medication to become comfortable after exercise. Walking your dog will help him shed a few pounds.
<urn:uuid:ca690940-3068-43ae-a222-460301eaa8c1>
CC-MAIN-2022-33
https://topdogharness.com/safety-tips-for-walking-your-dog/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.945114
1,228
2.71875
3
Frederick Sanger, (born August 13, 1918, Rendcombe, Gloucestershire, England—died November 19, 2013, Cambridge), English biochemist who was twice the recipient of the Nobel Prize for Chemistry. He was awarded the prize in 1958 for his determination of the structure of the insulin molecule. He shared the prize (with Paul Berg and Walter Gilbert) in 1980 for his determination of base sequences in nucleic acids. Sanger was the fourth two-time recipient of the Nobel Prize. Sanger was the middle child of Frederick Sanger, a medical practitioner, and Cicely Crewsdon Sanger, the daughter of a wealthy cotton manufacturer. The family expected him to follow in his father’s footsteps and become a medical doctor. After much thought, he decided to become a scientist. In 1936 Sanger entered St. John’s College, Cambridge. He initially concentrated on chemistry and physics, but he was later attracted to the new field of biochemistry. He received a bachelor’s degree in 1939 and stayed at Cambridge an additional year to take an advanced course in biochemistry. He and Joan Howe married in 1940 and subsequently had three children. Because of his Quaker upbringing, Sanger was a conscientious objector and was assigned as an orderly to a hospital near Bristol when World War II began. He soon decided to visit Cambridge to see if he could enter the doctoral program in biochemistry. Several researchers there were interested in having a student, especially one who did not need money. He studied lysine metabolism with biochemist Albert Neuberger. They also had a project in support of the war effort, analyzing nitrogen from potatoes. Sanger received a doctorate in 1943. Biochemist Albert C. Chibnall and his protein research group moved from Imperial College in London to the safer wartime environment of the biochemistry department at Cambridge. Two schools of thought existed among protein researchers at the time. One group thought proteins were complex mixtures that would not readily lend themselves to chemical analysis. Chibnall was in the other group, which considered a given protein to be a distinct chemical compound. Chibnall was studying insulin when Sanger joined the group. At Chibnall’s suggestion, Sanger set out to identify and quantify the free-amino groups of insulin. Sanger developed a method using dinitrofluorobenzene to produce yellow-coloured derivatives of amino groups (seeamino acid). Information about a new separation technique, partition chromatography, had recently been published. In a pattern that typified Sanger’s career, he immediately recognized the utility of the new technique in separating the hydrolysis products of the treated protein. He identified two terminal amino groups for insulin, phenylalanine and glycine, suggesting that insulin is composed of two types of chains. Working with his first graduate student, Rodney Porter, Sanger used the method to study the amino terminal groups of several other proteins. (Porter later shared the 1972 Nobel Prize for Physiology or Medicine for his work in determining the chemical structure of antibodies.) On the assumption that insulin chains are held together by disulphide linkages, Sanger oxidized the chains and separated two fractions. One fraction had phenylalanine at its amino terminus; the other had glycine. Whereas complete acid hydrolysis degraded insulin to its constituent amino acids, partial acid hydrolysis generated insulin peptides composed of several amino acids. Using another recently introduced technique, paper chromatography, Sanger was able to sequence the amino-terminal peptides of each chain, demonstrating for the first time that a protein has a specific sequence at a specific site. A combination of partial acid hydrolysis and enzymatic hydrolysis allowed Sanger and the Austrian biochemist Hans Tuppy to determine the complete sequence of amino acids in the phenylalanine chain of insulin. Similarly, Sanger and the Australian biochemist E.O.P. Thompson determined the sequence of the glycine chain. Get a Britannica Premium subscription and gain access to exclusive content. Two problems remained: the distribution of the amide groups and the location of the disulphide linkages. With the completion of those two puzzles in 1954, Sanger had deduced the structure of insulin. For being the first person to sequence a protein, Sanger was awarded the 1958 Nobel Prize for Chemistry. Sanger and his coworkers continued their studies of insulin, sequencing insulin from several other species and comparing the results. Utilizing newly introduced radiolabeling techniques, Sanger mapped the amino acid sequences of the active centres from several enzymes. One of these studies was conducted with another graduate student, Argentine-born immunologist César Milstein. (Milstein later shared the 1984 Nobel Prize for Physiology or Medicine for discovering the principle for the production of monoclonal antibodies.) In 1962 the Medical Research Council opened its new laboratory of molecular biology in Cambridge. The Austrian-born British biochemist Max Perutz, British biochemist John Kendrew, and British biophysicist Francis Crick moved to the new laboratory. Sanger joined them as head of the protein division. It was a banner year for the group, as Perutz and Kendrew shared the 1962 Nobel Prize for Chemistry and Crick shared the 1962 Nobel Prize for Physiology or Medicine with the American geneticist James D. Watson and the New Zealand-born British biophysicist Maurice Wilkins for the discovery of DNA (deoxyribonucleic acid). Sanger’s interaction with nucleic acid groups at the new laboratory led to his pursuing studies on ribonucleic acid (RNA). RNA molecules are much larger than proteins, so obtaining molecules small enough for technique development was difficult. The American biochemist Robert W. Holley and his coworkers were the first to sequence RNA when they sequenced alanine-transfer RNA. They used partial hydrolysis methods somewhat like those Sanger had used for insulin. Unlike other RNA types, transfer RNAs have many unusual nucleotides. This partial hydrolysis method would not work well with other RNA molecules, which contain only four types of nucleotides, so a new strategy was needed. The goal of Sanger’s lab was to sequence a messenger RNA and determine the genetic code, thereby solving the puzzle of how groups of nucleotides code for amino acids. Working with British biochemists George G. Brownlee and Bart G. Barrell, Sanger developed a two-dimensional electrophoresis method for sequencing RNA. By the time the sequence methods were worked out, the code had been broken by other researchers, mainly the American biochemist Marshall Nirenberg and the Indian-born American biochemist Har Gobind Khorana, using in vitro protein synthesis techniques. The RNA sequence work of Sanger’s group did confirm the genetic code. By the early 1970s Sanger was interested in deoxyribonucleic acid (DNA). DNA sequence studies had not developed because of the immense size of DNA molecules and the lack of suitable enzymes to cleave DNA into smaller pieces. Building on the enzyme copying approach used by the Swiss chemist Charles Weissmann in his studies on bacteriophage RNA, Sanger began using the enzyme DNA polymerase to make new strands of DNA from single-strand templates, introducing radioactive nucleotides into the new DNA. DNA polymerase requires a primer that can bind to a known region of the template strand. Early success was limited by the lack of suitable primers. Sanger and British colleague Alan R. Coulson developed the “plus and minus” method for rapid DNA sequencing. It represented a radical departure from earlier methods in that it did not utilize partial hydrolysis. Instead, it generated a series of DNA molecules of varying lengths that could be separated by using polyacrylamidegel electrophoresis. For both plus and minus systems, DNA was synthesized from templates to generate random sets of DNA molecules from very short to very long. When both plus and minus sets were separated on the same gel, the sequence could be read from either system, one confirming the other. In 1977 Sanger’s group used this system to deduce most of the DNA sequence of bacteriophage ΦX174, the first complete genome to be sequenced. A few problems remained with the plus and minus system. Sanger, Coulson, and British colleague Steve Nicklen developed a similar procedure using dideoxynucleotide chain-terminating inhibitors. DNA was synthesized until an inhibitor molecule was incorporated into the growing DNA chain. Using four reactions, each with a different inhibitor, sets of DNA fragments were generated ending in every nucleotide. For example, in the A reaction, a series of DNA fragments ending in A (adenine) was generated. In the C reaction, a series of DNA fragments ending in C (cytosine) was generated, and so on for G (guanine) and T (thymine). When the four reactions were separated side by side on a gel and an autoradiograph developed, the sequence was read from the film. Sanger and his coworkers used the dideoxy method to sequence human mitochondrial DNA. For his contributions to DNA sequencing methods, Sanger shared the 1980 Nobel Prize for Chemistry. He retired in 1983. New from Britannica The planet Venus goes around the Sun every 224.7 Earth days, but takes 243 Earth days to spin on its axis, making its year shorter than its day. Sanger’s additional honours included election as a fellow of the Royal Society (1954), being named a Commander of the Order of the British Empire (CBE; 1963), receiving the Royal Society’s Royal Medal (1969) and Copley Medal (1977), and election to the Order of the Companions of Honour (CH; 1981) and the Order of Merit (OM; 1986). In 1993 the Wellcome Trust and the British Medical Research Council established a genome research centre, honouring Sanger by naming it the Wellcome Trust Sanger Institute.
<urn:uuid:f1fabf94-a850-4ea9-a67c-a8070404d75c>
CC-MAIN-2022-33
https://www.britannica.com/biography/Frederick-Sanger
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.96071
2,100
3.296875
3
Pollution detectors show that air quality was good in South Iceland during the night with sulfur dioxide (SO2) levels not exceeding 5 mµ/m3. Today, the Icelandic Met Office expects light variable winds with gas pollution remaining mostly around the eruption site in Holuhraun in the northeastern highlands, ruv.is reports. Inhabitants in South Iceland from Kirkjubæjarklaustur to Höfn have been subject to extreme SO2 pollution in the past days with concentration of gas reaching a record of 21,000 mµ/m3 at one point. People were advised to stay inside and take measures to keep the gas out. The Icelandic Food and Veterinary Authority points out that animals are also sensitive towards high levels of SO2 and that their owners should not keep them outside if they seem to be experiencing discomfort because of the pollution. Follow vedur.is for forecasts and airquality.is for pollution levels in different locations in Iceland. On the website of the Environment Agency of Iceland (below the table), there are instructions on how to respond to high levels of SO2. Click here to order a unique limited-edition photo book about the Holuhraun eruption with a selection of Iceland Review’s photographers’ best pictures.
<urn:uuid:1fe9b0b7-4f0e-4897-aa49-c4a17e81d3a9>
CC-MAIN-2022-33
https://www.icelandreview.com/news/air-quality-restored-south-iceland/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.946604
267
2.71875
3
Education law is the body of state and federal law that covers teachers, schools, school districts, school boards, and the students they teach. Although the public school system is administered by the federal Department of Education, states are responsible for maintaining and operating public schools in compliance with state and federal laws. Education laws govern liability, curriculum standards, testing procedures, school finance, student financial aid, constitutional rights like school prayer and the bounds of student expression on school grounds, and school safety. Title IX is a section of the United States Education Amendments of 1972 that is codified at 20 U.S.C. §§ 1681-1688. Title IX protects people from sex discrimination when they are engaged in education programs and activities that receive federal financial assistance. Among the types of sex discrimination that Title IX expressly prohibits are sexual harassment, pregnancy discrimination, and the failure to give equal opportunities in athletics. Federal funding is only available to a recipient that promises not to discriminate on the basis of sex. Title IX is enforced through the federal Department of Education’s Office for Civil Rights (OCR), which has 12 offices across the country and a headquarters in Washington D.C. The OCR promulgates regulations to enforce Title IX. In addition to authorizing the OCR to investigate and try to negotiate remedies, or refer cases for administrative law proceedings to cut off federal funding or court proceedings pursued by the Department of Justice, Title IX also gives individuals a private right of action to bring a lawsuit for injunctive or monetary relief. The latter is only available for cases involving intentional sex discrimination. Discrimination in Education In addition to Title IX, many other federal laws prohibit education discrimination on the basis of protected characteristics, including race, age, and national origin. These laws include Title VI of the Civil Rights Act of 1964, the Individuals with Disabilities Education Act (IDEA), and Title II of the Americans with Disabilities Act. Title VI prohibits educational institutions from discriminating on the basis of race, color, or national origin. IDEA and Title II of the Americans with Disabilities Act protect individuals with disabilities from discrimination in educational contexts. Title II provides comprehensive civil rights protection to qualified individuals who have disabilities, and it requires state and local governments to make reasonable modifications to any policies or practices that deny equal access to individuals with disabilities, except if a fundamental alteration to the program would result. The Individuals with Disabilities Education Act (IDEA) is the primary law covering special education, which gives disabled children equal access to the education system. Disabilities under IDEA include mental retardation, autism, vision impairment, speech impairment, hearing impairment, emotional disturbance, traumatic brain injury, learning disabilities, and other impairments as defined by the law. IDEA allows students with specialized needs to have individualized education plans developed. Additionally, IDEA provides for an impartial administrative process for families of disabled students to resolve disputes with the school district. There have been substantial legal changes to public education over the last several decades. Most education reform has been led by the states, and each state has different laws in this area, addressing issues such as charter schools or bullying. However, in 2001, the No Child Left Behind Act (NCLB) was enacted at the federal level to change the public school curriculum and improve teacher and school accountability for students’ school performance. Under the NCLB, schools with high-performing students were rewarded, while schools with students who failed to meet the NCLB’s testing standards were restructured. Parents with children in low-performing schools are allowed to send their children to better-performing schools in other districts. As of 2011, states have been allowed to obtain a waiver of the NCLB in exchange for agreeing to implement other serious educational reforms regarding their academic standards, assessments, and accountability systems. Can I change an IEP without an IEP meeting? If the school administrators and you agree that the IEP would benefit from a small change, the IEP can be changed without a full meeting. You cannot unilaterally change the IEP. School Injuries Schools must keep children in their care safe, and they may be found liable if a failure to meet this duty causes injuries such as slip and falls, sports injuries, or playground accidents. Miranda Rights for Students Children have strong protections when they are being questioned by the police at school, but these protections may not apply to questioning by school officials. Education Reform The No Child Left Behind Act and related laws have attempted to impose minimum standards on performance in schools, relying on increased testing and other evaluations of student progress.
<urn:uuid:dec2a86e-2d32-44e2-bae3-65413918d22a>
CC-MAIN-2022-33
https://www.justia.com/education/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.956725
937
3.671875
4
Surrealism is a cultural movement that was formed in the 1920's and is best known for its visual artworks and writings. Are you an artist and know the history of this culture? Take up the quiz and find out more. Questions and Answers Which of the following words best describes surreal paintings? Who is this painting by? This painting by Magritte shows how changing the .................of an object can make it look surreal. Which of the following words best describes this painting by Magritte? Which word best describes the idea Magritte has used to produce this surreal painting? Ready to take the best Literary devices quiz? Here's one for you. Literature is a very fun course to undertake, and there are some practices one should undertake to ensure that they are able to write marvelous works of art.... Questions: 10 | Attempts: 61885 | Last updated: May 29, 2022 "Purple puppies like playing on the playground." This is an example of Do you know anything about the review of related literature? Do you think you can pass this quiz? An essential benefit of a decent literature review is that it enables the detection of theoretical connections among variables... Questions: 20 | Attempts: 7946 | Last updated: Mar 22, 2022 Generally speaking, the best time to begin the literature review associated with a specific research project is:
<urn:uuid:96b63d44-5001-4991-9e58-a4ef02902cf0>
CC-MAIN-2022-33
https://www.proprofs.com/quiz-school/story.php?title=surrealism_2
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.919194
376
2.828125
3
How do you change the time of a PowerPoint slide? - In case you want all your slides to switch according to a set time limit (e.g. 10 seconds), select one slide and hit CTRL+A to select all slides. In case you want to set a different time for each slide, you will have to select each slide one by one and follow the steps shown below. - 1 How do you time pictures on PowerPoint? - 2 How do I add duration in PowerPoint? - 3 How do I make pictures appear at different times in PowerPoint? - 4 How do you arrange pictures in a presentation? - 5 How do I make a PowerPoint Slide Show loop? - 6 How do you make a PowerPoint Slide Show run automatically? - 7 How will you change the effect timing? - 8 How do you create a sequence in PowerPoint? - 9 How do you date photos? - 10 How do I use timestamp app? How do you time pictures on PowerPoint? To show your talking points one bullet at a time, do this: - Select the bulleted list. - On the Animations tab, under Entrance Effects, choose an animation effect. - Select On Click if you want your bullets to appear one at a time. - Preview your animation by clicking Play from the Animations tab. How do I add duration in PowerPoint? Select the slide that has the transition that you want to modify. On the Transitions tab, in the Timing group, in the Duration box, type the number of seconds that you want. How do I make pictures appear at different times in PowerPoint? First, select the object and then head over to the “Animations” tab. This time, click the “Add Animation” button. You must select the animations from here if you want to apply multiple animations. Once selected, a drop-down menu will appear that looks just like the expanded animations drop-down we showed you earlier. How do you arrange pictures in a presentation? - Select the objects you want to align. Press Shift to select multiple objects. - Select Format > Align and select how you want to align them: Align Left, Align Center, or Align Right. Align Top, Align Middle, or Align Bottom. Distribute Horizontally or Distribute Vertically. How do I make a PowerPoint Slide Show loop? Continuous Looping for use at a Kiosk in PowerPoint - With the presentation open, select the “Slide Show” tab on the ribbon menu. - Click the “Set Up Slide Show” button. - Check the “Loop continuously until ‘Esc'” option. - Click “Ok.” The presentation will now run continuously after being started. How do you make a PowerPoint Slide Show run automatically? Open your PowerPoint presentation. Click the [Slide Show] tab > From the “Set Up” group, click “Set Up Slide Show”. From the resulting dialogue box, check “Loop continuously until ‘Esc'” under the “Show options” section > Click [OK]. How will you change the effect timing? On the slide, click the text or object that contains the animation effect that you want to set a delay for or another timing option. On the Animations tab, in the Delay box, enter in the number of seconds that you want the effect to pause before running. How do you create a sequence in PowerPoint? On the slide, select an animated object. On the Animation tab of the ribbon, in the Timing group, click Move Earlier or Move Later. Each click changes the object’s position in the order by one increment. The numbering in the animation markers changes to reflect the ordering of the effects. How do you date photos? Identifying characteristics: The thickness of the card stock, the color of its borders and whether it has rounded corners (1870s to 1900) or square corners (after 1900) can often help determine the date of a photograph. Many prints also included the name and location of the photography studio on the bottom of the card. How do I use timestamp app? Run the Stamp Camera app on iPhone, tap the image icon at the bottom right corner to browse to your photo library and add a photo to the stamp app. Swipe left and right to change a different date & time stamp, then press the Download button to save it as a new photo with date & time stamp to your Camera Roll.
<urn:uuid:b8d3ee0d-2d55-4e2f-bbc6-b90846034534>
CC-MAIN-2022-33
https://www.vanhienblog.info/power-point/how-to-add-time-between-pictures-in-power-point-question.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00088.warc.gz
en
0.81985
961
2.625
3
Huge swathes of Britain are being plunged into darkness as more and more streetlights are switched off by councils and roads authorities. 9:00PM BST 27 Oct 2012 Lights are being turned off on motorways and major roads, in town centres and residential streets, and on footpaths and cycle ways, as councils try to save money on energy bills and meet carbon emission targets. The switch-off begins as early as 9pm. They are making the move despite concerns from safety campaigners and the police that it would lead to an increase in road accidents and crime. The full extent of the blackout can be disclosed following an investigation by The Sunday Telegraph – which comes on the day that clocks moved back an hour, making it dark earlier in the evening – and found that: - 3,080 miles of motorways and trunk roads in England are now completely unlit; - a further 47 miles of motorway now have no lights between midnight and 5am, including one of Britain’s busiest stretches of the M1, between Luton and Milton Keynes; - out of 134 councils which responded to a survey, 73% said they had switched off or dimmed some lights or were planning to; - all of England’s 27 county councils have turned off or dimmed street lamps in their areas. The vast majority of councils have chosen to turn lights off at night, at times when they say there is less need for them, while others have installed lamps which can be dimmed. Local authorities say the moves helps reduce energy bills, at a time when energy prices are continuing to rise. Several of the big energy companies have unveiled price hikes in recent weeks, including British Gas, npower and EDF Energy – which this week said it was increasing its standard variable prices for gas and electricity customers by 10%. Some councils expect to save hundreds of thousands of pounds by turning off lights at night or converting them to dimmer switches. However some councils admit they may not see savings for another four or five years because of the cost of installing new lights, dimmer switches and complex control systems. And some councils – as well as the Highways Agency, responsible for motorways and major A roads – say that the lights are being turned off to meet “green” targets to cut carbon emissions, by reducing electricity use. Critics say that spending money to meet the targets is a poor use of public funds in a time of recession. The increasing black-out was criticised last night by safety and motoring organisations, who said the economic and environmental benefits were being over-stated and warned that less street lighting would lead to more accidents and more crime. A spokesman for the Royal Society for the Prevention of Accidents said: “The presence of lighting not only reduces the risk of traffic accidents but also their severity. Surveys have show that the public are in favour of street lighting as a way of improving road safety and that, if anything, it needs to be improved in some areas. “There are economic and environmental reasons why some organisations may wish to reduce the amount of lighting. However there are safety reasons why lighting needs to be available.” Paul McClenaghan, commercial director at Halfords, said: “Poor lighting or none at all can make it very difficult for motorists to see hazards or objects clearly at night. Added to this Government figures show that road accidents increase in the week after the clocks change, so it is clear that extra vigilance is needed at this time of the year, from motorists, cyclists and pedestrians.” Paul Watters, head of roads policy at the AA, said: “We do know that most accidents happen in the dark, its also comforting for people, especially if they arrive back from somewhere in the night, when they have got a late train. There are also suggestions that it increases crime. So it may save money in terms of energy but then you have to look at the cost in terms of security, safety and accidents, it may actually be more. We have even heard that some milkmen are having more trips and falls, so it has had some implications you might not think about. “Motorway drivers don’t like changing situations, from light to dark and dark to light, but I don’t think we would argue for no lighting at all. It is extremely comforting for drivers, especially in bad weather.” The switch-off of motorway lights means that 70 per cent of the network is now unlit at night. Sections of the M1, M2, M27, M4, M48, M5, M54, M58, M6, M65 and M66 are now unlit from midnight. One of the sections of the M1 is a 15-mile stretch from just north of Luton to the outskirts of Milton Keyns, one of the heaviest-used sections of any british road. The Highways Agency said the full-switch off had saved it £400,000 last year, while reducing carbon emissions, and said it planned further blackouts. Meanwhile 98 councils said they have switched off or dimmed lights, or planned to in the future. In Shropshire, 12,500 – 70 per cent of the area’s lights – are now switched off between midnight and 5.30am, while Derbyshire County Council plans to turn off 40,000 lights at night. In Lincolnshire, some are turned off from as early as 9pm. Leicestershire County Council expects to save £800,000 a year in energy bills by adapting one third of the country’s 68,000 street lights so that they can be dimmed or turned off at night. Caerphilly in Wales no longer lights industrial estates overnight and Bradford dims 1,800 of its 58,000 street lights between 9.30pm and 5.30am. However Worcestershire County Council postponed plans to switch off and dim lights after it found it would cost more money to implement the scheme than it would save. The authority currently pays £2 million a year to run 52,000 street lights but it found that to reduce that bill by £600,000 a year it would need to invest £3.4 million first. It is now running a trial to dim some lights before a final decision is made. In many areas councils have received complaints from residents. Caroline Cooney, an actress who complained to Hertfordshire County Council when the lights near her home in Bishop’s Stortford were switched off after midnight, said she faced a “black hole” when she returned home from working in the West End of London. “My street is completely canopied by large tress and I could not see my hand in front of my face,” she said. Mrs Cooney, who appeared in Gregory’s Girl and who has also appeared in Casualty, said it was putting people in danger and the council was effectively imposing a “midnight curfew on residents who do not want to take the risk of walking home blind”. “When I came out of the train station it was just like a black hole,” she said. “I simply cannot risk walking home in what is effectively pitch blackness.” However the council told her it could not “provide tailored street lighting for each individual’s particular needs”.
<urn:uuid:25e3cb20-1bc9-4107-affc-6510d1579329>
CC-MAIN-2022-33
https://clinicalnews.org/2012/10/27/street-lights-turned-off-in-their-thousands-to-meet-carbon-emission-targets/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.975655
1,548
2.640625
3
Remembering Steven Weinberg, the Nobel-prize winning physicist who argued with God The Nobel Prize-winning physicist Steven Weinberg, who died on July 23 at age 88, was publicly proud of being an atheist. But he retained a Jewish structure to his thinking throughout his life. Weinberg received the Nobel for his innovations, building on the work of Albert Einstein, in helping to understand how the tiniest components of the universe work. One of his specialized fields, electroweak forces, required hairsplitting analysis worthy of Talmudic scholars. Fortunately, Weinberg was never a weak force himself. His powerful and original research continued until the end of his life, accompanied with an increasing amount of writing for a general readership in which he was inspired by English prose stylists from Edward Gibbon and Lytton Strachey to Anthony Trollope. Religion — and disbelief — were also constant themes. In “The Atheism Tapes” (2004), a BBC-TV documentary series hosted by the British Jewish director Jonatha Miller, the Bronx-born Weinberg told Miller about a “very distinguished” astrophysicist friend — an “Orthodox Jew” who “doesn’t believe in God.” For that astrophysicist, Weinberg said, “religion is a framework for life that he inherited from his parents. He grew up with it, he wants to stay in it. But he doesn’t think there’s anything behind it.” Like that friend, Weinberg didn’t see anything behind ritual observance — he just didn’t participate in that observance, either. Scott Aaronson, a theoretical computer scientist, recalled in a memorial for Weinberg that in 2017, when he invited Weinberg to the brit milah of his newborn son, Weinberg RSVP’d that he would “be happy to come over… another time” — just “not to witness any body parts being cut.” Even so, Weinberg remained preoccupied by Judaism, including in his ardent support of the state of Israel. He also made regular public appearances to advance his viewpoints on related issues. In 1999, during a public debate with John Polkinghorne, a physicist and Anglican priest, at the National Museum of Natural History in Washington, D.C., Weinberg cited the flaming sword that the Book of Genesis says God entrusted to the cherubim to guard the gates of Paradise after Adam and Eve were banished. If God existed, he said, a flaming sword might descend from above and strike him dead to prove it. Polkinghorne suggested that such a test would pose a theological problem, presupposing a vengeful God. “It would be not only a theological problem, but a janitorial problem,” Weinberg joked. In an essay published the same year, in which he rejected the notion of a good and all-powerful God, Weinberg wrote “I have seen a mother die painfully of cancer, a father’s personality destroyed by Alzheimer’s disease, and scores of second and third cousins murdered in the Holocaust. Signs of a benevolent designer are pretty well hidden.” Weinberg added that some believers, like the Puritan English poet John Milton in “Paradise Lost,” justify the amount of evil and suffering in the world by claiming that free will is necessary in human life. To such arguments, he replied, “It seems a bit unfair to my relatives to be murdered in order to provide an opportunity for free will for Germans, but even putting that aside, how does free will account for cancer? Is it an opportunity of free will for tumors?” Speaking to The New York Times in 2000, Weinberg challenged one of the celebrated chapters in the history of the patriarch Abraham. Reacting to the binding of Isaac, in which Abraham is commanded by God to offer his son as a sacrifice in the land of Moriah, he commented: “Even if there is a God, how do you know that his moral judgments are the correct ones? Seems to me Abraham should have said, ‘God, that’s just not right.’” “Many people do simply awful things out of sincere religious belief… because they believe that this is what God wants them to do, going all the way back to Abraham being willing to sacrifice Isaac because God told him to do that,” Weinberg said.” Putting God ahead of humanity is a terrible thing.” Yet Weinberg’s beliefs were eternally complicated, especially when it came to squaring his lack of religious faith with his celebration of Jewishness, particularly in the context of Israel. In a 2008 essay, he described the Jewish state with tourist brochure-style encomiums: “The greatest miracle of our time is the rebirth of Israel in its ancient home. And, with it, the transformation of an inhospitable landscape into the lovely land of Israel, with its tree-lined streets, cafes, universities, its optimistic people, its liberated women, its liberal democracy and rule of law. The continuing miracle is the survival of this remnant of a life-loving people on a sliver of land, despite repeated attacks from hostile Arab armies… Miraculously, in the twentieth century Jews learned again to use arms to defend themselves.” His repetition of the word “miracle” three times in a few lines suggests that he saw the state of Israel — its democracy, its people and especially its women — as a general exception to his overall rejection of religious sensibilities. In a January 2005 issue of Scientific American, he wrote to castigate the periodical for presuming editorially that Albert Einstein would have been “outraged” by modern day Israel. Weinberg asked, “But with whom would he be outraged? The Israeli Jews wanted nothing more than to live peaceably with Arabs when they accepted a small fraction of the original Palestine Mandate in the 1948 U.N. partition, but they were attacked by all neighboring Arab states… Yes, I think Einstein would be outraged. He never forgave Germany for what it had done to the Jews of Europe, and I don’t think he would forgive Arab leaders for what they have done to the Jews of Israel.” In 2007, he cancelled a scheduled lecture at a London symposium in response to what he termed a “widespread anti-Israel and anti-Semitic current in British opinion.” The decisive factor for him was the U.K. National Union of Journalists’ temporary resolution earlier that year to boycott Israeli goods and services. They reversed the decision a few months later. Before this reversal, Weinberg commented: “Given the history of the attacks on Israel and the oppressiveness and aggressiveness of other countries in the Middle East and elsewhere, boycotting Israel indicates a moral blindness for which it is hard to find any explanation other than anti-Semitism.” Weinberg’s personal resolve was honed through a career during which he was seen as a staunch individualist who wrote his scientific papers alone, unlike most scientists, who prefer a more collaborative approach. Graduate students at his longtime academic base of the University of Texas marveled, calling him “Stevie Wonder.” His televised chat with Jonathan Miller ended with his declaration that science is “corrosive of religious belief. And it’s a good thing too.” Miller responded with exultant Tevye-like finger snaps straight out of “Fiddler on the Roof.” Like much of Weinberg’s critique of Judaism and other religions, the conclusion presented an image of an old Jew kvetching about God. So what else is new?
