text
stringlengths
181
621k
id
stringlengths
47
47
dump
stringclasses
4 values
url
stringlengths
15
3.11k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
44
134k
score
float64
2.52
5.03
int_score
int64
3
5
Viral inactivation study is one of the most important aspects of clinical trials, to manufacture and commercialize the biopharmaceutical products derived from human and animal sources. Biologics products that are developed from human, plants and animal resources represents the higher risk levels for viral contamination as these sources are said to carry several human and other pathogenic viruses. Viral contamination of these biologic products used to treat a variety of disease can have several implications from severe clinical complications to economic loss. Viral inactivation method is an important and mandatory step in the process of manufacturing of biological products for removing or inactivating potential contaminant viruses. These biological products are used to treat and diagnose in humans. Viral inactivation testing is necessary for investigational new drug (IND) submission by regulatory authorities and is mainly critical in the development process for biologicals such as tissue and tissue products, stem cell products, blood and blood products, cellular and gene therapy products, and vaccine and therapeutics. The main drivers for the market include rapid growth in pharmaceutical and biotechnology industries and strong R&D investments trend in the life sciences industry. Increase in the number of new drug launches, rise in chronic disease burden, an increase in government support for the pharmaceutical and biotechnology industries will also aid for the growth of the market. For instance, Virosart® Max developed by Sartorius AG is the platform virus prefilter of choice. This virus prefilter protects whatever virus filter you choose irrespective of process conditions. Virosart® Max will downsize your process and reduce your total virus filtration costs. A strong pharmaceutical product pipeline will aid the growth of the pharmaceutical and biotechnology industry, which is an important end-user of viral inactivation products. The introduction of many new drugs into the market has necessitated the testing of these drugs and has created demand within the global viral inactivation market. The bio-similar products and biologics field has undergone rapid advancements in recent times that have furthered the global viral inactivation market growth. A wide range of instruments is used in the viral inactivation process. For instance, FlexAct VI is considered a single-use technology developed by Sartorius AG, which allows virus inactivation by using low pH. This device is designed in a way for addressing the production capacity and tailored to adjust features like pH, temperature, pump speed, pressure, and fluid level. The biopharmaceutical industry attracted the attention of several governments, organizations, and international entities, and the need for developing this industry has become a need across the globe. This is expected to be a huge plus for the global viral inactivation market and is projected to reap tremendous revenues into the market over the forthcoming years. Further, the smaller market players are expected to stick to the basics and are learning from the footsteps of their developed counterparts. Thus, it is safe to prognosticate that the market players in the global viral inactivation market can see the emergence of several new growth opportunities over the forthcoming years. For instance, Parker Hannifin Corporation announced the acquisition of SciLog Inc, which is a provider of proprietary and unique single-use technologies and systems for biopharmaceutical markets for supporting their on-going development, which is a key supplier to the growing single-use market. The high degree of market consolidation is a major factor restraining the growth of this market. Despite the growth of the global market for viral inactivation, the high costs that are associated with the manufacturing of biosimilar products are expected to restrain the market growth. Further, the discovery of new types of viruses that cannot be countered with the current forms of vaccinations has also proved to a roadblock for the growth of the global viral inactivation market. Nevertheless, the rising incidence of contagious diseases and an outburst of viral infections are expected to keep bolstering demand within the global market. Furthermore, the rising geriatric population that is frequently in need of biologic therapeutics is also an advantage for vendors in the global viral inactivation market. The global viral inactivation market is segmented on method, product, application, end user, and geography. By Method: Solvent detergent method, Alkylating agent, Pasteurization, and other methods. Other viral inactivation method includes low pH, microwave heating, irradiation, and high-energy light. Of these, the solvent detergent method segment accounted for the largest share of the global viral inactivation market. By Product: Kits and reagents, Services, and viral inactivation systems and accessories. Kits and reagents are projected to account for the largest market share in the global viral inactivation market owing to their continuous usage by pharmaceutical and biopharmaceutical companies. Services are projected at the highest growth rate due to the ease of management and specialized services that are offered by service providing companies. By Application: Blood & blood products, Stem cell products, Tissue & tissue products, Cellular & gene therapy products, and Vaccines and therapeutics. Vaccines & Therapeutics is anticipated to grow at the fastest rate owing to biologics production growth and increasing government funding for the promotion of usage of biologics to treat diseases. By End-user: Pharmaceutical and biotechnology companies, academic research institutes, contract research organizations, and other end users. Other end user segment primarily includes cell banks, small cell culture laboratories and consultants, microbiology laboratories, immunology laboratories, molecular laboratories, animal facilities, toxicology laboratories, and media/sera manufacturers. Pharmaceutical and biopharmaceutical companies are expected to account for the largest share due to an increased usage of these products for the drug development process and drug manufacturing process. CROs provide customized services and efficient management of the entire viral inactivation process. Hence, these are expected to gain considerable share during the forecast period. By Geography: North America, Europe, Asia and Rest of the World (RoW). North America has dominated the market during the forecast period due to the adoption of many methods by blood testing center. The splendid biopharmaceutical industry in the US and Canada is expected to fortify the market for viral inactivation in North America. Some of the dominant players in the viral inactivation market are Sartorius AG, Merck KGaA, Parker Hannifin, Rad Source Technologies, Clean Cells, WuXi PharmaTech (Cayman) Inc., and Danaher. The other market players include Charles River Laboratories International, SGS S.A., Texcell, Inc., Viral Inactivated Plasma Systems SA, Macopharma, TERUMO BCT, INC., Weigao group, V.I.P.S. SA, Cerus Corporation, BioReliance, Thermo Fisher Scientific Inc., and others. The report covers in-depth analysis of Global Viral Inactivation Market. The report assesses the market products pipeline by stage of development (early development, pre-clinical, clinical and in approval), by application (Trauma, Hemorrhage, Coagulopathy, Influenza, Heart Valve diseases, and others). In addition, the report includes key insights on other development activities, including (but not limited to) – licensing (In and Out), collaborations, acquisitions, reimbursement, patent, and regulatory designations. The report includes in-depth company profiles of key players in the Global Viral Inactivation Market. The company profile includes key information on the overview, financial highlights, product portfolio, business strategies, and key recent developments. The report highlights information on emerging companies with potentially disruptive technologies and new market entrants. Data Collation (Primary & Secondary) In-house Estimation (Based on proprietary databases and Models) Market-related information is assembled from both primary and secondary sources. Primary sources involved participants from all global stakeholders such as experts from several related industries and suppliers that have been interviewed to obtain and verify critical information as well as to assess prospects of the market. The participants included are CXOs, VPs, and managers. Plus, our in-house industry experts having decades of industry experience contribute their consulting and advisory services. Secondary sources include public sources such as regulatory frameworks, government IT spending, government demographic indicators, industry association statistics, and company publications annual reports press releases along with paid sources such as Factiva, OneSource, Bloomberg among others. Top-down and bottom-up approaches: The overall market size was used in the top-down approach to estimate the sizes of other individual submarkets (mentioned in the market segmentation by product, type of manufacturing, and disease) through percentage splits from secondary and primary research. The bottom-up approach was also implemented (wherever applicable) for data extracted from secondary research to validate the market segment revenues obtained.
<urn:uuid:649531be-fbbd-4b4a-9d94-f46d8fc693cb>
CC-MAIN-2019-51
https://www.optimainsights.org/reports/113-viral-inactivation-market
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540543252.46/warc/CC-MAIN-20191212102302-20191212130302-00292.warc.gz
en
0.933225
1,787
2.734375
3
int neighbourcount(<geometry>geometry, int point_num) When running in the context of a node (such as a wrangle SOP), this argument can be an integer representing the input number (starting at 0) to read the geometry from. Alternatively, the argument can be a string specifying a geometry file (for example, a .bgeo) to read from. When running inside Houdini, this can be an The number of the point whose neighbours you want to count. The number of points that are connected to the specified point. A point is connected if it is adjacent in some polygon, is one of the four surrounding points in a grid or NURBs surface, or in some other manner directly shares an edge with point_num. Returns 0 if there is no input, or if the point number is out of range.
<urn:uuid:61e97516-1d82-4317-ba3f-f289c92f8eee>
CC-MAIN-2019-51
https://www.sidefx.com/docs/houdini/vex/functions/neighbourcount.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540543252.46/warc/CC-MAIN-20191212102302-20191212130302-00292.warc.gz
en
0.761911
187
2.75
3
This course brings together the four necessary communicating skills required to get to know the language: oral comprehension, written comprehension, oral expression and written expression. It is held 2 h/week, when it comes to academic courses, or more than 2 hours/week, for intensive courses, depending on each case. Pre-teaching:in order to introduce the student to the subject. Teaching: of new structures and vocabulary using a written or oral text. Guided Practice: making easy exercises related to the topic. Independent Practice: where the student uses all learnt in other similar topics. Evaluation: where the teacher checks what the student has learnt and the results achieved with this method. TKT preparation course What is the Cambridge Teaching knowledge Test (TKT)? The Cambridge TKT focuses on the teaching knowledge needed by teachers of primary, secondary or adult learners of English, anywhere in the world. It will increase your confidence and enhance your job prospects. What is CLIL? CLIL stands for Content and Language Integrated Learning. It refers to teaching subjects such as science, history and geography to students through a foreign language. This can be by the English teacher using cross-curricular content or the subject teacher using English as the language of instruction. Both methods result in the simultaneous learning of content and English. How can TKT help my career? Preparing for TKT will help you grow in confidence as a teacher and give you the knowledge and skills that will help you develop your career. You can take TKT whatever your background and teaching experience. The qualification is designed to be accessible, with no formal English language requirements for candidates. Why should you prepare with us? Our team is formed by experienced professionals who use official Cambridge material, for a more complete and efficient formation.Furthermore, we offer the opportunity to sign up for any of the official Cambridge exams. What’s in the exam The TKT is divided into separate modules. You can take them all, or just choose the ones that meet your needs. You have total flexibility in how and when you take the modules – you’ll receive a certificate for each one completed. To take the exams, you are advised to have a B1 level of English in the Common European Framework of Reference. The student’s development of the necessary skills required to succeed in the commercial and business world is the aim of this course. Obviously, English will be the communication language. Our Business English Courses are well-known by their strong technical character. Therefore, the student, apart from studying the used vocabulary in the business field, will learn current techniques used in the business world. The student will speak 70% about the most current topics, while the teacher will only speak to make an Error Analysis of the student’s mistakes. Finally, an evaluation/revision of everything learnt will take place at the end of each class.. This course has been designed in order to prepare the student for a special and particular event to take place in a short-medium term, such as: - Job Interviews - Business Trips - Public Speaking - Business Meetings - Preparation for level tests for academic years abroad
<urn:uuid:34c04667-4cda-4dc0-a6e9-d2a1e50878af>
CC-MAIN-2019-51
http://acc.itoweb.org/en/classes/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.924464
657
3.359375
3
The 2016 boating season is well underway. Every day, thousands of boaters head to the lake to fish, enjoy water sports, and relish in one of the greatest activities there is…boating. But, before you boat, you need to fuel up. Here are a few myths, facts, and solutions related to Ethanol Fuel in Boats. Fueling up a boat before hitting the water happens at retail gas stations for 95% of boaters according to a recent release from BoatUS. Due to recent changes by the federal government's Renewable Fuel Standard (RFS), risk of misfueling marine engines is on the rise. Here’s one reason why. The federal ethanol mandates require increasing amounts of biofuels—including corn ethanol—to be blended into the US fuel supply every year, such as E15 fuel. The approval of E15 fuel is putting boaters who fuel up at retail locations at risk because biofuels ARE NOT recommended for use in boats of any kind. One mistake at the gas pump can be a source of expensive, warranty voiding repairs and dangerous engine failure. Here are a few things to keep in mind the next time you hit the pumps. 1. E0 vs E10 vs E15 and how it affects your marine engine. Three of the most common types of gasoline currently found on the market are E0, E10, and E15. The “E” stands for Ethanol and the number represents the percentage of ethanol in unleaded gas. E0 is 0% Ethanol and 100% unleaded gasoline E10 is 10% Ethanol and 90% unleaded gasoline E15 is 15% Ethanol and 85% unleaded gasoline For marine engines, gas with 10% ethanol or less is recommended. Ethanol fuel in boat motors can put a quick damper on your weekend plans. One of the unfortunate characteristics of ethanol is that it attracts and absorbs water. Gasoline with ethanol can absorb roughly 10 times as much water and still burn through the engine. However, when water comes in contact with ethanol blended fuel, the fuel and water can separate to form distinct layers in your tank. The upper “gasoline” layer will be depleted of ethanol and have a reduced octane level. The lower “phase separation” layer will be a corrosive mix of water and ethanol and no chemical agent or fuel additive can be added to E10 gasoline, in a reasonable quantity, that will fully prevent phase separation or recombine a phase-separated layer. An engine won't run on the water-soaked, highly corrosive ethanol solution that sinks to the bottom of the tank. 2. Ethanol in Missouri fuel On January 1, 2008, the Missouri Renewable Fuel Standard became effective. Under this standard, all gasoline offered for sale in Missouri must contain 10% ethanol. A few exemptions to the standard allow gasoline without ethanol to be sold: - - When ethanol blends purchased at wholesale exceed the price of gasoline - - When selling premium unleaded gasoline with an octane rating of 91 or higher - - Gasoline sold at airports - - Gasoline sold at marinas 3. What to look for at the pumps. Marine refueling stations are your best options for ensuring you’re getting the proper fuel for your boat and reducing the risk of damages caused from ethanol fuel in your boat engine. If you choose to refuel on the way to the lake, be sure to check the pump first. In the state of Missouri, there is not a requirement for ethanol labeling on gasoline dispensers. Some gas pumps may offer both E10 and E15 or have a blender pump that is used for Flex-Fuel vehicles. Even though E15 can be less expensive than E10 fuel, the higher the risk of engine and fuel system damage is probably not worth the savings. 4. Transitioning from E0 to E10. Ethanol free fuel is the best option for marine engines, but E10 can still be used if necessary. The most likely time for fuel problems to occur is when you first begin using ethanol-blended fuel, because of phase separation. If your boat is currently fueled with Ethanol-free gasoline and you choose to transition to E10, there are few things to keep in mind. - - Check for water in the fuel tank. If you discover water in your fuel tank, pump the tank until it is dry. When you remove the fuel, place it in a clear container for inspection. If the fuel is not clear or has a bad or sour odor, you need to clean the tank. - - Add a quality cleaner that will help clean deposits in the engine. - - Fill the entire tank with E10 fuel. - - Monitor the filters and check for clogging. 5. Ethanol Myths Myth: Additives can prevent any issues caused by ethanol-blended fuel Fact: The only solution for preventing phase separation is keeping water from accumulating in your tank and using quality, ethanol-free fuel. Myth: Fuel that has been separated can be used again if a fuel additive is used. Fact: Once a fuel has gone “bad” it is no longer useable. The only option is to remove the fuel. However, high-quality fuel additives do aide in preventing sediment, gum and varnish buildup that forms when fuel goes bad. 6. Fueling up in 2017 The Environmental Protection Agency (EPA) is currently asking for comments on a proposal to increase the amount of ethanol that must be blended into the nation's gasoline supply for 2017. If adopted, these proposed levels will require the use of a record amount of ethanol, forcing higher-level ethanol fuel blends (E15) into gas pumps and at more gas stations. The Boat Owners Association of the United States (BoatUS) is urging all recreational boaters to send a message today urging the EPA to lower the ethanol mandates to ensure an adequate supply of fuel that will work with recreational boat engine and fuel systems and offers a simple way to send comments by going to: http://goo.gl/yczkuK. The deadline for public comments is July 11. Take a minute and leave a comment to help protect the future of fuel for marine engines. Fueling is an important part of any trip to the lake. Don’t let misfueling bring your weekend plans to a halt. Check your tanks, check the pumps, and enjoy the lake! If you have any questions or would like to know more about our boats, products and services, give us a call at 660-747-0388.