<urn:uuid:719e98e9-f461-4fea-a3cd-90606d8f65c3>
CC-MAIN-2022-33
https://forward.com/culture/473621/weinberg-steven-physics-nobel-prize-religion/?utm_source=rss&utm_medium=feed&utm_campaign=Main
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.970935
1,630
2.640625
3
Seventy-five percent of the world’s online population is from the global South, and nearly half is projected to be women. Yet public knowledge on the internet - exemplified by Wikipedia - is primarily constructed by (white) men from western Europe and North America. One in ten Wikipedia editors are estimated to self-identify as female. In other words, the internet of the majority is produced by the minority. But Wikipedia is only one example of the deeply skewed experience of the internet: from the design and architecture of the internet, to the production and reproduction of knowledge on the internet, this globalised “public sphere” not only reflects the structural and representative inequalities of our world, it can, in many ways, amplify and deepen them. Still, the internet’s socio-technical nature can also engender potentially emancipatory processes in which communities on the “margins” of both the physical and virtual worlds can produce and curate their own knowledge online. Whose Knowledge? is a global, multilingual campaign that aims to make public knowledge and the online experience less white, male, straight, and global North in origin. Using Miranda Fricker’s concept of epistemic injustice and Linda Tuhiwai Smith’s exhortation to decolonize our methodologies, the Whose Knowledge? campaign has supported marginalised communities like Dalits from India and the diaspora, queer activists from Bosnia-Herzegovina, and the Kumeyaay Native American Nation, to begin centering their knowledge online. The authors are feminist scholars, organizers, and technologists, and we describe the practices of decolonizing ourselves in this effort, in particular our approach to embedding feminist and anti-colonial values as we decolonize design, process, and metrics. We offer these possibilities and provocations for thinking further about a future feminist decolonized internet(s).
<urn:uuid:e86bf066-62bc-45ca-ae48-21fce0e3965a>
CC-MAIN-2022-33
https://online.ucpress.edu/gp/article-abstract/2/1/21268/116586/Decolonizing-the-Internet-by-Decolonizing?redirectedFrom=fulltext
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.912387
393
2.625
3
Mithridates VI, also known as Mithridates the Great, was the ruler of the Kingdom of Pontus, a region of northern Anatolia in what is now modern-day Turkey, from 120 to 63 BC. In 120 BC Mithridates’ father, Mithridates V, was assassinated by poison, allegedly as part of a conspiracy lead by his wife, Queen Laodice VI. Throughout his life, the younger Mithridates lived in fear of being poisoned, and began taking small non-lethal doses of various poisons in order to build up an immunity. After a series of wars against the Roman Empire, in 66 BC Mirthridates was defeated by Roman general Pompey at the Battle of Lycus and forced to retreat to the city of Panticapaeum on the Black Sea. There he hoped to gather another army to fight the Romans, but the local population rebelled against his rule and he was forced to commit suicide. At first Mithridates attempted to drink poison, but as he had already built up an immunity this had no effect, and he instead had to ask his bodyguard, Bituitus, to run him through with his sword. Ever since, this practice, known as mithridatism, has appeared in countless works of fiction, perhaps most memorably in the 1987 film The Princess Bride. But is it really possible to immunize yourself against poison by taking tiny doses over time, just like the Dread Pirate Roberts? Well yes and no. The body’s ability to tolerate a given poison depends on its ability to metabolize or break down said poison into a less toxic form, a task largely performed by enzymes in the liver. Thus the poisons one can build immunity to tend to be larger organic molecules. One common example of this is ordinary grain alcohol, or ethanol, which is toxic if consumed in large quantities. The body actually has two lines of defence against ethanol: the stomach and the liver. The stomach secretes small quantities of an enzyme called alcohol dehydrogenase, which converts ethanol into less toxic acetaldehyde. This mechanism exists to counter the small amounts of ethanol – around 3g per day – generated naturally by the fermentation of food in the stomach. However, this small amount of dehydrogenase is easily overwhelmed by most alcoholic beverages, so most of the alcohol we consume is metabolized in the liver. Here, as in the stomach, ethanol is converted into acetaldehyde by alcohol dehydrogenase. However, as acetaldehyde is also toxic it must then be acted upon by another enzyme called acetaldehyde dehydrogenase, which converts it into harmless acetic acid, the main ingredient in white vinegar. Acetic acid is further broken down into carbon dioxide and water, which can then be expelled by the lungs and kidneys. When a person drinks heavily and often, it can stimulate the liver to produce larger quantities of alcohol and acetaldehyde dehydrogenase, accelerating the metabolic process and gradually building a tolerance to alcohol. However, this process can only go so far. An excess of alcohol dehydrogenase can lead to a buildup of toxic acetaldehyde, which can cause alcoholic fatty liver disease – a common affliction among those with chronic alcoholism. This is particularly dangerous for certain individuals – including around 50% of those of Northern Asian descent – who thanks to a mutated gene produce a less efficient version of the acetaldehyde dehydrogenase enzyme. This leads to the rapid onset of acetaldehyde poisoning symptoms – including skin flushing, sweating, increased heart rate, and nausea – after even mild alcohol consumption. Increased levels of alcohol dehydrogenase can also accelerate the metabolism of other substances, such as the barbiturates in sleeping pills, leading the user to take larger amounts and risk overdosing. The rapid breakdown of acetaminophen, a common painkiller, also produces a number of substances toxic to the liver, making this drug potentially dangerous to those with chronic alcoholism. These defence mechanisms can also backfire in other ways, such as when a person consumes methanol. Methanol, or wood alcohol, smells and tastes nearly identical to ethanol but when ingested can be deadly. This is because when acted upon by alcohol dehydrogenase, methanol breaks down into formaldehyde, the chemical used to embalm corpses and preserve biological specimens. Acetaldehyde dehydrogenase further breaks down formaldehyde into formic acid, a highly toxic substance that immediately attacks the optic nerve, causing one of the first symptoms of methanol poisoning: permanent blindness. Formic acid and formaldehyde are also cellular poisons and in high quantities cause the victim’s body to slip into a coma and shut down. During Prohibition in the 1920s, the United States Government added methanol to industrial ethanol – a process known as denaturing – in order to prevent it from being diverted for human consumption. But vast quantities of this denatured alcohol still made it onto the black market, leading to the deaths of an estimated 10,000 people. Another type of poison to which humans can become at least partially immune is the venom of snakes. While composition varies from species to species, snake venom generally contains a combination of complex enzymes such as proteases to dissolve tissues, nucleases to break down DNA, cholinesterase inhibitors to impede nerve function, ATPases to rob cells of their energy, and anticoagulants to encourage bleeding – all of which ensures that whatever creatures the snake bites is guaranteed to have a very bad day. Yet despite snaked possessing this seemingly overpowered cocktail of death, many animals are effectively immune to their bite, including the Mongoose, Secretary Bird, Garden Dormouse, Hedgehog, Wood Rat, Opossum, California Ground Squirrel, and yes, everyone’s favourite furry badass, the Honey Badger. The biological mechanisms which confer this immunity vary widely: Opossum blood contains a peptide that breaks down snake venom proteins, while the proteins of Mongoose cell membranes feature a mutation that protects them from venom proteases. While humans have no such natural protection, it is possible for us to build up a tolerance to snake venom. In fact, inoculation against snakes and other venomous animals is one of the oldest forms of vaccination, with cultures throughout history such as the Pakokku snake cult of Myanmar injecting or tattooing their skin with small doses of venom in order to gain immunity. Unlike with alcohol tolerance, protection is conferred not via metabolic enzymes but rather the immune system, with each exposure generating antibodies to that specific venom. If the inoculated person is bitten again, these antibodies will recognize and latch onto the venom proteins, allowing the immune cells to neutralize them. In more recent years, researchers such as Charles Tanner, Herschel Flowers, and Joel la Rocque have confirmed the effectiveness of the practice by injecting themselves with pure or dried venom. This research lead to the development of the first effective antivenins, which are traditionally manufactured by injecting horses with venom, collecting their blood, and purifying the resulting antibodies. However, there have been numerous incidents where the immune systems of snakebite victims have rejected the horse proteins, leading a number of scientists continue self-experimentation in order to make a safer antivenin. Among the most extreme of these is Tim Friede, a self-taught immunologist from Wisconsin, who over the last 17 years has endured over 200 bites from some of the world’s deadliest snakes. And the results speak for themselves: a bite from an African Black Mamba usually results in an agonizing death within 15 minutes, but for Friede its effects are, according to him, no worse than a handful of bee stings. Working with Dr. Brian Hanley, a microbiologist at University of California and founder of gene therapy startup Butterfly Sciences, Friede hopes that his blood will lead to the development of a universal antivenin for all Old World snakes. Another strange case is that of British rock musician Steve Ludwin, who has been injecting himself with snake venom for the past 40 years. Ludwin’s first encounter with snake venom came at the age of 10 when he visited legendary reptile handler Bill Haast’s Serpentarium in Florida: “Bill Haast came out and draped an indigo snake around my neck. I was aware that he had been injecting himself with snake venom and I just thought it was the wildest thing I had ever heard. When I was 17, I knew I was going to inject snake venom in the future. I felt like Richard Dreyfuss in Close Encounters of the Third Kind , when he had that feeling ‘this means something’. But you know I’ve always loved snakes. I had no idea what it would do to me, but I knew it’d been done before and was curious to see if it was possible to become immune to snake venom.” Ludwin began injecting snake venom in October 1988, slowly working his way up through larger doses and more venomous species. One day in 1991 he injected himself with a mixture drawn from the Pacific Rattlesnake, Eyelash Viper, and Green Tree Viper, only to realize that he had gone too far: “My arm was all red and doughy with a sack of liquid hanging from it and I could see the blood vessels appear. It was like something out of Evil Dead .” Ludwin finally decided to go to the hospital, where the emergency room doctors, who had never treated a snakebite before, administered the common rattlesnake antivenin CroFab. But after spending three days in intensive care without improvement, Ludwin decided to discharge himself from hospital. Incredibly, despite the doctors’ warnings that he would either die or lose his hand, within a week his arm had returned to normal – a recovery Ludwin attributes to his immunization regimen. Today, Ludwin frequently travels to Denmark to have his blood drawn by researchers from the University of Copenhagen and the biotech startup VenomAB. Like Tim Friede, Ludwin hopes that his unique antibodies will eventually lead to a universal antidote for all snakebites, which according to the World Health Organization kill 125,000 people worldwide every year. When it comes to simpler, inorganic poisons, however, the prospective mithridatist is unfortunately out of luck. The majority of these poisons either can’t be broken down by the body or break down into even more toxic substances. Heavy metals like lead, antimony, or cadmium are cumulative poisons, meaning that rather than being metabolized or flushed out of the body, they slowly accumulate within tissues, their toxic effect only growing over time. Certain metals like plutonium, strontium, or radium can be mistaken by the body for calcium or phosphorus and used in its place in forming bones, making it extremely difficult to remove. In addition to being conventionally toxic these metals are also radioactive, and can lead to the development of bone cancer or leukaemia. Another common accumulative metal is Mercury, which tends to collect in the brain. Indeed, this is the origin of the term “mad as a hatter” as milliners would often use various mercury compounds to soften the felt used in making hats, eventually developing chronic mercury poisoning and psychosis. One seeming exception to this rule is Arsenic, to which people can actually develop a certain tolerance. In 2012, researchers from Lund and Uppsala Universities in Sweden conducted a study on the residents of the small Argentinian town of San Antonio de los Cobres in the Andes, where, thanks to natural mineral deposits and centuries of copper mining, the groundwater contains extremely elevated levels of Arsenic. They found that a large proportion of the town’s population possesses a gene called AS3MT, which allows the body to expel arsenic more efficiently. However, this ability was gained not through individual exposure but collectively through natural selection over the past thousand years; it is not possible for an individual to consume small quantities of Arsenic and become immune. Another partial exception is Cyanide, which the liver can metabolize in small quantities using the enzyme rhodanese, converting it into less-toxic thiocyanate. This allows the body to tolerate the small amounts of cyanide found in foods such as apple seeds or almonds. However, unlike alcohol, it is not possible to stimulate the liver to more quickly metabolize cyanide. While the liver can produce more rhodanese, the reaction also depends on the compound thiosulfate, whose supply in the body is limited and cannot be increased. Yet throughout history there have been individuals who appeared to be completely immune to cyanide poisoning. One such person was Grigori Rasputin, the Russian mystic who held great sway over the court of Tsar Nicholas II. In 1916, a group of noblemen lead by Prince Yusupov plotted to assassinate Rasputin, inviting him to Yusupov’s home in St. Petersburg where they offered him wine and cakes laced with cyanide. While Rasputin initially refused, he eventually relented and ate the food seemingly without ill effect. This forced Yusupov and his co-conspirators to shoot Rasputin, wrap him in a carpet, and dump him in the frozen Neva river. Rasputin’s immunity to poison is often attributed to his mystical powers, but the actual explanation is likely far more mundane. The poison the conspirators fed him was likely either potassium or sodium cyanide, which cannot be directly absorbed into the bloodstream. Instead, it must first react with the hydrochloric acid in the stomach, producing hydrogen cyanide gas which can then be absorbed through the stomach wall. Due to a variety of factors including genetics or various diseases, certain individuals cannot produce stomach acid, a condition known as Hypochlorohydria. If Rasputin was such a person, then the cyanide would simply have sat harmlessly in his stomach, making him appear to be immune. So unless your enemies plan to attack you with poisonous snakes – and if so then your life must be awesome – unfortunately mithraditism appears to be largely the stuff of fiction. However, we at Today I Found Out believe in being prepared, and not wanting to fall victims to one of the classic blunders, have spent the last few years building up an immunity to Iocane Powder. If you liked this article, you might also enjoy our new popular podcast, The BrainFood Show (iTunes, Spotify, Google Play Music, Feed), as well as: - The Cancer Pandemics Spread By Bites and Mosquitoes - Why Don’t Vultures Get Sick When Eating Dead Things? - Does Diplomatic Immunity Really Make It So You Can Get Away with Murder? - Why can We Make Vaccines for Some Viruses and Not Others and Why Do Most Experts Think One Will be Successful for Covid-19 Very Soon? Expand for References Mark, Joshua, Mithridates VI, Ancient History Encyclopedia, December 4, 2017, https://www.ancient.eu/Mithridates_VI/ Alcohol and Tolerance, National Institute on Alcohol Abuse and Alcoholism, https://pubs.niaaa.nih.gov/publications/aa28.htm Fatty Liver Disease, Medline Plus, U.S. National Library of Medicine, https://medlineplus.gov/fattyliverdisease.html How is Alcohol Eliminated from the Body? The Alcohol Pharmacology Education Partnership, https://sites.duke.edu/apep/module-1-gender-matters/content/content-how-is-alcohol-eliminated-from-the-body/ Hawthorne, Mark, The Tale of Tattoos, Hinduism Today, August 2001, https://www.hinduismtoday.com/modules/smartsection/item.php?itemid=4068 Snake Venom, bionity.com, https://www.bionity.com/en/encyclopedia/Snake_venom.html Collins, Britt, Poison Pass: the Man Who Became Immune to Snake Venom, The Guardian, February 11, 2018, https://www.theguardian.com/environment/2018/feb/11/poison-pass-the-man-who-became-immune-to-snake-venom-steve-ludwin Boyd, Connor, The Man Immune to Snake Venom, Daily Mail, March 27, 2018, https://www.dailymail.co.uk/news/article-5548807/Scientist-Wisconsin-lets-snake-bite-inject-poison-arm-prove-immunity.html Bittel, Jason, The Animals that Venom Can’t Touch, Smithsonian Magazine, September 30, 2016, https://www.smithsonianmag.com/science-nature/animals-venom-cant-touch-180960658/ Cyanide in Drinking Water, World Health Organization, 2007, https://www.who.int/water_sanitation_health/dwq/chemicals/second_addendum_cyanide_short_term%20_4_.pdf Harkup, Kathryn, Is arsenic eating a clever poisoning plot device or recipe for disaster? The Guardian, February 29, 2016, https://www.theguardian.com/science/blog/2016/feb/29/is-arsenic-eating-a-clever-poisoning-plot-device-or-recipe-for-disaster Steadman, Ian, Humans Can Develop a Genetic Tolerance for Arsenic, Wired, October 17, 2012, https://www.wired.co.uk/article/genetic-immunity-to-arsenic
<urn:uuid:4e19d110-dd1b-4abc-9630-753e3e0eddce>
CC-MAIN-2022-33
https://samoohamu.com/can-you-really-make-yourself-immune-to-poison-by-taking-tiny-doses-over-time
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.949384
3,686
2.859375
3
Organisms interact with each other and their environment in ecosystems. The role of consumers in an ecosystem is to obtain energy by feeding on other organisms and sometimes transfer energy to other consumers. Changes that affect consumers can impact other organisms within the ecosystem. Components of an Ecosystem Ecosystems contain all the living and nonliving parts of an environment. Nonliving, or abiotic, components include: - carbon dioxide Plants, animals, protists, fungi and bacterial make up the biotic, or living, parts of ecosystems. Organisms within an ecosystem can be classified into two main categories: those that produce their own food and those that consume other organisms for food. Producer Definition: Autotrophs The foundation of any ecosystem is the primary source of energy: sunlight. Plants and other photosynthesizing organisms use light energy from the sun – together with water and carbon dioxide – to produce carbohydrates that they use for energy. These organisms are called autotrophs, meaning they make their own food. Autotrophs are producers in an ecosystem because they provide energy for other organisms. Consumer Definition: Heterotrophs Organisms that cannot make their own food are called heterotrophs, because they obtain food from other organisms rather than themselves. All heterotrophs are consumers and are classified by the type of organisms they eat and their place in the ecosystem. Primary consumers feed directly on plants and other producers. Secondary consumers feed on primary consumers, and tertiary consumers feed on secondary consumers. Consumer examples include mammals, birds, fish, reptiles, amphibians, insects, fungi and microscopic organisms such as protozoa and some types of bacteria. Consumer interactions and behaviors are characterized by the relationship between predators and prey. Secondary and tertiary consumers can be predators if they feed on other live consumers. An apex predator is the top consumer in an ecosystem and is not preyed upon by other predators. The Role of Decomposers Decomposers are a type of consumer with a specific role in an ecosystem. They eat dead organisms, both producers and other consumers, and break down the remains. Decomposers process decaying tissues and return nutrients and other necessary molecules to the environment for producers to use. Molds, bacteria, protozoa and earthworms are examples of decomposers. Food Webs and Food Chains A food web shows the flow of energy between organisms in an ecosystem. Producers convert light energy into chemical energy in the form of glucose. Some of this energy is transferred to primary consumers when they eat producers. When a primary consumer becomes prey to a secondary consumer, energy transfers from the prey to the predator. When producers, prey and predators die, a portion of the energy is transferred to decomposers. The transfer of energy is indicated by an organism’s trophic level, or feeding level, within a food web. The linear movement of a series of energy transfers within a food web from one trophic level to another is called a food chain. Consumers and Trophic Cascades Factors that impact one trophic level can also affect organisms within other trophic levels in a series of events called a trophic cascade. A change in the environment that affects apex predators is called a top-down effect. If the population of apex predators decreases due to disease or habitat loss, it can cause an increase in the population of prey species that make up the primary and secondary consumers in other trophic levels. An increase in these populations can result in a shortage of producers because there are more organisms feeding on limited resources. When environmental conditions cause a decrease in the populations of producers, it results in a bottom-up effect. Smaller populations of producers mean less food is available to primary consumers. The effects are felt through all the trophic levels of consumers as there is less energy available at each level. About the Author A.P. Mentzer graduated from Rutgers University with degrees in Anthropology and Biological Sciences. She worked as a researcher and analyst in the biotech industry and a science editor for an educational publishing company prior to her career as a freelance writer and editor. Alissa enjoys writing about life science and medical topics, as well as science activities for children
<urn:uuid:ffcb0c97-f906-4acb-89dd-6b1ac9d39ef7>
CC-MAIN-2022-33
https://sciencing.com/role-consumer-ecosystem-5770576.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.932818
904
3.90625
4
In addition to processing copper concentrates, recycling copper scrap, alloy scrap and other recycling materials is a central business activity in copper production at Aurubis. Raw material purchasing is managed centrally by Aurubis AG’s Supply Chain Management. Metal recycling means raw material security and environmental protection Europe has a high copper demand but limited natural resources. Metal recycling opens up the metal reserves found in products and therefore makes a considerable contribution to the supply of copper and other metals. Copper recycling fulfills the criteria for sustainable development and is the foundation of modern recycling management. It conserves natural resources, reduces energy demand and prevents the loss of valuable materials. Most non-ferrous metals and precious metals have outstanding recovery properties. Recycling copper, silver, gold and other non-ferrous metals doesn’t lead to losses of quality in the metals and can be repeated as often as desired. State-of-the-art recycling technologies Aurubis efficiently processes a variety of recycling raw materials and recovers the individual metals in an environmentally sound manner that conserves resources with state-of-the-art recycling technologies. About 700,000 t of recycling raw materials of varying qualities and compositions are processed annually in our facilities. Metal recycling at Aurubis Recycling at Aurubis starts with a reliable acceptance and assessment of the material, which includes precise chemical analysis, preparation and pyrometallurgical and hydrometallurgical processing. It ends with the fabrication of high-quality products. - Bare wire scrap - Lead scrap - Precious metal-bearing copper scrap - Electronic scrap - Copper and aluminum cable scrap - Copper-lead granules - Copper-iron material - Copper granules - Copper-bearing residues - Copper-brass radiators - Copper refining material - Copper remelting blocks - Printed circuit boards - Materials from the waste management industry - Brass refining material - Metal hydroxide slimes, foundry sands, catalysts - Non-ferrous metal shredders - Red brass refining material - Tin/lead-bearing recycling raw materials
<urn:uuid:612a4266-cbd2-4fe8-a8e0-fa6d6a932d83>
CC-MAIN-2022-33
https://www.aurubis.com/en/products/recycling/metal-recycling
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.873922
450
2.640625
3
Sexual reproduction is a fundamental aspect of life. It is defined by the occurrence of meiosis and the fusion of two gametes of different sexes or mating types. Sex-determination mechanisms are responsible for the sexual fate and development of sexual characteristics in an organism, be it a unicellular alga, a plant, or an animal. In many cases, sex determination is genetic: males and females have different alleles or different genes that specify their sexual morphology. In animals, this is often accompanied by chromosomal differences. In other cases, sex may be determined by environmental (e.g. temperature) or social variables (e.g. the size of an organism relative to other members of its population). Surprisingly, sex-determination mechanisms are not evolutionarily conserved but are bewilderingly diverse and appear to have had rapid turnover rates during evolution. Evolutionary biologists continue to seek a solution to this conundrum. What drives the surprising dynamics of such a fundamental process that always leads to the same outcome: two sex types, male and female? The answer is complex but the ongoing genomic revolution has already greatly increased our knowledge of sex-determination systems and sex chromosomes in recent years. This novel book presents and synthesizes our current understanding, and clearly shows that sex-determination evolution will remain a dynamic field of future research. The Evolution of Sex Determination is an advanced, research level text suitable for graduate students and researchers in genetics, developmental biology, and evolution. 1: What are sexes, and why are there sexes? 2: The diversity of sexual cycles 3: Molecular mechanisms of sex determination 4: The quantitative genetics of sex determination 5: The evolution of sex chromosomes 6: Evolutionary correlates of sex-determination systems 7: Transitions among sex-determination systems Leo Beukeboom is full professor in Evolutionary Genetics at the Centre of Ecological and Evolutionary Studies of the University of Groningen (Netherlands). His expertise is in organismal evolution with special interest in speciation, life history evolution, reproductive systems, sex determination and selfish genetic elements. His current research focuses on the interaction of genetic mechanisms of sex determination with life history traits in insects, Experimental study systems include species of haplodiploid parasitoid wasps and the polymorphic sex determination system of houseflies. Nicolas Perrin is full professor at the Department of Ecology and Evolution, University of Lausanne (Switzerland). His wide-ranging interests across evolutionary ecology led him to work on a diversity of topics, from life-history theory and optimal resource allocation to the evolution of mate choice and mating systems, population genetics and phylogeography, habitat and niche modeling, and the evolution of dispersal, kin structures and social systems. His present research focuses on sex-determination systems, integrating evolutionary modeling approaches with empirical work on the dynamics of sex chromosomes, using amphibians as model organisms.
<urn:uuid:84c41d8a-9203-4f11-b2f5-818959da2837>
CC-MAIN-2022-33
https://www.nhbs.com/the-evolution-of-sex-determination-book
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.906512
593
3.34375
3
The term "risk and return" refers to the potential financial loss or gain experienced through investments in securities. An investor who has registered a profit is said to have seen a "return" on his or her investment. The "risk" of the investment, meanwhile, denotes the possibility or likelihood that the investor could lose money. If an investor decides to invest in a security that has a relatively low risk, the potential return on that investment is typically fairly small. Conversely, an investment in a security that has a high risk factor also has the potential to gamer higher returns. Return on investment can be measured by nominal rate or real rate (money earned after the impact of inflation has been figured into the value of the investment). Different securities—including common stocks, corporate bonds, government bonds, and Treasury bills—offer varying rates of risk and return. As Richard A. Brealey and Stewart C. Myers noted in their book Principles of Corporate Finance, "Treasury bills are about as safe an investment as you can get. There is no risk of default and their short maturity means that the prices of Treasury bills are relatively stable." Long-term government bonds, on the other hand, experience price fluctuations in accordance with changes in the nation's interest rates. Bond prices fall when interest rates rise, but they rise when interest rates drop. Government bonds typically offer a slightly higher rate of return than Treasury bills. Another type of security is corporate bonds. Those who invest in corporate bonds have the potential to enjoy a higher return on their investment than those who stay with government bonds. The greater potential benefits, however, are available because the risk is greater. "Investors know that there is a risk of default when they buy a corporate bond," commented Brealey and Myers. Those corporations that have this default option, though, "sell at lower prices and therefore higher yields than government bonds." In the meantime, investors "still want to make sure that the company plays fair. They don't want it to gamble with their money or to take any other unreasonable risks. Therefore, the bond agreement includes a number of restrictive covenants to prevent the company from purposely increasing the value of its default option." Investors can also put their money into common stock. Common stockholders are the owners of a corporation in a sense, for they have ultimate control of the company. Their votes—either in person or by proxy—on appointments to the corporation's board of directors and other business matters often determine the company's direction. Common stock carries greater risks than other types of securities, but can also prove extremely profitable. Earnings or loss of money from common stock is determined by the rise or fall in the stock price of the company. There are other types of company stock offerings as well. Companies sometimes issue preferred stock to investors. While owners of preferred stock do not typically have full voting rights in the company, no dividends can be paid on the common stock until after the preferred dividends are paid. Many types of risk loom for investors hoping to see a return on their money, noted Jae K. Shim and Joel G. Siegel in their Handbook of Financial Analysis, Forecasting, and Modeling. Business risk refers to the financial impact of basic operations of the company. Earnings variables in this area include product demand, selling price, and cost. Liquidity risk is the possibility that an asset may not be sold for its market value on short notice, while default risk is the risk that a borrower company will be unable to pay all obligations associated with a debt. Market risk alludes to the impact that marketwide trends can have on individual stock prices, while interest rate risk concerns the fluctuation in the value of the asset as a result of changes in interest rate, capital market, and money market conditions. Individual risk aversion is thus a significant factor in the dynamics of risk and return. Cautious investors naturally turn to low-risk options such as Treasury bills or government bonds, while bolder investors often investigate securities that have the potential to generate significant returns on their investment. Certain types of common stock that fit this description include speculative stocks and penny stocks. Many factors can determine the degree to which an investor is risk averse. William B. Riley Jr. and K. Victor Chow contended in Financial Analysts Journal that "relative risk aversion decreases as one rises above the poverty level and decreases significantly for the very wealthy. It also decreases with age—but only up to a point. After age 65 (retirement), risk aversion increases with age." Riley and Chow note that decreases in risk aversion often parallel higher degrees of education as well, but speculate that "education, income and wealth are all highly correlated, so the relationship may be a function of wealth rather than education." Economically disadvantaged families are, on the surface, often seen as risk-averse; in actuality, however, decisions by these households to avoid investment risk can be traced to a lack of discretionary income or wealth, rather than any true aversion. As Riley and Chow noted, "risk aversion can … be expected to decrease as an individual's wealth increases, independent of income. Someone whose stock of wealth is growing can be expected to become less risk averse, as her tolerance of downside risk increases." [ Laurie Collier Hillstrom ] Becker, Gary S. "You Want High Returns? Brace Yourself for High Risk." Business Week, 19 October 1998, 15. Brealey, Richard A., and Stewart C. Myers. Principles of Corporate Finance. 5th ed. New York: McGraw-Hill, 1996. Riley, William B., Jr., and K. Victor Chow. "Asset Allocation and Individual Risk Aversion." Financial Analysts Journal 48, no. 6 (November/December 1992): 32. "Risk and Return: Keeping a Level Head." Financial Times, 10 October 1998, WFT7. Shim, Jae K., and Joel G. Siegel. Handbook of Financial Analysis, Forecasting, and Modeling. Englewood Cliffs, NJ: Prentice-Hall, 1988. Simon, Ruth. "Bonds Let You Sleep at Night, but at a Price." Wall Street Journal, 8 September 1998, Cl.
<urn:uuid:bf408408-3f84-4c2a-8d90-f0a12d61b6df>
CC-MAIN-2022-33
https://www.referenceforbusiness.com/encyclopedia/Res-Sec/Risk-and-Return.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.954426
1,262
2.984375
3
Programs should utilize multi-joint multi-planer exercise that enhances the nervous systems’ ability to recruit subsystems (muscle synergies) through improved coordination of muscles working together as a unit. Introduction: In athletics, muscles work in coordinated synergies to create movements and accelerate, decelerate and stabilize forces. Athletic movements that are recruited by the nervous system are termed muscle synergies. Muscles synergies work as a coordinated unit to isometrically stabilize, accelerate, and decelerate forces during athletic movements and rarely work in isolation. There are four main muscular subsystems that you can develop with specific exercises in order to develop optimal performance in athletes. These include the anterior oblique subsystem, deep longitudinal subsystem, lateral subsystem and posterior oblique subsystem.
<urn:uuid:a95fe2ac-402d-45dd-80b6-af338e109250>
CC-MAIN-2022-33
https://www.sportsengine.com/article/baseball/training-subsystems-baseball
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.890269
162
3.359375
3
Avian influenza virus (AIV) causes acute infectious diseases in poultry, critically impacting food supply. Highly pathogenic avian influenza viruses (HPAIVs), in particular, cause morbidity and mortality, resulting in significant economic losses in the poultry industry. To prevent the spread of HPAIVs, detection at early stages is critical to implement effective countermeasures such as quarantine and isolation. Through a viral fusion mechanism, cell-mimetic nanoparticles (CMPs), developed in the current study, can rapidly detect HPAIV and low pathogenic AIV (LPAIV). The CMPs comprise polymeric nanoparticles, which are constructed using sialic acid and fluorescence resonance energy transfer (FRET) dye pairs that expose the FRET off signal in response to LPAIV and HPAIV, after activation by enzymatic cleavage in the endosomal environment. The CMPs detect a wide variety of LPAIVs and HPAIVs in biological environments. Additionally, the cross-reactivity of CMPs is determined by testing their function with different viral species. Therefore, these findings demonstrate the significant potential of the proposed strategy for mimicking viral infection in vitro and using them as a highly effective diagnostic assay to rapidly detect LPAIV and HPAIV, preventing economic losses associated with viral outbreaks. Bibliographical noteFunding Information: This research was supported by grants from the Korea Mouse Phenotyping Project ( NRF-2019M3A9D5A01102797 ) of the Ministry of Science and ICT through the National Research Foundation (NRF) . S. Haam acknowledges support from the Korea Environment Industry & Technology Institute (KEITI) through the Technology Development Project for Biological Hazards Management in Indoor Air Project, funded by Korea Ministry of Environment (MOE) ( RE202101004 ). This work was also funded by Bio & Medical Technology Development Program of the National Research Foundation through the Ministry of Science & ICT ( NRF-2018M3A9E2022819 ). © 2022 Elsevier B.V. All Science Journal Classification (ASJC) codes - Biomedical Engineering
<urn:uuid:71cce535-a187-4a81-b194-03b3044d0785>
CC-MAIN-2022-33
https://yonsei.pure.elsevier.com/en/publications/cell-mimetic-biosensors-to-detect-avian-influenza-virus-via-viral
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00088.warc.gz
en
0.875804
467
2.765625
3
category:Building materials / date:2022-06-27 00:10:24 / browse:115 / comment:6 I-beam is widely usedI-beam, also known as universal beam, is a long strip of steel with I-shaped section. I-beam is divided into ordinary I-beam and light I-beam. It is a section steel with I-type section shape.San Rafael,In order to improve the corrosion resistance of steel pipe, the general steel pipe (black pipe) is galvanized. The galvanized pipe is divided into hot-dip galvanizing and electric steel zinc. The hot-dip galvanizing layer is thick and the cost of electric galvanizing is low, so there is galvanized pipe.Advantages of using I-beam: reduce maintenance cost, reduce downtime improve equipment operation rate, reduce wear, reduce equipment capacity and increase power consumptionGuinea-Bissau,Alloy pipes are widely used in building materials, and the test standards of alloy pipes are also different. Alloy pipe has high hardness and can be used at many levels, most of which is prestressed reinforcement. Where plastic deformation is not specified but compressive strength is specified,San RafaelHow much is the price of welded pipe per ton, such stainless steel plate can be applied.I-beam, whether ordinary or light can only be directly used for bending members or lattice members on its Web because of its large and narrow section size and large moment of inertia difference between the two main axes on the section. It is not suitable for axial compression members and flexural members perpendicular to the web plane, its utilization value is higher, the chemical composition of alloy pipe contains more Cr, and its performance of high temperature resistance, low temperature resistance and corrosion resistance. Ordinary carbon seamless tubes do not contain alloy components or have few alloy components. Alloy tubes are widely used in petroleum, aerospace, chemical industry, electric power, boiler and other industries because the mechanical properties of alloy tubes change and are easy to adjust. Direct rolling pass system. The direct rolling pass system refers to the pass system in which the two open legs of the I-beam pass are on the same side of the roll axis at the same time, and the waist is parallel to the roll axis.Characteristics and application of galvanized pipeDehydrogenation solution: the alloy pipe shall be dehydrogenated after passivation treatment to avoid alkali embrittlementtechnical service, The defects can be removed by grinding with sand wheel, but the remaining wall thickness must be within the allowable standard.What is nitriding of alloy pipeAfter isothermal quenching treatment, the modified LNs steel of case hardening steel also has the surface compressive stress characteristics obtained by heat treatment. At present, there is still a big gap in the production technology of C-section steel between China and foreign countries.Where to sell API,The delivery length of I-beam is divided into fixed length and double length, and the allowable difference is specified in the corresponding standards. The length selection range of domestic I-beam is divided into -, - and - according to different specification numbers. The length selection range of imported I-beam is generally -.Galvanized; hot-rolling;Plan scheme : for high carbon steel with carbon content of more than .% and high chromium alloy pipe with chromium content of no less than % the interval is min.San Rafael,Because alloy pipe is a very unique pipe fitting, we must use appropriate methods to carry out installation in the case of installation, when installing alloy pipes, we will use some flanges and elbows to fix them, when we carry out use, we must ensure the quality of flanges and elbows,San RafaelQ345 straight seam welded pipe,San RafaelHow much is 2-inch galvanized pipe per meter, so as to ensure the actual effect of alloy pipe assembly. If there are instrument panel components that must be assembled on the pipeline, they must be installed together.What is the stainless steel passivation of alloy pipe?The finished product has smooth surface, low friction coefficient, flatness error + / - mm / m length, wear resistance and maximum temperature of ℃
<urn:uuid:e3babd6c-c1ec-424d-945a-db3aaed58c8c>
CC-MAIN-2022-33
http://gigawork.freeadvertisingvillage.com/2068content.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.91437
869
2.84375
3
An FAA environmental assessment has given the OK for SpaceX to test its Grasshopper reusable launch vehicle at its site in McGregor, Texas. The RLV is designed to test technologies needed to fully recover Falcon 9 stages for reuse. After reviewing and analyzing currently available data and information on existing conditions and the potential impacts of the Proposed Action, the FAA has determined that issuing an experimental permit to SpaceX for operation of the Grasshopper RLV at the McGregor test site would not significantly impact the quality of the human environment. Therefore, preparation of an Environmental Impact Statement is not required, and the FAA is issuing this FONSI. The FAA made this determination in accordance with all applicable environmental laws. The Final EA is incorporated by reference in this FONSI…. PROPOSED ACTION: The Proposed Action is for the FAA/AST to issue an experimental permit to SpaceX, which would authorize SpaceX to conduct suborbital launches and landings of the Grasshopper RLV from the McGregor test site in McGregor, Texas. SpaceX has determined that to support the Grasshopper RLV activities under the experimental permit, it would be necessary to construct a launch pad and additional support infrastructure. Therefore, the Proposed Action analyzed in the Final EA includes the activities that would be authorized by the experimental permit (i.e., the operation of the launch vehicle) as well as the construction of the launch pad and related infrastructure. The experimental permit would be valid for one year and would authorize an unlimited number of launches. The FAA/AST could renew the experimental permit if requested, in writing, by SpaceX at least 60 days before the permit expires. SpaceX anticipates that the Grasshopper RLV program would require up to 3 years to complete. Therefore, the Proposed Action considers one new permit and two potential permit renewals. Although an experimental permit would authorize an unlimited number of launches, the FAA/AST must estimate the number of launches in order to analyze potential environmental impacts. In conjunction with SpaceX, the FAAIAST developed a conservative set of assumptions regarding the possible number of launches that could be conducted under anyone experimental permit for the Grasshopper RLV at the McGregor test site. The FAA/AST has assumed that SpaceX would conduct up to 70 annual suborbital launches of the Grasshopper RLV under an experimental permit at the McGregor test site. This estimation is a conservative number and considers potential multiple launches per day and potential launch failures. The full assessment is here.
<urn:uuid:86cd6437-bc53-4fc7-83d9-5abcd32caab7>
CC-MAIN-2022-33
http://www.parabolicarc.com/2011/11/18/faa-assessment-clears-way-for-spacex-grasshopper-tests/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.938095
499
2.5625
3
16 Fast Facts About ALS Amyotrophic lateral sclerosis (ALS) is a disease that causes the degeneration of motor neurons, eventually leading to a loss of movement and patients being unable to breathe without assistance. We’ve put together a list of fast facts about ALS with help from the National Institute of Neurological Disorders and Stroke. - ALS can strike at any time, but it most commonly strikes between the ages of 55 and 75. - It’s estimated that between 14,000 and 15,000 Americans have ALS. - It affects slightly more men than women. - Military veterans are 1 1/2 to two times more likely to develop ALS than people who haven’t served in the military. - Ninety percent of ALS cases are considered “sporadic,” meaning there is no clear reason for the disease’s development. - Five to 10 percent of ALS cases are familial and due to mutated genes. - The first symptoms of the disease often appear in either a hand or a leg and is referred to as “limb-onset ALS.” - For others, the first symptoms are speech or swallowing difficulties, called “bulbar-onset ALS.” - The spread of symptoms differ from patient to patient but eventually, all patients will lose the ability to move and breathe on their own. - ALS does not affect mental ability. - ALS patients burn calories faster than non-sufferers and as a result are often underweight. - There isn’t one test to diagnose ALS. Diagnosis is done through a variety of observations and scans. - There is no known cause of ALS but researchers think that it is a combination of genetics and environmental triggers. - Researchers are studying exposure to toxic substances, diet, and physical trauma as potential causes of the disease. - There is no cure or effective therapy for ALS. Patients will undergo palliative therapy to make them as comfortable as possible. - However, the drug Rilutek can offer patients a few extra months as the drug has been shown to slightly reduce motor neuron damage. ALS News Today is strictly a news and information website about the disease. It does not provide medical advice, diagnosis or treatment. This content is not intended to be a substitute for professional medical advice, diagnosis, or treatment. Always seek the advice of your physician or another qualified health provider with any questions you may have regarding a medical condition. Never disregard professional medical advice or delay in seeking it because of something you have read on this website.
<urn:uuid:9071b950-588a-452f-a925-b7649a8582b2>
CC-MAIN-2022-33
https://alsnewstoday.com/social-clips/fast-facts-about-als/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.95179
531
3.390625
3
The world is not on track to achieve the Sustainable Development Goals for urban sanitation. There is chronic underfunding and a lack of innovative thinking in the urban sanitation sector. However, there is a growing shift towards a citywide inclusive sanitation (CWIS) framework which, brings more contextual, sustainable, and equitable solutions. Adding to the situation’s complexity is the urgent need for the sanitation sector to consider its climate impact as a significant contributor to greenhouse gas emissions. This session will explore the opportunities and limitations of using Container-Based Sanitation, an innovative system of sanitation service delivery, to address the urban sanitation crisis. Speakers will address cost-effectiveness, results-based financing, human rights, carbon credits, and climate change impacts. In addition, this webinar will delve into the reality of providing essential human rights services to the most vulnerable populations. Date & Time September 13 at 5 pm (PDT)/ September 14 at 8 am (HK time) Kory Russel (University of Oregon) and Isabella Montgomery (Container Based Sanitation Alliance) This webinar brings together representatives from five different Container-Based Sanitation organizations providing services across South America, Africa, and South Asia to discuss how the Sustainable Development Goals for urban sanitation coverage can be achieved. View the recording here.
<urn:uuid:04bd535a-e54e-4935-af02-4dfcc813e07e>
CC-MAIN-2022-33
https://apru.org/event/session-3-urban-sanitation-and-the-sustainable-development-goals-the-role-of-container-based-sanitation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.880397
272
2.75
3
Image compression is the process of minimizing the size in bytes of a photo, image, or graphics file without degrading the image quality to an unacceptable level. The file size is reduced to make sure that you can store a greater number of images in the same disk or memory space. Reducing the image size might also be necessary if you want to attach it in an email. You can compress different types of image files that include: When optimizing your images, you can choose between two types of compression: lossy and lossless image compression. Lossy image compression is the process of reducing an image’s size where some data from the original image file is lost. And this process is irreversible, which means that you can’t go back to the original image. Lossless image compression is the process of reducing an image’s size where the image quality is not affected. For this, the image compressors remove unnecessary metadata from the PNG and JPG/JPEG image files. You should choose to compress your images using the lossless image compression method as it allows you to retain the quality of your images while reducing their file sizes. Here’s an example of lossless image compression: The main purpose of image compression is to reduce the size of your image file. Wondering why you might need to reduce an image’s size? Here are a few possible reasons: Image compression has now become easier than ever. Compress your PNG and JPG/JPEG images online for free. TinyImage allows you to compress up to five images (max. 5 MB each) in one go.
<urn:uuid:5b635fe1-5bd4-41db-8dac-e76928b48e3c>
CC-MAIN-2022-33
https://attrock.com/image-compression-tool/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.90363
340
3.5625
4
80 implementations of the same set of requirements are compared for several properties, such as run time, memory consumption, source text length, comment density, program structure, reliability, and the amount of effort required for writing them. The results indicate that, for the given pro- gramming problem, which regards string manipulation and search in a dictionary, “scripting languages” (Perl, Python, Rexx, Tcl) are more productive than “conventional lan- guages” (C, C++, Java). In terms of run time and mem- ory consumption, they often turn out better than Java and not much worse than C or C++. In general, the differences between languages tend to be smaller than the typical dif- ferences due to different programmers within the same lan- guage. The study was published in 2000 and a lot has changed in the iterim with lots of progress both in JVMs and in scripting languages, making me wonder how the same study would look today.
<urn:uuid:c84e4a74-4875-4f82-878a-ed62ee391499>
CC-MAIN-2022-33
https://bitworking.org/news/2009/10/empirical/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.953805
210
2.5625
3
US to not have ‘White Christmas’, though some states report snow – CVBJ Effects of a snowfall at the start of the year in New York. Photo: Dia Dipasupil /. Areas of New York woke up this Friday, Christmas Eve, to a little snow; however, experts do not predict that the United States will see a “White Christmas” this year. According to the National Oceanic and Atmospheric Administration (NOAA), areas further northeast and west of the country could experience highest amount of snow between Christmas Eve and Christmas. Much of Idaho, Minnesota, Maine, upstate New York, Pennsylvania and West Virginia would be the states most likely to witness snowfall. In the Rocky Mountains and Sierra Nevada, the prognosis is higher. In the northwest, freezing conditions that will include rain will continue until the weekend. Cities like Seattle, Washington, and Portland, Oregon will also see the snowflakes fall. But, the chances of a white Christmas have generally diminished. Experts attribute the new scenario to climate change Between 1981 and 1990, approximately, 47% of the country experienced snowfall on Christmas Day, averaging 3.5 inches, according to University of Arizona data cited by Today on Thursday. But, between 2011 and 2020, snowfall fell to 38%, with an average depth of 2.7 inches. This would react to warmer temperatures due to the aforementioned phenomenon, according to Northern Illinois University professor of meteorology Victor Gensini. For his part, Mark Serreze, director of the National Ice and Snow Data Center in Boulder, Colorado, said that in 20 and 30 years of climate change, forecasts of a White Christmas in many parts of the United States will be slim. The change, according to scientists, is relatively small, so it is not recommended to generalize to the extreme. The fascination with the idea of ââsnowy Christmas dates back to 1942 when theThe song “White Christmas” by Bing Crosby in the movie “Holiday Inn. What is a “white Christmas” in meteorological terms Experts consider it a “White Christmas” when at least an inch of snow is recorded on the ground on the morning of December 25th. It doesn’t have to be snowing that day for this to happen. You may be interested in: Delta and United Airlines cancel more than 200 flights before Christmas due to Omicron variant of coronavirus
<urn:uuid:4a31e6a2-cc61-4e61-b561-c557635bdeec>
CC-MAIN-2022-33
https://denversnow.co/us-to-not-have-white-christmas-though-some-states-report-snow-cvbj/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.926037
516
2.890625
3
People tend to use benzodiazepines because they work, plain and simple. A group of prescription sedatives, benzodiazepines are classified as Schedule IV in the Controlled Substances Act and are most commonly prescribed to treat anxiety, namely under the brand names Xanax, Ativan, and Valium.1 They work on the neurotransmitter GABA (gamma-amino butyric acid) to calm nerve impulses, which also helps calm anxiety. The state of wellbeing that results quickly creates loyal fans of its users—for many, this is where the trouble can begin. Most people understand that they should take a prescription medication as instructed, yet perhaps fewer fully understand the implications of deviating from their prescription. This is particularly dangerous with benzos, since their chemical composition and action in the body make them especially easy to abuse. These 5 alarming facts about benzo addiction may surprise you. 1. Becoming Addicted Is Shockingly Easy Researchers discovered that when you take a benzo, your dopamine levels surge, which floods your brain with the feel-good neurotransmitter.2 This sudden, strong wave of pleasure is understandably rewarding and, to some, can prove irresistible. In fact, researchers found that the addictive power of benzos was similar to that of opioids, cannabinoids, and GHB—all substances with exceptionally strong addictive qualities. They believe that as benzos accumulate in the body, they actually alter the structure and function of certain receptors in the brain that make them more susceptible to excitable surges from other neurotransmitters, and further increase and intensify dopamine rushes.2 All of these chemical actions add up to a high many people do not wish to give up, and the progression from use to abuse to addiction can occur shockingly quickly. On average, tolerance can develop after just 6 months of use, though it is possible to become physically dependent sooner. It’s estimated that at least 44% of users eventually become dependent on benzos.3 2. Quitting Is Devastatingly Difficult Once your body has become dependent on the benzo, simply deciding to quit is not so simple at all. First, completely stopping the medication is never advised, and will likely result in severe withdrawal symptoms, including:4 - Muscular pain. - Difficulty concentrating. - Perceptual changes. - Sleep disturbance. - Increased tension and anxiety. - Panic attacks. - Heart palpitations. - Muscle tremor. And for those on high doses of the medication, withdrawal has led to seizures and psychosis. What’s more, even if you’ve only taken a benzodiazepine at low doses as prescribed, you may still experience very difficult withdrawal symptoms. 5 It is this experience that typically prevents people from trying to quit benzos again. However, for those who determine to quit, following closely a doctor’s recommended guidelines for slowly weaning off the benzo was most effective—if still painful. 3. Using Often Creates Cognitive Impairment As increasing numbers of people were prescribed benzos—and stayed on them for years, despite their recommended short-term application—and doctors noticed a worrying trend: cognitive impairment in the form of forgetting things they previously knew or could easily recall, and forgetting how to perform tasks they once knew. So researchers explored the connection between these impairments and benzodiazepine use and found consistent links between doses of the medication and cognitive deficiencies. Especially telling was the fact that study participants who were both older and younger than age 60 experienced the same impairment as a result of benzo use, thus reducing the alternative explanation that the declines were due to natural aging in the older demographic.6 Still, the cognitive impairment studied here fell short of dementia. But this is not always the case… 4. Developing Alzheimer’s Disease Is Far More Likely As numbers of long-term-use benzodiazepine prescriptions for the elderly sharply rose (31.4% of people ages 65-80 prescribed vs. 14.7% of people, ages 18-35),7 so too did a disturbing trend: Alzheimer’s Disease.8 In a study that considered length of benzo use (at least 5 years) and corrected for other variables including health and demographics, as well as when each person was first diagnosed with Alzheimer’s in relation to their benzo use, the evidence was clear: long-term benzo use is positively associated with an increased risk of Alzheimer’s. And the more a person took benzos, the higher the risk for developing the neurodegenerative disease—84% higher for those who took the drug for 6 months or longer. The researchers of the study concluded that “unwarranted long-term use of these drugs should be considered as a public health concern.”8 5. Dying Early Is a Tragic Possibility Not only must people considering beginning a benzodiazepine regimen weigh risks such as addiction, difficult withdrawal, cognitive impairments and an increased risk of Alzheimer’s, they must also understand that benzo use could, in fact, kill them. More than an alarmist warning, this last fact is supported by extensive research. In a study that examined more than 100,000 participants’ medical records, researchers discovered that benzodiazepines were associated with greatest number of early deaths among all the prescription medications tested.9 The study’s results state the statistically significant chances of early death double with the prescription of a benzodiazepine. 9 These findings remained significant and reflected a dose-response pattern after a 12-month follow-up with participants. Given the serious concerns around benzos, it is important to carefully consider all of your health needs, as well as short- and long-term goals, with a licensed treatment professional. How to Get Help for Benzodiazepine Addiction If you or someone you love is struggling with your benzodiazepine use, it may be time to seek help. Professional drug and alcohol addiction treatment programs can provide the support you need. You can contact a representative with American Addiction Centers (AAC) for free at for more information about treatment options. You can also check your insurance coverage online now. Insurance Coverage for Benzo Addiction Treatment Find out if your insurance coverage includes benzo addiction rehab and treatment by visiting the links below: Recommended Benzodiazepine Rehab-Related Articles - Benzodiazepine Overdose - Finding Help for Benzodiazepine Addiction - Inpatient Rehab Programs - Outpatient Rehab Programs - 3-Day, 5-Day and 7-Day Detox Programs - Using Insurance to Pay for Treatment - Treatment Without Insurance - How to Help Someone With Drug Addiction - Rehab Centers Near Me 1. Center for Substance Abuse Research. (2013). Benzodiazepines. 2. National Institute on Drug Abuse. (2012). Well-Known Mechanism Underlies Benzodiazepines’ Addictive Properties. 3. Minaya, O., Fresan, A., Cortes-Lopez, J.L., Nanni, R., and Ugalde, O. (2011). The Benzodiazepine Dependence Questionnaire (BDEPQ): validity and reliability in Mexican psychiatric patients. Addictive Behaviors, 36(8), 874-77. 4. Petursson, H. (1994). The benzodiazepine withdrawal syndrome. Addiction, 89(11), 1455-1459. 5. Liebrenz, M., Gehring, M.T., Buadze, A., Caflisch, C. (2015). High-dose benzodiazepine dependence: a qualitative study of patients’ perception on cessation and withdrawal. BioMed Central Psychiatry, 15(116). 6. Tannenbaum, C., Paquette, A., Hilmer, S., Holroyd-Leduc, J., Carnahan, R., (2012). A systematic review of amnestic and non-amnestic mild cognitive impairment induced by anticholinergic, antihistamine, GABAergic and opioid drugs. Drugs and Aging, 29(8), 639-658. 7. National Institute of Mental Health. (2014). Despite Risks, Benzodiazepine Use Highest in Older People. 8. Billioti de Gage, S., Moride, Y., Ducruet, T., et al. (2014). Benzodiazepine use and risk of Alzheimer’s disease: case-control study. The BMJ, 349(5205). 9. Weich, S., Pearce, H.L., Croft, P., Singh, S., Crome, I., Bashford, J., Frisher, M. (2014). Effects of anxiolytic and hypnotic drug prescriptions on mortality hazards: retrospective cohort study. The BMJ, 348(1996).
<urn:uuid:f1d66fc4-27f2-4c1c-8052-ca41bec55461>
CC-MAIN-2022-33
https://drugabuse.com/blog/worried-benzos/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.909882
1,883
2.515625
3
Online safety and security needs to be high on the agenda for schools who are increasingly reliant on a variety of technologies. For instance, schools rely heavily on software that is predominantly accessed via Wi-Fi connections, this always brings a small amount of risk, so it’s important that the connection is secure. Additionally, the software schools are using stores a great deal of confidential data too, so implementing an online safety policy can reassure schools, as well as staff, students’ and students’ parents that everyone is being kept safe while online. Here is an idea of some points the policy should cover: - Roles and responsibilities Ideally a team would be formed who ensures that online safety is being adhered to throughout the school. The ideal scenario is to create a group of stakeholders from across the school e.g. Governors, Headteachers, Teachers and IT staff. Each team member would have a defined role, for instance the IT Manager could be responsible for the day-to-day management of online safety; and the Headteacher could be responsible for ensuring all staff receive suitable training for online safety etc. With the fast pace of technology it would be recommended that the group meets regularly to discuss any issues or next step implementation that needs to take place. - Logging on and off devices A logging on and off procedure for when devices aren’t in use should be made clear to everyone who has access to edtech throughout the school – particularly in Secondary Schools when single devices could have multiple users in anyone day. All staff and students need to be aware of the potential access issues faced if they leave a machine logged on and leave the room e.g. access to sensitive information. Ensure that strong passwords are in place as standard. Passwords are recommended to contain characters from three of the following five categories: â— Uppercase characters of European languages (A through Z) â— Lowercase characters of European languages (A through Z) â— Base 10 digits (0 through 9) â— Non-alphanumeric characters: ~!@#$%^&*_-+=’ â— Recommended length between 8 and 16 characters â— Recommended to force password change every 30 days - Email content Filters and anti-virus software are a good starting point, but schools are also advised to educate students on clicking on emails when they don’t know the sender, and also clicking through links in emails when they’re not 100% certain on the content. Controlled email systems are available that allow schools to monitor emails and also limit the addresses that children can communicate with. - Parental support Try to encourage parents to get involved with online safety, especially if students are accessing software and school emails at home. However, be mindful that it can be overwhelming for parents to keep up-to-date with latest fast changing technology and potential threats. Provide a helping hand by keeping them updated on what the school is doing to encourage online safety, and signpost them to other sources of information for example, BBC Stay Safe and the Google Family Centre. For more information, please read through Promethean’s ‘Quick Guide to Simplifying School Technology Management’.