<urn:uuid:01cc8402-a6f9-4b30-9e56-8a4b56585adb>
CC-MAIN-2019-51
http://jonesbrosmarine.com/blog/ethanol-fuel-in-boats/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.929007
1,373
2.703125
3
CALENDULA: health and beauty in a flower 19/12/2015 - Calendula is a flower with a thousand virtues that can not miss in creams ... Calendula: health and beauty in a flower Also known as the "Marigold", calendula is a herbaceous plant flowers yellow-orange color, that grows almost anywhere in temperate climates: in the gardens, along the roads, in fallow fields, vineyards. The most important active ingredient content in the flowers of calendula is a saponin, responsible for their anti-inflammatory and healing. Among other active ingredients contained in the flowers, remember also carotenoids, polysaccharides, volatile oils and essential fatty acids, which make this plant one of the herbal medicines with the largest range of therapeutic and cosmetic applications. Used as a tea or herbal tea, dried calendula petals are useful in combating and preventing atherosclerosis, problems of circulation and varicose veins, as well as regulate the menstrual flow. In the form of ointment, marigold promotes wound healing and is useful in the treatment of insect bites, mycosis (especially nails), and any other condition to irritation or inflammation of the skin. But perhaps the most famous preparations made from calendula are creams, activities nourishing, moisturizing, soothing and restorative. Its effectiveness, combined with its sweetness, make it ideal for sensitive skin of infants and children, so that the creams made from calendula are often used for the treatment and prevention of sunburn, even diaper. A flower, then, a thousand virtues, which should never miss armory health and beauty of each of us. Chiara De Carli
<urn:uuid:f00473da-21a9-4b51-9c4d-335536f0ce50>
CC-MAIN-2019-51
http://www.parafarmacia.co.uk/articoli/916-news.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.930069
362
2.65625
3
For they could not love you but still your love was true,This world was never meant for one as beautiful as you. And when no hope was left in sight on that starry starry night, You took your life as lovers often do; But I could have told you, Vincent, —Don McLean, "Vincent" Vincent Willem van Gogh was a famous post-impressionist artist, famous for his hard life, insanity and vividly colored paintings. His last name is pronounced the Dutch way: "van" rhymes with "one", and "Gogh" is a soft Southern Dutch guttural G, a short O (as in "log"), and another soft guttural G. As with any Dutch last name, the "van" is spelled without its capital letter when preceded by the first name or initial. Van Gogh was born to a minister and his wife, a Replacement Goldfish to their dead son. After growing up with his brother Theo and going to boarding school, he left his small home in the Netherlands to work at an art dealer. After expressing rage at the thought of art becoming a commodity, he was fired. He fell in love with the landlord's daughter Eugénie Loyer, who rejected him when he finally confessed his feelings. This would start a chain of romantic failures. Van Gogh proposed to his cousin Kee Vos-Stricker, who had no interest in him. Van Gogh held his hand over an open flame, saying he would hold it there until he could change her mind. She absolutely refused him. Van Gogh fell in love with a prostitute named Sien Hoornick. Van Gogh's father did not approve of the marriage. She drowned herself in the river in 1904. Van Gogh fell into depression, but decided to enroll in a school to do something with his life. He befriended Henri de Toulouse-Lautrec there, but because of his problems their friendship fell out. He then moved to Arles, which he described as a disgusting and filthy city. This didn't show in his artwork, as he made some of his most colorful and vibrant pictures of the city there. He found a friend in Paul Gauguin, and waited for him to join him at the yellow house he bought in the country side. He painted paintings for Gauguin and asked after him constantly, which annoyed Gauguin. In a fit of his mental illness he cut off the lobe of his ear in a fight with Gauguin, begging him not to leave. He gave the bit of flesh to a prostitute at a hotel. After increasing tension and a state of angry paranoia and mental illness, he returned home. There 30 townspeople made a petition to get rid of him. He was having paranoid delusions of people trying to poison him. They called him fou roux (the redheaded fool/madman) and had him committed to an asylum. He threw himself into painting at the asylum, making brilliant painting after painting. After he left, he remained reclusive in his yellow house. In 1890 he shot himself in the chest with a revolver in the middle of a field. Unfortunately for him, he survived and had to stay in the hospital another two days, eventually dying of infections from the gunshot wounds. Recent academic research and told on a recent segment of 60 Minutes that van Gogh might not have shot himself as the tale goes but received his fatal wound as a result of a village boy shooting him by accident. Tropes applying to the artist: - The Alcoholic - Beard of Sorrow - Common Knowledge: Vincent didn't cut off his whole ear. It was only his lobe! - Dead Artists Are Better - Dogged Nice Guy - Driven to Suicide: Sort of. He did shoot himself, but it took complications from the injury to finish the job. - Forgets to Eat: Another thing that contributed to his poor health. He often used the very little money he got from his brother to buy art supplies, and the only thing he'd buy to consume was coffee and thujone. - Genre Popularizer: Post-Impressionism - Ho Yay: Vincent van Gogh and Paul Gauguin, at least from Vincent's side. He kept begging Gauguin to come and live with him in Arles and gave him dozens of paintings, basically saying "please be my friend." Unfortunately for him, Gauguin didn't really respect him as an artist and was probably a little creeped out. Their relationship began to deteriorate and poor Vincent cut off his ear with a razor to keep Gauguin from leaving him. Gauguin's response to this was to... leave, and Vincent was soon after committed to a mental hospital. He often asked his brother Theo to have Gauguin come and see him, and at one point he wrote "I think about him all the time." - It Is Pronounced "Tro-PAY": The correct Dutch pronunciation of Van Gogh is as follows: "van" rhymes with "one", and "Gogh" is a soft Southern Dutch guttural G, a short O (as in "log"), and another soft guttural G. Not "Van Goth", "Van Goff" or "Van Go". Note that Van Gogh was born in the southern province of Brabant, so he wouldn't have used the rough guttural G that's used in standard Dutch. - Loners Are Freaks - Lost in the Maize: He attempted suicide in a cornfield, and supposedly his last painting was of one. - Mad Artist: Famously. The Long List of his many health problems: - Bipolar disorder - Temporal Lobe Epilepsy: Random seizures without altered conciousness, but ending in a state of confusion and paranoia. - Thujone poisoning (from his absinthe alcoholism) - Lead and chromium poisoning (chromium yellows had recently been introduced and he used a LOT of them). - Hypergraphia (a condition in which you feel the need to write continuously, which might explain why he wrote 800 letters in his lifetime) - Sunstroke: He often got so wrapped up in painting outside he forgot that he was about to pass out. - Some historians believe he was also a paranoid schizophrenic. - Magnum Opus: The Starry Night is considered his best. - Mood Swinger: Justified, as he was bipolar. - Must Have Caffeine: Letters to his brother indicate that he ate close to nothing and stayed alive on coffee and absinthe. - Never Accepted in His Hometown: As mentioned above, 30 townspeople made a petition to get rid of him. - Nice Hat - Not Good with People - Picture Pastiche: Just one example: Look familiar? - Post Something Ism: Post-Impressionism, which became popular when his work gained acceptance. - Reclusive Artist - Redheaded Hero - Replacement Goldfish: Vincent had an older brother who died at birth, also named Vincent, born on the same day as him, but one year earlier. Every week when his family went to church, Vincent would have to walk past a gravestone with, essentially, his name and birthdate on it, only off by one year. - Starving Artist: Literally. Poor nutrition also was a contributing factor to his terrible health. - There Are No Therapists: At least until Saint Remy. Historians have speculated that a lot of his problems came from him actually being a paranoid schizophrenic, which couldn't have been treated then. - The Unpronounceable: His surname; in English people argue whether it's Van Go or Van Goff, while the actual Dutch pronunciation is quite different from either. - Vindicated by History: Van Gogh's art was never highly regarded until after his death, when a series of memorial exhibitions cemented his reputation. He is now generally considered one of the greatest artists who has ever lived.
<urn:uuid:6fcb74f0-b67e-4b34-a047-efa0d282b8cb>
CC-MAIN-2019-51
https://allthetropes.fandom.com/wiki/Vincent_van_Gogh
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.989979
1,679
2.8125
3
Can We Conquer Drug Resistance in Lung Cancer? At the beginning of the last century lung cancer was a rare disease. However, as early as the end of the 1900s, it had already become the leading cause of preventable death worldwide. In 2016, the disease is expected to cause approximately 158,000 deaths in the United States alone, more than colorectal, breast, and prostate cancers combined. Therefore, finding a better cure for this deadly disease is a pressing need. Lung cancer has poor prognosis, as it often stays asymptomatic until it is well advanced. Tobacco smoking is responsible for approximately 90% of lung cancer cases, contributing to lung cancer surpassing heart disease as the leading cause of smoking-related mortality. Exposure to other types of carcinogens, such as asbestos, radon, or to a particularly polluted atmosphere, have all been implicated in disease development among non-smokers. 85% of all lung cancer cases are of the non-small cell subtype (NSCLC). Advanced molecular techniques have identified genetic susceptibility in NSCLC linked to amplification of oncogenes and inactivation of tumor suppressor genes. The most important genetic abnormalities detected are mutations involving the ras family of oncogenes. The Genetic Basis of Drug Resistance More than a third of NSCLC cases among the Asian population, where tobacco smoking is on the rise, present mutation in the epidermal growth factor receptor (EGFR) gene, which has become a popular target for the development of new anticancer agents. These mutations (deletions in exon 19, and exon 21 L858R mutation) generally arise within the tyrosine kinase domain of the receptor contributing to the expression of a constitutively active form of the protein, which leads to aberrant cell multiplication. The first generation of inhibitors against the EGFR kinase activity (EGFR-TKIs), such as gefitinib and erlotinib, have been effectively utilized as first-line treatment of advanced NSCLC harboring activating EGFR mutations. However, in these patients drug resistance eventually arise, in most cases as a result of secondary mutations emerging in EGFR (EGFR T790 M, also known as “gatekeeper” mutation). Second and third generation EGFR-TKIs, such as afatinib or osimertinib, were designed to overcome resistance and more potently inhibit EGFR activity. Third generation TKIs are also capable of crossing the blood-brain barrier, and are therefore more likely to have activity in brain metastases, which sometimes develop within a year of treatment. Given the difficult clinical path of lung cancer treatment which takes patients through disheartening relapse before the more advanced EGFR inhibitors can be prescribed, it has recently been suggested that the third generation EGFR-TKIs should become first-line treatment for EGFR mutated NSCLC. A New Hope for Treatment Resistant Patients? It is worth noting that for a subpopulation of NSCLC patients carrying non-canonical mutations in EGFR (exon 20 insertions), there is still no convincing therapy approach since they seem to be refractory to EGFR-TKIs. For these patients combination strategies that hit multiple pathways at the same time have been proposed and novel TKIs are currently being investigated. To address the need of finding new treatments for this subpopulation of patients, researchers at CrownBio have developed a unique set of patient-derived models (patient-derived xenograft, PDX) that specifically carry non canonical EGFR mutations and that have been trialed with a range of EGFR inhibitors – including first, second, and third generation TKIs as well as Erbitux® (cetuximab), an anti-EGFR antibody that binds to the receptor to inhibits its activity. Similarly to patients in the clinic these newly developed models showed poor response to standard of care TKIs. More importantly this study was the first one to report a poor outcome following cetuximab treatment in this class of NSCLC, suggesting that CrownBio’s newly developed models represents invaluable assets to predict a patient’s response and for preclinical investigation of drug efficacy before new agents enter the clinic. CrownBio’s NSCLC models have already been successfully utilized in preclinical research to validate the antitumor efficacy of novel compounds or novel combination strategies. For more information on CrownBio’s comprehensive collection of NSCLC PDX models visit HuBase™, our curated, online, searchable database of phenotypic and genotypic data, patient information, growth curves, and standard of care treatment for our HuPrime® PDX models. Alternatively email us today for a copy of our Models of Resistance Application Note.
<urn:uuid:89c000ed-b8ca-4f66-9a98-add6e8544294>
CC-MAIN-2019-51
https://blog.crownbio.com/v4/can-we-conquer-drug-resistance-in-lung-cancer
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.950945
996
2.5625
3
Click a title to view the article.> The following is an explanation of how scientists working on the Dog Genome Initiative set out to identify genes that determine behavior or inherited diseases in dogs. Research methods have evolved to include other approaches in the 15 or so years since then, but this remains a good explanation of genes and gene mapping. It was written for non-scientists by Dr. Polly Matzinger, an immunologist and sheepdog handler. Start by thinking of GENES as pearls on a string (made of DNA instead of oyster saliva). Dogs, like people, have lots of these strings, a bit like a multi-strand pearl necklace. The strings are called chromosomes. Now suppose that you wanted to know how many of these genes it takes to control something as complicated as the behavioural trait we call “eye” and you wanted to know which particular ones, on which particular strings, do the job. If you look at the chromosome strings in a microscope, they all look pretty much the same, though some are longer than others. Suppose that the third gene on the first chromosome string has something to do with the INTENSITY with which an animal pays attention to an object, the 11th gene on the second chromosome controls whether it pays attention by LOOKING rather than listening or smelling, the 7th gene on the third chromosome controls HOW LONG it will continue to pay attention, and the 22nd gene on the 4th chromosome controls whether it pays attention to STATIONARY or only moving objects.> How would you ever be able to find this out? remember, the chromosomes all look the same. This is NOT an easy task and for years we didn’t have the technology to do it, but recently several interesting and odd quirks of nature have been discovered that open the way. One of the odd quirks is a type of DNA called ‘micro-satellite’. These are funny little areas where the DNA string can stretch and contract. They are a little like the leaves of a dining table that can be used to make it longer. The micro-satellite extensions are always made of the same stuff but sometimes they are very long (a boardroom table, lots of extensions added) and sometimes short (a card table). There are about 4,000 of these in most species that have been studied and they are scattered all around the genome (another word for the total number of strings that make up the pearl necklace). So our picture of the DNA pearl necklace begins to get a bit more detailed: No one really knows why the micro-satellites exist, but the current view is that they are due to slippage mistakes made during the repair of the strings, which, being very delicate, periodically break and need repair. The micro-satellites have three properties that make them incredibly useful to researchers who want to find the genes that control particular traits. First, because the micro-satellites are always made of the same stuff, they can be located and mapped. For example, chromosome number one in dogs (the chromosomes were originally numbered in order of length, since there was no other useful way to tell them apart: number one is the longest) might contain a micro-satellite 1,000 units in from the left end, and another one that is 450,000 units further down to the right and so on. People have been working on the micro-satellite maps of the chromosomes of different species for a couple of decades and some of the maps are getting very close to complete. Second, their lengths will vary randomly, so the one that is 1000 units in from the left end might be 92 units long, whereas the next one down might only be 31 units long and so on. Each micro-satellite therefore has two properties that identify it; its position and its length (like mapping the co-ordinates of a city and also knowing its size) Third, the more distantly related two individuals are, the more different their micro-satellites will be. Breaks in dog strings, for example, will be randomly repaired differently from those in human strings, not because there’s anything inherently different about dog DNA but simply because the breaks are random. So, although both humans and dogs carry genes for blue and brown eyes, and red and black hair (and probably for behavioral things like attention spans and ability to see and hear), the years of breaks and repairs that have gone on between us will lead to differences in the positions and lengths of the micro-satellites Border collies and newfoundlands, though not as different as humans and dogs, have been separated for long enough that many of their micro-satellites are different. So people like the Dog Genome researchers can look at the micro-satellite map of, say, chromosome two and know whether the chromosome came from a border collie, or a newf, just by looking at the micro-satellites. I’m making a couple of assumptions here. In the position where the border collie has the gene for paying attention by looking (Lo), I’m assuming that the newf has a gene for paying attention by listening (li). This may not be true, of course, but let’s use it for illustration. The same sort of thing holds for chromosome four, where sits the gene for paying attention to stationary things or to moving things. Lets say that the border collie has a gene that induces it to pay attention to things regardless of whether they are moving or stationary (a scared sheep? The sheep that’s been backed into a corner?), while the newf mostly pays attention to things that are moving (drowning people rather than the rocks their boat crashed on). So at position 22, the border collie chromosome has the stationary/moving gene (Sm) and the newf has the moving gene (m). The two chromosomes will also have different micro-satellites. Now remember that nobody knows where the behavior genes are (or even how many exist, or which types of behavior are influenced by genes). They only know the positions and lengths of the micro-satellites. How can they use this information to find the behavior genes? They start by mating a newfoundland to a border collie. Now, in every individual, each one of the chromosome strings is actually paired up. There are two copies of each chromosome, one received from the mother and one from the father. So the border collie and the newf each has a pair of chromosome 2s and a pair of chromosome 4s. In the process of making eggs and sperm, they split these pairs up and donate one half (a complete set of singles) to all their progeny. All the puppies will thus have one set of chromosome strings from their mother (the newf, in this case) and one from their father. So their sets of chromosomes 2 and 4 will look like this. By analyzing the behavior of this first cross, the scientists can make some guesses about the relative strengths of the different behavior genes, (though they won’t yet be able to say how many there are or where they sit on the chromosomes). For example, if the puppies tend to look rather than listen, then looking (Lo) would be said to be DOMINANT over listening (li). If they tend to do both, paying attention with both their ears and their eyes, the genes would be said to be CO-DOMINANT. For the sake of this example, let’s say that they are co-dominant. Lets also say that the Moving vs. Stationary genes on chromosome 4 are not co-dominant, but that paying attention only to moving things is dominant over paying attention to both moving and stationary things. So the puppies of a newf by border collie cross would pay attention only to moving things and they would do it by both listening and looking. Good. This means that the first generation has taught us something, but not a whole lot. To learn more, we need to do some more breeding. We do this by breeding the puppies to each other (brothers to sisters) to make the second generation (called the F2 generation). Each parent will split its pairs of chromosmes, sending one copy (either the border collie copy or the newf copy) into the sperm or egg. The splits happen randomly so that a border collie type of chromosome 2 might end up going into the same egg as a newfoundland type of 4 etc. The puppies will therefore get all sorts of combinations of pairs of chromosomes. (Just like the progeny of a tri-color, prick eared bitch and a black, drop eared dog will come out in all the combinations of tri-color-drop eared, black-prick eared etc). Now things begin to get really interesting. We wait for the new puppies to grow up and then test them for the looking vs listening type of attention as well as for moving vs stationary attention. (The tests haven’t really been worked out yet. In fact, I think this is the most problematic part of the whole project, but that’s another story. Let’s pretend that good tests have been devised and let’s get back to the genetics, because the genetics will work for any trait, including many of the diseases for which good tests already exist). Suppose that we find an F2 puppy that Looks (and doesn’t listen) at both stationary and moving things. This is a dog that has copies of the border collie genes for LOOKING and STATIONARY/MOVING and doesn’t have copies of the newfoundland genes. We don’t know where these genes are yet, all we know is that we have found a dog that has them. So we take a little bit of blood, isolate the DNA from the white blood cells and look at the micro-satellite map. We find that both copies of chromosome 4 have a border collie type of micro-satellite pattern. We also find that both chromosome 2s are border collie type. But we can’t yet conclude that the Looking and Stationary/Moving genes are on chromosomes 2 and 4 because this dog also has two sets of border collie chromosomes 7, 9 and 13. Though these chromosomes don’t carry any genes that we’re interested in, we don’t know that yet. All we know is that chromosome sets 2,4,7,9 and 13 are pure border collie. Let’s say that sets 5,6 11 and 14 are pure newfoundland and all the rest are mixed pairs, where one comes from the border collie and the other from the newf. We can therefore guess that the LOOKING gene (Lo) and the gene for STATIONARY/MOVING attention (Sm) are somewhere on chromosomes 2,4,7 9 or 13. To pin point it a bit closer, we need to find other dogs that have the border collie trait. Suppose that we now find one that looks (and doesn’t listen) but only to moving things. We know therefore that it has the border collie Looking gene (Lo) and the newfoundland moving gene (m). When we analyse the DNA from its white blood cells, we find that chromosomes 1,2 and 7 are pure border collie, 4, 8, 9 and 15 are pure newf and the rest are mixes. We’re now down to two choices for the Looking gene!! It must be either on chromosome 2 or 7 because these are the only two that are pure border collie in BOTH dogs. We haven’t learned anything more about the Stationary/moving gene because this dog has the dominant trait (looking at only moving things) that can result from having either two pure copies of newf genes (m) or one copy each of the border collie (Sm) and the newfoundland (m) gene. So we look at more dogs, hoping to find some more that have the Looking trait. We test them, find the ones that have the Looking trait rather than the Listening trait, bleed them, look at their DNA and . . . eventually . . . after a LOT of work, we pinpoint the Looking (and the Listening) genes to chromosome 2. We’ve now accomplished the first step. We have mapped a behavior gene. We have learned a LOT from this. First, that there really is a gene involved in controlling this behavior, in the same way that there are genes governing ear prick and coat color. We’ve learned that a single gene is at work (not always true) and that it is co-dominant with its partner, the Listening gene. This means that, if we want dogs that will both look and listen, we’ll need to keep making hybrids (like tomatoes) because this is a trait that needs both genes and therefore will never breed ‘true’. Every time we breed two looking/listening dogs together, we will get some puppies that look (about one fourth of them), some that listen (another fourth) and about half that do both. Now, please remember that this is a concocted fantasy example. I don’t think that anything is known yet about the number, position, dominance, co-dominance or recessiveness of genes for behavior. I have just given an account of how the search is being done. I think we can pretty well say that genes for behavior do exist. Anyone who has worked with different breeds of dogs can’t help but know this. And hopefully, if these amazingly dedicated people get enough funding to do the work, we’ll know the answers to some of our questions some day. The following article was published by the United States Border Collie Club in 1995, just after the Border Collie was recognized by the AKC. At that time, the AKC stated that it would close its studbook to non-AKC Border Collies three years after it began registering the breed. In the end, it never did close the studbook to Border Collies registered with the working registries. However, this article is a good explanation of the effect that setting a conformation standard and breeding to it has on the working ability of the breed. 1. Basic Genetics We all learned basic genetics in high school biology, but most of us who don’t use it every day have forgotten the details, and those who remember it don’t necessarily see the connection between Mendel’s work and the practical questions of dog breeding. In order to understand the genetic basis of the USBCC’s objection to AKC registration of the Border Collie, we may have to start back at the high school biology level and work forward. In the first place, heredity, the information passed from one generation to another, is contained in discrete particles which Mendel called “genes.” These genes are carried, somewhat like beads on a string, along microscopic bodies called “chromosomes.” Genes are arranged in constant linear order along a chromosome; each has a specific “address” (called a locus) on a specific chromosome. Chromosomes occur in pairs, one from mother, one from father. Each member of the pair has, at the same address, the same gene, but possibly a different form of the gene (called an allele). There are probably close to twenty thousand genes altogether in the dog. The only ones that are important to us are the ones that have identifiable alternative alleles. In other words, the only reason we are aware of the E gene which causes black hair is by the existence of its allele, e, which, if present on both chromosomes, causes red hair. The vast majority of the genes that make up the whole dog are not even identified; at most, we deal with a few dozen. 2. Recombination and Linkage Behavior traits which make up the Border Collie: E. Speed and agility F. Interest in moving targets All come from different sources: A. setter/pointer; B. spaniel; C and D. unknown (maybe some older breed of sheepdog; E and F. greyhound/whippet. How did they all come to be assembled in the modern sheepdog? During the production of eggs and sperm, the chromosomes are scrambled, and one of each pair is passed to each germ cell. There is no preference for those originating from, say, the mother, to be passed together as a group. Furthermore, actual genetic material of those chromosomes is regularly exchanged between members of the pair during the process, so that in the end there is no such thing as “mother’s chromosome.” All of the chromosomes carry genes that originated with both mother and father. This is the very important process called recombination. The closer two genes occur along the linear order of the chromosome, the more likely they are to remain together in the next generation. In fact, we can actually “map” chromosomes in organisms where we can do large numbers of breeding tests, (fruit flies, mice, etc.) simply by measuring how often particular alleles of two genes remain together from one generation to the next. In extreme cases, where this “linkage” is as close as one molecule to the next, they may only separate in one case in millions. It is very rare, however, for two recognized, identifiable genes’ addresses to be so close together. What are the implications of recombination and linkage? First, it would have been impossible to assemble into one breed all the different genetic traits that go into Border Collie instinct if they were very tightly linked together. Suppose, for instance, that the spaniel has the traits “crouch; no eye” and the setter has “no crouch; eye.” If the “crouch” gene were tightly physically connected to the “eye” gene, the two original combinations of alleles would still be together. We would have dogs which crouch, but have no eye, and dogs which have plenty of eye, but do not crouch. If we couldn’t recombine those alleles, we could never arrive at the “crouch; eye” combination we treasure in our working dogs. The original litters in which spaniels and setters were crossed with old-fashioned sheepdogs, and the next few generations as well, must have included the whole spectrum: crouch, eye; crouch, no eye; no crouch, eye; and no crouch, no eye. From those, the ancestors of the Border Collie were selected: those which had eye and crouch together. The more completely random the recombination among these genes, the easier it would have been to get these new combinations. The flip side of this, though, is that now that we have assembled within our breed the combinations that we want, it is just as easy for them to come apart in future generations if no effort is made to hold them together by selective breeding. 3. Fixing a Combination Genetic combinations are said to be “fixed” within a breed if every member of the breed has exactly the same combination of alleles at a particular locus. In the Belgian Sheepdog, for example, the black color gene has been “fixed”; no other alleles of the E gene are present within the breed. A single gene of this sort is easy to fix. We simply remove from breeding all individuals who either are the wrong color or ever produce puppies who are the wrong color. It is also possible to make progress toward fixing the normal allele of a gene which causes a genetic disease by such selective methods. Generally speaking, the Border Collie does not have any fixed genetic combinations. In appearance, this is obvious. Even in herding, however, there is a spectrum in almost every one of the traits we value. A dog may have very little eye, or so much that he freezes (like the pointer who is “staunch on point”) and cannot be brought to move the stock; he may have no balance at all, or such a strong sense of it that he cannot be persuaded to move off the balance point; he may lack power and be unable to move even the lightest stock, or he may have so much that sheep flee from him the moment he comes onto the field. In all of these, the combination that produces the middle ground is the most desired; it is also the most difficult to fix genetically. After all these generations, a litter of the best-bred working Border Collies still may have perfect working dogs, mediocre dogs, and useless dogs. Alleles are not always dominant or recessive; often the combination in which the two alleles are different (heterozygous) is intermediate between the two homozygous combinations. Some of our most desired genetic combinations in herding behavior may well be heterozygous pairs: they can never be fixed in a population because they will always produce some of each type of homozygous pair. Because these complex traits cannot be fixed in the breed at their optimum levels, because the alleles and combinations of alleles that produce mediocre and useless dogs still occur in the breed, the risk of losing the best combinations is always at hand. If every Border Collie carried the precise combination that produced a perfect worker–for light sheep or cattle, for trial or farm, for Arizona or Scotland, for the tough handler and the soft–we would have nothing to worry about. No matter which of our dogs were chosen to be bred for “conformation” showing, all of them would still be working Border Collies. 4. Complex Genetic Traits The red Border Collie, like the chestnut horse, is the result of a recessive gene pair. In the case of the dogs, the dominant (black) is called B, and the recessive (red) is called b. A black dog may be either BB or Bb; the red dog is always bb. Two black dogs may have red puppies if both of them are Bb; the b can come from each parent to produce bb in the pups. Statistically, one out of four pups with such a cross will be red. If either parent is BB, though, the combination can’t produce red pups. If both parents are red, bb, then all their puppies will be red; there is no B available from either parent to make a black pup. The end product of most genes is some sort of biochemical substance. In the red color, the chemical is a pigment called eumelanin. This is one of a group of pigments, the melanins, which cause color in animal skin, hair, and feathers. It is responsible for very dark brown or black color. All Border Collies have in their hair a red version of melanin, called phaeomelanin. In the black dogs, the black eumelanin covers the appearance of the red. If you’ve ever looked closely at your black dog in bright light after he has spent a lot of time in the sun, you will see a faint red glow to his hair. The eumelanin has been bleached by the sun, and the red color is showing through, however slightly. Only the dominant version of the color gene results in eumelanin production; if the dog has two copies of the recessive version, he will have no eumelanin. His hair will contain only the red pigment, and anywhere that he would otherwise have been black, he will instead be red. This means he may have the same variety of white markings as any black Border Collie; he may be tri-color, with lighter brown markings in all the usual places; he may even be a red merle instead of a blue merle. His nose and toe pads, which would be black on a black dog, are red-brown. But why are there suddenly more of them? One reason is that the red gene is present in some of our favorite breeding lines. The first recorded red Border Collie was a bitch named Wylie, grandmother of the famous Dickson’s Hemp (153). The recessive gene passed through the generations to J. M. Wilson’s Cap (3036) who appears in the pedigree of Wiston Cap at least 16 times! Wiston Cap carried the red gene and passed it to many of his sons and daughters. Our current Border Collies tend to have many crosses of Wiston Cap in their background; each one increases the chances of receiving that e gene. Crosses on both sides of the family, likewise, increase the chances of a double dose and the appearance of more and more red dogs. Unlike most simple genetic traits, however, good (or bad) hips don’t result from a single pair of genes. With a single pair, like the “red” genes, the probability of each genetic combination in the next generation is easy to measure. We know exactly how many red pups, statistically, to expect from any combination. With hip dysplasia, on the other hand, we have no idea what to expect in a litter of pups, even if we have x-rayed both parents. Instinct and behavior, like hips, are affected by a large number of genes; some may be recessive like the b; some may be dominant like the B. The problem is that we don’t know how to identify any of them, and we have no idea how many there are. If we had some kind of behavioral measurements on all the members of hundreds of litters and their parents and offspring, we could make a start. We aren’t even close. We have no real measurements at all; our assessment of herding ability is subjective, and deals with the whole dog and his ability to get the job done. Studies by Scott and Fuller on spaniels revealed the genes involved in the behavior known as “crouch”; the crouch itself is controlled by two major genes, with the crouch (or sit) dominant over the stand. The quiet attitude was also controlled by two genes, with the quiet behavior recessive to the more active. The whole pattern of quietly crouching, then, results from four genes altogether. The number of different genetic combinations that can be formed from 4 (2-allele) genes is 81! If the parents are heterozygous for all four of these genes, any of these genetic combinations is possible in the same litter. What does all this mean to the Border Collie? Imagine, if that simple quiet crouch behind the sheep depends on 4 separate genes, what must be involved in the entire collection of herding behavior: eye, balance, power, biddability, etc. And what must the chances be of accidentally combining the right factors to remake a herding dog, if those combinations are ever lost? The complexity of the genetics of behavior is probably not a surprise, but it is the basis of the entire argument that the performance dog must be bred for performance at every generation. The more genes are involved, the more different combinations are possible, the more easily they become separated and lost. If the dogs selected for breeding for conformation are not the ones with the best herding genes, the population will inevitably drift away from the wonderful performance combinations that have been selected in the breed for so many generations. Because the extremely complex instinct that makes up the working dog is not fixed in the population, constant selection is needed, at every generation, to maintain the best combinations. Any relaxation of this pressure will result in the increase in numbers of those dogs which have less than ideal genetic combinations. Breeding for any other purpose without also selecting for truly high quality working genes will inevitably result in the dilution of the working instinct within the breed. Genes may have more than two different alleles (there are 160 different alleles of the blood group gene, B, in cattle). The number of possible genetic combinations as we increase both the number of possible alleles and the number of genes rises abruptly. If we are dealing with, say 6 traits (see above), each with an average of only two gene loci involved, that is 12 genes; if they have only 2 or 3 possible alleles: If we are already trying to maintain some genetic equilibrium with all these possibilities, consider the additional burden of selecting at the same time for color, ear type, body size, coat quality, eye color, head shape, etc., to fit some arbitrary standard of appearance. The number of different genetic types becomes astronomical. The number of dogs that can fit all these separate standards for all these separate genes is, as Verne Grant stated it, probably less than one in the whole breed! The number that will come close is still very small. This is particularly true within a breed like the Border Collie where there is no genetic uniformity in appearance to begin with. When the number of available dogs for breeding becomes very small (as, for instance, those dogs who fit both a performance standard and an appearance standard), the result will be, unavoidably, an increase in inbreeding. Furthermore, the best, and indeed the only way to fix a set of alleles within a breed is through inbreeding. Members of the same family tend to carry the same genes, so breeding among them is the quickest way to “concentrate” those alleles we want. Concentration is a poor word, although it is the one usually used here; we can never have more than two copies of the same allele–a gene pair–so we cannot concentrate any further than that. What we can do is get more and more genes to be present in identical pairs, in other words, “fixed” within the breed. This condition of having identical alleles in a gene pair is called homozygosity. And it is exactly the increase in homozygosity that is the problem with inbreeding. In addition to producing a predictable appearance in your litters of puppies–if that is somehow a valuable thing–homozygosity does other things which are downright dangerous. Most (although not all) detrimental or even lethal genes are recessive (take CEA as an example), that is, they must be present in a homozygous pair to have their effect; increasing homozygosity leads to increasing the number of individuals with the damaging gene pair. For rather more complicated biochemical reasons, a general increase in homozygosity also leads to a decrease in general vigor and a greater sensitivity to stress–all in all, less healthy animals. Geneticists generally agree that genetic diversity within a population is always desirable. The more traits we try to fix in a breed, such as both performance and appearance, the less diversity we will have. There is a mathematical formula called the Hardy-Weinberg law which predicts that in a random-breeding situation the frequencies of different alleles will remain constant. The key is in the concept of “random” breeding; every male in the population has an equal chance of mating with every female and vice versa; every mating is equally productive. Variations in these constraints cause change in the frequencies of genes, and in the number of individuals with different genetic traits. One variation from randomness is viability. One is statistical sample size. With domestic animals, the most important is selective breeding. The fact is that among purebred dogs, there is no such thing as random breeding. It is the intention of breeders to change the frequencies of important alleles. In the performance of this function, breeders take advantage, quite correctly, of the ability of a single male to impregnate a large number of females. In animal breeding, a relatively small fraction of all the available males produces a very large fraction of all the offspring. The choice of those male dogs determines the future of the breed. We can all point to the presence in our pedigrees of such great stud dogs as Wiston Cap, Gilchrist’s Spot, Dryden Joe, Whitehope Nap, Welsh’s Don, etc. In the case of the Border Collie, these central dogs have all been great herding dogs in their own right, and great sires of herding dogs as well. The recent increase in the number of red dogs is a direct result of this system of breeding, arising from the popularity of Wiston Cap. This increase has been purely accidental, called “genetic drift,” and is typical of the change in genetic makeup in a population when mating is not random. The presence of large numbers of dogs with genetic defects–CEA, hip dysplasia, epilepsy, etc.–in any breed usually results from this sort of accidental selection. A popular stud dog carries genes, usually recessive ones which are not expressed in his own life, which are passed on in increased numbers to the next generations simply because he produces a disproportionate number of pups. Consider what will happen when the most popular stud dog is one who merely fits the appearance standard and so wins a show ring championship. He may or may not carry the particular, very complex combination of genes that makes a great herding dog. He may even be a good herding dog. If he contributes his genes to a disproportionate number of puppies, and if he is anything less than a great herding dog, his genetic contribution will lower the general level of herding ability within the breed. The extremely wide variety of appearances in the existing breed means that only a small number of our present herding dogs will be used in the breeding of showring competitors; at the very least, the genes in those great herding dogs who do not live up to the appearance standard will be sacrificed. 7. The Standard The existing Border Collie is not a breed without a standard. It has a very specific standard, by which dogs without registration papers and pedigrees can be Registered on Merit if they can demonstrate their herding ability to satisfy this standard. Whatever appearance standard is designed by the AKC and its chosen Breed Club (should it eventually designate one), it will not be the same standard to which the breed currently strives; it will therefore, by definition and unavoidably not be the same breed of dogs. Even though the initial registration will come from the existing breed, the next generation of “showdogs” will have been bred under a different set of selective rules, and will already be at least philosophically different. After three years, when the AKC closes its books and no longer allows dogs of the original breed to be used for breeding, the AKC breed will have become a separate entity, no matter what its name! This already happened at least once, when the “Lassie” collie was created. The working sheepdogs used to be called “collies.” They became “Border Collies” to distinguish them from the developing show breed. At the time of separation, there was no real distinction; anyone can tell the two breeds apart now. All of this is quite apart from the possibility of a standard being chosen which is simply inconsistent with the demands of the shepherding life. This may be in the written standard or in the fashions of judges who know nothing about these physical demands. This has already happened to some of the breeds (Labrador retrievers, for instance, are currently too heavy and short-legged to be of much use in the field; Siberian huskies tend to be showring winners with legs too short to run properly and with fluffy coats that cannot shed snow and ice; bearded collies look nothing like their ancestors, and have coats which obscure their vision, and collect burrs and mud). There has been some call for the USBCC to become the breed club so that we could set the standard and thereby avoid the problems of inappropriate physical traits being used. Unfortunately, although the problem will be made worse by the “wrong” standard, it is the existence of a physical appearance standard, and not its details, that is the danger. The currently proposed standard is flexible enough to appear to cover many of our dogs. In practice, however, an appearance standard, however broad it may seem, will subject the breed to all the problems listed above. Although there is a popular belief that a dog that looks like his father (or mother) will work like his father (or mother) this is simply not necessarily true. Because of recombination of genes, it is no more likely that the pup with his father’s markings is going to behave more like his father than the pup with completely different markings. If we were to set the show standard to duplicate in every detail the appearance of the latest International Supreme Champion, this would no more guarantee us a working breed than any other conformation standard. If we don’t choose the pups that work like the latest Champion, we are not selecting the right genetic blend from the many possible combinations. 8. What Is A Breed? As was stated in the USBCC Spring Newsletter: Currently, we have several registries, here and abroad, organizing the Border Collie breed and directing its selective breeding. They all communicate with each other, their breeding goals are the same, and dogs move freely from one registry to another, so that they are effectively a single genetic population. From the moment the AKC closes its books on the breed they have derived from the existing Border Collie, they will have created a separate genetic population, on which new selective rules will apply. Whatever its origin, and whatever the standard of selection (even if it were to be a performance standard!) this new breed will inevitably begin to differ from the breed registered by the existing registries. It will not be a Border Collie. Reproductive isolation, the genetic separation of one group of breeding animals from another, cannot help but result in two distinct “gene pools,” and thus two different breeds. In natural selection–evolution–this is the path to the formation of separate species. In artificial selection, it is the path to the formation of separate breeds. Even with a very similar standard of performance, two genetically separate populations will eventually diverge simply by the effect of drift, the accidental change resulting from the use of a few sires to produce large numbers of pups. In fact, there can be no other reason for the AKC to close the books and prevent future entry of dogs registered with existing Border Collie registries but this: to create and perpetuate a separate genetic population, i.e., a separate breed of dogs.