<urn:uuid:7905b833-fded-4f1c-9c17-ab78ea5baadd>
CC-MAIN-2022-33
https://edtechnology.co.uk/comments/how-to-maximise-online-safety-at-school/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.950135
668
2.984375
3
The Bose Corporation is well known for delivering quality sound products and have recently introduced this build-it-yourself kit which lets kids explore the actual science behind sound and music. BOSEbuild is a Bluetooth speaker that comes with various components that kids put together to make it work. Builders assemble with such components as magnets, wire coils, power supplies, speaker panels, 40 clips, as well as housing covers with papercraft templates for customization. Kids will learn several important STEM concepts, including magnetism and types of metals, how copper coils work with magnets, using a magnet to launch a copper coil into the air, how vibrations create sound waves, isolating sounds via a slider tool, how to make LED lights dance to the sound of music in various colors, testing the sound of different pitch frequencies, and much more. How it works: The BOSEbuild Speaker Cube works in conjunction with a companion app built by Bose Corporation that takes kids through the process of building their own Bluetooth speaker. After downloading the app, it’s necessary to touch your device with the BOSEbuild speaker control panel which pairs the two Bluetooth devices together and prompts the user to name their speaker. Here’s the real deal review of the BOSEbuild Speaker Cube: Easy to follow instructions Instructions in the companion app are easy to follow and include clear visuals, animations and videos that guide kids through the engaging hands-on activities. Process can be completed in a short amount of time The process of building the BOSEbuild Bluetooth speaker can be completed in less than an hour. However, because the app teaches several science concepts, you will want to encourage your kids to take a little longer to fully understand those concepts. Kids can customize the Bluetooth speaker with special lighting effects and custom covers Lighting effects and personalized side covers to customize the BOSEbuild Bluetooth speaker: Once all components have been put together, kids get to customize their own BOSEbuild cube speaker with colored lights and custom covers that create special shadow effects. Fun and Engaging Finally, kids get to learn fun facts that encourage exploration as they are building the speaker. The app provides content through the use of visual aids and videos that delve deeper into each step by explaining how and why various components work. Unfortunately for Android users, the building app is currently only available for Apple devices. With the growth of this product, however, I can imagine that this will be changing soon. The Real Deal: IF you’re looking for a fun and educational gift for your child or teen, the BOSEbuild speaker is a fantastic choice. It appeals to both children and adults alike, so parents could actually enjoy working on this project along with their child. It’s recommended for kids 8 older, so it’s also a great gift choice for teenagers in your life. Best of all, the final product is an actual blue tooth speaker with BOSE quality sound that they can actually use. It retails for $149 on Amazon.com, but if you have a young scientist who is interested in electronics, it’s totally worth it.[ezcol_1quarter]25 STEM Gifts for Kids[/ezcol_1quarter] [ezcol_1quarter]25 Educational Gifts for Toddlers[/ezcol_1quarter] [ezcol_1quarter]20 Gifts for Teens under $20[/ezcol_1quarter] [ezcol_1quarter_end]20+ Gifts for Teachers under $20[/ezcol_1quarter_end] [ezcol_1quarter]*[/ezcol_1quarter] [ezcol_1quarter]20 Gifts for Couples[/ezcol_1quarter] [ezcol_1quarter]20 Hostess Gifts Under $20[/ezcol_1quarter] [ezcol_1quarter_end]*[/ezcol_1quarter_end] Want to be featured in our Gift Guide? Email me at lovepeacemommy (at) gmail (dot) com. to get started!
<urn:uuid:fe5b8cf1-957d-4e23-9cf5-84765c07e3e9>
CC-MAIN-2022-33
https://www.lovepeaceandtinyfeet.com/holiday-gift-guide-bosebuild-speaker-cube-review/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.919113
842
2.8125
3
The Remiornithidae is a family of primitive Paleognaths, commonly known as Ratites, that lived during the Paleocene epoch of Europe. Distribution & Fossil evidence Fossil of Remiornithidae have been found in France and are mainly represented by leg bones. Remiornithids had very stout legs, like that of modern-day Rheas. The Remiornithidae-family contains only a single species, Remiornis.
<urn:uuid:8b866722-7079-4f1f-b1e1-bbfa3130e3c3>
CC-MAIN-2022-33
https://www.meetthefossyls.com/family-data-meet-the-fossyls/remiornithidae
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.938903
116
2.765625
3
Since Russia's invasion of Ukraine in February, the world has been gripped by fear that we could face a nuclear war. Russian president Vladimir Putin has made threats about the prospect of using a nuclear warhead should western powers become more involved. And there have also been fears he could use a nuclear weapon to try and break the stalemate in Ukraine. Russian forces have become bogged down as they look to bring the nation to submission. Russia has one of the biggest nuclear arsenals in the world. Moscow is thought to preside over almost 6,000 nuclear weapons. But there remains doubt over how likely the country is to use them, especially with Nato currently limiting itself to aid for Ukraine rather than making a military intervention. What have the Russians said? Vladimir Putin has made several threats of using nuclear weapons during the war. In fact, it is believed to mark the first time a state has used nuclear threats as part of a war of expansion, according to a paper written for the European Council on Foreign Relations (ECFR). Senior policy fellow Gustav Gressel argues these threats "not only deter the West from directly interfering in its attempts to conquer Ukraine but also to limit Western political, economic, and military support for the country". He argues this tactic has been largely successful as Nato powers have failed to introduce a 'no fly' zone over Ukraine and have "avoided forms of military assistance for Ukraine that fall within their rights as third parties in the conflict". Putin has made several threats to use various nuclear weapons, many of which could reach the UK in minutes. Last month he vowed to deploy deadly Sarmat 'Satan II' nuclear-capable missiles by the end of the year if needed to 'defend' Russia. A Russian TV show even said the United Kingdom could be wiped out with a single powerful missile strike in a chilling on-air threat. Russian media also claimed nuclear war was 'likely'. Will Putin use nuclear weapons? With so many threats it is understandable to think Putin has an itchy finger and wants to push the button. But the reality is more complex than this. Writing in the same ECFR paper, Mr Gressel argues that "nuclear warfare against Ukraine makes no sense". He adds: "A single nuclear strike would not alter the military balance in the war. "The use of multiple nuclear weapons would do so, but would also inflict huge and lasting damage on Russia. Nuclear attacks on a Nato country would begin escalation that Russia could not control. "And the Russian military would be unable to respond to any other contingency, because it would be bogged down in Ukraine. Russia could only respond to retaliation for a nuclear strike with further nuclear escalation – which would be suicidal. Putin is certainly not concerned with morals or ethics, but he is far from crazy or suicidal." Others have put the probability of a nuclear war before the end of the year to be 10 per cent, a frighteningly high number. And Robert S. Litwak, senior vice president and director of international security studies at the respected Wilson Centre, says the threat is at its highest in decades. Writing in May, he said: "Throughout the nuclear age, the US strategy of deterrence has aimed to keep low a low probability event with high consequences. While the probability of Russian nuclear use remains low, the Ukraine War has elevated this risk to a level not seen since the most fraught moments of the Cold War. "As Putin warns that any Western interference in Ukraine will be met with a 'lightning fast' response from Russia, the crisis contains the risk of escalation—such as a geographical spillover of the conflict beyond Ukraine’s borders." Never miss the top headlines, check out the latest stories from our sections below:
<urn:uuid:13a13f82-bc70-4621-90b6-4a0b045cc1b4>
CC-MAIN-2022-33
https://www.scottishdailyexpress.co.uk/news/world-news/how-likely-nuclear-war-vladimir-27454082
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.957746
771
2.75
3
Using gamification to elevate the way we educate What is gamification? Gamification is the approach to apply game principles and playing methods to a non-game context to create an experience that is like playing a game. This is used to engage and motivate the user. Why choose Minecraft? Minecraft is one of the most played games in the world. From children to adults, many enjoy this game in many ways. It is easy to navigate for newcomers and provides you with unlimited options to customize your project. You will create a positive connection with your project instantly. Since our inception in 2013 we have created a variety of content. Also we have taken part in multiple academic studies to achieve greater learning, both standing alone and used alongside classroom teaching, books, and other educational tools. With that, and our expertise to bring enjoyable experiences through Minecraft, we are ready to take on your next gamified project! Here's some gamification stats increase in knowledge recall when taught through gamification increase in procedural knowledge when trained with gamification greater retention of knowledge through gamification We are proud of the games we make. Great Ormond Street Hospital Explore the Great Ormond Street Hospital and get to know the complex before your visit. Chat and interact with other patients and feel right at home. Walk through the colorful hallways and get comfortable before your stay at the hospital. Come and design the new Town Hall Station! Use the five different design themes and test them out in the six design spaces. Get inspired by solutions already installed around the world like the piano stairs in Stockholm. Unlock various power-ups by interacting with the NPCs and learning about the different themes. You can also join an archeological excavation site to protect and look for fossils that could be uncovered while redesigning the station! The castle is under attack by hordes of undead monsters! Protect and free the castle from the invaders with the help of traps, magical weapons, and your trusty companion! Fight zombies, undead plushies, and many more fantastic creatures. Unlock more weapons and traps to help you defend the castle! With COVID-19 preventing the usual campus tours for new prospect students, we helped Erasmus University in Rotterdam, The Netherlands, make a virtual solution. Over the years we have worked on our projects with a variety of partners.
<urn:uuid:8b634a35-12e9-40d2-8498-8226853b589f>
CC-MAIN-2022-33
https://www.shapescape.com/education
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.935605
512
2.546875
3
A statue of Russian leader Vladimir Ilyich Lenin will be removed from the streets of the city of Kotka in southeast Finland, and relocated to a museum, following a decision by the city council on Monday evening. The removal means that no large monuments to the Russian revolutionary and politician will be present on the streets of Finland. The statue of Lenin, sculpted by Estonian artist Matti Varikin, was presented as a gift in 1979 by Kotka's twin city Tallinn, which at the time was still part of the Soviet Union. The statue has been vandalised and damaged several times over the years, and had been the subject of an intense, years-long local debate even before Russia's invasion of Ukraine in February. Proposals submitted to both the city and municipal councils argued that the statue should be moved to a local museum, as the monument insulted the memory of people who died as a result of Soviet war crimes. The Kotka-based Kymenlaakso Museum had requested that the statue be kept in place, but that a plaque describing its history be added to the pedestal. The museum had also proposed transferring the statue to the Lenin Museum in Tampere, but this offer was not accepted. At a city council meeting on Monday evening, delegates voted 41-9 in favour of removing the Lenin statue. Authorities in Turku also removed a statue of Lenin in April, citing Russia's invasion of Ukraine. Similar to the monument in Kotka, the presence of the statue in Turku had sparked significant public debate since being given to the city by authorities Leningrad — now St.Petersburg — in 1977.
<urn:uuid:16607d60-712a-4b11-8b5b-a56a1601ca8e>
CC-MAIN-2022-33
https://yle.fi/news/3-12492284
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00088.warc.gz
en
0.977825
340
2.734375
3
There’s more to surviving winter at the South Pole than keeping warm and avoiding frostbite. It’s the psychological effects the extreme isolation and months of darkness have on the mind that are the real challenge.Just ask Dr. Alexander Kumar. He recently wrapped up a year at Concordia science station in Antarctica, where he conducted research for the European Space Agency’s (ESA's) Human Spaceflight program.The 29-year-old doctor has come out of the experience with his humor firmly intact, but he now sports a shock of white hair in his dark fringe and has lost a lot of weight.He does, however, have all his fingers and toes intact despite living through temperatures that fell to minus 80 C. Surviving the world's worst winter Dr. Kumar was initially invited to join the Concordia team solely as a researcher for the ESA. Two weeks before they were due to set off, the Italian crew doctor pulled out.Kumar -- a qualified doctor and anesthetist -- took a five-day crash course in dentistry and agreed to step in.The team took a boat across the Southern Ocean, facing waves the size of houses and steering between icebergs until they reached Dumont d’Urville. From there it was a five-hour flight on a Twin Otter to Concordia station.As he watched the plane take off from the station he knew there was no way out for nine months. Whatever happened, they would have to wait until November before another plane could get through. Responsible for the health of the team, he was the only British member of the European crew of 13. “Twelve men and one woman, not a winning formula,” he quips. Antarctica is the coldest, most isolated place on the planet, with what Kumar calls “the worst winter in the world."First there’s the extreme cold -- the minus 80.4 C low Kumar experienced is only nine degrees off the coldest temperature ever recorded on Earth (minus 89 C at the Soviet Vostok Station in Antarctica in 1983). If you add in the windchill factor, temperatures can fall as low as minus 100 C. To gauge just how cold this is, consider that if you breathe heavily and continuously -- say if you were running -- at minus 25 C or below your lungs will dry out, freeze and hemorrhage. On the plus side, Dr. Kumar could make iced coffee in less than three minutes by leaving his steaming coffee mug on the window ledge.Then consider the lack of oxygen. With 30 percent less than normal, breathing is difficult and it can take weeks to acclimatize. Next comes the darkness. For three months the frozen South doesn’t see the sun at all. “The isolation is very real,” says Kumar. “There is nothing around you for 1,000 kilometers in most directions.” Read the whole article: http://travel.cnn.com/survival-how-get-through-worst-winter-world-523396
<urn:uuid:23ce73ca-821e-455d-a48b-0e2274b0abc3>
CC-MAIN-2022-33
http://devconsultancygroup.blogspot.com/2012/12/cnn-antarctica-enduring-worst-winter-in.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.964373
635
2.640625
3
In 993, St. Ulrich of Augsburg was the first saint to be formally canonized, by Pope John XV. By the 12th century, the church officially centralized the process, putting the pope himself in charge of commissions that investigated and documented potential saints’ lives. When did Christians start believing in saints? The practice of praying through saints can be found in Christian writings from the 3rd century onward. The 4th-century Apostles’ Creed states belief in the communion of Saints, which certain Christian churches interpret as supporting the intercession of saints. Why does the church honor saints? significance in Christianity Veneration of the saints began because of a belief that martyrs were received directly into heaven after their martyrdoms and that their intercession with God was especially effective—in the Revelation to John the martyrs occupy a special position in heaven, immediately under the altar of… Where did the idea of saints come from? The first Catholics revered as saints were martyrs who died under Roman persecution in the first centuries after Jesus Christ was born. These martyrs were honored as saints almost instantaneously after their deaths, as Catholics who had sacrificed their lives in the name of God. Why is the church a communion of saints? In Methodist theology, the communion of saints refers to the Church Militant and Church Triumphant. … When we celebrate Holy Communion, we feast with past, present and future disciples of Christ. We experience the communion of saints, the community of believers –– living and dead. Do Protestants pray to saints? When speaking of the word Saint that other denominations pray to, the answer is no. Protestants do utilize the word saint in other variations, however, they do not believe in praying to the Saints, and term this as idolatry. Do Catholics worship saints? In conclusion, we Catholics do not worship Mary, the saints, or images and statues of them. We ask Mary and the saints to intercede for us on our behalf since they hold a spot in Heaven with God. … As for images, we do not worship statues of Jesus, Mary, or the saints. Are Catholic saints in the Bible? While sainthood, in the Roman Catholic Calendar of Saints, is not conferred to biblical figures from the Old Testament, three archangels who appear in the text of the Old Testament are considered saints: St. Michael, St. Gabriel and St. Raphael. Do Baptists believe in saints? Baptists “honor Mary as the mother of Jesus Christ” but consider the “communion of saints as primarily a present reality among Christians,” and don’t pray to Mary or “deceased Christians lest such infringe the sole mediatorship of Jesus Christ.” Why are there so many saints in Catholicism? They were believed to be men and women of “heroic virtue” who after their deaths held a privileged place with God in heaven. Because of this, saints were considered to be spiritual guides and mentors, who would add their prayers in heaven to those offered by Christians still living in the material world. Who was the first saint in history? Synopsis. Saint Stephen is a recognized saint in many Christian theologies, and is considered to be the first Christian martyr. Are Christians saints? Saint simply means sanctified or holy–set apart. Those who have entered God’s kingdom and who are living righteously in accordance with the word of God are your saints and not just does who say, “Lord, Lord”. Yes all (true) Christians are saints. Do Protestants recite the Apostles Creed? Protestants all over the world share much Christian heritage with Eastern Orthodox and Roman Catholic believers. … The Protestant reformers understood themselves to be a part of “the holy Catholic Church.” Millions of Protestants still repeat these words every week as they stand in worship to recite the Apostles’ Creed. Do Protestants believe in the communion of saints? Major Protestant reformers, wishing to reaffirm the unique mediatory role of Jesus Christ, denied the intercessory role of the saints and viewed the communion of saints as all believers in Christ. Some Protestant churches further understand this to be limited to living Christians. Why do Catholics pray to saints? It arises because both groups confuse prayer with worship. … When we pray to the saints, we’re simply asking the saints to help us, by praying to God on our behalf—just like we ask our friends and family to do so—or thanking the saints for having already done so.
<urn:uuid:b1ea12b2-e226-40ab-910f-9a2fd6ee1a96>
CC-MAIN-2022-33
https://abujacatholicarchdiocese.org/bible/when-did-the-church-begin-to-honour-the-saints.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.958507
954
3.0625
3
Bilins are linear tetrapyrroles used as chromophores of phycobiliproteins and phytochromes for their light-harvesting and light-sensing properties, respectively. Enzymes for their biosynthesis first evolved in cyanobacteria and were subsequently transferred to photosynthetic eukaryotes during endosymbiosis. Although many present day eukaryotic algae lack both phycobiliproteins and phytochromes, as do some cyanobacteria, e.g. prochlorophytes, all oxygenic phototrophs retain a bilin biosynthetic pathway which consists of plastid-localized heme oxygenase (HO/HMOX1) and ferredoxin-dependent biliverdin reductase (FDBR) enzymes. We previously showed that bilins are retrograde signals released from plastids which mitigate oxidative stress during diurnal dark-to-light transitions, and are also required for maintenance of a functional photosynthetic apparatus in diurnal light-dark cycles in the green alga Chlamydomonas reinhardtii. We hypothesize that bilins are needed to sustain sufficient chlorophyll synthesis in light for repair of daily damage to the photosynthetic apparatus. The loss-of-function mutant of CrHMOX1, the enzyme responsible for the formation of biliverdin IXa (BV) from heme in C. reinhardtii, is phenotypically similar to non-lethal mutants in the chlorophyll biosynthesis pathway - all of which bleach under high light. One such mutant affects CrGUN4, which encodes a known positive regulator of Mg-chelatase activity. Our studies show that CrGUN4 can tightly binds bilins, and it can also interact with CrPCYA1 in a bilin-dependent manner. Localized to both thylakoid and stroma, CrPYCA and CrGUN4 are thus well positioned to function as bilin-dependent regulators of chlorophyll synthesis in the presence of both light and oxygen. Since C. reinhardtii lacks phytochromes, ongoing research seeks to identify cytosolic bilin binding proteins that might function as bilin (and/or light) sensors to regulate the diurnal oxidative stress pathway uncovered by our studies. J. Clark Lagarias is a Distinguished Professor of Biochemistry at the University of California-Davis with degrees in Chemistry and Botany from the University of California-Berkeley. The recipient of the Paul K. and Ruth R. Stumpf Professorship in Plant Biochemistry in 1999, Dr. Lagarias was elected to the National Academy of Academy of Sciences in 2001, one of the highest honors accorded to a scientist or engineer in the United States. Internationally known for his work to understand the molecular basis of plant and cyanobacterial light perception, Lagarias' research interests hold significant potential for improving crop yield and for development of bilin-based fluorescent and optogenetic probes for live cell applications.
<urn:uuid:58e7a1d8-defb-40d2-985b-3e690693ae9d>
CC-MAIN-2022-33
https://biology.anu.edu.au/news-events/events/ps-seminar-why-bilins-are-essential-oxygenic-phototrophs
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.926296
637
2.78125
3
|Size (L x W x H)||32 cm x 44 cm x 10 cm| Documenting Indigenous Knowledge in Science, Technology and Innovation contains several interesting chapters related to natural resources that are found in Malaysia and how these resources are used by indigenous and/or local people for survival. For example, the availability of marine resources such as fish as a source of protein to humans should be maintained to accommodate the increasing demand by the worlds population. Some approaches to maintain the availability of marine resources, as discussed in this book is the effective conservation strategies, sustainable aquaculture systems and the use of latest technology in the provision of capture data of marine life. The rapid increase in the world population has also changed people's views about the plants that have medicinal value towards the more aggressive use. However, efforts to record and document the medical plants is lacking in Malaysia. In addition to being a key ingredient in traditional medicine, plants such as banana can also be innovated as a renewable energy source. Although the discovery and design of this still new in Malaysia, efforts to further refine these findings should be continued to ensure the availability and sustainability of renewable energy sources. This book is suitable for use by all levels of readers, such as teachers, lecturers, researchers, scientists and the general public who need information about the topics included in this book.
<urn:uuid:17ede5e4-0d42-4642-896b-4eb4a1a62e99>
CC-MAIN-2022-33
https://emdash.my/malaysiana/documenting-indigenous-knowledge-in-science-technology-and-innovation
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.947169
289
3.21875
3
The science is in! And it undoubtedly proves that gratitude is more than just a simple sentiment. Studies link gratitude to a stronger immune system, lower blood pressure, better sleep quality, reduced risk of heart disease, and better kidney function. But the benefits of living a life in gratitude extend much further than purely physical. A study out of the University of California, Riverside, reported that grateful people experience more optimism, joy, enthusiasm, and other positive emotions, and they have a deeper appreciation for life’s simple pleasures. These researchers also found that by expressing gratitude for people in your life, like a friend or romantic partner, you can report higher levels of satisfaction in relationships. The most intriguing fact to come out of this study though was that gratitude is a skill that can be learned and nurtured, much like perfecting your Grandmother’s secret recipe. Gratitude, however, doesn’t always come naturally. In our day-to-day lives, it’s easy to get caught up in the things that go wrong and feel like we’re living under our own private rain cloud; at the same time, we tend to adapt to the good things and people in our lives, taking them for granted. As a result, we often overlook everyday beauty and goodness—a kind gesture from a stranger, say, or the warmth of our heater on a chilly morning. That is why it is so important that we make it a priority to live our life in gratitude. Intentionally developing a grateful outlook helps us all recognize the good in our life and acknowledge that these things are truly “gifts” that we are fortunate to receive. Here are simple actions we can take to start making gratitude a habit: 1. Three Good Things This practice guards against those tendencies to miss opportunities for happiness and connection. By remembering and listing three positive things that have happened in your day, and considering what caused them, you tune into the sources of goodness in your life. It’s a habit that can change the emotional tone of your life, replacing feelings of disappointment or entitlement with those of gratitude—which may be why this practice is associated with significant increases in happiness. 2. Start a Gratitude Journal This exercise helps you develop a greater appreciation for the good in your life. In fact, people who routinely express gratitude enjoy better health and greater happiness. The best part—there is no right or wrong way to keep a gratitude journal. We recommend starting out with writing 15 minutes per day, at least once per week for at least two weeks. Soon you’ll figure out what works best for you and discover the impact on your happiness level. 3. Write a Gratitude Letter This exercise encourages you to express gratitude in a thoughtful, deliberate way by writing—and, ideally, delivering—a letter of gratitude to a person you have never properly thanked. Call to mind someone who did something for you for which you are extremely grateful but to whom you never expressed your deep gratitude. This could be a relative, friend, teacher, or colleague. Try to pick someone who you could set an in-person meeting with in the next week to make the most out of this experience. When writing the letter, don’t worry about spelling or grammar and just focus on how this person’s behavior affected you. Not only will it brighten your spirit, but it will remind the recipient of your letter that our actions really do have make an impact. So much goodness happens when you’re grateful. What are you grateful for today? Select a graphic you love below and share Gratitude Revealed with your friends and family. Help gratitude go global! Bio: Gratitude Revealed is an unprecedented journey into the science, mystery and building blocks of gratitude. In a series of 16 film shorts, acclaimed filmmaker Louie Schwartzberg shows us not only what these ideas look like, but how they can be expressed in our daily lives. The Greater Good Science Center at UC Berkeley (GGSC) has attached evidence-based practices to each video to ensure that the viewer has a place to go even when the video ends. This journey begins with gratitude but the destination is entirely up to you, the viewer. Start your journey by clicking here.
<urn:uuid:9ee2a7f5-9911-44e8-b569-29d9808f14d8>
CC-MAIN-2022-33
https://movingart.com/introduction-to-gratitude/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.943359
875
2.5625
3
The leading causes of mortality globally in children younger than five years of age (under‐fives), and particularly in the regions of sub‐Saharan Africa (SSA) and Southern Asia, in 2018 were infectious diseases, including pneumonia (15%), diarrhoea (8%), malaria (5%) and newborn sepsis (7%) (UNICEF 2019). Nutrition‐related factors contributed to 45% of under‐five deaths (UNICEF 2019). World Health Organization (WHO) and United Nations Children’s Fund (UNICEF), in collaboration with other development partners, have developed an approach – now known as integrated community case management (iCCM) – to bring treatment services for children ‘closer to home’. The iCCM approach provides integrated case management services for two or more illnesses – including diarrhoea, pneumonia, malaria, severe acute malnutrition or neonatal sepsis – among under‐fives at community level (i.e. outside of healthcare facilities) by lay health workers where there is limited access to health facility‐based case management services (WHO/UNICEF 2012). To assess the effects of the integrated community case management (iCCM) strategy on coverage of appropriate treatment for childhood illness by an appropriate provider, quality of care, case load or severity of illness at health facilities, mortality, adverse events and coverage of careseeking for children younger than five years of age in low‐ and middle‐income countries….more
<urn:uuid:309abbc5-0e19-4e97-bd0a-34c4bac8fcde>
CC-MAIN-2022-33
https://profmoosa.com/integrated-community-case-management-of-childhood-illness-in-low%E2%80%90-and-middle%E2%80%90income-countries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.928414
306
3.046875
3
The body mass index is an attempt to quantify the amount of tissue mass (muscle, fat, and bone) in an individual, and then categorize that person as underweight, normal weight, overweight, or obese based on that value. Commonly accepted body mass index ranges are: This “Stranger Things” Actor Doesn’t Believe His Character Is Really Dead — Here's Why . Our team includes licensed nutritionists and dietitians, certified health education specialists, as well as certified strength and conditioning specialists, personal trainers and corrective exercise specialists. Our team aims to be not only thorough with its research, but also objective and unbiased. 5 Keys for How to Lose WeightBest Diet Plans to Lose Weight Fast35 Quick Tips to Lose Weight Fast Precautions When eating in a restaurant, plan ahead. Think about ordering low-fat, low-calorie foods. Remember that most restaurants serve portions much larger than an accepted serving size. When trying to lose weight, your diet plays a big part. Making the right choices will greatly impact you, and those choices start at the supermarket. Shopping for the right foods may seem overwhelming, especially when you don't know where to start. But before you make a beeline for healthy foods, you might want to consider trying food swaps first. For a some people, weight gain can be related to genetics. Others may have a medical condition that makes it hard to lose weight. Examples of this include: Hormonal disorders Cushing’s disease Diabetes Hypothyroidism Polycystic ovarian syndrome (PCOS) Sleep disorders Obstructive sleep apnea Upper airway respiratory syndrome Eating disorders Bulimia Carbohydrate craving syndrome. Tools & Resources Do High-Protein Diets Work? Weight Loss Dos and Don'ts Financing Weight Loss Surgery 10 Ways to Control Your Eating Guide to Becoming Vegetarian Weight Loss Surgery FAQ Equally important is mindfulness. Mindfulness is the key to fat burning and losing weight. A proper diet and commitment to your goals is the perfect recipe for weight loss success! What else you should know: If you don’t lose 5% of your weight after 12 weeks of taking Belviq, you should stop taking it, because it’s unlikely to work for you, the FDA says. Stubb's Original Barbecue sauce has only 5 grams of sugar, while others contain over 10 grams. Nothing heats up the body more than a plank at the beginning of a workout. Place your hands underneath your shoulders and your feet hip-width distance. Your heels should be driving back, your hips in line with your shoulders, and your abdominals pulling in. Hold this position for 30 seconds as you breathe into the rib cage and exhale out of the mouth to create that fire in your belly. And you'll probably lose a pound in the process, which gets you off to a nice mental start. Trending Now:Father's Day 2022Father's Day ImagesFather's Day QuotesSamantha Ruth PrabhuFather's Day MemesMicro Fat Grafting For one, it makes it easier to be more consistent with your workout routine, and consistency is everything when it comes to losing weight. Instead of having to drive and go out of your way, you can work out right in your own home! There can be changes in your life that might come after a significant weight loss journey. The reason and manner in which you might have lost weight will vary from person to person, but the weight loss journey doesn't en... Weight Loss Supplements└ Weight Management└ Vitamins & Lifestyle Supplements└ Health & BeautyAll CategoriesAntiques Art Baby Books & Magazines Business & Industrial Cameras & Photo Cell Phones & Accessories Clothing, Shoes & Accessories Coins & Paper Money Collectibles Computers/Tablets & Networking Consumer Electronics Crafts Dolls & Bears Movies & TV Entertainment Memorabilia Gift Cards & Coupons Health & Beauty Home & Garden Jewelry & Watches Music Musical Instruments & Gear Pet Supplies Pottery & Glass Real Estate Specialty Services Sporting Goods Sports Mem, Cards & Fan Shop Stamps Tickets & Experiences Toys & Hobbies Travel Video Games & Consoles Everything Else Summary Recently Viewed Bids/Offers Watchlist Purchase History Buy Again Selling Saved Searches Saved Sellers My Garage Messages Collection beta Rock salt is the purest form of salt and it comes with some amazing health benefits. Read on to know more.