<urn:uuid:4095cce0-8d5b-469d-b953-3af6e66774f8>
CC-MAIN-2019-51
https://bordercolliefoundation.org/health-and-education/genetics-101/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.949731
8,022
3.46875
3
(RxWiki News) Although medical-grade honey has previously shown promising antibiotic properties, it may not live up to the hype for certain infections. A recent study compared topical treatments of honey against a standard wound care for preventing infection at the site of dialysis. They looked for rates of infection and how long it took for an infection to develop. They found that between the honey and the standard care, there was no significant difference in rates of infection. Additionally, more people with the honey treatment reported a negative side effect, like skin irritation. The researchers suggested that honey may not be an effective way to prevent infections from dialysis wounds. "Talk to your doctor about preventing infection." David Johnson, PhD, of the Australian Kidney Trials Network in the University of Queensland led the study in order to see how well honey worked in treating infections that resulted from a certain kind of dialysis treatment. Specifically, he used patients who had experienced kidney failure and were using peritoneal dialysis. When the kidneys fail, they can't filter the blood. In peritoneal dialysis, a catheter is inserted into a patient's abdomen and a solution is used to help filter wastes from the body. Peritoneal dialysis is an important treatment option for people with kidney failure, but it can lead to infection at the insertion site or inside the abdomen. Usually, infections resulting from peritoneal dialysis are treated with antibiotics. However, some bacteria are becoming resistant to the antibiotics used, so the antibiotics are becoming less effective. Some previous reports have suggested that medical grade, sterilized honey may be able to kill bacteria while avoiding promoting antibiotic resistance. This study tested honey in place of antibiotics for some patients undergoing peritoneal dialysis. The researchers used 371 participants who had experienced kidney failure and were being treated with peritoneal dialysis. Of the participants, 186 received a topical treatment of medical-grade honey and standard wound care. The other 185 participants received standard wound care, with mupirocin ointment if they were carriers of nasal S. aureus. Doctors examined the patients and the exit sites of their catheters every two months for up to 24 total months. They were looking to see if the honey treatment delayed the time to infection of the dialysis area. The researchers found that 170 of the 371 participants developed an infection related to peritoneal dialysis: 82 participants who had been treated with honey and 88 who were treated with standard care. They also found that the time it took to develop an infection were not significantly different between the honey group and the control group. Patients in the honey group averaged of 16 months until their first infection, and patients in the control group averaged of 17.7 months until their first infection. Patients with diabetes in the honey group averaged 11.6 months until their first infection. The risk of peritonitis was almost two times as high compared to patients with diabetes in the control group. People in the honey group were also much more likely to withdraw from the study due to a skin reaction. Additionally, there were no differences in serious side effects or death between the honey and control groups. However, people in the honey group were more likely to require hospital admission for removal of part of a parathyroid gland, uterine bleeding, and high blood sugar. The researchers concluded that, in this trial, honey was not an adequate treatment for preventing infections related to peritoneal dialysis. “While the fact that honey doesn’t contribute to antibacterial resistance makes it an attractive option for preventing infection at wound sites, our results suggest that honey cannot be routinely recommended for the prevention of infections related to peritoneal dialysis,” said Prof. Johnson in a press release. The study was published in The Lancet on October 9. The research was funded by Baxter Healthcare, Queensland Government, Combita, and Gambro. Some of the researchers reported financial ties to Baxter Healthcare and other pharmaceutical companies.
<urn:uuid:5ca4b3a8-bb17-4bb9-9d2a-3327f0705d2d>
CC-MAIN-2019-51
https://feeds.rxwiki.com/news-article/honey-did-not-prevent-more-infections-standard-antibiotics-and-led-more-side-effects
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.965689
823
3.234375
3
Each type of mining equipment comes with its own set of mining activities. The most common types of mining equipment vary depending whether the work is being carried out above or below ground or mining for gold, metals, coal or crude oil. Chapter 7 COAL If we as a nation are to benefit in the future from our enormous, low-cost coal reserves, a variety of efforts are necessary to (1) develop and demonstrate new "clean coal" Coal. Coal is a naturally occurring combustible material consisting primarily of the element carbon. It also contains low percentages of solid, liquid, and gaseous hydrocarbons and/or other materials, such as compounds of nitrogen and sulfur. Mining Types: Hardrock Mining . Not so often utilized in the 19th century, it is a common practice today, especially with copper and coal. Because this type of mining devastates the landscape, regulations are generally in effect that requires companies to restore the environment when the mining . Coal mining, especially mountaintop removal mining, can damage large areas of land and destroy natural habitats. Higher grades of coal burn more cleanly than lower grades, although they still pollute more than other fuels. Types . Room and pillar mining is the most common method of underground mining. The roof of the mine is supported by areas or columns of coal (pillars) spaced out at regular intervals in rooms from which the coal is mined. The two types of room and pillar mining are conventional and continuous mining. The coal formation process involves the burial of peat, which is made of partly decayed plant materials, deep underground.The heat and pressure of burial alters the texture and increases the carbon content of the peat, which transforms it into coal, a type of sedimentary rock. land is too hilly for surface mining, coal miners must go underground to extract the coal. Most underground mining takes place east of the Mississippi, especially in the Appalachian mountain states and is used to produce about 40 percent of U.S. coal today. Th e type of underground mining technique used is determined by how the coal seam is . Coal mining and coal fueling of power stations and industrial processes can cause major environmental damage. Water systems are affected by coal mining. For example, mining affects groundwater and water table levels and acidity. Nov 25, 2018 · A piece of coal used for burning. Note that in British English either of the following examples could be used, whereas the latter would be more common in American English. Put some coals on the fire. Put some coal on the fire. A type of coal, such as bituminous, anthracite, or lignite, and grades and varieties thereof. Mining is the industry and activities connected with getting valuable or useful minerals from the ground, for example coal, diamonds, or gold. Anthracite: This is the highest ranked, hardest, oldest, and least common type of coal.It possesses a high energy content, high percentage of carbon (>85%) and relatively little moisture or volatiles. Coal mining definition: the act, process, or industry of extracting coal from the earth | Meaning, pronunciation, translations and examples INTRODUCTION TO MINING . A further subdivision of the types of minerals mined by humankind is also common. These terms are often used in the industry to differentiate between . that can be utilized as fuels,such as coal,petroleum,natural gas,coalbed methane,gilsonite,and tar sands. The three main types of surface coal mining are strip mining, open-pit mining, and mountaintop removal (MTR) mining. Surface Mining: Strip Mining Strip mining is used where coal seams are located very near the surface and can be removed in massive layers, or strips. Surface mining, method of extracting minerals near the surface of the Earth. The three most common types of surface mining are open-pit mining, strip mining, and quarrying. See also mining and coal mining. Mining definition is - the process or business of working mines. . Katowice has a long history of coal mining, . 7 Obscure Names and Types of Songs 'Aubade,' 'threnody,' and other songs for the right mood. Ask the Editors. 2018 Word of the Year: Behind the Scenes. The coal is widely used for generating steam power and industrial purposes. Sometimes called "black lignite," sub-bituminous coal is not stable when exposed to air; it tends to disintegrate. This type of coal contains more moisture and volatile matter than other bituminous coal types. What is Coal? Coal is an organic sedimentary rock that forms from the accumulation and preservation of plant materials, usually in a swamp environment. Coal is a combustible rock and, along with oil and natural gas, it is one of the three most important fossil fuels.Coal has a wide range of uses; the most important use is for the generation of electricity. The calorific value of coal varies with percentage of carbon present in it. Coal depending upon variation in percentage carbon, can be divided into three egories as follows (bituminous / anthracite type is the most abundant form present in Indian coal): Table 2.3: Categories of Coal Coal is the largest and most widespread fossil fuel resource providing 23 per cent of the world's energy. However widespread concern about environmental emissions from coal has started to limit . Section 3(h)(1) of the Act defines the term "mine" and includes related milling operations within that definition. Mine development, rehabilitation activities, and exploration work at an established mine are within the Act's scope. All types of mining, including placer, dredge, and hydraulic operations must be . There are two types of room and pillar mining–conventional mining and continuous mining. Conventional mining is the oldest method and accounts for only about 12% of underground coal output. In conventional mining, the coal seam is cut, drilled, blasted and then loaded into cars. The Sun (2009) The obsessive desire to stop burning coal has overwhelmed common sense. The Sun (2016) Coal tar fills your lungs and your head. Times, Sunday Times (2014) The mining of gold and silver was not essentially different from the mining of coal and iron. The life cycle of mining begins with exploration, continues through production, and ends with closure and postmining land use. New technologies can benefit the mining industry and consumers in all stages of this life cycle. This report does not include downstream processing, such as smelting of . The choice of mining method is largely determined by the geology of the coal deposit and its distance to the surface. Underground mining currently accounts for a larger share of world coal production than surface mining. Coal can be burned for heating or to produce electricity. 1.7.3 Marketable Reserves 2. Coal Mining 2.1 Surface Mining 2.1.1 Strip Mining . a brief prospect for coal exploration and mining is given. With the wide range of subjects that have to be covered in an article of this type, the amount of detail that can be included on many aspects is greatly limited. As a coal definition: 1. a hard, black substance that is dug from the earth in pieces, and can be burned to produce heat or power, or a single piece of this: 2. a hard, black substance that is dug from the earth in lumps and used as a fuel, or a single piece of this substance: . Learn more. Fossil fuels are formed from the remains of once-living organisms. Prehistoric plants and animals provided the raw material for the list of fossil fuels that are in use today. Seeing examples of fossil fuels will help you understand the importance of these materials as major sources of energy. Coal-fired power plants provide about 45 percent of U.S. electricity. To increase the percentage of electricity coming from clean energy sources, America will likely have to move away from coal .
<urn:uuid:69ebf14f-c8f1-4729-81b4-c2eb056ff6e5>
CC-MAIN-2019-51
https://hoteltofana.eu/2017/24553-three-type-of-coal-mining-and-definition/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.944759
1,641
3.484375
3
Lunchtime starts at noon at the Jordan Foundation. Nine or ten children are seated in colourful plastic chairs around two tables, happily digging into a full plate of rice and vegetables. Joyce (6), gets up from her chair and walks to the other table to help a smaller boy with his food. She gently wipes his mouth with a napkin. Joyce is partially blind. The other children eat in complete darkness. Twenty-two visually impaired children live here, at the residential centre of the Jordan Foundation in Gasabo, Kigali. A true place of hope for them. In 2015 Mrs Vanessa Bahati and her husband Jean Bosco Hakiza received the devastating news that their third child, Jordan, was born blind and he would never be able to see. Determined to find the best possible care for her son, Mrs Bahati researched organisations and institutions in Rwanda and abroad and she was unhappy with what she found. She realized that for blind children from poor families, the future looked particularly grim and she decided to act. Bahati reached out to other parents with blind children, to counsellors, teachers and authorities, to friends and sponsors. And this is how the Jordan Foundation, named after her son, saw the light Changing the mindset The Jordan Foundation takes care of visually impaired children between the ages of 3-9, who come from poor families in Rwanda. The children are offered a safe place to live and have access to medical care and eye treatment, but also to other health services such as counselling, physiotherapy, and nutrition. Eulade Manzi, one of the coordinators of the Foundation, explains that blind children from villages in remote and poor rural areas are often hidden from the public eye and rejected by their families. The child will not go to school and does not receive proper healthcare. When it is known such a child is there, the specialists from the Jordan Foundation talk to the local authorities and the parents in the hope of raising awareness of the rights of blind children and persuading them to give the child in their care “There is a lot of stigma on blindness”, says Manzi. “Some parents consider these children “useless”. They don’t know how to care for them”. He points at one of the children, a boy of about six years old named Hadi. “Hadi was left behind by his parents on the street. A catholic organization picked him up and brought him to our door when they realised he was blind”, he says. “Parents can visit their children on Sundays, and are invited to regular parent meetings”, Manzi continues, “Our counsellors make every effort to change the parents’ mindset and give them social and economic support so they can accept the child’s disability”. After lunch, Joyce and the other children go outside to play. They laugh and chat like any other kids their age. It is clear that Joyce feels a responsibility because she can see a little bit. She supports the others as they practice walking with a stick. One of the other boys, Jean-Claude (4) wasn’t born blind either but suffered a series of eye infections when he was two years old. The doctors took his eyes in order to save his life and he was brought into the care of the Jordan Foundation. He speaks a little bit of English now and when asked if he minds having his picture taken, he straightens up as if in military position and yells: Cheeeeeese! He is a happy, sociable young boy who likes English songs and music. It is heart-breaking to think what life would have been like for him, and his 21 friends, without the efforts of Vanessa Bahati. A school for the blind The children that are of the right age currently attend the local Gihogwe Primary School, where they receive additional lessons from a special-needs teacher, Mr August Habyarimane. The Jordan Foundation takes care of school fees and materials. During the holidays, most children return to their villages and the Jordan Foundation fights malnutrition by supporting their families with small livestock or training to set up kitchen gardens with seeds. The World Health Organization (WHO) estimates that of the 19 million children that are visually impaired globally, less than 10% of them have access to education, and they are more likely to suffer from malnutrition, abuse, sickness and infant mortality. Vanessa Bahati believes all visually impaired children should have the support, healthcare and education to become independent adults and active citizens. So, her ambition reaches further. At the moment, the Foundation rents the residential centre where the children live, but the building has its limitations and only 22 children can be accommodated. Furthermore, the school is not attached to the centre and transport to and from the school can be a daily issue. Some time ago the Foundation was able to purchase a plot of land in Rutunga, Gasabo district. Bahati’s dream is to build a special school there that can offer a better future to a hundred visually impaired children. The construction ground will be broken on October 19th this year and Bahati is busy raising the funds for its first classrooms, because this is how you realize a vision: step by step. This article was written for the Jordan Foundation magazine, Oct 2018. Photos by author. About the Jordan Foundation Jordan Foundation Rwanda is a non-profit organization serving children with visual impairments (blind and partially sighted). Find out more on Facebook: @jordanfoundationrwanda The East African (06 Jan 2018): A Mother’s blind love paid back in kindness New Times Rwanda (16 Nov 2017): How one woman chose to be the eyes of visually impaired children
<urn:uuid:44fc4fe1-3d2e-4e45-bf5d-d339f4e98342>
CC-MAIN-2019-51
https://ilselasschuijt.com/2018/10/03/the-jordan-foundation-a-vision-of-hope-for-blind-children/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.972525
1,178
2.53125
3
About the Gender Equality Program Achieving gender equality is essential to strengthening democratic governance, human rights, and sustainable development. This fact is reflected in numerous international agreements, including Agenda 2030, in which gender equality is both a standalone Sustainable Development Goal (SDG5) and a recognized pre-requisite for achieving all other objectives. The Americas and Caribbean region is viewed as a global leader in gender equality, with vibrant social movements, advances in women’s representation in national parliaments, and comprehensive legislative frameworks on issues like gender-based violence. However, systemic barriers and harmful social norms continue to disadvantage women and other marginalized groups in this region, as around the world. Parliamentarians -- both women and men -- play a critical role in furthering progress on gender equality. Through their legislative functions and platforms, parliamentarians can contribute significantly by reforming discriminatory laws, strengthening social protections, advocating for gender-sensitive budgeting and oversight mechanisms, and ensuring that gender equality work is well-resourced and informed by women’s needs and perspectives. Parliaments themselves must also be responsive to gender in their internal operations and cultures to create enabling environments for change. ParlAmericas supports parliamentary efforts to advance gender-sensitive legislative action. As a part of our gender equality program we create inclusive working spaces that foster peer-driven exchange of best practices, and provide specialized resources and support to strengthen these efforts. In close collaboration with civil society partners, our gender equality program also promotes women’s political leadership, including that of the next generation of empowered women leaders. Our work is informed by intersectional analysis, recognizing systems of discrimination and privilege that overlap with gender relations. The Inter-American Task Force on Women’s Empowerment and Leadership was announced at the 8th Summit of the Americas (Peru, April 2018). With the objective of contributing to regional progress towards SDG 5 (gender equality), the Task Force serves as a coordination mechanism that reinforces commitments and strategies to advance women’s empowerment and leadership. The Task Force is composed of key inter-American and international institutions working across sectors and at multiple levels.
<urn:uuid:f0046d20-125f-40fe-9551-ce031f7af235>
CC-MAIN-2019-51
https://parlamericas.org/en/gender-equality/about-ge.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.941913
433
2.75
3
Practical Handbook for the Actor Terms in this set (10) Who wrote the introduction to A Practical Handbook for the Actor? In the Job of the Actor section of A Practical Handbook for the Actor there is a quote by J.D. Salinger that states "You were a reader before you were a write." By the same token all actors started out as what? It is the job of the actor to clearly define and list those things that are the actor's responsibility and separate those things that are not. What are the 4 responsibilities of the actor? Voice, analyze script, ability to concentrate, and body Why is it that as an actor, you should never concern yourself with talent? Talent if it exists at all, is completely out of your control. Whatever talent might be, you either have it or you don't, so why waste energy worrying about it? The actor must live truthfully under imaginary circumstances. Acting requires common sense, bravery, and a lot of will. common sense/ bravery/ and a lot of will. What is technique? Technique is knowledge of the tools that maybe used for a certain craft and an understanding of how to apply those tools. What is action? Action is what you go onstage to do, the physical process of trying to obtain a specific goal, often referred to as the objective. What is moment? Moment is what is actually happening in the scene as you are playing it at any given instant. What are the 9 checklist items that an action must have? Be physically capable of being done Be fun to do Have its test in the other person Not be an errand Not presuppose any physical of emotional state Not be manipulative Have a cap Be in line with the intentions of the playwright OTHER SETS BY THIS CREATOR Parts of a Story (POS) The Sandwich Technique Quiz#2- The Sandwich Technique, Parts of a Story, Stage Directions Stage Directions- Proscenium Stage
<urn:uuid:8c44969e-c188-4f39-a89e-48bc3452cdc6>
CC-MAIN-2019-51
https://quizlet.com/455111008/practical-handbook-for-the-actor-flash-cards/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.926514
424
3.03125
3
Crimen falsi is Latin for “crime of dishonesty.” A conviction for fraud is unique because it is seen as a reflection of a person’s honesty. Fighting these charges often involves going through bank statements, business records, recorded surveillance, and phone records. Below is a list of common fraud charges: -There are several ways to commit welfare fraud when applying for aid or benefits from state or federal programs. Typical cases involve: failing to disclose material facts, failing to report a change in circumstances, altering or forging food stamps or Medicaid card, and receiving unauthorized payments. Fraudulent use or possession of personal identification information: -This is the willful and unauthorized use or possession with intent to use the personal identification information of another without their consent. Organized fraud/Scheme to defraud: -Involves obtaining property through an ongoing, systematic course of conduct with the intent to defraud one or more people. Forgery and Uttering: -Forgery is the falsifying of a document with the intent to defraud another person. Uttering is the passing of such a document knowing it to be forged and with the intent to defraud. Although the facts may arise from a single event, Forgery and Uttering are crimes independent of each other. -This is essentially passing a bad check. This act becomes criminal if the payor knows there are insufficient funds in the account and he knows there is no arrangement with the bank to pay the amount in question. Fraudulent use of a credit card: -Occurs when a person uses a credit card with the intent to defraud for the purpose of obtaining good or services. These cases generally involve credit cards that are stolen or forged.
<urn:uuid:e429f9b4-4aae-4b40-bed9-4ae545dacda8>
CC-MAIN-2019-51
https://trafficlawfirm.com/fraud/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.934527
356
2.90625
3
Meteorites have traditionally been defined as solid objects that have fallen to Earth from space. This definition, however, is no longer adequate. In recent decades, man-made objects have fallen to Earth from space, meteorites have been identified on the Moon and Mars, and small interplanetary objects have impacted orbiting spacecraft. Taking these facts and other potential complications into consideration, we offer new comprehensive definitions of the terms ``meteorite,''``meteoroid,'' and their smaller counterparts: A meteoroid is a 10-μm to 1-m-size natural solid object moving in interplanetary space. A micrometeoroid is a meteoroid 10μm to 2mm in size. A meteorite is a natural, solid object larger than 10μm in size, derived from a celestial body, that was transported by natural means from the body on which it formed to a region outside the dominant gravitational influence of that body and that later collided with a natural or artificial body larger than itself (even if it is the same body from which it was launched). Weathering and other secondary processes do not affect an object's status as a meteorite as long as something recognizable remains of its original minerals or structure. An object loses its status as a meteorite if it is incorporated into a larger rock that becomes a meteorite itself. A micrometeorite is a meteorite between 10μm and 2mm in size.Meteorite-``a solid substance or body falling from the high regions of the atmosphere'' (Craig 1849); ``[a] mass of stone and iron that ha[s] been directly observed to have fallen down to the Earth's surface'' (translated from Cohen 1894); ``[a] solid bod[y] which came to the earth from space'' (Farrington 1915); ``A mass of solid matter, too small to be considered an asteroid; either traveling through space as an unattached unit, or having landed on the earth and still retaining its identity'' (Nininger 1933); ``[a meteoroid] which has reached the surface of the Earth without being vaporized'' (1958 International Astronomical Union (IAU) definition, quoted by Millman 1961); ``a solid body which has arrived on the Earth from outer space'' (Mason 1962); ``[a] solid bod[y] which reach[es] the Earth (or the Moon, Mars, etc.) from interplanetary space and [is] large enough to survive passage through the Earth's (or Mars', etc.) atmosphere'' (Gomes and Keil 1980); ``[a meteoroid] that survive[s] passage through the atmosphere and fall[s] to earth'' (Burke 1986); ``a recovered fragment of a meteoroid that has survived transit through the earth's atmosphere'' (McSween 1987); ``[a] solid bod[y] of extraterrestrial material that penetrate[s] the atmosphere and reach[es] the Earth's surface'' (Krot et al. 2003).
<urn:uuid:70ab2928-dfc2-422c-a873-4a3e3938f16c>
CC-MAIN-2019-51
https://ui.adsabs.harvard.edu/abs/2010M&PS...45..114R
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.927142
620
4.3125
4
As summer draws to a close, we’re all getting into the swing of back to school! Shopping for new supplies and getting ready for upcoming soccer games are both important, but making sure your child gets to school with a nutritious lunch is crucial to their ability to focus and learn. However, if your child has braces, making sure lunch is both healthy and braces-friendly can be difficult. Fear not—small adjustments to a child’s school lunches can ensure nutritious, safe options. Eggs, seafood, and chicken are easy ways to provide your child with protein without damaging his or her teeth. Your child can get calcium from yogurts and puddings, and their daily intake of fruits with soft ones such as tangerines, oranges, or kiwis. Steamed vegetables are an excellent option as well. A healthy lunch might include a soft sandwich, paired with a soft, peeled fruit (think orange or banana), and a small treat, like pudding or applesauce. Hard foods, such as pizza crust, should not be in your child’s lunchboxes. If possible, harder foods can be safe if they are cut up into small pieces to prevent any damage to braces. Apples, pears, and other hard, crunchy fruits should be cut up as well. If your child bites into hard foods while wearing braces, the brackets can easily pull away from teeth and break, which can be incredibly painful. By putting careful thought into what your child eats, you can save the time and money it would take to repair damaged brackets. As a general rule of thumb, avoid any foods you consider hard or chewy. Hard candies or gooey caramels are a nightmare for braces, and breakages they might cause can extend the needed time for braces to stay on. So be sure to pack braces-friendly desserts for your kids like soft chocolates, brownies (without nuts) and soft cookies. Be thoughtful about those school lunches and it will all be worth it once a beautiful smile is in place!
<urn:uuid:7f49dfb3-5398-424a-9e7f-db19c011d203>
CC-MAIN-2019-51
https://www.lovethatsmile.net/blog/2016/08/healthy-braces-friendly-lunch-ideas
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.952473
425
2.734375
3
Tennis Psychology - The foundation of Winning Tennis It is based on general and sports psychology and then applied to tennis specifically. There are many common elements in the psychology of tennis which can be found in other sports too. An athlete that wants to perform at his peak needs to learn: Negative thinking affects players much more than they are aware of. It affects body abilities in two ways - being aware of them (feeling tension) and being unaware (the pendulum experiment); moreover it evokes negative feelings - emotions that cloud the player's judgment and affect his body abilities - again. By being more and more aware of what he is thinking a player can then change his thoughts to a more positive and solution based thinking. The awareness of our thoughts is quite a challenge in the tennis psychology approach. A player's arousal can be too high or too low and in both cases he is not able to play his best tennis. Arousal affects his body and mind abilities - a player may have too much muscle tension and his decisions are usually not tactically intelligent. Learning to find the "ideal state" is the key in controlling one's arousal and one of the most important aspects of tennis psychology. A player may get upset (and it happens often) about an event that he cannot control or even influence. For example - the noise of the planes flying over the court, windy conditions, court conditions, his opponent's luck and so on. By being focused on these events he wastes his energy which could be used on elements that he can control - his attitude and effort, how he intends to play, … Many players start the match with good concentration but they drop their level of concentration because of disturbing outside events, pressure situations, emotional reactions to various events and so on. A player needs to learn how to quickly and effectively refocus to be able to play his best tennis. Imagery or visualization is extremely useful in almost all aspects of the tennis game. A player can improve technique, strategy, physical abilities and his mental preparation of certain events. Another use of imagery is when a player misses a shot and then quickly sees in his mind how he hit the ball correctly. Using imagery is an incredibly efficient technique, not only in tennis sports psychology but in everyday life too. Confidence is one of those elements where tennis psychology can help really quickly and with very simple tools. A player who is not confident will hesitate in his decisions, will be afraid to take risks and his shots will usually miss by just a little. Doubt can be seen in reality as small misses that happen regularly. When a player builds his confidence he is able to play at his best and doesn't lose his hope when a big challenge appears. Limiting beliefs are one of the most limiting and troublesome aspects of human's psyche. They are mostly deep in the subconsciousness and are sometimes hard to find. A limiting belief for example is when a player believes that he is not good in tie-breaks and he will then self-sabotage himself in those crucial moments to prove himself right. Having no limiting beliefs means that the player is in total acceptance of everything that happens. Outside events are just events with no meaning. Tennis psychology helps the player to accept and deal with them. There are three main principles of the Inner Game - quieting the mind, non-judgment and trusting the body. The player must first learn to apply them in training. And when he experiences these effects in training he knows what to look for in the match. He then plays the inner game - how to perform at his peak. These are the fundaments of tennis psychology and by understanding these principles and applying them daily a player develops mental toughness. He knows how to apply the tools and as a very positive side effect gains a lot of self confidence. He now knows that he has ways of dealing with his own mind and that most of his competitors do not. He is aware that he has the edge in the most stressful situations in the match and that gives him self confidence. By constant application of these tools a player becomes more and more proficient with them and finds his ideal mental state very quickly if he happens to lose it. These losses of ideal state happen less and less often.
<urn:uuid:37ca5b9b-bea3-477f-bb9f-aef7f1088c63>
CC-MAIN-2019-51
https://www.tennismindgame.com/tennis-psychology.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540569332.20/warc/CC-MAIN-20191213230200-20191214014200-00452.warc.gz
en
0.98013
871
2.796875
3
Figure 8-11.--Drilling in the horizontal boring mill. provides the rotary motion for the tools mounted in the boring bar. Align the work with the axis of the boring bar and bolt and/or clamp it to the table. In the To set the horizontal boring machine for a line cutting operation, the spindle usually moves while the boring operation, insert a boring bar into the spindle work is held stationary. However, there may be times and pass it through the work. The boring bar is when you need to hold the bar in a fixed position and supported on the foot end by the backrest assembly. move the table lengthwise to complete the operation. Depending on the size of the bore, you can use either standard or locally manufactured tooling. The head Figure 8-12.--Boring bar driven by the spindle and supported in the backrest block.
<urn:uuid:a8742380-25bd-4f2c-8895-47b8449154d8>
CC-MAIN-2019-51
http://enginemechanics.tpub.com/14345/Figure-8-11-Drilling-In-The-Horizontal-Boring-Mill-245.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.86911
195
2.546875
3
Avocado is known for being a great source of good fats. Originally from Mexico, contains about 322 calories and 29 grams of fat. Avocados can undoubtedly be considered as fat fruit, but not in a harmful way. Studies have shown that avocado can definitely be included in your daily diet as it can encourage weight loss and health of the whole body. It regulates cholesterol levels Scientists claim that increasing the intake of avocado can regulate cholesterol levels in the body. One study found that daily consumption of avocado in a period of five weeks can reduce cholesterol levels to 13.5mg / dl. It is enough to significantly reduce the risk of heart disease. It helps to reduce waist circumference Avocados are an excellent source of monounsaturated fatty acids and oleic. They can help reduce abdominal fat, which can help reduce the risk of developing metabolic syndrome, a number of health conditions associated with weight gain. A diet rich in monounsaturated acids may prevent the distribution of fat around the abdomen. In contrast to the extra virgin olive oil, avocado oil has a high degree of combustion. This means that you can use in the preparation of food at high temperature. Improve the quality of your diet Avocados are an excellent source of vitamins and a number of other important nutrients that can reduce the volume of your waist. In one study it was shown that avocado enhances the absorption of carotenoids, antioxidant compounds that may help prevent cancer cells. Specifically, avocados can improve the absorption of carotenoids as much as 3 to 5 times better. To include avocado in the daily diet, you can start to use avocado oil. Experts suggest that you use it as a condiment for salads. It reduces the level of free radicals Free radicals attack your mitochondria, and that is sabotaging your metabolism. Free radicals cause a series of chain reactions in the body that destroy cells and DNA, and cause many other health problems. The antioxidants from fresh fruits and vegetables can help to neutralize free radicals, but can not reach the mitochondria and there is a problem. When your mitochondria are not working properly, it affects the metabolism. Studies have shown that monounsaturated acid from avocados can help mitochondria to defend themselves from attack by free radicals. One tablespoon of avocado can help reduce cravings for snacks, and studies have shown that people who eat a moderate daily craving avocados feel as much as 40% less craving for snacks, which usually occurs in the afternoon. It reduces the craving for sweets Avocado for body provides nearly 20 vitamins, minerals and phytonutrients that are important for weight control. Avocado contains about 14 grams of fiber and an excellent source of vitamin K, which helps regulate the degradation of sugar and your insulin sensitivity. One study showed that people who bring a satisfactory amount of vitamin K, a 19% lower risk of developing diabetes over the next 10 years.