<urn:uuid:6a2c41c4-3dc8-4bc7-ba2b-05dd02c98463>
CC-MAIN-2022-33
https://viagramoo.com/weight-loss-yoga-poses.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.900434
917
2.609375
3
The US Environmental Protection Agency says it’s not sure it can legally allow carbon offsets to be used for compliance under its proposed Clean Power Plan, but Victor B. Flatt, an expert in the US federal Clean Air Act says it has the authority and should give states the flexibility they need to reduce carbon emissions in the most cost-effective manner. 16 March 2015 | The US Environmental Protection Agency’s (EPA) proposed Clean Power Plan, the agency’s attempt to regulate existing sources of greenhouse gases (GHGs) in the electricity-generating sector under its Clean Air Act authority, may be the most controversial rule proposed by the agency. Weighing in at around 670 pages (with a 750-page technical support document,) it is certainly one of the most complex regulations ever attempted by the agency. It should also be interpreted as offering the states maximum flexibility in how states handle their emission reductions, as we can see by zeroing in on just two sections of the Clean Air Act: Section 110 and Section 111. Section 110 governs the State Implementation Plans (SIPs), which are the way in which ambient levels of criteria pollutants (like ozone), are to be enforced. Section 110 allows states to meet these goals in any way they wish as long as they do not interfere with another state’s compliance. Section 111, on the other hand, purportedly deals with reductions from source categories (such as electricity generating units). Here, we’ll be looking at just two sub-sections of Section 111: Section 111 (b), which deals with new or recently upgraded sources of pollution; and Section 111 (d), which deals with older or existing sources of pollution not regulated by states under Section 110 (or as a hazardous air pollutant) . Since greenhouse gases are the only pollutants that exist in this category, and they have yet to be regulated, section 111(d) is as yet untested. The Clean Power Plan is the EPA’s attempt to do so. Section 111(d) says the EPA may establish guidelines for how states meet reductions required, and it also says that the procedure governing approval of these state systems should be a “procedure similar to that provided by section 7410[Section 110].” And guess what? Section 110 clearly leaves room for offsetting, as well as any measure that would reach the target required. How Does the Clean Power Plan Work? The Clean Power Plan sets individual targets for GHG emissions rates for each state through a formula the EPA developed, examining how various GHG reduction strategies could be implemented given each state’s own unique circumstances. In determining the state’s targets, the EPA critically made a decision that the Best System of Emissions Reduction (BSER) referenced by the Clean Air Act authority under its Section 111(d) provisions could include reductions in GHG emissions from end-user efficiency gains, electricity dispatch decisions, and new non- or low-carbon sources. Because these reductions would not technically be from a regulated plant itself, they are characterized as “beyond the fenceline” reductions. It is this decision that is responsible for much of the rule’s complexity as well as the ability of the EPA to propose a more aggressive reduction target than could be achieved by changes at the electricity generating plant itself. This approach, the EPA says, allows the states maximum flexibility in meeting ion targets. Unfortunately, the EPA has shied away from allowing states maximum flexibility for reductions by refusing to endorse (at this time) the use of GHG offsets, (such as biological offsets or reductions from other unregulated sources) even though the use of offsets is generally recognized as a more efficient way to reach tighter GHG reductions targets. Lying at the heart of this decision, according to the EPA, is “legal uncertainty.” Because of the controversy in the United States surrounding any regulation of GHGs, the regulations are being, and will continue to be, challenged in court. One of these challenges suggests that in setting up the guidelines for the states, that the EPA (and presumably the states) cannot do any “outside of the fenceline” regulation, asserting that this differs from prior regulation of electricity generating units under other pollutants. In response, the EPA correctly reasons that its authority under section 111(d) is different from its authority to regulate criteria pollutants under 111(b), and that the BSER can include the “outside the fenceline” reductions suggested, as well as emissions trading between sources. I believe the agency is absolutely correct in this interpretation, but this reasoning would suggest that offsets would also be legally allowed under Section 111(d). To see why, we have to return to the relationship between Sections 110 and 111(d) that I alluded to at the start – namely, that Section 111(d) specifies that the Best System of Emissions Reduction adopted by a state be modeled on Section 110, which governs the State Implementation Plans . While the EPA has not had cause to consider the full meaning and implications of this statutory phrase before, I believe that it means that 111(d) provides that the “system” of emissions reduction can be anything that meets the target required by the EPA. Section 110 allows the states such autonomy in constructing how they will meet the ambient air quality standards for criteria pollutants. In Union Electric Co. v. EPA, 427 U.S. 246, 96 S.Ct. 2518, 49 L/Ed/ 2d 474 (1976), the Supreme Court upheld the EPA’s position that if a state proposes a strategy that is effective in meeting the ambient air quality standards, the EPA must approve that SIP. This follows statutory language in Section 110(a) and also supports the cooperative federalism at the heart of the Clean Air Act. Though the EPA seems to distinguish between the reductions itproposes in the Clean Power Plan rulemaking and the use of offsets, if “outside the fenceline” reductions are allowed at all if the states so choose, which I believe they are because of the reference to Section 110, then they can be allowed in other arenas such as offsetting. What it boils down to is this: Unless the EPA is willing to grant the same sort of flexibility to the states under Section 111(d) that it does under section 110, it reads the reference to section 110 out of the statute, which was not the intent of the drafters. The EPA seems to be afraid that the use of offsets might be a step too far, and other commentators have suggested that the agency’s power under Section 111(d) becomes more precarious the further it moves from the fenceline. But the applicable law suggests otherwise. While the EPA may be trying to paint a smaller target for legal challenge or simply avoid the politics of proposing something that looks very much like a cap-and-trade system, these distinctions are not based on the law. As such, the EPA should clarify that the states could choose to keep or utilize verifiable offset emissions reductions and be compliant with the Clean Power Plan. Because some of the states, such as California and the Northeastern states participating in the Regional Greenhouse Gas Initiative already have carbon trading programs allowing for GHG reductions from sources such as verified GHG offsets or other industries (such as the petroleum industry), this clarification would allow these states to keep or utilize such reductions and be compliant with the BSER rulemaking. Additionally, clarifying the allowance of verified offsets and reductions from other industrial sectors (if proposed by a state or states) would facilitate the creation of a GHG trading market, which the agency has correctly determined would allow for more reductions at lower costs. Victor B. Flatt is the Taft Distinguished Professor of Environmental Law at UNC Chapel Hill School of Law. Please see our Reprint Guidelines for details on republishing our articles.
<urn:uuid:cdc7e72a-0126-4ce1-8e7f-bd5c417e8336>
CC-MAIN-2022-33
https://www.ecosystemmarketplace.com/articles/em-opinion-em-yes-the-us-epa-can-and-should-allow-offsets-under-the-clean-power-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.94559
1,619
2.78125
3
When some stars much more massive than the sun reach the end of their lives, they explode in a supernova, fusing lighter atoms into heavier ones and dispersing the products across space—some of which became part of our bodies. As Joni Mitchell wrote and Crosby Stills Nash & Young famously sang, “We are stardust, we are golden, we are billion-year-old carbon.” However, knowing this and understanding all the physics involved are two different things. We can’t make a true supernova in the lab or study one up close, even if we wanted to. For that reason, computer simulations are the best tool scientists have. Researchers program equations that govern the behavior of the ingredients inside the core of a star to see how they behave and whether the outcomes reproduce behavior we see in real supernovae. There are many ingredients, which makes the simulations extraordinarily complicated—but one type of particle could ultimately drive supernova explosion: the humble neutrino. Neutrinos are well known for being hard to detect because they barely interact with other particles. However, the core of a dying star is a remarkably dense environment, and the nuclear reactions produce vast numbers of neutrinos. Both these things increase the likelihood of neutrinos hitting other particles and transferring energy. “We can estimate on a sheet of paper roughly how much energy neutrinos may deliver,” says Hans-Thomas Janka, a supernova researcher at the Max Planck Institute for Astrophysics in Garching, Germany. “The question still remains: Is that compatible with the detailed picture? What we need is to combine all the physics ingredients which play a role in the core of a collapsing star.” Things fall apart, the center cannot hold Typically, all the nuclear fusion in a star happens in its core: That’s the only place hot and dense enough. In turn, the nuclear fusion supplies enough energy to keep the core from compressing under its own gravity. But when a star heavier than eight times the mass of our sun exhausts its nuclear fuel and fusion halts, the core collapses catastrophically. The result is a core-collapse supernova: a shock wave from the collapse tears the star apart while the core shrinks into a neutron star or black hole. The explosion leads to more nuclear fusion and the spread of nuclei into interstellar space, where it can eventually be used in making new stars and planets. (The other major supernova type involves an exploding white dwarf, the source of many other common atoms.) Core-collapse supernovae are rare and extremely violent phenomena, sometimes outshining whole galaxies at their peak. The last relatively close-by supernova appeared in the sky in 1987, in the neighboring galaxy known as the Large Magellanic Cloud. Even if a supernova exploded close enough to observe in detail (while being far enough to be safe), we can't see deep inside to where the action is. However, 24 neutrinos from the 1987 supernova showed up in particle detectors (built for studying proton decay). These neutrinos were likely born in nuclear reactions deep in the exploding star's interior and confirmed theoretical predictions from the 1960s, when astrophysicists first began to study exploding stars. Supernova research really took off in the 1980s with growing computer power and the realization that a full understanding of core collapse would need to incorporate a lot of complicated physics. “Core-collapse supernovae involve a huge variety of effects involving all four fundamental forces,” says Joshua Dolence of the US Department of Energy’s Los Alamos National Laboratory. “The predicted outcome of collapse—even the most basic question of ‘Does this star explode?’—can depend on how these effects are incorporated into simulations.” In other words, if you don’t do the simulations right, the supernova never happens. While some stars may collapse directly into black holes instead of exploding, astronomers see both supernova explosions and their aftermaths (the most famous example being the Crab Nebula). Some simulations don’t ever show a kaboom, which is a problem: The energy released during the burst of neutrinos is enough to stall out the supernova before it explodes. If neutrinos cause the problem, they may also solve it. They carry energy away from one part of the dying star, but they may also transfer it to the stalled-out shockwave, breaking the stalemate and making the supernova happen. It’s not the only hypothesis, but currently it’s the best guess astrophysicists have, and most of the large computer simulations seem to support it so far. However, some of the most energetic supernovae—known as hypernovae—don’t seem to abide by the same rules, so it’s possible something other than neutrinos are responsible. What that something else might be is anyone’s guess. Explosions in the sky Core-collapse supernovae are natural laboratories for extreme physics. They involve particle physics, strong gravity as described by general relativity and nuclear physics, all mixed up with strong magnetic fields. All of those aspects must be implemented in computer code, which necessarily involves tough decisions about what details to include and what to leave out. “The major open questions revolve around understanding which physical effects are crucial to a quantitative understanding of supernova explosions,” Dolence says. His own work at Los Alamos involves testing the assumptions going into the various theoretical models for explosions and developing faster code to save on precious computer time. Janka’s work in Europe, by contrast, involves modeling the neutrino behavior as exactly as possible. Currently, both detailed and simplified approaches are needed, until researchers know exactly what physical processes are involved deep inside the dying star. Both methods use tens of millions of hours of computer time, distributed across multiple computers working in parallel. Even with certain simplifying assumptions, these simulations are some of the biggest around, meaning they require supercomputers at large research centers: the Leibniz Computing Center in Germany; the Barcelona Supercomputing Center in Spain; Los Alamos, Oak Ridge National Laboratory and Princeton University in the United States, and just a handful of others. “We have no proof so far except our calculations that neutrinos are the cause of the explosion,” Janka says. “We need to compare models with [astronomical] observations in the future.” The world’s current neutrino experiments are poised to catch neutrinos from the next event and are connected by the Supernova Early Warning System. But in the absence of a nearby supernova, massive supercomputer simulations are all we have. In the meantime, those simulations could still teach us about the extreme physics of dying stars and what role neutrinos play in their deaths.
<urn:uuid:92eea277-f174-443d-9d38-e9f96c9bead5>
CC-MAIN-2022-33
https://www.symmetrymagazine.org/article/low-mass-particles-that-make-high-mass-stars-go-boom
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00088.warc.gz
en
0.933337
1,437
4.28125
4
The Centre provides a number of programs and services that aim to improve the health and well-being of Indigenous Individuals, families and communities through wholistic approaches that harmonize Indigenous, traditional and western health care which respects people with a distinctive cultural identity, values and beliefs. Bite for Brant is an agriculture education day for grade five students in Brant County and Brantford. It takes place each April. Students learn about local food sources through hands-on learning activities. Organized by the Brant County Federation of Agriculture. Cost is $3 per student. The Food Safety Certificate Course is designed to help you further develop your skills for working in the Food Service Industry. During the sessions, you will learn: - to recognize potential food safety hazards - how to store foods properly - developing better cleaning procedures that control the growth of bacteria - how to avoid unnecessary waste - what are food premise regulations and how they affect you The GRCHC has a team of health professionals dedicated to client-centred care. This includes physicians, nurse practitioners, nurses, social workers, registered dietitians, a counsellor, and a community support facilitator/advocate. Free group classes are offered in our kitchen that focus on nutrition education and hands-on food skills. Examples of these classes include: Budget friendly cooking, Cooking for one, Healthy Bodies series, Food preservation workshops, and one-time chronic disease management workshops.” Our Registered Dietitian and Registered Social Worker are certified to facilitate the Craving Change Program at various times throughout the year. Craving Change is a licensed, cognitive-behavioural program for emotional eating. (Note: This is Not a program for those clinically diagnosed with an eating disorder). Call for details: 519-754-0777 x 234 (Registered Dietitian) or x 256 (Registered Social Worker).
<urn:uuid:ca14eedd-6887-4561-9092-c90824d908db>
CC-MAIN-2022-33
https://feedbrant.ca/education-programs
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00288.warc.gz
en
0.934158
386
2.640625
3
How do you dry an avocado? | Avocado is a popular fruit that can be eaten raw, in guacamole or used as a salad dressing. How do you dry an avocado? The “dehydrated avocado” is a food that can be dried and used in many ways. The process of drying an avocado is not difficult, but it does take some time. - Wash and cut the avocado fruit in half. - Remove the seed using a spoon. - Using a knife, cut the fruit into thinner slices. - Place the slices on the dehydrator tray and arrange them as desired. - Dehydrate for 8-10 hours at 135°F-140°F in a dehydrator. - Take one out and inspect it for brittleness. - Allow the dehydrated avocado slices to cool before using. After all, how does one dry an avocado pit? They must first be dried for a few hours at a high temperature in the oven. Some people dry the seeds in the oven at 250°F (121°C) for two hours. After the seed has been dried, cut it up and mix it in a blender or food processor until it becomes a powder. In addition, how long does an avocado seed take to dry out? Within 24 to 48 hours Similarly, you may wonder whether avocados can be dried. Avocados — Sure, but you probably don’t want to. Foods that are very heavy in fat do not dehydrate well and rapidly get rancid. So just eat it right away. Keep-bought condiments — There’s a method for reducing everything you can dehydrate to its most basic form to make it simpler to store. What’s the best way to create avocado powder? - To extract the seed out of your avocado pear, cut it open. - Rinse and dehydrate for 2 hours at 120°C in the oven. - Remove and discard the thin outer skin. - Cut the seam open with a knife by gently pressing it against it. - In a blender, grate or blitz the vegetables. - It’s time to make your avocado powder. Answers to Related Questions Is it possible to cultivate an avocado seed that has been dried? It depends on how dry the environment is. After removing the avocado seeds from the fruit, it’s a good idea to plant them as soon as possible. It’s possible that if the seed dries out too much, it won’t sprout. It should be alright if it’s just been dry for a few days. Why is my avocado so wilted? The oil in the avocado causes the fruit to acquire a rotten taste or a pasty or “dry” texture if it is left on the tree for too long. What can avocado pits be used for? There are nine different ways to utilize an avocado pit. - Make your own dye. To make a natural pink-hued dye for textiles, combine the skins and the pit. - Keep your guacamole in the fridge. Put an avocado pit in your guacamole to keep it from becoming brown. - Make a face mask. Dulce Candy is a sweet treat. - Eat it. - Make a cup of tea. - Prepare the mole sauce. - Plant an avocado tree. - Be inventive. Is cyanide present in avocado pits? Avocado seeds contain minor amounts of hydrocyanic acid and cyanogenic glycosides, which may create poisonous hydrogen cyanide, in addition to persin and tannin. The California Avocado Commission advises against ingesting avocado seeds (though of course, they encourage you to enjoy the fruit). Is it possible to eat an avocado pit? To make the seed toxic, you’d have to consume a lot of it. Avocados are delicious, but their pits aren’t exactly delicacies. While the pits are ground into a powder that may be used to smoothies and other drinks, the minimal quantity will not make humans sick. What’s the best way to create an avocado pit button? Buttons for Avocado Pits Split the pit in half, then cut each half into two or three slices with a sharp knife. In the middle of each slice, poke four holes in the form of a tiny square with a pointed skewer or a small drill. And there you have it: handmade avocado buttons! Is it true that avocado is healthy for cancer patients? According to experts, avocado nutrients are able to fight oral cancer cells, killing some and preventing pre-cancerous cells from evolving into genuine malignancies. They discovered that Hass avocado extracts inhibit or slow the formation of precancerous cells that contribute to oral cancer. Is it true that avocado seeds are toxic to humans? Avocado pits, as well as the skin, bark, and leaves of the avocado tree, contain a small amount of persin, a fungicidal toxin that looks like a fatty acid. However, since there is such a little quantity, the avocado seed is not really dangerous to humans unless consumed in large numbers. What is the purpose of a dehydrator? A food dehydrator reduces the water content of foods by using a heat source and air movement. The heating element in a dehydrator heats the food, forcing moisture to escape from its inside. The warm, wet air is then blown out of the appliance through the air vents by the device’s fan. What’s the deal with avocados being so expensive? Avocado prices have risen by up to 129 percent in recent years. Heat waves, droughts, and a lack of water may all have a negative impact on avocado production. Avocados’ growing popularity is wreaking havoc on the environment as providers try to keep up with demand. What is the maximum size of an avocado tree? “Can you tell me how tall my avocado tree will get?” Avocado trees range in height from modest to enormous. It may reach a height of 20 to 40 feet. It may be maintained at a considerably lesser height through pruning. Where do the majority of avocados originate? They’re considered to have come from Mexico, Central America, and South America. The first avocado trees were planted in Florida in 1833, followed by California in 1856. According to the National Agricultural Statistics Service, California currently produces the most avocados in the United States, followed by Florida and Hawaii. The “dried avocado benefits” is a question that has been asked many times. The answer to the question, is that you can dry an avocado by placing it in a paper bag with a banana peel and then leaving it out for 3-4 days.
<urn:uuid:7e6851fa-ab6e-4a53-ad57-43d0b4861c36>
CC-MAIN-2022-33
https://justalittlebite.com/how-do-you-dry-an-avocado/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00288.warc.gz
en
0.911244
1,440
2.53125
3
By: Nikki Nuno April 12th is a day observed by the LGBTQ+ community as the day we give tribute to those who have risked or sacrificed their lives through the expression of their sexual identity. Many individuals take this day seriously as it is a student-ran event to further push back anti-LGBT agendas and help all people feel free to love who they love. Day of Silence was originally formed by a group of college students at the University of Virginia. What was meant to be a project for non-violent protesting became an annual occurrence across the nation, having tens of thousands standing together to end the “endemic” of name calling, bullying and harassment of LGBT students. Those who partake in its observance take a vow of silence for the entire day and use cards to explain what their sacrifice is intended for. How to get Involved? The Gay, Lesbian and Straight Education Network (GLSEN) became the official sponsor of the event in 2001. Search their website with the special link www.glsen.org/day-silence to register online or via text to show your support. Below the registration option is several other ways to take action in your school. You can join the Street Team to help spread the word in your community by receiving updates on new resources for April 12th. If you’re planning your silence, GSLEN gives great tips in starting up activities in your school beforehand. You can send in a sign to GSLEN telling how you plan to support at your school along with a selfie. The website also recommends printing out their speaking cards that explain your participation in Gay Activist Pioneers you should Know - James Baldwin. Known as an author, activist, and playwright, Baldwin was one of the first individuals to venture into the correlation between race, class and sexuality (intersectionality). He was a highly active participant during the Civil Rights Movement; he attended numerous marches and helped stabilize the motivation of Africans Americans to fight for their human rights in the South. As for his reputation in gay rights activism, in one of his most renowned literary works, Giovanni’s Room,gave clarityto the dynamics of same sex marriages. This was a crucial breakthrough in early gay rights activism, giving answers to numerous stereotypes while making sexual identity a less taboo topic and leaving more room for conversation. - Barbara Smith. As a black feminist, lesbian, activist and elected official, it seems as if the fight for gender/sexual equality was bound to be part of her future. In 1974, she became co-founder of the Combahee River Collective, which is known for its developments in the field of intersectionality. It also helped highlight that the “white” feminist movement helped only specific groups of women and excluded African American women. Through this organization, Smith gained some experience under her belt, and with the motivation of her friends, later founded the Kitchen Table: Women of Color Press. This was a national advancement not only for women, but the most oppressed group amongst us, colored women. The Kitchen Table was the world’s first publishing company to be operated exclusively by colored women. Once she received her chair in Albany, New York’s councilmen, she would serve two terms directed in addressing systemic imbalances in the city. - Rev. Dr. Brent Hawkes. Now retired, Senior Pastor Brent Hawkes has worked at the Metropolitan Community Church of Toronto for 35 years. He realized he was “different” at a young age and decided to keep his sexuality to himself. One day, he saw an ad for the Metropolitan Community Church and knew from there on he’d finally found a place where he could show all that he is and be accepted for it. He is the forefront of ministry for the Gay and Lesbian community of Toronto. He relishes his reputation with several human rights initiatives, especially benefitting those with unbound sexual identities. In 1994, he received the highest civilian award in Toronto, Award of Merit. In 2007, he was appointed the Order of Canada for his strong stance on social justice and human rights for LGBTQ+ members. This is currently the highest honor a country has given to a gay activist.
<urn:uuid:a0c96292-b9cb-4642-9d89-530f553ab16d>
CC-MAIN-2022-33
https://sghsrambler.com/2019/04/04/day-of-silence/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00288.warc.gz
en
0.977479
870
3.53125
4
When a driver hits the brakes, the cars following behind may not see the telltale red lights if driving around a bend or caught up in foggy weather conditions. The Ford Motor Company hopes to make the roads safer with a warning system that transmits a "brake light" alert to the dashboards of cars following behind. The "Electronic Brake Light" proved it could allow drivers to brake earlier and avoid collisions—or at least reduce the severity of accidents—during a four-year research project concluded in Dec. 2012. Such technology represented just one of 20 possible car systems tested by Ford and presented as part of the Safe Intelligent Mobility—Testfield Germany (simTD) project, according to a press release on June 20. A brake light warning of slowing traffic ahead could speed up reactions for drivers several cars behind a braking vehicle. The system could even help prevent deadly highway pileups involving many cars in bad weather, such as a 95-car pileup near the Virginia and North Carolina state lines on Mar. 31, 2013. Ford engineers developed the system at the Ford European Research Centre in Aachen, Germany. Road tests took place with 500 test drivers in 120 vehicles near Frankfurt, Germany. Testing included more than 41 000 hours and 1.6 million kilometers on both public roads and a separate test track. The smart car technology shows the advantages of having networked cars "talking" to one another on the roads, even if self-driving autonomous cars have not yet become widely available. Smarter cars may even communicate with traffic control systems to reduce or eliminate problems such as traffic congestion. Specially-equipped Ford S-MAX models also helped test other smart car systems during the simTD project, including an "Obstacle Warning" system to watch out for road hazards and a "Traffic Sign Assistant" that communicated with traffic management centers for the latest information. Ford's alert system may give drivers a heads up about the behavior of others, but researchers have also experimented with taking networked cars to another level of cooperative driving. Volvo participated in Europe's Safe Road Trains for the Environment (SARTRE) project that networked cars together into a follow-the-leader road train—another marker on the road toward taking driving decisions out of human hands. Jeremy Hsu has been working as a science and technology journalist in New York City since 2008. He has written on subjects as diverse as supercomputing and wearable electronics for IEEE Spectrum. When he’s not trying to wrap his head around the latest quantum computing news for Spectrum, he also contributes to a variety of publications such as Scientific American, Discover, Popular Science, and others. He is a graduate of New York University’s Science, Health & Environmental Reporting Program.
<urn:uuid:32610b8f-9ca7-4fd1-b2b1-25435050b319>
CC-MAIN-2022-33
https://spectrum.ieee.org/smart-ford-brake-light-alerts-drivers-to-slowing-traffic
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00288.warc.gz
en
0.958177
573
3.109375
3
Automobile “window stickers” provide relevant information about new automobiles. They are affixed to every new car in every car showroom in the U.S. The window sticker is specified and designed by the Environmental Protection Agency (EPA) with support from the Department of Energy (DOE) and Department of Transportation (DOT); the logos of all three organizations are on the most recent sticker. The EPA and related agencies set the standards for car fuel-economy testing but do not do the actual testing of cars; this is done by the car manufacturers. Automakers are required to test one representative vehicle – typically a preproduction prototype – for each combination of loaded vehicle weight class, transmission class, and basic engine. EPA reviews the results and verifies a small number of the cars tested using their own tests at the National Vehicles and Fuel Emissions Laboratory.
<urn:uuid:c3eb04be-8bc3-4bea-abab-a0d6deb5530f>
CC-MAIN-2022-33
https://www.plancurtail.org/white-paper/the-epas-flawed-2013-window-sticker/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00288.warc.gz
en
0.926789
174
2.625
3
Cause of cable fire and explosion 1. The cable head burns Because the surface of the cable head is damp and dirty, the ceramic sleeve of the cable head is broken and the distance between the lead wires is too small, which leads to flashover and fire, causing the surface insulation of the cable head and the insulation of the lead wires to burn. 2. Short circuit fault caused by edge damage The protective lead sheet of the power cable is damaged during laying or the cable insulation is mechanically damaged during operation, which causes the insulation breakdown between the cable phases or between the lead sheets, and the resulting arc causes the insulating material and the outer protective layer of the cable to burn and catch fire. 3. The cable is overloaded for a long time During long-term overload operation, the operating temperature of the cable insulation material exceeds the maximum allowable temperature for normal heating, causing the cable insulation to age and dry up. This phenomenon of aging and dry insulation usually occurs on the entire cable line. Due to the aging and drying of the cable insulation, the insulating material loses or reduces the insulating properties and mechanical properties, so it is prone to strike through fire and even burn at multiple places along the entire length of the cable. 4. Fire source and heat source lead to cable fire Such as the spread of fire in the oil system, the spread of the explosion and fire of the oil circuit breaker, the spontaneous combustion of pulverized coal in the boiler pulverizing system or the coal conveying system, the baking of the high temperature steam pipeline, the chemical corrosion of acid and alkali, welding sparks and other fires, all of which can cause the cable fire. 5. The immersed cable runs and leaks due to the height difference When the oil-immersed cable is laid with a large height difference, the phenomenon of oil dripping from the cable may occur. As a result of the flow, the upper part of the cable is dried up due to the loss of oil, the thermal resistance of this part of the cable increases, and the paper insulation cokes and breaks down in advance. In addition, because the oil in the upper part runs down, it makes room at the upper cable head and creates a negative pressure, which makes the cable easy to absorb moisture and make the end wet. The lower part of the cable generates a large static pressure due to the accumulation of oil, which causes the cable head to leak oil. Wet cables and oil leaks increase the chance of failure and fire. 6. Insulation breakdown of indirect joint box The intermediate joint of the cable joint box is oxidized, heated, and glued during operation due to insufficient crimping, weak welding or improper selection of joint materials; when making the intermediate joint of the cable, the quality of the insulating agent poured into the intermediate joint box does not meet the requirements. It is required that when the insulating agent is poured, there are air holes in the box and the cable box is poorly sealed or damaged and leaks into the moisture. The above factors can cause insulation breakdown, form a short circuit, and cause the cable to explode and catch fire. What to do when the cable explodes (1) Cut off the power supply of the fire cable. If the cable catches fire, no matter what the cause is, the power supply should be cut off immediately. Then, according to the path and characteristics of the cable, carefully check to find out the fault point of the cable, and at the same time, personnel should be quickly organized to fight. (2) Cut off the power supply of the non-faulty cable in case of fire in the cable trench. When the cables in the cable trench catch fire, if the cables laid side by side in the same trench have obvious possibility of fire, the power supply of these cables should be cut off. If the cables are arranged in layers, first cut off the power supply of the heated cable above the fire cable, then cut off the power supply of the cable side by side with the fire cable, and finally cut off the power supply of the cable below the fire cable. (3) Close the fire door of the cable trench or block both ends of the cable trench. When the cable in the cable trench catches fire, in order to avoid air circulation and to quickly extinguish the fire, the fire door of the cable trench should be closed or both ends should be blocked, and the fire should be extinguished by suffocation. (4) Do a good job of personal protection when putting out cable fires. Since the fire of the cable will produce a lot of smoke and poisonous gas, the rescue personnel should wear a gas mask when putting out the fire of the cable. In order to prevent personal electric shock during the rescue process, the rescuers should also wear rubber gloves and insulating boots. If one phase of the high-voltage cable is found to be grounded, the rescuers should observe: Do not enter indoors within 4m from the fault point, and do not enter outdoors from the fault. Points within 8m, so as not to step voltage and contact voltage hurt people. Rescue of injured personnel is not limited to this limit, but protective measures should be taken. (5) Fire-fighting equipment used to extinguish cable fires. Fire extinguishers should be used to extinguish cable fires, such as dry powder fire extinguishers, “1211″ fire extinguishers, carbon dioxide fire extinguishers, etc.; dry sand or loess can also be used to cover; if water is used to extinguish fire, it is best to use water spray; Other methods may be used to put out the fire. After the power supply is cut off, water can be poured into the cable trench, and the fault can be sealed and extinguished with water. (6) When fighting a cable fire, it is forbidden to directly touch the steel armor of the cable and the moving cable with your hands. Post time: Aug-04-2022
<urn:uuid:f7e5b0dd-9650-4376-a6dd-c1654bd903e8>
CC-MAIN-2022-33
https://www.ahelek.com/news/cause-of-cable-fire-and-explosion/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00288.warc.gz
en
0.919308
1,227
3.21875
3
Genomics is changing the way healthcare will be delivered, and it requires a workforce that is ready to embrace the potential of this technology. The Genomics Game is designed to give an overview of the genome, the field of genomics and how it is used in healthcare, in an engaging and innovative way. It is aimed at healthcare professionals who may be unfamiliar with the topic. The game can be used as a standalone resource or as an adjunct to support and complement other educational activities. Originally developed for nurses, the content of the game has been aligned to the nursing associate curricula framework and the Nursing and Midwifery Council standards of proficiency for registered nurses. The game is not exclusively for nurses, however, and can be used by any healthcare professional who may be unfamiliar with this topic. The game can be played without a facilitator, or form part of a structured teaching session or workshop. See our suggested session plan for incorporating the game into a teaching session.