<urn:uuid:edd6c787-9b81-430a-9034-c9a02e6d2e3f>
CC-MAIN-2019-51
http://healthylnb.com/beauty/why-is-avocado-good-for-slimness/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.941977
599
2.734375
3
AI::FANN::Evolving::Experiment - an experiment in evolving artificial intelligence Constructor takes named arguments, sets default factory to AI::FANN::Evolving::Factory Getter/Setter for the workdir where AI::FANN artificial neural networks will be written during the experiment. The files will be named after the ANN's error, which needs to be minimized. Getter/setter for the AI::FANN::TrainData object. Runs the experiment! The optimal fitness is zero error in the ANN's classification. This method returns that value: 0. Returns a function to compute the error. Given an argument, the following can happen: 'sign' => error is the average number of times observed and expected have different signs 'mse' => error is the mean squared difference between observed and expected CODE => error function is the provided code reference
<urn:uuid:46a13186-d6fd-4662-9c74-37e5169320c8>
CC-MAIN-2019-51
http://web-stage.metacpan.org/pod/AI::FANN::Evolving::Experiment
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.825013
184
2.5625
3
Bilirubin is the water-soluble pigment excreted in the bile. It is a yellow to orange bile pigment produced by the breakdown of Heme and reduction of biliverdin, it normally circulates in plasma and is taken up by liver cells and conjugated to form bilirubin diglucuronide. Failure of the liver cells to excrete bile, or obstruction of the bile ducts, can cause an increased amount of bilirubin in the body fluids and lead to obstructive jaundice. Related Jornals of Bilirubin Journal of Hepatitis, Air & Water Borne Diseases, Immunological Techniques in Infectious Diseases, Infectious Diseases & Therapy, Foodborne pathogens and disease, Infectious Diseases and Diagnosis, Emerging infectious diseases, Viruses, American journal of infection control, Disease markers, Infection, Infectious disease clinics of north America
<urn:uuid:716a1a1f-fafb-4098-95e2-98913160f7f7>
CC-MAIN-2019-51
http://www.imedpub.com/scholarly/bilirubin-journals-articles-ppts-list.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.870746
192
3.484375
3
| Abstract|| | Background: Children of people with alcohol dependence (COAs) are at high risk for behavioral and cognitive problems. Aim: Aim of this study was to compare the nature and extent of these problems in children of men with and without alcohol dependence. Materials and Methods: 32 children (17 in study group and 15 controls) were evaluated for psychopathology, neurodevelopment, cognitive functioning and family environment. Tools used were: Socio-demographic data sheet, Malin's Intelligence Scale for Indian Children (MISIC), Child Behavior Checklist, Trail Making Test, Neurodevelopment Scale and the Family Environment Scale. Results: Children of men with alcohol dependence had higher externalizing than internalizing scores. Children of alcohol-dependent fathers had higher scores on the neurodevelopment scale and lower scores on the performance scale of the MISIC than the children in control group. These children also made more errors on the Trail Making Test. The family environment of COAs was characterized by lack of independence for its members, greater perceived control and lack of adequate cultural and intellectual activities. Conclusion: Our findings suggest that children of men with alcohol dependence have difficulties with frontal lobe functions and neurodevelopmental tasks. There are also difficulties in the family, which are related to alcohol consumption by the father. Keywords: Alcohol dependent fathers, children, family environment, neurodevelopment, psychopathology |How to cite this article:| Raman V, Prasad S, Appaya M P. Children of men with alcohol dependence: Psychopathology, neurodevelopment and family environment. Indian J Psychiatry 2010;52:360-6 | Introduction|| | Parental mental illness and its impact on the development and behavior of children has been an active field of research over the last two decades. Children of parents with alcohol dependence syndrome are particularly at high risk for substance use as well as other emotional and behavioral problems such as learning disability, hyperactivity, psychomotor delays, somatic symptoms and emotional problems. There have been attempts to study various aspects of children of people with alcohol dependence from India and some published literature is available that looks at various domains in the same sample. ,,, Cantwell's review of prior research indicated that families of hyperactive children have increased prevalence of alcohol-dependent and sociopathic fathers. Six of the seven studies of parents who were alcohol dependent found some association with child hyperactivity. Other childhood conduct problems have also been found such as lying, stealing and truancy. ,, Adolescents who abused alcohol reflected a 46% of parent alcoholism, that is, in 46% of adolescents who abused alcohol, there was family history of alcoholism in the parent/s. , There was an increased prevalence of physical aggression and low anxiety and this best distinguished sons of male alcohol dependents from normals. Another study concluded that central nervous system hyperexcitability may be etiologically linked to the excess of externalizing behaviors observed in this population, which is thought to be a predisposition to a higher risk of developing early onset alcoholism. Lieberman, in a review, states that children of alcoholics are two to ten times more likely to develop alcoholism than children of non alcoholics. Children with relatives who abuse or are dependent on alcohol apparently have a slightly higher risk for drug abuse or dependence than those without relatives who consume alcohol. Evidence from twin and adoption studies has highlighted the significance of genetic influences, and the heritability of alcoholism has been estimated at 40-60% Risk factors that mediate the increased vulnerability and protective factors which moderate the risk included in this review are parental antisocial personality disorder, externalizing behavior, internalizing symptoms, differential response to the effects of alcohol and positive and negative alcohol related expectancies. Neuropsychological functions in these children have been the focus of attention over the last decade. Pihl and Brice reviewed studies of cognitive functioning in children of alcoholics. They found that these children have lower verbal intelligence, overall poor verbal skills, poor verbal and nonverbal memory and poor abstraction and planning. Corral found that children with multi-generational alcoholism, but not children with a father who was alcohol dependent, showed reduced performance in specific cognitive areas such as attention, visuospatial abilities and frontal lobe functions. Studies have also reported reduced visual event related potential (ERP) amplitudes in young males at high risk for alcoholism. In one study, however, authors found that ERP deviations are not attributable to stages of visual processing deficits but represent difficulty involving more complex utilization of information. In a comparison of amplitudes and topography of the P300 generated in response to a visual task, between subjects at high risk (offspring of treatment seeking patients with alcohol dependence) and those at low risk for alcoholism (alcohol naοve individuals with absence of family history of alcohol dependence in any of the first- or second-degree relatives) and its relation to externalizing behaviors, Silva and others found that high risk subjects have lower P300 amplitudes over frontal brain areas. They found that differences are greater in young, tending to converge with increasing age. They also described a strong association between this reduced brain activation and an excess of externalizing behaviors in high risk individuals. The authors concluded that a maturational lag in brain development, causing central nervous system disinhibition and externalizing behaviors may underlie the susceptibility to alcoholism. The highest risk for developing alcoholism exists for individuals who start using alcohol as adolescents, have a high family loading for alcohol problems and display a cluster of behavior traits described as disinhibited, undercontrolled or impulsive, which are usually evident in childhood and persist into adulthood. , On the Child Behavior Checklist (CBCL), Christiansen found that in 103 Danish children of alcohol-dependent fathers, there was a significantly greater incidence of symptoms on 17 of the 118 CBCL items. These authors found that daughters of alcohol-dependent fathers were more impaired than sons of alcohol-dependent fathers on most CBCL measures. In a series of investigations, a positive association has been reported between parental alcoholism and impaired emotional functioning of offspring. Rodriguez Holguin found, in his study, that when compared to controls, children of alcoholics had smaller middle latency auditory evoked potential which the authors opine points to an anomalous pattern of information transmission from the thalamus to cortex. Rao found that alcoholism was present in parents of malnourished (49.4%) and injured children (45%). In another study, Stanley and Vanitha investigated the manifestation of self-esteem and adjustment in a group of 50 adolescent children of alcoholic parents and a matched reference group of adolescent children of non-alcoholic parents. The data revealed lower self-esteem and poor adjustment in all the domains studied in the adolescent children of alcoholic parents than the controls. These deficits, the authors opined, can be attributed to the increased stress and vitiated alcohol complicated domestic environment of the children of alcoholic parents. This study made a strong case for psychosocial intervention for these children. The review of available literature indicates that children of parents with alcohol dependence are at risk for a wide range of neuropsychological dysfunction and psychopathology. This study was an attempt to examine the broad areas of dysfunction in children of fathers with alcohol dependence in the Indian context so that early identification and intervention can be planned. | Materials and Methods|| | This study attempted to look at psychopathology, cognitive functioning and family environment in a group of children of men with alcohol dependence and compared them with a control group of children of men without alcohol dependence. The study was approved by the Hospital Ethics Review Board. Informed consent was taken in writing from all the parents of the children who participated in this study. The study was conducted in the Department of Psychiatry attached to a tertiary care general hospital. The sample was obtained through referral by one of the co-authors. The patients - both in-patient and out-patient - diagnosed as Alcohol Dependence Syndrome according to ICD 10 criteria (WHO, 1992) and who had children aged between 5 and 9 years (as the Neurodevelopmental Examination is standardized for this population) - both male and female - were included in the study. A control group from the pediatrics out-patient department and the school setting was taken with no parental psychiatric illness and mother scoring less than 4 on the General Health Questionnaire (GHQ). The inclusion criteria for children were: father diagnosed as Alcohol Dependence Syndrome; having no other known psychiatric illness; aged between 5 and 9 years; with mother having GHQ scores less than 4 and living with the index parent for at least the preceding year. The exclusion criteria were: parent having any known organic brain syndromes, mental retardation or any other psychiatric illness, children having any known visual/auditory handicap, children with known chronic medical illness like diabetes, asthma or chronic renal disease. All the assessments were done by the first and second authors who were blind to the clinical status of the father. Subjects for the study were referred by the third author from the out-patient and in-patient services. First, for both the groups, the mother was screened using the GHQ (Goldberg) for psychopathology. Children whose mothers scored above the cut-off on the GHQ were excluded from the study. The fathers in the study group were then administered the Severity of Alcohol Dependence Questionnaire (SADQ) by the second author. The assessments involving the parents, the CBCL and the Family Environment Scale (FES), were administered by the second author and the assessments involving the child, Malin's Intelligence Scale for Indian Children (MISIC), Neurodevelopmental Examination, and Trail Making Test (TMT), were administered by the first author. The GHQ is a symptom and well-being scale that serves as a screening for psychopathology. It is a self-rating scale with the severity of symptoms compared to the habitual state of the person in question on a 4-point rating scale. It has sensitivity and specificity of 80-90% in relation to interview-based diagnosis. The 28-item version was used in this study. The SADQ is a short, easy to complete, self-administered 20-item questionnaire designed to measure severity of dependence on alcohol. There are five subscales with four items in each: Physical withdrawal, Affective withdrawal, Withdrawal Relief Drinking, Alcohol Consumption and Rapidity of Reinstatement. Each item is scored on a 4-point scale, ranging from "Almost Never" to "Nearly Always", resulting in a corresponding score of 0-3. Thus, the total maximum score possible is 60 and the minimum is 0. Test-retest reliability of this instrument is 0.85 and factor analysis yields single main factor accounting for 53% of variance. The mother was interviewed by the co-author using a socio-demographic data sheet (developed for the study), the CBCL (Achenbach and Edelbrock) and the FES (Moos). The CBCL is a descriptive instrument designed to classify behavioral and emotional disorders of children aged 4 through 16 years comprehensively. Each of the 113 items is scored on a 3-step response scale: 0, not true; 1, sometimes true; and 2, often true. The test can be self-administered or administered by an interviewer. The two broad band groupings of behavioral problems assessed correspond to the internalizing and externalizing behavior. Adequate reliability and validity has been established by the authors. The FES assesses the social environments of families along 10 salient dimensions. It focuses on measurement and description of the interpersonal relationships among family members, on the directions of personal growth emphasized within the family, and on the basic organizational structure of the family. The FES significantly discriminates among families, is sensitive to parent-child differences in the way in which families are perceived, is related to family size and drinking patterns and discriminates between psychiatrically disturbed and matched "normal" families. This scale has a reliability of 0.67 and the validity of this tool has been established. The author then assessed the children on the MISIC (Indian adaptation of the Wechsler's Intelligence Scale for Children, Malin). This scale is used widely in testing the intelligence in children of age between 5 and 16 years. It provides a Full Scale IQ, a Verbal IQ and a Performance IQ. The reliability and validity of this instrument is well established. The TMT (Luria) was then administered. This is a test of controlled attention and is widely used as a screening device, a test of laterality: a test of perceptuo motor functions and is a sensitive measure of frontal dysfunction. The test consists of a set of numbers (1-16) and alphabets (A-P) randomly spread on a sheet of paper. The child is asked to alternate between alphabetical and numerical sequence (1-A, 2-B, etc.). The total time taken and the number of errors made are recorded. The TMT has been found to have a high reliability (0.81) and adequate validity. The final test done with the children was the Neurodevelopmental Examination (Lindahl et al.). This test is used in children of age between 5 and 9 years. This examination consists of 21 tasks. This ranges from an evaluation of the child's auditory and visual acuity to threading wooden beads within a time limit. It is a sensitive indicator of neurological compromise and is known to pick up subtle deficits. Each item was scored 0, 1 or 2: 0 score if normal, 1 if uncertain or mildly abnormal and 2 if abnormal. The maximum score is 40 and a score of 8 and above is considered significant and indicates dysfunction. The test-retest reliability coefficient of this instrument is established at 0.78. All the data obtained were analyzed after loading on to SPSS and using the student's "t" test. A comparison of all the parameters - psychopathology, cognitive functions and family environment - was made between the study group and the control group. | Results|| | Forty-three children were screened for the study. During the screening procedure, a number of children (n=11) had to be excluded. The reasons were: child having had no formal education (n=4), child unable to come for completing the assessment (n=2) and mothers scoring high on the GHQ (n=5). Out of 32 children included in the study, 17 (8 boys and 9 girls) were in the study group and 15 (6 boys and 9 girls) were in the control group. The sample was restricted by the time frame available for the study. As can be seen in [Table 1], there were no significant differences between the two groups with respect to age of the child. [Table 2] also reveals no differences between the two groups with respect to sex of the child. The scores on the CBCL were analyzed on the basis of the two scales - Internalizing Scale and Externalizing Scale. [Table 3] shows the scores obtained by the two groups on the two scales of the CBCL. As can be seen from the table, the children of alcohol-dependent parents obtained statistically significant high scores on the externalizing scale and a marginal, though not statistically significant, high score on the Internalizing Scale. [Table 4] contains the scores obtained on the Neurodevelopmental Examination. There is a statistically significant difference between the two groups on the Neurodevelopmental Examination, with children of alcohol-dependent parents scoring higher, indicating more difficulty with neurodevelopmental tasks. Neuropsychological functioning in terms of general intelligence and perceptuo motor skills was assessed using the MISIC and the TMT. The results of these two tests are presented in [Table 4]. |Table 4 :Scores obtained by the two groups on the neuropsychological tests – Neurodevelopmental| Examination, Malin's Intelligence Scale for Indian Children and Trail Making Test Click here to view As can be seen from the table, there is a statistically significant difference between the two groups on the Verbal, Performance as well as Full scale IQ scores on the MISIC. In the TMT, there was a statistically significant difference between the two groups in the terms of the errors made - children of alcohol-dependent parents made more errors although they took a similar amount of time to do the task. The results are presented in [Table 4]. [Table 5] presents the data obtained from the FES. Families of alcohol-dependent parents had lower degrees of independence for its members, fewer cultural/intellectual activities and greater degree of perceived control. |Table 5 :Scores obtained by the two groups on the various subscales of the Family Environment Scale| Click here to view | Discussion|| | The results can be discussed by answering three broad questions: - Behaviorally, are children of alcohol-dependent fathers different from children of non-alcohol-dependent fathers? - Do children of alcohol-dependent fathers have difficulties with cognitive tasks? - Are family environments in families with an alcohol-dependent father different from normal families? There were no age or sex differences between the two groups. 