<urn:uuid:7e45fbae-5fa2-4013-ba70-c7a00ae3e4b4>
CC-MAIN-2022-33
https://www.genomicseducation.hee.nhs.uk/education/teaching-aids/genomics-game/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00288.warc.gz
en
0.95253
197
2.828125
3
Portal:Military of the United States - War and the military Military of Ancient Rome - United Kingdom (British Army - Royal Air Force - Royal Navy) - United States ( Army - Marine Corps - Air Force - Coast Guard) … Military history of Africa - the Ottoman Empire …… American Civil War - American Revolutionary War - Cold War - Italian Wars - Napoleonic Wars - War of 1812 - World War I - World War II …… Battleships - Biological warfare - Weapons of mass destruction …… NATO The military of the United States, officially known as the United States Armed Forces, consists of five of the seven federal uniform services: the United States Army, the United States Marine Corps, the United States Navy, the United States Air Force, and the United States Coast Guard. Approximately 1.4 million personnel are currently on active duty in the military, with an additional 1,359,000 personnel in the seven reserve components. The Commander-in-Chief of the U.S. military is the President of the United States. With a strength of 2.26 million personnel, including reserves, the United States Armed Forces are the second-largest in the world, after the People's Liberation Army of China, and have troops deployed around the globe. As in most militaries, members of the U.S. Armed Forces hold a rank, either that of officer or enlisted, and can be promoted. State Defense Forces are militia units operating under the sole authority of a state government or governor, and are distinct from the National Guard in that they are not federal military forces. Authorized by state and federal law, State Defense Forces as a whole "may not be called, ordered, or drafted into the armed forces" (of the United States) under 32 U.S.C. § 109 however the subsection further states that individuals serving in the State Defense Forces are not exempt from conscription. Including Puerto Rico, approximately twenty-five states have active State Defense Forces that can be called upon during emergency management and homeland security missions. The United States Department of Defense (DoD) is the Cabinet organization that controls the U.S. military, headquartered at the Pentagon. The Secretary of Defense also oversees the Joint Chiefs of Staff, the Unified Combatant Commands, and civilian agencies such as the Inspector General, Defense Intelligence Agency, and the National Security Agency. The DoD is the largest employer in the United States. The military history of the United States spans a period of over two centuries, during which the United States grew from an alliance of thirteen British colonies without a professional military, to the world's sole remaining military superpower as of 2012. The history of the United States military begins in civilian frontiersmen, armed for hunting and basic survival in the wilderness that were organized into local militias for small military operations, mostly against Native American tribes but also to resist possible raids by the small military forces of neighboring European colonies. Template:/box-footer Uniform changes by Army uniform board After polling Army personnel for input, the Army's uniform board has instituted several changes to the Army's attire. First and foremost, the Black Beret will be relegated to the Army's service dress uniform. Velcro is also being made optional for some closures. Soldiers will be provided the chance to sew patches to their uniform. The beret has been the standard headgear for the Army Combat Uniform since June 2001. The beret is worn on base and for ceremonies while the patrol cap is worn in the field. Soldiers disliked the beret for its nonexistent practical purpose and the redundancy of having to carry both a beret and hat at all times. “The [ACU] signifies a uniform that should be worn in combat or training for combat, yet a beret doesn’t even make the cut on the deployment packing list,” said one NCO. The Army will now issue only one beret to each soldier for a cost savings of $6.5 million over the lifecycle of the ACU. Soldiers will still wear their berets with their Army Service Uniform. Soldiers are pleased overall with the appearance of the beret on the ASU. The change does not effect Special Forces soldiers such as the Army Special Forces who wear distinctive Green Berets. Velcro replaced buttons on the digital ACU replacement for the BDU. Velcro was received as being too noisy, messy, and unprofessional looking by early users after the new ACU uniform was adopted by the Army. Soldiers voiced their opposition to velcro to the Army's Uniform board earlier this year prior to the decision. Armed Forces Lists
<urn:uuid:7f3089d5-1797-4fdc-8fc6-0993629de806>
CC-MAIN-2022-33
https://www.infogalactic.com/info/Portal:Military_of_the_United_States
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00288.warc.gz
en
0.946481
1,003
3.078125
3
As someone’s ability to think, remember or communicate declines, his or her ability to understand and respond appropriately to a situation becomes impaired. This often leads to trouble-some behaviors, known as behavioral “acting out,” or what professionals call “need-driven behaviors.” Types of behavior Challenging behaviors can include repetition, resistance, suspicious delusions, confusion, wandering, agitation and verbal or physical aggression. There are often changes in eating and sleeping schedules as well. Behaviors may lead to erratic, unpredictable and uncontrolled outbursts. However, behaviors have a purpose and are often triggered by un-met needs and the inability to communicate those needs. Persons with dementia may wander aimlessly. Are they trying to find their children, parents or spouse? Are they agitated, because they have a physical complaint and can’t communicate it? Did they become aggressive when a caregiver they no longer recognize is attempting to undress them? Is the room too hot, too cold, too noisy or is a task too overwhelming? When need-driven behaviors occur in someone with dementia, it is important to try to understand why this is happening. Identifying the triggers may help in offsetting the behaviors and controlling the cascade of events. It is helpful to document what happens before and after the behavior occurs to provide clues to the need being expressed or the goal being pursued. Charting these episodes allows caregivers to actually “see” and track patterns, which can help in developing new approaches and preventing the behavior. Changing the behaviors Once patterns are determined, caregivers can make adjustments in approaches and routines. Strategies to cope with cognitive changes that come with dementia can prevent the chronic stress and loss of control that can lead to challenging behaviors. Keeping a daily routine can help produce a sense of predictability and security. Increasing socialization, introducing therapies such as music, exercise or pets, making subtle changes to the person’s environment (such as limiting noise and activity), and focusing on the person and not the task, can reduce the likelihood of problematic behaviors. Adjusting expectations to match the capabilities of someone with dementia will also help avoid frustration. Five tips for coping - Try not to take behaviors personally. - Remain patient and calm. - Explore pain as a trigger. - Don’t argue or try to convince. - Accept behaviors as a reality of the disease and try to work through it. Sudden changes in behavior Medical illness may be the cause of a marked and rapid decline or sudden onset of behavioral issues in a person with dementia. Often this sudden change, which is called “delirium,” may be due to an easily identifiable and treatable problem such as an uncomplicated urinary tract infection, mild dehydration, pain, constipation, a common cold, a sore throat, itchy skin or lack of sleep. Seek help immediately if you notice a sudden change in a person with dementia.
<urn:uuid:6deac900-a1db-4d5c-8450-86633a8f8ac8>
CC-MAIN-2022-33
https://www.pinerest.org/resource/dementia-and-alzheimers-disease/dementia-challenging-behaviors/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00288.warc.gz
en
0.948574
614
3.515625
4
Situated in Banff National Park, the Valley of Ten Peaks is a beautiful valley in the Canadian Province of Alberta. Check out the ten peaks that crown the valley. It is common to witness one or two peaks within a valley but extremely rare to see ten peaks in one single valley! Well, the Valley of the Ten Peaks (French: Vallée des Dix Pics), as the name suggests, is a valley crowned with ten jagged snowy mountain peaks. It is located on the continental divide in Banff National Park in Alberta, a Canadian province. An incredible wonder of nature, it is also the highest mountain range in the region. You can reach the valley through the Moraine Lake road near Lake Louis. The deep blue water of glacially-fed Moraine lake lets you see the reflection of the tall mountain tops. Interestingly, this valley of ten peaks appeared on the reverse side of the 1970/69 and 1978/79 Canadian 20 dollar bill and also on a 2 Mountcent. Let’s know about the history, culture, and nearby attractions of the Valley of Ten Peaks. Originally named by an early explorer of the region Samuel Allen, the ten peaks were referred to as using the numerals from one to ten in the Stoney First Nations Language. He may have learned the terms from his Native American guides, who helped him with the horses. The Nakoda, also called the Stoney Indians, is a tribe having a close cultural and dialect relation with that of the Assiniboine First Nation. They are believed to have parted in the mid-1700s, and they traveled across large parts of the prairies and mountains of western Alberta into British Columbia. The isolated Valley of the Ten Peaks was Nakoda’s original homeland’s part. Eventually, all except three of the ten mountain peaks were renamed in honor of notable individuals, including Allen. The Allen’s original peak list didn’t include Mount Hungabee, despite it being higher than Wenkchemna Peak, which is an extension of Hungabee. The ten peaks are numbered from east to west as follows: 1. Mount Fay (Original Native name: Heejee) is 10,613 feet high. 2. Mount Little (Original Native name: Num) is 10,131 feet high. 3. Mount Bowlen (Original Native name: Yamnee) is 10,079 feet high. 4. Tonsa (Original Native name: Tonsa) is 10,030 feet high. 5. Mount Perren (Original Native name: Sapta) is 10,010 feet high. 6. Mount Allen (Original Native name: Shappee) is 10,860 feet high. 7. Mount Tuzo (Original Native name: Shagowa) is 10,650 feet high. 8. Deltaform Mountain (Original Native name: Shakhnowa) is 11,234 feet high. 9. Neptuak Mountain (Original Native name: Neptuak) is 10,607 feet high. 10. Wenkchemna Peak (Original Native name: Wenkchemna) is 10,401 feet high. Other mountain peaks that can be spotted from within the valley are Mount Temple, Mount Babel, and Eiffel Peak. Fay Glacier is developed within Mount Babel, Mount Fay, Mount Little, and Mount Bowlen. The Neil Colgan Hut is a mountaineering destination that could be reached in an 8 to 12-hour long hike along the Perren Route from Moraine Lake. Kayaking or canoeing in the crystalline, pristine, emerald-hued water of Moraine Lake is something you can’t-miss. Besides sightseeing, photography, walking, and hiking, you can also enjoy camping and climbing in remote areas for extra incentive. Other nearby destinations include Larch Valley, Louise Lake, Sentinel Pass, and Eiffel Lake. A nearby massive glacier develops in the wintertime, and Moraine Lake Road becomes a destination for cross country skiers. So whenever you plan a visit, carry your camera along and take pictures of the beautiful sceneries of this valley of the ten peaks and the beautiful Moraine Lake. We recommend you should go once in your lifetime and watch the stunning views that the valley beholds. What do you think about the future? Does it bring thrill in you or terrifies you? What’s your take on high speed trains, miles... Rivers have been crucial to human settlements, commercialization, and building cities. This opens opportunities for trading goods and establishing international connections. Have you ever seen blue-green waterfalls? Hidden in the Grand Canyon, Havasupai Falls Arizona is an exotic destination and a par...
<urn:uuid:8e84fb1e-1dad-4b0b-ae0b-5c98cb025bad>
CC-MAIN-2022-33
https://www.stillunfold.com/travel/the-valley-of-the-ten-peaks-in-banff-national-park-canada-is-a-natural-wonder
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00288.warc.gz
en
0.936449
999
3.0625
3
Guest post by Babette Bohn, Texas Christian University The north Italian city of Bologna produced the largest and most successful group of women artists in early modern Italy. Bologna is the real protagonist of my new book, Women Artists, Their Patrons, and Their Publics in Early Modern Bologna (Pennsylvania State University Press, 2021; fig. 1). Founded on extensive archival research, the book examines sixty-eight women who were painters, sculptors, printmakers, embroiderers, and disegnatrici (draftswomen) from the fifteenth through the eighteenth centuries. No other city comes close to these numbers, and none matches the diverse specializations and impressive public record of this accomplished group. I investigate individual artists, from well-known painters such as Lavinia Fontana (1552–1614) and Elisabetta Sirani (1638–1665) to more obscure figures such as the etcher Maria Elisabetta Macchiavelli (1692–1727) and the sculptor Clarice Fortunata Pellegrini Vasini (1732–1823). The book explores the reasons for women’s unusual success in Bologna. Key factors included - exceptional local biographers; - unusually diverse patrons and collectors; - earlier accomplished women in literature, academic fields, and religion; - Bologna’s venerable university and reform-minded archbishops; and - the unprecedented celebration of women’s drawings. How to Measure Success The sixty-eight Bolognese women artists recorded by early writers or documents provide a striking barometer of success. During the seventeenth century, the forty-four women artists in the city far exceed the numbers recorded elsewhere, even in the much larger cities of Venice, Naples, and Rome. This discrepancy suggests an environment that was unusually receptive to female agency. Bolognese women’s many public commissions also confirm their accomplishments. During the seventeenth century, twenty-five women received commissions for prestigious and lucrative public works such as altarpieces. Even earlier, around 1525, Properzia de’ Rossi, the first woman to receive a public commission in Bologna, created marble sculptures for the Basilica of San Petronio (fig. 2). Properzia was also the sole woman to receive a biography in the first edition of Giorgio Vasari’s Lives of the Artists (1550). Lavinia Fontana, whose achievements were described by more writers than any other woman artist of the sixteenth century, earned an unprecedented twenty-four public commissions for paintings. And Elisabetta Sirani produced even more: some thirty-five public pictures between 1655 and 1665. Her altarpiece of The Christ Child appearing to Saint Anthony (fig. 3, 1662), painted for the Church of Saints Leonardo and Ursula, brings a characteristic sense of tenderness and intimacy to her devotional figures. Context and Patronage Bologna housed the oldest university in Europe, and many women artists came from academic families or worked for university scholars. The city was also a center for book publishing and religious reform, which both yielded opportunities for women. Moreover, Bologna celebrated its accomplished women writers, scholars, and religious figures, dating back to the thirteenth century. Caterina Vigri (1413–1463), a nun who founded the Corpus Domini convent, was also the first recorded woman painter in Bologna. Her example sanitized the painter’s profession for women, particularly after her beatification in 1592 and canonization in 1712. She became the patron saint of Bologna’s Accademia Clementina in 1710. Although Vigri worked exclusively within her convent, later women benefited from the growing socioeconomic diversity of patrons and collectors in the city. Unlike some cities, Bologna was not a court, and patronage was not dominated by one ruling family after the fifteenth century. As Raffaella Morselli has shown, patrons and collectors from varied income levels promoted artistic production. They included fishmongers, jewelers, bankers, cloth merchants, ecclesiastics, and nobles, among others. I suggest that Bolognese women produced some of their most original works for middle-income patrons who were receptive to iconographic innovations. The painter Elisabetta Sirani was a pivotal figure, achieving great success and inspiring many other women to pursue artistic careers. Earlier studies exaggerated her influence, hypothesizing that most of her successors were her students. My archival research uncovered new dates for many women, confirming that most of them could not have studied directly with Sirani. Instead, they were evidently inspired by her example. One consequence of this discovery is the realization that many women studied with men who were not family members. The widespread character of this phenomenon began in the later seventeenth century, when more than half of recorded women artists studied with male non-relatives. This suggests that social and professional conventions were changing, enabling more women to become artists. Bolognese Biographers and Signing Practices One chapter examines how local writers contributed to the appreciation of their female compatriots. Most early modern biographies of women artists emphasize their beauty, virtue, and personal lives at the expense of their work. I argue that Bolognese biographers, beginning with Carlo Cesare Malvasia in 1678, treated women as professionals, focusing instead on their artistic production and promoting a fuller appreciation of their works. These biographies have contributed significantly to larger extant oeuvres for many women, a situation also promoted by numerous signed paintings and sculptures. Most extant paintings by Sirani and most extant sculptures by Vasini (fig. 4) are signed, facilitating recognition of their works today. Since male artists in Bologna rarely signed, this method of claiming authorship is a distinctive feature of Bolognese women’s artistic practices. In 1976, Ann Sutherland Harris first recognized Lavinia Fontana as the earliest professional woman artist in Italy. She worked in the marketplace rather than a court or convent, receiving commissions from different patrons. She was especially famous for her portraits (fig. 5), which constitute over half of her oeuvre, and she also painted many public and private religious pictures (fig. 6). Sirani died at the age of twenty-seven, so her short career lasted scarcely more than a decade. But thanks to her list of some 200 paintings that Malvasia published in his biography, we know that she was productive nevertheless. Unlike Fontana, most of Sirani’s paintings portrayed religious subjects, and her privately commissioned paintings of the Madonna and Child were especially popular (fig. 7). Like her two famous predecessors, Lucia Casalini Torelli (c. 1680–1762) painted both portraits and altarpieces. And like them, she produced several remarkable self-portraits (fig. 8). Casalini was one of fifteen Bolognese women to receive an honorary membership in Bologna’s new artist’s academy, the Accademia Clementina, founded in 1709. As in other cities, most of Bologna’s female artists were painters, although uniquely, it also boasted three sculptors. Anna Morandi Manzolini (fig. 9) was the most famous, winning memberships in more academies than any other woman artist to date. But despite her international reputation, prestigious commissions, and position at the university, she was never financially secure. Tragically, she was forced to relinquish one of her two children and to sell her entire collection of wax sculptures to make ends meet. In contrast, top painters like Fontana and Sirani were financially successful. Malvasia remarks on the high prices Fontana commanded for her portraits of noblewomen, comparing them to the compensation earned by such eminent portraitists as Anthony van Dyck. Perhaps it was easier for painters to obtain generous compensation than for women in other specializations. My rediscovery of the woodcutter Veronica Fontana’s will confirms that despite her many commissions, she died in poverty. One frustration of studying women artists in early modern Italy is the paucity of drawings that can be reliably credited to them. This limits our understanding, since drawings for most Italian artists were crucial in both education and pictorial preparation. Elsewhere in Italy, only a few drawings by women artists such as Sofonisba Anguissola are still identifiable. Thus the existence of drawings by a number of Bolognese women offers a rare opportunity. About thirty drawings can be reliably ascribed to Lavinia Fontana, including several that prepared paintings. But the first Italian woman to be famous explicitly for her drawings was Elisabetta Sirani, by whom some 150 drawings are identifiable. Malvasia collected Sirani’s drawings and especially admired her facility with wash, which he thought reflected her consummate skill. The Saint Jerome (fig. 10), a study for a painting, illustrates the dynamic, expressive quality of the artist’s wash drawings. My book also presents some red chalk drawings that are newly connected to Sirani’s paintings. Only a few later women produced drawings that are still identifiable, so more work remains do be done on this important subject. I’d like to conclude with some comments about my hopes for this new book. Because Bologna has so many, and such diverse, women artists, it provides an unusual opportunity to formulate some comprehensive hypotheses about women artists in early modern Italy. This broader scope may offer opportunities for understanding not just Bologna but also other cities where women worked. Three documentary appendices should provide useful starting points for scholars who wish to pursue little-known artists further. There are still quite a few with no identifiable works, so there are lots of opportunities for my successors. But most of the book is pitched to broader audiences, and I hope it will be engaging for anyone with an interest in women artists. Babette Bohn, (Pennsylvania State University Press, 2021). Dr. Babette Bohn is professor and graduate coordinator of art history at Texas Christian University. She has published numerous books and articles particularly on Bolognese women artists, drawings, and prints, and is the author of Ludovico Carracci and the Art of Drawing (2004) and Le “Stanze” di Guido Reni: Disegni del maestro e della scuola, an exhibition catalogue for the Uffizi Gallery, Florence. Her new book is Women Artists, Their Patrons, and Their Publics in Early Modern Bologna (Pennsylvania State University Press, 2021). More Art Herstory guest posts about Bolognese women artists: The Restoration of Royalty: Lavinia Fontana’s Queen of Sheba and King Solomon, by Dr. Aoife Brady Elisabetta Sirani: Self-Portraits, by Jacqueline Thalmann Drawings by Bolognese Women Artists at Christ Church, Oxford, by Jacqueline Thalmann Lavinia Fontana and Elisabetta Sirani at the Smith College Art Museum, by Dr. Danielle Carrabino Elisabetta Sirani of Bologna (1638–1665), by Dr. Adelina Modesti Lavinia Fontana: Italy’s First Female Professional Artist, by Dr. Elizabeth Lev Sister Caterina Vigri (St. Catherine of Bologna) and “Drawing for Devotion,” by Dr. Kathleen G. Arthur More Art Herstory guest posts about Italian women artists: Judith’s Challenge, from Lavinia Fontana to Artemisia Gentileschi, by Alessandra Masu By Her Hand: Personal Thoughts and Reflections on an Exhibition, by Oliver Tostmann Sister Eufrasia Burlamacchi (Lucca, 1478–1548), by Dr. Loretta Vandi Artemisia Gentileschi: What Wasn’t in the London Exhibition and Why it Matters, by Dr. Jesse Locker “La grandezza del universo” nell’arte di Giovanna Garzoni / “The grandeur of the universe” in the art of Giovanna Garzoni (Guest post/review by Dr. Sara Matthews-Grieco) Plautilla Bricci (1616–1705): A Talented Woman Architect in Baroque Rome, Guest post by Dr. Consuelo Lollobrigida Renaissance Women Painting Themselves, Guest post by Dr. Katherine McIver Orsola Maddalena Caccia (1596–1676), Convent Artist, Guest post by Dr. Angela Ghirardi Two of a Kind: Giovanna Garzoni and Artemisia Gentileschi, by Dr. Mary D. Garrard The Priceless Legacy of Artemisia Gentileschi: A Curator’s Perspective, by Dr. Judith W. Mann
<urn:uuid:470e0cc4-ccfb-4580-b369-e846624bb48c>
CC-MAIN-2022-33
https://artherstory.net/celebrating-bolognas-women-artists/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.954478
2,750
2.65625
3
Holy Right-Believing Princes Boris and Gleb were the first Russians to be canonized by the Church. To a modern-day person, the actions that made them worthy of canonization seem weird. Personally, I had a number of questions. Could it be due to the fact that we were brought up with examples of war heroes who fought bravely, killed enemies, and defended their homeland? We have to refer to the worldview of their contemporaries to understand why the Church canonized Boris and Gleb. The murder of the two princes by their brother Sviatopolk was a political murder typical of that time. Contemporaries perceived feuds and politically motivated murders as not-so-grave sins. When Prince Vladimir, who had been a cruel ruler and a die-hard pagan, converted to Christianity, he set an example for his subjects by giving up sin. He abolishes capital punishment, gives up his harem, and helps the sick and the poor. Unlike their older brothers, Boris and Gleb were brought up in Christianity since childhood. When the Grand Prince’s sons grew up, Vladimir put them in charge of parts of his country. It was common for Russia but it was the first time all land was entrusted to the sons of the Grand Prince. This appointment was necessary to ensure unified management of the land and to override local separatism. The oldest son, Sviatopolk, made a deal with the Polish king and decided to attack his father. He failed, and Prince Vladimir threw him in prison in Kiev. When Vladimir died, Sviatopolk was the only one of his sons who was in Kiev and therefore he seized the power. Aptly nicknamed ‘The Accursed’, Sviatopolk decides to murder his brothers to rule Russia on his own. He sends assassins to his brother Boris who is coming back from a war with the Pechenegs. Boris enjoys respect and support of his troops, and they advise him to fight against Sviatopolk. What does Boris say in response? “How can I raise my hand against my brother, especially since he is my older brother whom I honor as my father?” (The Saga of Boris and Gleb, translated by Dmitry Likhachev). Prince Boris refuses to act like a pagan. He doesn’t engage in the strife and prefers death: “[W]hosoever will lose his life for my sake, the same shall save it.” (Luke 9:24 as quoted by The Saga of Boris and Gleb, translated by Dmitry Likhachev.) His soldiers leave him. Before he dies, Prince Boris manages to pray at a Matins and to take communion. When Sviatopolk’s soldiers come to murder the prince, he prays to God asking him to forgive them and his brother who sent them. “All who heard his words were unable to utter a word for fear and bitter sadness and because of tears that were flowing down their cheeks.” (The Saga of Boris and Gleb, translated by Dmitry Likhachev). Having Boris killed, Sviatopolk decides to murder Prince Gleb who was very young. He sent for him, pretending that it was his father who wanted to see him. Yaroslav warned Gleb of the imminent danger. Gleb refused and was killed by Sviatopolk’s minions. What strikes me in this story is the fact that both Prince Boris and Prince Gleb chose to die voluntarily. That is, they had the choice, and they chose to remain Christians, to keep the Lord’s commandments and be with God rather than in this world. That was their moral victory. It was a revolution in people’s minds. People started venerating the two princes immediately. Their choice was directed by a completely different logic, and I don’t know if there are similar examples nowadays. We need such examples, that’s for sure.
<urn:uuid:7ba1af93-f90d-4681-81bd-d9b806f47200>
CC-MAIN-2022-33
https://catalog.obitel-minsk.com/blog/2019/05/boris-and-gleb-the-first-russians-canonized-in-the-history-of-the-church
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.987166
817
2.796875
3
Kentucky Health News Obesity worsens the damage that arthritis does to joints, but simply telling patients to go home and diet and exercise is not working, and health care providers must proactively monitor their patients and help them find affordable solutions to succeed. And daily walking is still the best exercise. Those were examples of research findings discussed at the 10th annual Center for Clinical and Translational Science conference sponsored by the University of Kentucky on March 25. More than 700 researchers, students, policymakers and guests discussed research with a focus on physical activity across the lifespan. Stephen Messier, professor and director of a biomechanics laboratory at Wake Forest University, said obesity has a significant effect on joint health, particularly osteoarthritis, which he said is quite painful. He called for closer attention to obese patients with arthritis. He said a study found that a combination of diet and exercise over an extended period of time offers the best results for less pain and less disability. He said that a separate study found those who lost 10 percent of their body weight had the most “significant outcomes” related to function, which included walking speed. The conference featured 31 oral presentations and 270 poster presentations, addressing a vast array of topics including physical inactivity in children, physical inactivity in chronic disease and biomedical informatics. “The conference was designed to raise awareness of the science behind the benefits of exercise and the dangers of physical inactivity,” Charlotte Petterson, professor and associate dean of research in the College of Health Sciences, who chaired this year’s conference, said in a UK press release. The keynote speaker, Duke University medicine professor William E. Kraus, encouraged walking as a proven and simple activity that can improve health and actually extend life. “Fitness always trumps fatness,” he said, noting that a “culture of convenience” and conditions of built environments, such as absence of sidewalks, deter people from physical activity. Research on fourth and fifth graders in two Clay County schools, while in the early stages of analysis, found that obesity and inactivity begins early. Karyn Esser, professor of physiology at the UK College of Medicine, said her research was examining the circadian rhythms and physical activities of students because changes in natural circadian rhythms “can create pre-cursors to disease” in just seven days, even in healthy young people. She said her study is intended to help schools improve students’ health by adjusting meal times and offering physical activities to best coincide with circadian rhythms. The data for Esser’s study was gathered through electronic devices that the 136 students wore for seven days to measure activity, heart rate and skin temperature. The students also kept a daily journal to record their activities. So far, Esser said, the data show 33 percent of the students are considered obese, their initial blood pressure measurements are on the high end of normal, and the students are less active on weekends and nights than during the school week. Another UK study found that students who are more active during the school day do better in mathematics. Alicia Fedewa and Heather Erwin of the College of Education said they found that increased physical activity levels “significantly improved” math scores and slightly improved reading scores of the students who got an extra 20 minutes of movement on each school day. They recommended two short 15-minute recesses per day, rather than one long one. They also said that classroom “energizers” and stability balls also help students with these behaviors. The researchers said many studies show that students who participate in recess and physical education during the school day are more focused and less fidgety, show less listlessness, and have better overall classroom behavior. They said more controlled studies need to be conducted, but said most studies to date have found that fit kids have less anxiety and better overall well-being. Also, a regimen of consistent physical activity is best for kids with attention deficit hyperactivity disorder (ADHD).
<urn:uuid:fda3b42c-a5a3-4baa-9479-04f9cd6b2054>
CC-MAIN-2022-33
https://ci.uky.edu/kentuckyhealthnews/2015/03/30/researchers-meet-to-discuss-physica/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.966019
823
2.859375
3
SOURCE: UCSF ARTICLE The areas in purple are the regions of the brain where connectivity is significantly lower in patients with epilepsy, as compared to well patients. The different images show the brain data from different angles. Image courtesy of Dario Englot A new study found that patients with epilepsy have significantly weaker connections throughout their brain, particularly in regions important for attention and cognition, compared to individuals without epilepsy. These weaker brain connections may reflect harmful long-term effects of recurrent seizures, but importantly the connectivity patterns may be used in the future to help locate which part of the brain is causing seizures, and may help doctors plan more effective surgeries. In the study, 61 epilepsy patients and 31 controls subjects were analyzed using a non-invasive whole-brain imaging technique that detects magnetic fields produced by the electrical signals in the brain. The technique is called magnetoencephalography, and these MEG signals are used to examine the strength of connections in the brain. Neurosurgery resident Dario Englot, MD, PhD, sought to learn what the patterns of brain connectivity in epilepsy patients may tell us about the long-term effects of seizures on the brain. The findings suggest these connectivity patterns could help predict which individuals might benefit most from epilepsy surgery. Intervening Earlier to Protect the Brain The researchers found that patients who have had epilepsy for a longer period of time or have more frequent seizures had the most abnormal brain connectivity, suggesting that seizures may have progressive negative effects on the brain over time. This might advocate for early aggressive treatment of epilepsy that is not controlled with medication, to prevent these damaging effects of seizures that accumulate over time. All patients in the study had seizures that were not controlled despite several anti-epileptic medications, and all ultimately underwent brain surgery to remove the part of the brain causing the seizures. After surgery, about two-thirds of patients became seizure-free. The investigators then examined whether brain connectivity patterns could predict which patients stopped having seizures after surgery. More Precise Surgeries Interestingly, those patients who became seizure-free were more likely to have an area of increased connectivity in the part of the brain causing seizures. This was not often seen in individuals who continued to have seizures after surgery. This suggests that although the brain is less connected overall in epilepsy patients, the part of the brain causing seizures may actually have increased connectivity. Knowing this, MEG studies of brain connectivity could help determine which part of the brain is causing seizures, and may help predict a patient’s chance of becoming seizure-free after epilepsy surgery. The study, published in the journal Brain, is the product off a multidisciplinary effort at the University of California, San Francisco, including biomedical engineer Srikantan Nagarajan, PhD, neurologist Heidi Kirsch, MD, neurosurgeon Edward Chang, M.D., and several other investigators.
<urn:uuid:304051ee-c04e-46ec-aff8-40b260ff5aed>
CC-MAIN-2022-33
https://epilepsyu.com/brain-connectivity-study-could-lead-to-better-outcomes-for-epilepsy-patients/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.951661
587
3.640625
4
8 top foods for healthy eyes Review your eye health. Read on for a selection of the most beneficial foods to counter eye disorders and help maintain excellent eyesight. Rich in omega-3, fatty fish like tuna, herring or sardine (steamed or grilled) nourish the cell membranes of nerve cells, including the retina and also prevent the onset of eye diseases linked to aging. Clementines, oranges and mandarins As with all citrus fruits, these three foods can be found almost year-round and are rich in vitamin C. They contain antioxidants that protect the cornea and crystalline lens of the eye and help prevent cataracts, a disease caused by age that causes clouded vision, especially at night. As with a number of other orange and yellow fruit, the carrot is full of beta-carotene, an antioxidant precursor of vitamin A and rich in pigments that protect the retina, especially against cataracts. It’s also important to note any vitamin deficiencies that could provoke decreased visual acuity. Carrots should be consumed cooked several times per week. Renowned for improving night vision and tested for this by Royal Air Force pilots during World War II, blueberries contain vitamin C and anthocyanins, components that boost visual acuity and that can help alleviate eye fatigue. Rich in pigments, beta-carotene and vitamins, spinach is a super food for eye health as it protects against loss of visual acuity and UV rays. It should be a staple of your kitchen ingredients and consumed several times per week either alone or with sides, in a salad or cooked to your liking. Thanks to its numerous antioxidants including vitamin A — essential for seeing in the dark — this food is renowned for its protective qualities. In particular, it helps protect against aging-related macular degeneration (AMD), a disease of the retina. This green vegetable, as well as its entire family of cruciferous vegetables, are rich in pigments and antioxidants and contain a high level of vitamin C that protects the retina and the crystalline lens from UV rays as well as free radicals, harmful to vision. These vegetables are to be consumed without moderation in gratin dishes, steamed or in tarts all year long. A great source of lutein and zeaxanthin, essential pigments for eye health, this ingredient protects against AMD and can be eaten in salads, cooked or raw. Consuming 5 to 6 g per day of these pigments is said to be one of the best ways to prevent cataracts.
<urn:uuid:57e6c0b8-d92a-4d8e-80d3-495ada1310bc>
CC-MAIN-2022-33
https://htv.com.pk/news/8-top-foods-healthy-eyes
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.928251
559
2.609375
3
by Nathan Drucker figures by Daeun Jeong As the U.S. recovers from the pandemic and shores up its environmental defenses from a rapidly changing climate, federal money is being spent like never before. Simultaneously, the exceedingly competitive global economy is driving lawmakers to thrust the American economy into the 21st century. One result of this fervor is a potentially vast increase in federal funding for science and technology. In April 2021, a bipartisan group of Senators put forward the Endless Frontiers Act, a proposal that would pump almost $100 billion into science and technology funding. By June 2021, the Senate passed the legislation, repackaged it as part of the U.S. Innovation and Competitiveness Act (USICA), and sent it to the House of Representatives. The House of Representatives responded with their own proposal, dubbed the America COMPETES Act. Embedded within these two proposals are different visions for the role of science and technology within American society for the years to come. One the one hand, the Senate version (USICA) adopts more of a ‘top-down’ legislative architecture with congress explicitly setting research priority areas. On the other hand, the House version (America COMPETES) is structured more from the ‘bottom-up,’ reflecting research priorities predominantly set by the scientific community. Comparing the USICA and the America COMPETES Act sheds light on how science and technology shape political debate, and conversely, how political debate molds science and technology. With the House of Representatives and Senate debating these bills in the coming months, it remains to be seen which vision of science in America will win. Science situated in crisis Funding for science in America has historically been embedded in societal issues. President Lincoln chartered The National Academy of Science, a non-government organization, during the Civil War, reportedly after the first battle between iron-clad warships. The calamities of World War I and World War II highlighted the significant role of science and technology in modern warfare, ranging from penicillin to chemical weapons and the atomic bomb. President Franklin D. Roosevelt recognized how critical America’s science infrastructure was to the Allied victory during World War II and solicited advice on converting wartime research into peaceful endeavors from his advisor and Director of the Office of Scientific Research and Development, Vannevar Bush. In response, Bush wrote Science: The Endless Frontier, an essay which advocated for federal support of science and technology through a “National Research Foundation.” The National Science Foundation (NSF) and other federal agencies which fund science can trace their lineage to Vannevar Bush’s and Roosevelt’s interest in systematically funding research to address America’s societal problems. American society is at another major juncture defined by crises like the COVID-19 pandemic and climate change. Federal spending played a tremendous role in rapidly developing vaccines for COVID-19, not to mention decades of research at the National Institutes of Health (NIH) and other programs focused on virology and mRNA. Similarly, taxpayer dollars are actively used in the research and development of clean energy technology like batteries and solar panels. Pandemic recovery legislation and President Biden’s multi-trillion-dollar infrastructure bill allocate billions of dollars for research and development (R&D). International competition—both economic and geopolitical— continues to be another major driving force for R&D funding. The growth of the Chinese economy has been outpacing the U.S. for over a decade, and their rapid development of a competitive high-technology sector has alarmed many Americans. Indeed, both the USICA and America COMPETES include the word ‘compete’ in their working titles. In fact, the USICA specifically cites economic and ideological competition with China as a justification for large increases in R&D funding in specific areas such as artificial intelligence. With so many high-stakes paths for federal funding to go, who decides which projects get funded and how do they decide? These questions are central to a longstanding debate surrounding the role of science and technology in modern society. Who should set scientific priorities? Science is a capital-intensive enterprise. As nation-states began to fund R&D during the 20th century, scientists actively debated how to balance their own interests with those of their governments when creating scientific institutions and setting research priorities–part of a concerted effort to establish forms of scientific governance. For Michael Polanyi, a Hungarian-British polymath, scientific society organizes itself as a marketplace of ideas and regulating this marketplace from the outside would reduce its productivity. In America, Vannevar Bush was concerned about military interests completely controlling R&D infrastructure after World War II, so his proposed “National Research Foundation” encouraged greater autonomy of the scientific community funded by non-military interests. More recently, there have been public concerns over certain directions of science and technology. For many, the initial excitement surrounding the internet has given way to anxiety about privacy and misinformation. Developments in robotics and artificial intelligence threaten the livelihoods of millions of people. Meanwhile, genetic engineering continues to raise ethical concerns, from genetically modified (GM) foods to “designer” babies. Especially in a democratic society, the debate on how to balance public interests, private interests, and the interests of the scientific community remains an active conversation. A distinguishing feature of the American science funding landscape is the alphabet soup of government agencies investing in science with their own missions. For example, the NSF has traditionally focused on fundamental research for its own sake, rather than projects with the explicit goal of technological development. The Department of Energy (DOE) funds research for energy related science and technology, whereas the National Institute of Standards and Technologies (NIST) focuses more on research for economic advancement. Other major funders of research include the Department of Defense (DoD), and National Institutes of Health (NIH) along with many more. The missions of these agencies can overlap, but their variety can be an effective way of including many different kinds of research in the entire federal portfolio. What are USICA and the America COMPETES Act? The recent push for increased science funding began with Senate Majority Leader Charles Schumer (D-NY) and Senator Todd Young (R-IN) chatting while they exercised in the Senate gym. By April 2021, these two senators and their collaborators composed bipartisan legislation to advance semiconductor manufacturing, create regional technology hubs, and establish a Directorate for Technology and Innovation in the National Science Foundation (NSF). The Senate initially named the legislation the Endless Frontiers Act, an homage Vannevar Bush’s essay. But after two months of legislative processes, the bill was edited and incorporated as part of the United States Innovation and Competitiveness Act (USICA). A principal focus of the USICA is strengthening U.S. leadership in technology to compete with global rivals. It aims to expand domestic semiconductor manufacturing, research, and development. Furthermore, it allocates more funds for the Deference Advanced Research Projects Agency (DARPA) and the DOE. Another major part of USICA would create a Directorate for Technology and Innovation in the NSF with a list of ten ‘key technology focus areas’ to be updated periodically. A budgetary breakdown for funding increases proposed by the USICA is shown in Figure 1. The America COMPETES Act is the House version of the bill sponsored by Rep. Eddie Bernice Johnson (D-TX-30). This version also includes appropriations for domestic semiconductor manufacturing in addition to funding to improve America’s supply chains. For scientific funding, the House version aims to redesign NSF, DOE, and NIST. This approach is in contrast with the Senate version which primarily aims to establish a new technology directorate only for the NSF. Other parts of the House version of the bill would raise the NSF, DOE and NIST office of science budgets, shown in more detail in Figure 1. How do the USICA and America COMPETES Act express competing visions of scientific governance? The deliberation over scientific governance is alive and well in the congressional debate over the USICA and the America COMPETES Act. The USICA appropriates more money than the America COMPETES Act, but it is more focused on developing technologies from basic scientific discoveries through the new NSF ‘Science and Technology Directorate.’ This technology directorate represents a significant shift from the previous mission of the NSF, which is supposed to focus more on basic science that does not necessarily hold technological promise. While broad, the ten technology focus areas for the USICA are heavily weighted towards developments in fields of advanced computing such as quantum information science and machine learning. These priorities are to be set by a combination of lawmakers and agency directors, representing a form of scientific governance from outside the scientific community (depicted in Figure 2, left). Right now, these priorities heavily reflect concerns over national security and economic competition. In contrast, the America COMPETES Act looks more to scientists to define their own course, and has provisions to restructure the DOE and National Institute of Standards and Technology (NIST). Rep. Johnson (D-TX) has expressed concerns that the geopolitically competitive tone of the USICA could be a potential turnoff to the scientific community. The House bill specifies more focus areas across different funding agencies than the Senate version, including areas not directly related to geopolitics. This diversity of scientific research topics from multiple government agencies suggests that the scientific community has played a larger role in setting the agenda of the America COMPETES Act (depicted in Figure 2, right). The competing visions are also reflected in alternative mechanisms for funding projects in jurisdictions which are historically underrepresented. Both bills aim to strengthen the DOE Established Program to Stimulate Competitive Research (EPSCoR), which aims to stimulate STEM activity in targeted geographic areas and communities. However, the USICA aims to secure additional money for specific regions, whereas the America COMPETES Act does not require as much funding to be tied to particular geographic zones. For some government officials such as the DOE Under Secretary for Science and Innovation Geri Richmond, geographic quotas would conflict with merit-based allocation of research funding, which is a practice firmly rooted in the view of science as a decentralized marketplace of ideas. For others, this program plays a vital role in stimulating research and education in districts which can be overlooked by the merit-based allocation system. Despite the differences between the two bills, lawmakers and scientists alike are very excited about the proposed increases to R&D funding. Researchers are eager to repair, maintain, and expand America’s critical science infrastructure to address the crises of our time and explore the wonders of nature. The USICA and America COMPETES Act each have bipartisan support and are currently in the conferencing stage. A final bill is slated to be announced over the summer. Nathan Drucker is a PhD candidate in Applied Physics with a secondary field in Science, Technology and Society at Harvard. Daeun Jeong is a fourth-year Ph.D. student in the Biological and Biomedical Sciences program at Harvard University.
<urn:uuid:5dcbf0ce-096d-4463-9f07-76eefa66a44d>
CC-MAIN-2022-33
https://sitn.hms.harvard.edu/flash/2022/competing-visions-of-science-funding-in-congress/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.939583
2,280
2.703125
3
- 1 Which is more dangerous black bear or brown bear? - 2 Which bear is bigger black or grizzly? - 3 How can you tell a black bear from a brown bear? - 4 Is a brown bear a black bear? - 5 Do polar bears eat humans? - 6 Do you play dead with a brown bear? - 7 Who would win a grizzly bear or polar bear? - 8 Can you fight a black bear? - 9 Who would win grizzly or gorilla? - 10 Is a brown bear a grizzly? - 11 What’s the bear saying? - 12 Are black bears aggressive? - 13 Are brown bears aggressive? - 14 Do grizzlies eat black bears? - 15 What do you do if you see a black bear? Which is more dangerous black bear or brown bear? The average brown bear encounter is more dangerous —3.5 times more likely to result in injury—than the average polar bear encounter, and 21 times more dangerous than the average black bear encounter, according to Smith and colleague Stephen Herrero, professor emeritus at the University of Calgary in Canada. Which bear is bigger black or grizzly? Typically grizzly bears are larger than black bears but when one is suddenly close, you are not going to know the difference based on size. When standing, a black bear is generally 5 feet tall while a male grizzly can be around 6.5 feet tall. How can you tell a black bear from a brown bear? It’s a black bear. Face: Brown bears have a thick ruff of fur around their faces, while black bears have slimmer, sleeker necks. Brown bears also have shorter, rounded ears. Black bear ears are pointier. Is a brown bear a black bear? Black bears occur in many hues of brown, and even shades of blue and white. Brown bears range from dark brown through light blond. Compared to black bears (Ursus americanus), brown bears (Ursus arctos) usually are larger, have a more prominent shoulder hump, shorter fuzzier ears, and longer, straighter claws. Do polar bears eat humans? Polar bears, particularly young and undernourished ones, will hunt people for food. Truly man-eating bear attacks are uncommon, but are known to occur when the animals are diseased or natural prey is scarce, often leading them to attack and eat anything they are able to kill. Do you play dead with a brown bear? Brown/Grizzly Bears: If you are attacked by a brown/grizzly bear, leave your pack on and PLAY DEAD. Use whatever you have at hand to hit the bear in the face. Black Bears: If you are attacked by a black bear, DO NOT PLAY DEAD. Who would win a grizzly bear or polar bear? Not far behind in third place is the grizzly bear, at 73%. This may raise eyebrows among zoologists, given that grizzlies far outperform their pale cousins the polar bear (ninth place, on 64%) despite the latter being far larger and more aggressive. Can you fight a black bear? A pistol, like a 9mm, may kill a black bear if it’s within a few feet and strikes the head or heart. It won’t be immediate though, so don’t rely on it. A 12-gauge may be more effective, but again, it’s no guarantee. Against a grizzly, it’s quite possible you’ll just piss it off. Who would win grizzly or gorilla? A grizzly beats a silverback 10 times out of 10. The average silverback weighs around 350 pounds and stands at 5-and-a-half feet tall. Their long arms give them the reach advantage on a grizzly, but that’s about it. Is a brown bear a grizzly? Grizzly bears and brown bears are the same species (Ursus arctos), but grizzly bears are currently considered to be a separate subspecies (U. a. horribilis). In North America, brown bears are generally considered to be those of the species that have access to coastal food resources like salmon. What’s the bear saying? Bears: If it’s black, fight back. If it’s brown, lay down. If it’s white, say goodnight. Are black bears aggressive? Black bears, for instance, are usually less aggressive and more tolerant of people. They often live near human settlements, whereas grizzly bears prefer to stay away from human settlements and are often extirpated from heavily used or populated areas. Black bears are excellent climbers. Are brown bears aggressive? Brown Bears They’re also typically bigger and more aggressive than black bears, meaning a date with a brown bear is one you will absolutely want to be prepared for. Most bear attacks occur during grizzly-human interactions and usually involve a mother bear protecting her cubs. Do grizzlies eat black bears? 4. THEY’ LL EAT OTHER BEARS. In addition to being omnivorous, grizzlies can also be classified as cannibals. They’ve been spotted eating the carcasses of black bears in Canada. What do you do if you see a black bear? Stand and face the bear directly. Never run away from or approach him. Make yourself look as big as possible by spreading your arms or, better yet, a coat. Make as much noise as possible by yelling, banging pots and pans or using other noisemaking devices.
<urn:uuid:15ff6768-0591-4914-b668-2a7e50c786f3>
CC-MAIN-2022-33
https://superbearblog.com/brown-bear/which-is-bigger-brown-bear-or-black-bear.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.928252
1,189
2.921875
3
It is true that the contributions of modern technologies are affecting every aspect of our lives including the way we study and teach. Online is getting popular nowadays due to its convenience. In essay, I will discuss the pros and cons of remote Learning remotely has manifold benefits for an individual. , online lessons are extremely flexible. , we can purchase courses and study anytime we want; , we have more freedom to balance career and , it is possible to learn remotely from anywhere with internet access in any educational platform or university around the globe. To illustrate, before, students had to go to England if they wanted to get a British degree; option was less attractive for people with a limited budget. As it follows, learning online is cost-effective and time-efficient. , studying remotely requires great motivation and discipline. can offer better social skills. , if students study in one group and see each other every day, their interpersonal skills get fostered. Clearly, social skills have vital importance on our careers and mental health. , it is impossible to learn subjects as medicine and engineering, because the emphasis is on practical not theory. For reason, the importance of in-person should not be neglected. To sum up, both methods of learning have advantages, it is difficult to prove that one is better than the other. , I believe that everyone should learn how to balance online and classroom educations in order to benefit from both of them.
<urn:uuid:f71176b5-e13f-494e-9231-648b83ba42e3>
CC-MAIN-2022-33
https://writing9.com/text/60c608d0b558f000189f3040-online-learning-is-better-than-classroom-learning-do-you-agree
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.954668
351
2.953125
3
Coming home after doing a week or even a month’s worth of greens shopping, one gets challenged with the task of keeping them as fresh as possible. Certainly, you will not cook all the vegetables in a day and store them Well, if you are feeling lost about how to keep the veggies fresh for as long as possible. Then, the following tips are going to be of immense benefit. Continue to read and unlock some valuable tips! Separating Fruits and Vegetables One of the first rules of storing fruits and vegetables for a greater lifespan is to separate the two. You need to keep the fruits a safe distance from vegetables because they can cause veggies to spoil earlier than usual. Fruits like kiwi, apples, plums, apricots, peaches, and nectarines produce high amounts of a compound called ethylene. It is a compound that reacts with the chemical composition of the vegetables such that it causes them to decay at a faster rate. So, it’s best to store them in separate compartments. Also, a vegetable as a whole survives longer outside of the refrigerator. Hence, we wouldn’t advise cutting these into pieces and then storing them alongside fruits, which many people seem to do. Storing in Cool, Dry & Dark Places Only because the refrigerator slows down the decay of vegetables does not mean you have to put all of them there. Some vegetables require different storage environment to sustain longer, which is a cool, dry, and even dark places. These vegetables include potatoes, onions, garlic, and shallot. You can store them in either a cupboard or a pantry. Keep them away from ovens and stoves. Also, ensure the maintenance of 50-70 F temperature. Note, these veggies last longer in cooler months than in hotter. Try to store them in dark places as they process brightly lit conditions as outside and start to sprout earlier. Moreover, do not place onions with potatoes as it increases sprouting and reduces freshness. Another great way of storing your month’s stock of vegetables is freezing them. No, you should not freeze them just as they are. Instead, you will need to put in some extra effort in peeling and chopping them. But once you do it, you will be pleased with yourself. That’s because it will make cooking easier and help the vegetables last much longer than they should. However, make sure you briefly immerse them in hot water before storing them. Wrap the Leafy Vegetables first Leafy greens can prove to be very tricky. Certainly, they contain a lot of nutrition, but they must get consumed within one to two days. However, if you a leafy veggies lover, will you make a run to the grocery store twice or thrice a week? Probably, not! Hence, the best method is to preserve the nutritional content as well as freshness through effective storage techniques. Firstly, never store your greens with spoiled or rotten leaves on them. Toss such leaves away before storage. Secondly, wrap the leafy greens in a paper towel so that it absorbs excess moisture. Do not wash the vegetables before this. Next, place them in an airtight plastic bag and pop in the fridge. Keep the varieties separated for the best results. Deal with those Tall Stalks To store stalks like asparagus and green onions, you can make use of a small-sized jar. Split the bunch that you got from the grocery store into two halves and store them in jars with some water. You may have to cut off the bottoms slightly, especially in the case of asparagus. Next, cover the jars with a plastic produce bag and secure the jar with a rubber band. Using this method, you can help the otherwise easy decaying green stalks for up to one week. They will surely remain green and crisp as they were on day one. At most, you may notice slight wilting. But this technique will postpone yellowing and complete rot for at least a week or two. Although the above-stated storage tips to keep your veggies fresh are quite effective, know that some exceptions also exist. You need to take special care of these particular vegetables, such as mushrooms and lettuce. Well, it is surely a whole new topic that calls for another blog. Stay tuned to learn more instant hacks, and do let us know your suggestions in the comments below!
<urn:uuid:f485f737-1fe9-4b7d-bc67-c11be4171cb1>
CC-MAIN-2022-33
https://www.dsrnblogs.com/vegetables/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.955066
920
2.875
3
Web graphics include both static images and animated web graphics. These graphics can consist of web buttons used on menus, background images on websites, web slideshows and single images displayed on a page. Some common formats for web graphics include Joint Photographic Experts Group (JPEG) files, portable network graphic (PNG) files, tagged image file format (TIFF) files, bitmap picture (BMP) files and graphics interchange format (GIF) files. The type of graphic format used is determined by the intended use of the specific graphic. One of the most popular static formats for web graphics is JPEG. This format supports compression that helps make graphics load faster on a slower Internet connection. Th JPEG format does have a drawback, though, because images lose some of their quality during the compression process. JPEG files, however, can also use a smaller amount of compression if a higher image quality is desired. Another format that supports compression is PNG. This file format allows images to have transparent backgrounds, but some browsers might not support the PNG file type. PNG does have benefits in that these images are sharper and have more color depth than some of the other image formats. On the other hand, some web designers are still reluctant to use PNGs very much because of the possible compatibility issues with older browsers. If an animated web graphic is desired, the GIF format is a good choice. Animated GIFs use several variations of a static image to create a motion effect. GIF images, however, do not have to be animated, and they can be used for compact static web graphics because of the smaller file size. Common uses of static GIF images includes web buttons and website backgrounds, although the JPEG and PNG formats are commonly used as well. One disadvantage of GIFs is that they are limited to 256 possible colors, which can be a problem if an image needs to have excellent color depth. TIFF images are a higher-quality image format that is usually used for graphics that are printed. They are not used often on the web because of their large file size and limited capabilities for compression. Common uses of TIFF images includes images that are captured from a picture or document scanner and are used for printing a newsletter, poster or a magazine layout. BMP images are more common than TIFF images but also have issues with file size. They are uncompressed images that suffer no loss in quality. As a result, BMPs are useful when a web designer wants to put high-quality images on a site but does not want the long download times associated with TIFF files.
<urn:uuid:e0be3da4-0cd8-4313-ab7b-cb939e8ccf07>
CC-MAIN-2022-33
https://www.easytechjunkie.com/what-are-the-different-types-of-web-graphics.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.930889
521
3.265625
3
Right Back clears to Defending Centre Midfield. Attacking Centre Midfield blocks the ball long enough to know he is in space. He then dribbles fast at an angle to confuse the defense. The Centre Back leaves the attacker for his Left Back. The Attacking Midfielder continues his angled run toward the Left Back. The Left Back begins to be drawn. The Attacking Midfielder continues a line toward the Left Back, who is drawn inwards, leaving the Right Winger open. The Attacking Midfield sees that his Right Wing is open and angles a pass into his line of movement. The Right Wing uses his speed to intercept the ball. The Striker accelerates towards the goal. The Right Wing sends in a first-time cross to the Striker. The Striker heads the ball towards the near post.
<urn:uuid:70a2bb8f-ac5c-46d2-af3a-caf97da4102d>
CC-MAIN-2022-33
https://www.jes-soccer.com/animated/pattackmidfielddraw.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.952541
196
2.90625
3
They were there to see an ancestor. On Tuesday afternoon, more than 50 Southeast residents gathered at the clan house in the Walter Soboleff Building to celebrate the Southeast Alaska return of a Chilkat blanket sent by a collector in Texas. Rosita Worl, president of Sealaska Heritage Institute, said the return was a moment of sorrow and joy — sorrow because it had been absent for so long and joy because it had returned. In the 19th century, disease and the deliberate suppression of Native culture disrupted Alaska Native communities, ending the teacher-learner chain that led to the production of Alaska Native items. Collectors bought or stole surviving items, leaving Alaska Native clans and tribes with few ways to connect to their heritage. In recent years, organizations including SHI have attempted to return items to tribes across Alaska. Once returned, they can be used in ceremonies or reverse-engineered to learn the unique techniques employed in their construction.