1. In this study, we used the CBCL as a tool for assessment of behavioral problems. We found that there were no significant differences between the two groups on the Internalizing subscale. On the Externalizing subscale, there was a statistically significant difference between the two groups. Other authors have also found, with larger samples, that children of alcohol-dependent parents, especially daughters of alcohol-dependent parents, scored higher than controls on the CBCL - both on the Internalizing and Externalizing Scales. ,, In Indian literature too, studies have shown that there is higher externalizing behavior in children who are at high risk for alcohol dependence compared to those at low risk. Behavioral and emotional difficulties are commonly seen in children of alcohol-dependent parents and substantive findings exist in literature. Even with a small sample, our data Corroborates this. It was found that children had particular difficulties with handling frustration, were irritable and overall described by parents as children needing extra supervision. This is an issue that can be due to both intrinsic as well as extrinsic reasons. Genetic studies have shown that children of alcohol-dependent fathers tend to be temperamentally more difficult from infancy and disciplining patterns also tend to be inconsistent in such families. This causative link needs further exploration. 2. To assess cognitive functioning, we used several unrelated and probably overlapping measures. The 'Neurodevelopmental Scale' has been used previously to assess gross cognitive dysfunction in children at risk (having various neonatal problems particularly low birth weight and preterm babies). In this study, we used this measure as a gross indicator of cognitive functioning. This scale has shown significant differences between the children of alcohol-dependent parents and normals, with the children of alcohol-dependent parents scoring higher (higher scores indicate greater difficulty with neurodevelopmental tasks). This is an interesting finding as most studies in this area have looked at specific skills. ,,, Although this is a gross indicator, the fact that a significant difference was found even on this scale reflects the nature and extent of the deficits. The TMT, a test of controlled attention, is a sensitive measure of frontal dysfunction. In this test, two aspects were considered - the time taken and the errors made. As can be seen from the data, there were significant differences between the two groups, that is, children of alcohol-dependent parents took as much time to do the task as the control group but tended to make more errors and this difference is statistically significant. This decision of choosing speed over accuracy is a function of the frontal lobe and frontal dysfunction is well known in children of alcohol-dependent parents. ,,, Our study proves this as well. In addition, as seen on the CBCL, impulsivity was also found to be a significant factor differentiating children of alcohol-dependent parents from normal children. This impulsivity may also be reflected in the choice of doing a task quickly rather than accurately. On the MISIC, there is a statistically significant difference on the Verbal, Performance and Full Scale IQ with children of alcohol-dependent parents obtaining lower scores than normal controls, indicating a global dysfunction. Assessment of cognitive dysfunction using the Wechsler scales has shown significant differences in previous studies as well. The reason for this has been discussed in some studies - some explanations are related to the general level of stimulation at home, some to the educational level of parents, some to more basic neuropsychological dysfunction. This study, however, is based on a small sample and cannot make causative links but this is an area that needs further research. 3. There have been a number of studies focusing on various aspects of family environment. ,, We found, in our study, that statistically significant differences were present on several aspects of family functioning. In the families where the father was alcohol dependent, there appeared to be decreased independence for its members, fewer opportunities for cultural and intellectual activities and there was a greater degree of perceived control when compared to normal families. The lack of independence and the greater degree of perceived control are obviously linked. Family members may feel dictated to. This has also been a finding by other authors , who reported that fathers would be aggressive, impose their will on others and did not tolerate non compliance especially in the family context. The other dimension where there is a significant difference between the families of alcohol-dependent parents and normal controls is the dimension of cultural and intellectual activities. This has not been discussed in many studies. It appears, in our study, that family members felt that fathers who were alcohol dependent were not available for family rituals and social interactions. Drinking related behaviors may take precedence over other activities. This is definitely an area where children and their mothers have reported, in our study, to be of some concern to them. Therefore, this seems to be an area that will need clinical attention to ensure that families' coping styles are adaptive. This is discussed in some detail in another study from India. Therefore, this adds to an extensive body of literature showing that there is increased psychopathology in the form of increased externalizing behavior, difficulties in neurodevelopment and frontal lobe functions and some differences in the family environment in children and families of alcohol-dependent fathers when compared to normal controls. | Conclusions|| | There is enough evidence in literature to indicate that children in families where there is an alcohol-dependent father are at increased risk for behavioral and emotional problems, cognitive deficits and dysfunctional family environment. Our study endorses these findings in the Indian context. In addition, this is a group at risk and preventive strategies in the form of early assessment and intervention for possible problem areas would definitely be helpful. | References|| | |1.||Rao KN, Begum S, Venkataramana V, Gangadharappa N. Nutritional neglect and physical abuse in children of alcohol dependent parents. Indian J Pediatr 2001;68:843-5. | |2.||Silva MC, Benegal V, Devi M, Mukundan CR. Cognitive deficits in children of alcoholics: At risk before the first sip! Indian J Psychiatry 2007;49:182-8. | |3.||Muralidharan K, Venkatasubramanian G, Pal PK, Benegal V. Abnormalities in cortical and transcallosal inhibitory mechanisms in subjects at high risk for alcohol dependence: A TMS study. Addict Biol 2008;13:373-9. | |4.||Stanley S, Vanitha C. Psychosocial correlates in adolescent children of alcoholics- Implications for intervention. Int J Psychosoc Rehabil 2008;12:67-80. | |5.||Cantwell D. Familial - genetic research with hyperactive children. In: Cantwell D, editor. The hyperactive child: Diagnosis management and current research. New York: Spectrum; 1975. p. 93-105. | |6.||Steinhausen HC. Children of alcoholic parents. A review. Eur Child Adolesc Psychiatry 1995;4:143-53. | |7.||West MO, Prinz RJ. Parental alcoholism and childhood psychopathology. Psychol Bull 1987;102:204-18. | |8.||Sher K, Walitzer KS, Wood PK, Brent EE. Characteristics of children of alcohol dependent parents: Putative risk factors, substance use and abuse and psychopathology. J Abnorm Psychol 1991;100:427-48. | |9.||Rydelius PA. Are children of alcohol dependent parents a clinical concern for child and adolescent psychiatrists of today? J Child Psychol Psychiatry 1997;38:615-24. | |10.||Schukit MA, Smith TL, Radziminski S, Heyneman EK. Behavioural symptoms and psychiatric diagnoses among 162 children in non alcoholic or alcoholic families. Am J Psychiatry 2000;157:1881-3. | |11.||Lieberman DZ. Children of alcohol dependent parents: An update. Curr Opin Pediatr 2000;12:336-40. | |12.||Enoch MA, Goldman D. Genetics of alcoholism and substance abuse. Psychiatr Clin North Am 1999;22:289-99. | |13.||Pihl RO, Brice KR. Cognitive impairment in children of alcohol dependent parents. Alc Health Res World 1995;19:142-7. | |14.||Corral MM, Holguin SR, Cadaveira F. Neuropsychological characteristics of children of alcohol dependent parents: Familial density. J Stud Alcohol 1999;60:509-13. | |15.||Steinhauer SR, Locke J, Hill SY. Vigilance and iconic memory in children at high risk for alcoholism. J Stud Alcohol 1997;58:428-34. | |16.||Haber JR, Jacob T, Heath AC. Paternal alcoholism and offspring conduct disorder: Evidence for the 'common genes' hypothesis. Twin Res Hum Genet 2005;100:652-661. | |17.||Begleiter H, Projesz B. What is inherited in the predisposition toward alcoholism? A proposed model. Alcohol Clin Exp Res 1999;23:1125-35. | |18.||Christensen HB, Bilenberg N. Behavioral and emotional problems in children of alcoholic mothers and fathers. Eur Child Adolesc Psychiatry 2000;9:219-26. | |19.||Anderson E, Quast W. Young children in alcoholic families: A mental health needs assessment and a prevention strategy. J Prim Prev 1983;3:174-87. | |20.||Rodriguez Holguin S, Corral M, Cadaveira F. Middle latency auditory evoked potentials in children at high risk for alcoholism. Neurophysiol Clin 2001;31:40-7. | |21.||World Health Organization. Classification of Mental and Behavioural Disorders (ICD -10). Clinical descriptions and diagnostic guidelines. Geneva: WHO; 1992. | |22.||Goldberg D. The determination of psychological illness by questionnaire. London: Oxford University; 1972. | |23.||Stockwell T, Murphy D, Hodgson RJ. The severity of alcohol dependence questionnaire: Its use, reliability and validity. Br J Addict 1983; 78:145-55. | |24.||Achenbach TM, Edelbrock ES. Manual for the Child Behaviour Checklist and Revised Child Behaviour Profile. USA: Queen City Printers Inc; 1993. | |25.||Moos R. Family Environment Scale and Preliminary Manual. 577 College Avenue, Palo Alto, California: Consulting Psychologists Press; 1976. | |26.||Malin AJ. Malin's intelligence scale for Indian children (MISIC). Indian J Ment Retard 1976;4:15-25. | |27.||Luria AR. Higher cortical functions in man. New York: Basic Books; 1980. | |28.||Lindahl E, Michelsson K, Helenius M, Parre M. Neonatal risk factors and later neurodevelopmental disturbances. Dev Med Child Neurol 1988;30:571-89. | Department of Psychiatry, St. John's Medical College Hospital, Bangalore - 560 034 Source of Support: Project funded by the St. Johnís Research Society, Conflict of Interest: None [Table 1], [Table 2], [Table 3], [Table 4], [Table 5]
<urn:uuid:3db1e790-0a08-4234-8a32-8a6ab692243b>
CC-MAIN-2019-51
http://www.indianjpsychiatry.org/article.asp?issn=0019-5545;year=2010;volume=52;issue=4;spage=360;epage=366;aulast=Raman
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.941303
5,938
2.765625
3
Sentence 003 Let the cat out of the bag Leslie: Which of the three Sentences is incorrect? Flora: ’It rained a lot this season.’ F: Because there is a Time Marker in the Sentence: ’this season’ and it is Non-Past. The Sentence is ’It rained a lot this season.’ and it is Past Simple Tense. The Time and Tense don’t agree. L: You are right. The Time is Non-Past and it is manifest, i. e. it is clear to see or understand through the Time Marker. The Time makes the Tense and Non-Past Time can only make Non-Past Tense. Is this Sentence the worst? F: No. There is an even worse Sentence here and it is ’It raining a lot this season.’ L: Why is it worse than the previous Sentence? F: Because it is not a Sentence. L: Why do you think so? F: Because it has no Verb. ’Raining’ is not a Verb. If there is no Verb, there is no Sentence. L: Then, we have found the correct Sentence. Can you help me? F: Yes, and it is ’It has rained a lot this season.’
<urn:uuid:14d3ce44-32cd-4993-a711-eaf3503220e7>
CC-MAIN-2019-51
http://www.lesliesimonfalvi1948.com/441398805/6706646/posting/sentence-003-let-the-cat-out-of-the-bag
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.923226
296
2.75
3
The Malankara Church is a church of the Saint Thomas Christians of Kerala, India, with particular emphasis on the part of the community that joined Archdeacon Mar Thoma in swearing to resist the authority of the Portuguese Padroado in 1653. This faction soon entered into a relationship with the Syriac Orthodox Church of Antioch, and was thereafter often known as the Malankara Syrian Church. As part of the Saint Thomas Christian community, the church traced its origins to the evangelical activity of Thomas the Apostle in the 1st century. As an independent faction, it originated in the first major split within the Saint Thomas Christian community. Historically, the Thomas Christians had been united in leadership and liturgy, and were part of the Church of the East, based in Persia. However, the collapse of the Church of the East's hierarchy in Asia left the province of India effectively isolated, and through the 16th century, the Portuguese, recently established in Goa, forcefully drew the Thomas Christians into Latin Rite Catholicism. Resentment of these measures led the majority of the community to join the archdeacon, Thoma, in swearing never to submit to the Portuguese in the Coonan Cross Oath. Several months later Thoma was ordained as the first indigenous Metropolitan of Malankara. Following the Oath, in 1661 Pope Alexander VII established a new East Syrian Rite hierarchy in communion with Rome for the Saint Thomas Christians; by the next year 84 of the 116 communities had joined, forming what is now the Syro-Malabar Catholic Church. The remaining 32 communities stayed independent, and formed a relationship with the Syriac Orthodox Church. Over the next centuries this relationship strengthened, and the Malankara Church adopted a variant of the West Syrian Rite known as the Malankara Rite (as opposed to the previous East Syrian usage) and entered into full communion with the Syriac Orthodox Patriarch of Antioch. However, through this time the church experienced a series of splits, resulting in large numbers of followers breaking away. In 1772 a Syriac Orthodox bishop consecrated Kattumangatt Kurien (Mar Cyril) as his successor against the wishes of the Metropolitan, Mar Dionysius I; Cyril led a faction that eventually became the Malabar Independent Syrian Church. In the 19th century, a reform movement inspired by British missionaries led to the formation of the independent Mar Thoma Syrian Church, while the rest of the church, resistant to British influence, came under the direct jurisdiction of the Syriac Orthodox Patriarch in 1876. In 1912, a dispute over authority between supporters of the Metropolitan and supporters of the Patriarch finally divided the Malankara Church, with the former group becoming the essentially independent Malankara Orthodox Syrian Church under the Catholicos of the East and the latter maintaining ties with the Patriarch as the Jacobite Syrian Christian Church. Motions by the church leaders and two Supreme Court decisions in the 20th century failed to heal the rift. In 1930, a reunion group split away and entered into communion with the Catholic Church as the Syro-Malankara Catholic Church, an Eastern Catholic Church with its own liturgy. | The word Malankara derives from the name of the island of Maliankara near Muziris, which according to tradition was the first place Thomas the Apostle landed in India. Initially the terms "Malankara Christians" or "Malankara Nasranis" were applied to all Saint Thomas Christians, but following the split the term was generally restricted to the faction loyal to Mar Thoma I, distinguishing them from the Catholic faction. Later, many of the churches that subsequently branched off have maintained the word in their names. At the time of the split, the branch affiliated with Mar Thoma was called the Puttankuttukar, or "New Party", while the branch that entered into Catholic obedience was designated the Pazhayakuttukar, or "Old Party". This latter group evolved into the Syro-Malabar Catholic Church. These appellations have been somewhat controversial, as both groups considered themselves the true heirs to the Saint Thomas tradition, and saw the other as heretical. Following the association with the Syriac Orthodox Church, the church was often known as the Malankara Syrian Church (Malayalam: മലങ്കര സുറിയാനി സഭ) in reference to their connection to the West Syrian tradition. As such they were often known as "Jacobites", "Syrian Jacobites", or "Jacobite Syrians", a reference to the Syriac Orthodox Church's connection to Jacob Baradaeus. After the split between Metropolitan- and the Patriarch-supporting factions, the Jacobite designation has been chiefly associated with the latter group, who emphasize their connection with Antioch. As a Saint Thomas Christian group, the Malankara Church traced its origins to Thomas the Apostle, said to have proselytized in India in the 1st century. Different strains of the tradition have him arriving either by sea or by land. There is no direct contemporary evidence for Thomas coming to India, but such a trip would certainly have been possible for a Roman Jew to have made; communities such as the Cochin Jews and the Bene Israel are known to have existed in India around that time. The earliest text connecting Thomas to India is the Acts of Thomas, written in Edessa perhaps in the 2nd century. Some early Indian sources, such as the "Thomas Parvam" or "Song of Thomas", further expand on the tradition of the apostle's arrival and activities in India and beyond. Generally he is described as arriving in the neighbourhood of Maliankara and establishing Seven Churches, the Ezharapallikal: Cranganore (ml:കൊടുങ്ങല്ലൂര്), Paravur (Kottakavu)(ml:കോട്ടക്കാവ്), Palayoor (ml:പാലൂർ ), Gokkamangalam (ml:ഗോക്കമംഗലം), Niranam (ml:നിരണം ), Chayal (ml:ചായൽ ) and Kollam (Quilon) (ml:കൊല്ലം ). Eusebius of Caesarea mentions that his mentor Pantaenus found a Christian community in India in the 2nd century, while references to Thomas' Indian mission appear in the works of 3rd- and 4th-century writers of the Roman Empire, including Ambrose of Milan, Gregory of Nazianzus, Jerome, and Ephrem the Syrian, showing that the Thomas tradition was well established across the Christian world by that time. Whatever the historicity of the Thomas tradition, the earliest organised Christian presence in India dates around the 3rd century, when East Syrian settlers and missionaries from Persia, members of what became the Church of the East or Nestorian Church, established themselves in Kerala. The Thomas Christians trace the further growth of their community to the mission of Thomas of Cana, a Nestorian from the Middle East said to have relocated to Kerala some time between the 4th and 8th century. The subgroup of the Saint Thomas Christians known as the Southists trace their lineage to the high-born Thomas of Cana, while the group known as the Northists claim descent from Thomas the Apostle's indigenous converts who intermarried with Thomas of Cana's children by his concubine or second wife. As the community grew and immigration by East Syrians increased, the connection with the Church of the East, centred in the Persian capital of Seleucia-Ctesiphon, strengthened. From the early 4th century the Patriarch of the Church of the East provided India with clergy, holy texts, and ecclesiastical infrastructure, and around 650 Patriarch Ishoyahb III solidified the Church of the East's jurisdiction over the Saint Thomas Christian community. In the 8th century Patriarch Timothy I organised the community as the Ecclesiastical Province of India, one of the church's illustrious Provinces of the Exterior. After this point the Province of India was headed by a metropolitan bishop, provided from Persia, the "Metropolitan-Bishop of the Seat of Saint Thomas and the Whole Christian Church of India". His metropolitan see was probably in Cranganore, or (perhaps nominally) in Mylapore, where the shrine of Thomas was