<urn:uuid:767e1f4c-d6b4-492c-bd4f-ecb70f3172bd>
CC-MAIN-2022-33
https://www.juneauempire.com/news/ceremony-celebrates-chilkat-blankets-return/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.95871
193
2.65625
3
The Alexander Technique is a hands-on educational method that facilitates a more efficient and effective use of body and mind for improved mobility, posture, performance, alertness, as well as relief of chronic stress, stiffness, tension, and pain. It re-organizes patterns of chronic tension that have unconsciously become a fixed part of how we move, breathe, and act in the world. Rather than attempting to directly relax all tensions in the body, or trying to disperse the tensions by vigorous exercise, Alexander recognized that by consciously addressing the primary coordination of postural support, movement and breathing, tension could be transformed into available, coherent energy. HOW EFFECTIVE IS THE ALEXANDER TECHNIQUE? The Alexander Technique is an effective tool that enables the student's self-awareness, conscious control, and ability to modify the physicality required to play a musical instrument correctly. A teacher helps guide the student towards playing with ease, only using the necessary amount of muscular energy. The Alexander Technique philosophy also aids greatly in developing the ability to practice the instrument efficiently, which saves time and energy. How does the alexander technique help musicians? The Alexander Technique helps musicians because all activity then becomes far more energetically efficient by bringing a whole new awareness of what it means to be supported, to be breathed, and how to allow appropriate effort to arise from this self-sustaining background without interfering with it. Physiologically, the specialized guidance of an Alexander teacher’s hands and verbal instruction can re-distribute tone between the support muscles of the neck and back, the breathing muscles of the trunk, and the movement muscles of the limbs. Over a number of lessons, this new coordination becomes more and more accessible to the student in daily life and in skills such as athletic or artistic performance. In parallel, this heightened awareness of physical coordination can bring with it that greater ability to be in the moment, consciously present, grounded and uplifted, which is sought after in so many psychological and spiritual disciplines.
<urn:uuid:541e0560-182b-400d-b8a9-3f9c1e7f0b63>
CC-MAIN-2022-33
https://www.mindfulmusicstudio.com/alexander-technique-musicians.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00288.warc.gz
en
0.933577
414
3.25
3
- By reducing the mosquito population with the use of controlled spraying around homes with insecticides. This is done by state-employed teams. - By reducing pools of water where mosquitoes can breed. Malarial mosquitoes have become resistant to many insecticides. The controlled use of DDT is very effective but remains controversial due to the risk of environmental pollution and dangers to other animals and possibly the newborn infant.
<urn:uuid:1eefff91-9bb4-40a7-80aa-2aac0f56eb90>
CC-MAIN-2022-33
http://childhealthcare.co.za/parasites/malaria/how-can-the-number-of-mosquitoes-be-reduced/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.96054
81
3.296875
3
Social Psychology is the study of group psychology and why humans do some of the strange things that they do even if those behaviors do not seam to benefit them. For example, why are people always looking at something? Why does it feel strange to go to a huge crowd (think a crowded mall before Covid-19) and to just stand there not moving? It’s very difficult. Try this social experiment: go to a crowd of your family or friends that are Covid-19 free and just stand there still as a board for five minutes. At some point, most humans will look at their phone, or watch, or talk and explain what they are doing in that location. Meaning in Social Psychology is said to be socially derived. That means that meaning depends on the meaning that it has to the individual perception of the event, person, etc. Social Psychologists like Erving Goffman argue that meaning is not inherent in a “natural state” but is culturally derived and relative from region to region. If you are interested in learning more about Erving Gauffman and other Social Psychologists, I am sharing his Wikipedia page as follows: https://en.wikipedia.org/wiki/Erving_Goffman I will be doing my main business so posts will be at a lower post rate.
<urn:uuid:ffd1a635-eb5a-4f2c-8cfb-86c0b32ace21>
CC-MAIN-2022-33
https://difrentmindstate.com/2020/12/08/social-psychology-concept-about-meaning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.968982
277
2.859375
3
Phage Therapy in Bacterial Infection Received Date: February 02, 2021; Published Date: March 24, 2021 Phage therapy has proven to be an effective method to control bacterial infection and it has been successfully applied for the treatment of Shigella dysenteriae infections in children. The phage therapy approach is an effective method for controlling multidrug-resistant bacteria. Félix d’Herelle discovered phages as a lytic agent active on dysentery bacteria exactly 100 years ago . When working on cholera in India, d’Herelle observed that mortality declines during an epidemic. Studying stool phages, he linked death and recovery from disease with the absence or presence, respectively, of virulent vibriophages in the patients . Shigellosis, an infectious diarrheal disease, is caused by the enteric pathogen Shigella. It is a major worldwide health burden and causes nearly 164.7 million cases and over a million deaths every year, most of them occurring in developing countries . Bacteriophages (phages) are viruses that infect bacteria. With many species of bacteria becoming resistant to antibiotics, phages are reemerging as an attractive alternative and have already been used to combat a wide variety of bacterial infections . One of the first bacteriophages ever isolated was a Shigella phage, discovered by Felix d’Herelle in 1917 [6,7], which was subsequently shown to cure children suffering from severe S. dysenteriae infection . However, relatively few studies on the isolation or characterization of Shigella phages have been performed since then. Information for only ∼35 Shigella phages has been deposited in public databases, and detailed studies of these phages are sparse. By contrast, over 400 Escherichia and Salmonella phages are readily available, some of which, such as ϕX174, P22, λ, and T4, have been used as model systems for decades. As the problem of antibiotic resistance becomes ever more acute, a number of scientists and clinicians are looking again at bacteriophages as a therapeutic option in the treatment of bacterial infections. The researchers used phages adapted to the intestine of guinea pigs, arguing that laboratory-adapted phages had lost major traits for in vivo replication in the human gut . In contrast, researchers from the Dhaka cholera hospital used massive doses of brothpropagated phage (1015 pfu) for the treatment of acute cholera, which necessitated large production facilities. Such a high dose was chosen to achieve an immediate ‘lysis from without’ of the high titers of vibrios measured in cholera ‘rice stool.’ The researchers reasoned that the replication time of vibriophage was longer than the gut transit time through the cholera patient (30 min). Phage treatment significantly reduced the stool output compared to controls, but had only a weak effect on the duration of diarrhea. Antibiotic treatment with tetracycline was clinically much more efficient than phage . In addition, Soviet scientists conducted in 1971 a phage treatment trial of cholera in Dhaka. Oral phage alone or combined with intramuscularly injected phage had no impact on diarrhea duration, stool volume, or vibrio excretion compared to placebo, while tetracycline caused a marked amelioration . Faruque et al. isolated a phage from surface water samples from Bangladesh that specifically lyses strains of S. dysenteriae type 1. This phage, designated SF-9, belongs to the Podoviridae family and has a 41-kb double-stranded DNA genome. Water samples were tested to determine the prevalence of SF-9, and the results indicated that 9 of 71 (12.6%) water samples were positive for the phage. The authors concluded that phage SF-9 may have epidemiological applications as an index of the presence of S. dysenteriae type 1 in environmental waters. Another attempt to treat human shigellosis with phages was made by the Hirszfeld Institute in 1957. The Institute was instrumental in developing and producing phages for the treatment of many diseases, including infections caused by antibiotic resistant bacteria that were refractory to conventional treatment with antibiotics . Phage therapy will not be a panacea, but it is likely that it will find application in infections where favorable conditions are met. Conflicts of Interest No conflicts of interest. - Sulakvelidze A, Alavidze Z, Morris JG (2001) Bacteriophage therapy. Antimicrob Agents Chemother 45(3): 649-659. - D Herelle F (1917) On an invisible microbe that is an antagonist of dysenteric bacilli. C R Acad Sci Paris 165: 373-375. - D Herelle F (1929) Studies upon Asiatic cholera. Yale J Biol Med 1(4): 195-219. - Kotloff KL, Winickoff JP, Ivanoff B, Clemens JD, Swerdlow DL, et al. (1999) Global burden of Shigella infections: implications for vaccine development and implementation of control strategies. Bull. World Health Organ. 77(8), 651–666. - Abedon ST, Kuhl SJ, Blasdel BG, Kutter EM (2011) Phage treatment of human infections. Bacteriophage 1(2): 66-85. - D Herelle F (1917) An invisible antagonist microbe of dysentery bacillus. C R Hebd Seances Acad Sci 165: 373-375. - Note by MF d Herelle (2011) On an invisible microbe antagonistic to dysentery bacilli. Note by MF d Herelle, presented by M Roux Comptes Rendus Academie des Sciences 1917 165: 373-755. - D Herelle F (1931) Bacteriophage as a treatment in acute medical and surgical infections. Bull NY Acad Med 7(5): 329-348. - Sayamov RM (1963) Treatment and prophylaxis of cholera with bacteriophage. Bull WHO. 28(3): 361-367. - Monsur KA, Rahman MA, Huq F, M N Islam, R S Northrup, et al. (1970) Effect of massive doses of bacteriophage on excretion of vibrios, duration of diarrhoea and output of stools in acute cases of cholera. Bull World Health Organ. 42(5): 723-732. - Marcuk LM, Nikiforov VN, Scerbak JF, T A Levitov, RI Kotljarova, et al. (1971) Clinical studies of the use of bacteriophage in the treatment of cholera. Bull World Health Organ 45(1): 77-83. - Faruque SM, Chowdhury N, Khan R, Hasan MR, Nahar J, et al. (2003) Shigella dysenteriae type 1-specific bacteriophage from environmental waters in Bangladesh. Appl Environ Microbiol 69(12): 7028-7031. - Sulakvelidze A, Alavidze Z, Morris JG (2001) Bacteriophage therapy. Antimicrob Agents Chemother 45(13): 649–59.
<urn:uuid:e26a13db-c389-4568-93af-72e2f986e53d>
CC-MAIN-2022-33
https://irispublishers.com/abeb/fulltext/phage-therapy-in-bacterial-infection.ID.000608.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.889618
1,624
3.390625
3
Part of JFKC: A Centennial Celebration of John F. Kennedy This exhibition presents objects that combine inclusive design and technology and result in equal parts, art and function. Together art, design, and technology produce ingenious and beautiful solutions that enable people of all abilities to interact with their environments. “Art means more than the resuscitation of the past: it means the free and unconfined search for new ways of expressing the experience of the present and the vision of the future.” President John F. Kennedy The Alternative Limb Project Sophie de Oliveira Barata, founder of The Alternative Limb Project, creates her art within prosthetic arms and legs. This arm was designed for model Kelly Knox who was born without a forearm. Aura Powered Suit The Aura Powered Suit is powered clothing designed to assist movement for older adults. The Bradley Timepiece The Bradley is a watch that can be touched and seen to tell time, providing equal access for people who are blind or have low vision. Carpal Skin is a prototype for a protective glove to protect against Carpal Tunnel Syndrome. e-NABLE 3D Prostheses The e-NABLE Community provides free and low-cost 3D printable assistive devices for individuals with upper-limb differences. Emilie Gossiaux and BrainPort Emilie Gossiaux’s watercolor painting was made with the assistance of the BrainPort Vision Device. The Emma allows graphic designer Emma Lawton, who has Parkinson’s disease, to write and draw clearly. Graphiti is a tactile touch display that enables people who are blind or have low vision to access onscreen graphic. Ichó, is an interactive device in the form of a ball for therapeutic use. It’s a new digital device dedicated to people with cognitive limitations such as dementia. An interactive and multi-sensory smart toy designed to help children with autism learn to interact and communicate. Using a computer interface, the Mi.Mu Gloves can produce and manipulate sound through gesture. NAO is a human-like robot and is designed to assist children who have autism spectrum disorder (ASD). Raised Line Drawings Chris Downey is an architect, planner, and consultant who is blind and uses raised-line drawings in his work. Read the Music Read the Music allows musicians who are unable to read printed or handwritten sheet music to hear the notes played. Robotic Drumming Prosthesis The Robotic Drumming prosthesis allows drummers without an arm to continue playing the drums. The prosthesis even includes an improvisation mechanism. The Sonochromatic Head The Sonochromatic Head illustrates an eyeborg antenna that allows Harbisson to identify colors through sound frequencies. The Thync Relax autonomic stimulates the nervous system resulting in relief from stress and anxiety. Wanderers is a series of 3D life-sustaining wearables that explore the idea of how dangerous planetary elements can be transformed to sustain human life.
<urn:uuid:cd31eede-03e0-4016-a263-0fbbc360e761>
CC-MAIN-2022-33
https://kc.humancentereddesign.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.904201
671
2.9375
3
Download The Balanced Reader attachment (Adobe PDF, 189KB) Strong Foundations in Reading and Literacy Literacy is an important part of succeeding in life. The ability to read and understand what you are reading is at the centre of this development. Research shows that adults who read well have a wider access to the many and varied job opportunities which are constantly changing in our 21st century world. In today’s society, a child may end up having five or more different careers or jobs in their lifetime! In fact we really do not know what the job opportunities will be over the next decade and beyond. Literacy learning gives our children the knowledge and skills needed to do well in other curriculum areas which they will need throughout life beyond school. The use of a wide variety of books to teach literacy skills means that students learn different ways to go about writing and open up new experiences through books. At Salisbury Downs we teach reading by ensuring that students are Balanced Readers, going from ‘Learning to read’ to ‘Reading to learn’. Many students learn all of their letter sounds and blends and can read the words on the page well, but reading is much more than that. Readers need to be fluent with their reading, use expression, good phrasing, follow the punctuation on the page and have a reading rate that allows them to not lose the understanding of what they have read. Speaking of understanding, we read to understand, so readers must have comprehension of the words on the page not just how to say them. The need to understand the simple things the author is writing about, but more importantly how to “read between the lines” and understand the hidden meaning. We call this the understanding of Here, Hidden and Head questions. Learning to read is not like a running race where everyone competes against each other to be first across the line. Parents often think that if their child can read all the words on the page (decode) then they are ready for a higher level book and that the child’s reading success is measured by the reading level they are on. Many parents worry that their child is significantly below another child in their class or not moving up levels as fast as they should. A reading level (whether it be a number, colour or letter, depending on the book) indicates to the teacher what type of reading book the child is able to access. A child could be a beginner reader, emergent (developing) reader or an independent reader. The level is usually displayed at the front or back of the book. A reading level is given by a teacher who has conducted a “running record”, which is a reading assessment tool. Teachers use this record of reading to ensure that the student is moving through reading levels as a “Balanced Reader”. Yes it is important that a student can read the words on the page, but they must also be fluent, use phrasing, have expression and have a reading rate that is suitable for their age. Eg 8 year old should decode at a rate of 80 words per minute, a 10 year old should decode at a rate of 100 words per minute and a 12 year old should decode at a rate of 120 words per minute. In addition to these skills a student must have strong skills in understanding what they have read. This is called comprehension. Comprehension – Going from ‘Learning to read’ to ‘Reading to learn’ Comprehension is the understanding of any text being read, viewed or listened to. This includes finding information in tables and graphs, understanding a commercial on television or a street sign as a few examples. We believe in putting the right book in the hands of the right child at the right time and know that pushing students onto harder books just because they can read or decode the words does not mean they can read fluently or deeply understand what they have read. Reading at the right level is the key to being able to access information and make sense of the world around us. The comprehension taught in schools includes activating prior knowledge that is gained in our daily life, inferring meaning from a clue, analysing the information presented to us, knowing how and where to locate information and being able to communicate what has been learnt. At Salisbury Downs, staff have been highly trained in all aspects of comprehension and explicitly teach these skills using the gradual release of responsibility model. This means students are supported in their learning as teachers gradually give more independent control to students as they show evidence of learning. Good readers utilise a set of highly complex and well developed skills before, during and after reading so they can understand, learn from the text and remember what they have read. These skills include: - reading words rapidly and accurately - noting the structure and organization of text - monitoring their understanding while reading - using summaries - making predictions - checking predictions as they read - revising and evaluating predictions as needed - integrating what they know about the topic with new learning through their own knowledge and understandings related to their cultural and social background - making inferences and using visualization. - making connections – text to self, text to text and text to world All of the aspects of being “A Balanced Reader” must be able to be done across a wide variety of text types. Salisbury Downs offers quality teaching of all aspects of Literacy which are integral to the lifelong learning, future financial stability and success of literate students.
<urn:uuid:2a0a6b49-5204-4464-8d3e-bf41222cb5cd>
CC-MAIN-2022-33
https://sdps.sa.edu.au/school-info/curriculum-information/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.96557
1,123
3.921875
4
ZAGREB, 18 October 2021 – World Cravat Day is being marked in the Croatian capital Zagreb today. The forerunner to the modern necktie, the Croatian invention the ‘Cravat’, celebrates its day annually on 18 October. The tie was first used as an item of clothing by Croatian soldiers back in the 17th century with the oldest Croatian portrait of a person wearing a cravat painted in Dubrovnik in 1622 depicting the great Croatian poet Ivan Gundulić with a scarf tied around his neck like a cravat. The word cravat derives from the French cravate, a twisted French pronunciation of Croate. The Cravat is a Croatian symbol known and recognised worldwide and the 18th of October was declared World Cravat Day by Academia Cravatica back in 2008. “The cravat is a universal symbol of elegance and the culture of dressing, but it’s powerful symbolic potential contains many other values. The vertical cravat symbolises the human vertical – human dignity and self-awareness, moments of solemnity and ceremony, success and a business spirit… With its lightness on the one hand and the knot on the other, the cravat “binds” together freedom and responsibility. It encourages us to be more aware of the communication of our dignity and the dignity of others – our freedom, but also our responsibility. Due to its enormous symbolic power, the cravat is of great significance for Croatia and the world,” Marijan Bušić from Academia Cravatica association said. A changing of the guard took place on Monday on Zagreb’s Ban Josip Jelačić Square to mark Cravat Day. Organised by Academia Cravatica, a cravat was also placed around the neck of the Ban Josip Jelačić statue on the main square to mark today’s occasion.
<urn:uuid:33acfbaa-cd6c-4204-90ab-99b5c37a22e7>
CC-MAIN-2022-33
https://www.croatiaweek.com/world-cravat-day-croatian-invention-being-marked-today/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.948302
413
2.828125
3
How the LGBTQ+ Community Builds Resilience Through Activism Their demand for civil rights led to the Stonewall riots, a social revolution that launched the beginning of the modern LGBTQ+ movement. Lifelong Activist Ken Kidd on LGBTQ+ Resilience For LGBTQ+ and HIV/AIDS activist Ken Kidd, growing up gay in the 1960s in small-town Virginia wasn't easy, he says. It was a time when homosexuality was classified as a mental disorder by the American Psychiatric Association, and aversion therapy — in which electroshock techniques were used to try to stamp out same-sex attraction by associating it with something negative, and thereby “cure” homosexuality — was a recent memory. Ken Kidd knew he was gay from a young age, and even then, he recognized that made him different. He felt like he needed a place to fit in, and that meant leaving Virginia. So in the late 1970s, when he was in his early twenties, Kidd moved to New York City — the one place where people were out, and loudly fighting for the right to be themselves. By that time, almost a decade after the Stonewall riots of 1969, the modern LGBTQ+ movement was in full force. Arriving in New York, Kidd remembers people telling him “yes” a lot, something he wasn’t accustomed to as a gay man at that time. "Yes, he could have an apartment." "Yes, he could have a credit card." "Yes, he could have a boyfriend." He landed a job at New York University, had a great group of friends, and was finally part of a community who accepted him for who he was. Life was good, until suddenly it wasn't. Only a few years after Kidd arrived in New York, three men jumped him from behind as he was walking through Brooklyn Heights. They threw slurs with their punches and kicks, telling him he was worthless as they stomped on his face and chest. Kidd was left with a broken jaw, broken ribs, and a ruptured blood vessel in his brain. “Suddenly, this place that welcomed me with open arms told me I was nothing but a faggot and I deserved to die,” Kidd says. The gay rights movement was making progress, but hate crimes against the LGBTQ+ community were still common at this time. Almost 40 years later, incidents like these persist. After the attack, something irrevocably changed in Kidd. He had become, as he put it, “activated.” “When you’re quite literally staring down your demise and you live through it, you sort of make sure you take action to continue living through it,” he says. Overcoming Discrimination and Building Resilience in the LGBTQ+ Community Even now, in a decade where same sex marriage is legal and hate crimes are not, discrimination is still a huge burden to bear for minorities like the LGBTQ+ community. In the 2017 report Discrimination in America: Experiences and Views of LGBTQ+ Americans, 90 percent of those surveyed felt LGBTQ+ people are discriminated against. Research from the American Psychological Association shows discrimination may be linked to chronic stress and poorer health outcomes, and it can also prevent LGBTQ+ patients from seeking out healthcare for fear of discrimination. Mental illness is more than twice as common among LGBTQ+ adults compared with heterosexual adults, according to the 2015 National Survey on Drug Use and Health, and adults in the LGBTQ+ population are also at higher risk for suicide. The National Alliance on Mental Illness reports that LGBTQ+ high school students are five times more likely to attempt suicide, and suicidal thoughts among transgender adults are 12 times higher than the national average. “Imagine growing up constantly getting messaging that part of your identity is bad or sinful — it’s hard to reconcile who you are when you’ve grown up with an identity that’s ‘wrong,’” says Israel Martinez, a licensed clinical social worker and LGBTQ+ therapist based in Montclair, New Jersey. Martinez says there is a lot of fear in the LGBTQ+ community around being exposed. Being "outed" has the potential to lose family or friends who may not be accepting, and especially for LGBTQ+ youth, coming out may lead to bullying and feelings of isolation, he says. That's why being part of a community and having a sense of belonging is so important: it's how people build resilience, Martinez says. “It’s very encouraging and empowering for people to see how strong they can be in a strong community," he says. An Era of Change: How the Stonewall Riots Started the Gay Rights Movement In the early morning hours of June 28, 1969, the LGBTQ+ community collectively decided they had had enough. The Stonewall Inn — one of the only gay bars in New York City at the time — was raided yet again by police. But instead of remaining complacent about the harassment by police that happened time and time again, the group of drag queens, lesbians, gay men, transgender folks, and everyone else under the LGBTQ+ banner fought back, leading to what is famously known as the Stonewall riots, as well as the beginning of the modern LGBTQ+ movement. The first ever Pride march (“It wasn’t a parade, it was a march,” Kidd says) took place one year later, and a few years after that, the APA finally issued a resolution that homosexuality was not a mental illness. Finally, the LGBTQ+ community was garnering some big wins. Then, HIV/AIDS hit — a disease that was initially labeled GRID (gay-related immune deficiency). Kidd was still recovering from the traumatic assault, and now suddenly, his friends were starting to get sick, and they were starting to die. The Reagan administration seemed to be ignoring (or making jokes about) what they called “the gay plague,” a pandemic that has to date killed around 35 million people worldwide, according to the World Health Organization. Kidd joined ACT UP (AIDS Coalition to Unleash Power), a group of revolutionaries demanding civil rights for the LGBTQ+ community. They held demonstrations, waving posters with the now iconic pink triangle on a black backdrop with the words “Silence=Death” to draw public attention to the government’s poor response to the crippling health crisis. United in anger, per ACT UP's slogan, the LGBTQ+ community was making change happen. By this time, the rainbow flag — designed by the artist and gay rights activist Gilbert Baker — had become an international symbol of Pride and hope. Where a rainbow flag flew, so did acceptance. Because of groups like ACT UP and Queer Nation, both of which Kidd was involved in, hate crime legislation finally passed in 1993. Just over 20 years later, in 2015, same-sex marriage was legalized in the United States. “You can’t fight unless you’re a little bit angry,” Kidd says. “To get anger from all sides, to have literal hatred flung at you, and be able to bounce back from that? That’s the epitome of resilience.” Today, Kidd works as the director of special projects and events at the NYU College of Arts and Science. At age 61, he’s still an active force in the LGBTQ+ community. In 2017, Kidd helped push to get the first permanent Pride flag raised on federal land overlooking the Stonewall National Monument, a national park in Greenwich Village designated by Barack Obama during his presidency. A study published in September 2018 in the American Journal of Men’s Health found that actively combating discrimination through “building and sustaining networks” is essential to developing resiliency in middle-aged and older gay men, a demographic that has experienced extreme health disparities. That’s exactly what Kidd has done, and he is proud of it. “It’s an amazing thing to embrace what you’ve been told is the worst thing about you and turn it into the strongest aspect of your life,” he says. “That’s power, my friend.” How You Can Be an Ally and Support the LGBTQ+ Community While things have gotten markedly better, the LGBTQ+ community still has to deal with discrimination, hate crimes, and high levels of mental health issues. Today, only 18 states have bans against “gay conversion therapy,” according to the Movement Advancement Project, and in places like Japan, transgender people have to endure procedures like sterilization just to have their gender identity legally recognized. John Carroll, an LGBTQ+ therapist at the Institute for Human Identity (IHI) Therapy Center in New York City, says that since the 2016 election, there has been a considerable spike in people seeking IHI’s services. Carroll says resiliency isn’t just something people have; it's something a person has to actively develop. While community, therapy, and self-love are all factors in building resilience, he says how those outside the LGBTQ+ community treat those within also plays a key role. LGBTQ+ allies and supporters need to practice cultural competence just as they would for any friend of a different race, a different culture, or with a different viewpoint. “You don’t need a degree to practice active listening and empathy,” Carroll says. “Being an ally can start with treating others with dignity and respect, and being willing to listen to others’ experiences.” Here are some tips from Carroll and the Human Rights Campaign on how you can be an ally: - Be inquisitive about another person’s experience. - Listen actively. - Practice acceptance. Even if you don’t understand, try and accept someone for who they are. - Don’t make assumptions about someone’s gender, identity, or sexual orientation. - Treat LGBTQ+ friends and family with dignity and respect, and stand up for them if they’re being discriminated against. - If you need help or want more advice on how to best support someone you love, reach out to an LGBTQ+ organization.
<urn:uuid:dbd789d5-c4d9-44ef-b00b-632353ced065>
CC-MAIN-2022-33
https://www.everydayhealth.com/emotional-health/lgbtq-community-celebrates-stonewall/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.971692
2,112
2.96875
3
The COVID-19 pandemic has coincided with a period of intense racial unrest in the United States. The murder of George Floyd in May 2020 triggered Black Lives Matter protests, and rising rates of anti-Asian violence have become a huge concern. The COVID-19 pandemic itself also revealed inequities in health care and disease outcomes among different demographics, including racial disparities especially pronounced for Black and Latino populations and people of color. As mental health needs have increased and mental health care is becoming normalized, BIPOC (Black, Indigenous, and People of Color) providers are now highly sought out—in part because when people experience distress or mental health concerns and turn to a mental health provider, they often seek out a provider who they feel will better understand the cultural nuances of their concerns. But the trauma the providers themselves are coping with is often overlooked in the broader mental health space. There is very limited research on race-related stress and coping among BIPOC mental health providers, particularly during the pandemic. Qualitative data suggest that racial trauma experienced directly or vicariously through patients increases the burden on providers of color and their vulnerability to burnout. And mental health provider burnout is associated with harmful outcomes like health issues, job dissatisfaction, and negative feelings toward clients. The clinical research team at Modern Health has decades of experience conducting and collaborating on academic research. Continuing to contribute to the peer-reviewed psychological literature on topics we feel are critical to meeting our mission—like diversity, equity, inclusion, and belonging—will help inform how best to support our members, providers, and employers. In one of our most recent research collaborations, we worked with my colleagues Dr. Keri Kirk of Georgetown University and Dr. Lindsey Knott of Baylor College of Medicine to quantify the level of burnout felt by BIPOC providers during the COVID-19 pandemic. I launched the project when I was an assistant professor of psychiatry at Baylor College of Medicine and I was excited to continue this work with the clinical research team at Modern Health. Our aim was to examine providers’ reports of racial discrimination including the following occurring because of one's race or ethnicity: We distributed an anonymous survey to mental health practitioners in the United States between July and November 2020. The survey included questions about racial discrimination, coping, burnout, and perceived stress. The majority of respondents were female (85.37%), BIPOC identifying (71.95%), and aged 25-34 (42.68%). Led by our research scientist Dr. Sara Sagui-Henson, the Modern Health clinical research team analyzed the results and found that: Being younger, having shorter job tenure, and working as a social worker or family therapist were associated with higher burnout. For BIPOC providers, greater experiences of racial discrimination correlated with higher work-related burnout and stress. Additionally, the use of maladaptive coping strategies (e.g., self-blame, substance use, behavioral disengagement) was associated with higher burnout and stress. Results indicate that racial discrimination during the pandemic is significantly associated with work-related burnout and stress among BIPOC mental health providers. Given that these providers were not specific to the Modern Health network, it is critical for all of us in the mental health care system to examine the experiences of BIPOC providers to learn how we can best support them in their practices. Things like peer consultation, surveys to assess stress and burnout that result in actions to address these issues (like avoiding high patient loads), and workplace anti-racism efforts are all worthwhile considerations to better support BIPOC provider mental health. We also need to support rest and time away for BIPOC providers and think creatively about how technology can help BIPOC providers to thrive: For example, at Modern Health we utilize Circles (live community sessions led by therapists and coaches) and in-app digital content to support provider workload, and we reduce the burden of administrative tasks through an easy-to-use, streamlined provider dashboard. It’s an important goal at Modern Health to increase the racial diversity of available providers, and research into the BIPOC provider experience is one way in which we aim to recruit more BIPOC providers and empower them by addressing their needs.
<urn:uuid:7e13f888-3199-4fa1-839c-7ba3abdda428>
CC-MAIN-2022-33
https://www.modernhealth.com/post/new-research-into-bipoc-provider-support
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00288.warc.gz
en
0.961203
867
2.578125
3