located. Under him were a varying number of bishops, as well as a native Archdeacon, who had authority over the clergy and who wielded a great amount of secular power. The Rulers of Kerala, in appreciation for their assistance, gave to the Malankara Nazranis, three deeds on copper plates. They gave the Nasranis various rights and privileges which were written on copper plates. These are known as Cheppeds, Royal Grants, Sasanam etc. Five sheets of them are now in the possession of Mar Thoma Syrian Church headquarters at Thiruvalla. - Iravi Corttan Deed: In 1225 AD Sri Vira Raghava Chakravarti gave a deed to Iravi Corttan ( Eravi Karthan) of Mahadevarpattanam in 774. Two Brahmin families are witness to this deed showing that Brahmins were in Kerala by the 8th century. - Tharissa palli Deed I: Perumal Sthanu Ravi Gupta (844-885) gave a deed in 849 AD, to Isodatta Virai for Tharissa Palli (church) at Curakkeni Kollam. According to historians, this is the first deed in Kerala that gives the exact date. - Tharissa palli Deed II: Continuation of the above, given after 849 AD. These plates detail privileges awarded to the community by the then rulers. These influenced the development of the social structure in Kerala and privileges, rules for the communities . These are considered as one of the most important legal documents in the history of Kerala. The position of archdeacon – the highest for clergy who are not a bishop – had great importance in the church of India in the centuries leading up to the formation of an independent Malankara Church. Though technically subordinate to the metropolitan, the archdeacon wielded great ecclesiastical and secular power, to the extent that he was considered the secular leader of the community and served as effective head of the Indian Church in times when the province was absent a bishop. Unlike the metropolitan, who was evidently always an East Syrian sent by the patriarch, the archdeacon was a native Saint Thomas Christian. In the documented period the position was evidently hereditary, belonging to the Pakalomattam family, who claimed a privileged connection to Thomas the Apostle. Details on the archidiaconate prior to the arrival of the Portuguese are elusive, but Patriarch Timothy I (780 – 823) called the Archdeacon of India the "head of the faithful in India", implying an elevated status by at least that time. In the recorded period of its history, the office of archdeacon was substantially different in India than in the rest of the Church of the East or other Christian churches. In the broader Church of the East, each bishop was attended by an archdeacon, but in India, there was only ever one archdeacon, even when the province had multiple bishops serving it. Following the collapse of the Church of the East's hierarchy in most of Asia in the 14th century, India was effectively cut off from the church's heartland in Mesopotamia and formal contact was severed. By the late 15th century India had had no metropolitan for several generations, and the authority traditionally associated with him had been vested in the archdeacon. In 1491 the archdeacon sent envoys to the Patriarch of the Church of the East, as well as to the Coptic Pope of Alexandria and to the Syriac Orthodox Patriarch of Antioch, requesting a new bishop for India. The Patriarch of the Church of the East Shemʿon IV Basidi responded by consecrating two bishops, Thoma and Yuhanon, and dispatching them to India. These bishops helped rebuild the ecclesiastical infrastructure and reestablish fraternal ties with the patriarchate, but the years of separation had greatly affected the structure of the Indian church. Though receiving utmost respect, the metropolitan was treated as a guest in his own diocese; the Archdeacon was firmly established as the real power in the Malankara community. At the time the Portuguese arrived in India in 1498, the Saint Thomas Christians were in a difficult position. Though prosperous owing to their large stake in the spice trade and protected by a formidable militia, the tumultuous political climate of the time had placed the small community under pressure from the forces of the powerful rajas of Calicut, Cochin, and the various smaller kingdoms in the area. When the Portuguese under Vasco da Gama arrived on the South Indian coast, the leaders of the Saint Thomas community greeted them and proffered a formal alliance to their fellow Christians. The Portuguese, who had keen interest in implanting themselves in the spice trade and in expanding the domain of their bellicose form of Christianity, jumped at this opportunity. The Portuguese brought to India a particularly militant brand of Christianity, the product of several centuries of struggle during the Reconquista, which they hoped to spread across the world. Facilitating this objective was the Padroado Real, a series of treaties and decrees in which the Pope conferred upon the Portuguese government certain authority in ecclesiastical matters in the foreign territories they conquered. Upon reaching India the Portuguese quickly ensconced themselves in Goa and established a church hierarchy; soon they set themselves to bringing the native Christians under their dominion. Towards this goal, the colonial establishment felt it necessary to conduct the Saint Thomas Christians fully into the Latin Rite, both in bringing them into conformity with Latin church customs and in subjecting them to the authority of the Archbishop of Goa. Following the death of Metropolitan Mar Jacob in 1552, the Portuguese became more aggressive in their efforts to subjugate the Saint Thomas Christians. Protests on the part of the natives were frustrated by events back in the Church of the East's Mesopotamian heartland, which left them devoid of consistent leadership. In 1552, the year of Jacob's death, a schism in the Church of the East resulted in there being two rival patriarchates, one of which entered into communion with the Catholic Church, and the other of which remained independent. At different times both patriarchs sent bishops to India, but the Portuguese were consistently able to outmaneuver the newcomers or else convert them to Latin Rite Catholicism outright. In 1575 the Padroado declared that neither patriarch could appoint prelates to the community without Portuguese consent, thereby cutting the Thomas Christians off from their hierarchy. By 1599 the last Metropolitan, Abraham, had died, and the Archbishop of Goa, Aleixo de Menezes, had secured the submission of the young Archdeacon George, the highest remaining representative of the native church hierarchy. That year Menezes convened the Synod of Diamper, which instituted a number of structural and liturgical reforms to the Indian church. At the synod, the parishes were brought directly under the Archbishop's authority, certain "superstitious" customs were anathematized, and the indigenous liturgy, the Malabar Rite, was purged of elements unacceptable by the Latin standards. Though the Saint Thomas Christians were now formally part of the Catholic Church, the conduct of the Portuguese over the next decades fueled resentment in parts of the community, ultimately leading to open resistance. Over the next several decades, tensions seethed between the Latin prelates and what remained of the native hierarchy. This came to a head in 1641 with the ascension of two new protagonists on either side of the contention: Francis Garcia, the new Archbishop of Kodungalloor, and Archdeacon Thomas, the nephew and successor to Archdeacon George. In 1652, the escalating situation was further complicated by the arrival in India of a mysterious figure named Ahatallah. Ahatallah arrived in Mylapore in 1652, claiming to be the rightful Patriarch of Antioch who had been sent by the Catholic pope to serve as "Patriarch of the Whole of India and of China". Ahatallah's true biography is obscure, but some details have been established. He appears to have been a Syriac Orthodox Bishop of Damascus who converted to Catholicism and went to Rome in 1632. He then returned to Syria in order to bring the Syriac Orthodox Patriarch Ignatius Hidayat Allah into communion with Rome. He had not accomplished this by the time Hidayat Allah died in 1639, after which point Ahatallah began claiming he was Hidayat Allah's rightful successor. In 1646 he was in Egypt at the court of the Coptic Pope Mark VI, who dispatched him to India in 1652, evidently in response to a request for aid from Archdeacon Thomas. Reckoning him an impostor, the Portuguese arrested him, but allowed him to meet with members of the Saint Thomas Christian clergy, whom he impressed greatly. The Portuguese put him on a ship bound for Cochin and Goa, and Archdeacon Thomas led his militia to Cochin demanding to meet with the Patriarch. The Portuguese refused, asserting that he was a dangerous invader and that the ship had already sailed on to Goa. Ahatallah was never heard from again in India, and rumours soon spread that Archbishop Garcia had disposed of him before he ever reached Goa. Contemporary accounts allege that he was drowned in Cochin harbour, or even that the Portuguese burned him at the stake. In reality, it appears that Ahatallah did in fact reach Goa, from whence he was sent on to Europe, but he evidently died in Paris before reaching Rome where his case was to be heard. In any event, Garcia's dismissiveness towards the Saint Thomas Christians' appeals only embittered the community further. This was the last straw for the Saint Thomas Christians, and in 1653 Thomas and representatives of the community met at the Church of Our Lady in Mattancherry to take bold action. In a great ceremony before a crucifix and lighted candles, they swore a solemn oath that they would never obey Garcia or the Portuguese again, and that they accepted only the Archdeacon as their shepherd. The Malankara Church and all its successor churches regard this declaration, known as the Coonan Cross Oath (Malayalam: കൂനൻ കുരിശു സത്യം), after the outdoor cross in the churchyard, as the moment when their church regained its independence. The oppressive rule of the Portuguese padroado provoked a violent reaction on the part of the indigenous Christian community. The first solemn protest took place in 1653, known as the Coonan Kurishu Satyam (Coonan Cross Oath). Under the leadership of Archdeacon Thoma, the St. Thomas Christians publicly took an oath in Mattancherry, Cochin, that they would not obey the Portuguese Catholic bishops and the Jesuit missionaries. Until the Portuguese arrival, Malankara Christians never even heard of the Roman Catholic Pope.Unfortunately there was no Metropolitan present in the Malankara Church at that time. Hence in the same year, at Alangad, Archdeacon Thoma was ordained, by the laying on of hands of twelve priests, as the first known indigenous Metropolitan of Kerala, under the name Mar Thoma I. The Portuguese missionaries attempted for reconciliation with Saint Thomas Christians but was not successful. Later Pope Alexander VII sent the Syrian bishop Joseph Sebastiani at the head of a Carmelite delegation who succeeded in convincing majority of Saint Thomas Christians, including Palliveettil Chandy Kathanar and Kadavil Chandy Kathanar that the consecration of Archdeacon as Metropolitan was not legitimate as per the traditional apostolic standards. Later Palliveettil Chandy Kathanar was consecrated as the bishop for the Syrian Catholics with the historic title 'The Metropolitan and the Gate of all India' which denotes a Quasi Patriarchal status with all India jurisdiction. This led to the first permanent split in the Saint Thomas Christian community. Thereafter, the faction affiliated with the Catholic Church under Parambil Mar Chandy was designated the Pazhayakoottukar, or "Old Party", while the branch affiliated with Mar Thoma was called the Puthankoottukar, or "New Party". These appellations have been somewhat controversial, as both groups considered themselves the true heirs to the Saint Thomas tradition, and saw the other as heretical. After the Coonan Cross Oath, between 1661 and 1662, out of the 116 churches, the Catholics claimed eighty-four churches, and the Archdeacon Mar Thoma I with thirty-two churches. The eighty-four churches and their congregations were the body from which the Syro Malabar Catholic Church and Chaldean Syrian Church have descended. The other thirty-two churches and their congregations were the body from which the Malankara Syrian Churches (Jacobite Syrian Christian Church, Malankara Orthodox Syrian Church, Malabar Independent Syrian Church, Malankara MarThoma Syrian Church and Syro-Malankara Catholic Church originated. The Catholic faction constantly challenged the legitimacy of the consecration of Archdeacon as Metropolitan .This made it essential to rectify the illegetimacy of the consecration of Archdeacon as Metropolitan. In 1665, Mar Gregorios Abdul Jaleel, a Bishop sent by the Syriac Orthodox Patriarch of Antioch arrived in India and the Saint Thomas Christians under the leadership of the Archdeacon welcomed him. Gregorios Abdal Jaleel regularised the consecration of Archdeacon as Metropolitan as per the apostolic standards of Kaiveppu(Traditional legitimate way of laying hands by a valid Bishop). This resulted in the spiritual authority of the Antiochean Patriarchate and the reaffirmation of the orthodox faith in the Church. The 18th century saw the gradual introduction of West Syrian liturgy and script to the Malabar Coast, a process that continued through the 19th century. The arrival of Mar Gregorios in 1665, marked the introduction of Oriental Orthodoxy in the Malankara Church. The Malankara Church experienced a series of splits over the centuries, resulting in the formation of several churches, some of which embraced the jurisdiction of foreign churches, while others remained autocephalous and autonomous churches. The churches that share the Malankara Church tradition are: - Jacobite Syrian Christian Church: an autonomous oriental orthodox church under the jurisdiction of the Syriac Orthodox Patriarch of Antioch. - Malankara Orthodox Syrian Church: an autonomous and autocephalous oriental orthodox church under the jurisdiction of the autocephalous Catholicos of the East. - Malabar Independent Syrian Church: an autonomous and autocephalous church under the jurisdiction of its own independent Metropolitan. - Mar Thoma Syrian Church: an autonomous Oriental Syrian church under the jurisdiction of Marthoma Metropolitan. - Syro-Malankara Catholic Church: a self-governing Eastern Catholic church within the Catholic communion.
<urn:uuid:6d7f3ddf-21b5-4af2-9dbb-0c21d7012de2>
CC-MAIN-2019-51
https://alchetron.com/Malankara-Church
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.967141
4,972
3.171875
3
Historically, armed conflict has thrown a spotlight on the aggressive spread of deadly infectious diseases, which are easily transmitted when large numbers of people are displaced. But war has also had a lesser known, and more positive effect on dentistry. In 1914, Britain had no official dental branch of the armed services, and so dentists who were keen to serve their fellow countrymen enlisted as combatants. The U.S. experienced similar problems. When it entered the war, the U.S. Army had just 86 officers on its dental staff to treat about 200,000 troops. As the number of enlisted men swelled, so too did the dental staff. Naturally, dentists who served their country in the war treated soldiers for routine dental problems, like toothaches and fractured teeth, as well as more severe trauma caused by the conflict itself. For many of the enlisted men, the dental care they received in the Army was the first they’d ever had. At University Associates in Dentistry, we pride ourselves on offering the latest dental technologies and treatments to our valued patients. Call (312) 704-5511 to request an appointment for preventive care, cosmetic dentistry, or dental implants in Chicago. Physicians and dentists alike agree that it’s critical to get sleep apnea under control. Sleep deprivation can increase your risk of serious medical complications, some of which may be life-threatening. You can hear more about them when you watch this informative video, presented by a professor of neuroscience. This professor explains that sleep deprivation inhibits your brain’s ability to form new memories, and it increases the levels of a toxic protein called beta amyloid. Beta amyloid in the brain is associated with Alzheimer’s disease. Furthermore, failure to seek sleep apnea treatment may increase the risk of cancer and cardiovascular disease. University Associates in Dentistry is your source for effective, non-CPAP sleep apnea treatment in Chicago. Call us today at (312) 704-5511, and ask us how our dentists can treat your sleep apnea. Modern dental implants are comprised of titanium. The discovery that titanium is able to fuse with natural bone was made by accident in 1952. Since that time, dentists have continued to refine the materials and technique used to restore patients’ smiles. Although modern dental implants are an impressive innovation, implants have ancient roots. Throughout history, humans have used some strange materials to replace missing teeth. In recent years, bamboo has been prized by homeowners as a sustainable, eco-friendly flooring material. That’s because bamboo can be harvested after just a few years of growth. The rapid growth rate of bamboo is perhaps one reason why the ancient Chinese decided it would make a good replacement for teeth. About 4,000 years ago, Chinese dentists carved the hard, durable bamboo into a tooth-shaped implant and then tapped it into the unfortunate patient’s jawbone. Ancient Egyptians relied on oxen. When they slaughtered an ox, they used every part of the animal possible. The hides were used to make furniture and the bones were used to make dental implants for missing teeth. The Egyptians held the oxen bone implants in place with gold wire. It’s unknown if the implants were placed before death or after it. It’s conceivable that the implants were placed after death, since great care was taken to prepare the bodies of the deceased for the afterlife. In the 1930s, archaeologists were excavating an ancient Mayan site in Honduras when they discovered part of a human mandible. The jawbone was dated to about 600 CE, and is believed to be from a woman who died in her twenties. The jawbone had three dental implants made from tooth-shaped pieces of shells. Decades later, a researcher took radiographs of the mandible. He discovered that, based on the bone formation around the shells, these implants had been placed while the woman was still alive. University Associates in Dentistry is known as leading experts in dental implants in the Chicago area. Our dentists specialize in same-day dental implants, which lets you walk away with a complete, beautiful smile in just one appointment. If you have missing teeth, call us today at (312) 704-5511. You already know that it’s important to see a dentist every six months to reduce your risk of cavities and other oral health problems. But did you know that your teeth and gums can also affect your waistline, and vice versa? There are a few ways in which oral health and weight loss intersect. Individuals who are overweight have a higher risk of periodontal disease. If you’re looking for motivation to stick with your New Year’s resolution to lose weight, consider a recent study published in the medical journal Oral Diseases. It indicates that individuals who are overweight or obese have a nearly six-fold increased risk of suffering from periodontal disease. It’s thought that the increased presence of systemic inflammation in overweight individuals may play a role in the elevated risk of gum disease. This wasn’t the only study to evaluate this issue. Researchers from the Case Western Reserve University School of Dental Medicine conducted a study that led them to conclude that overweight individuals who successfully lose weight are better able to fight off gum disease. Poor oral health can lead to poor nutrition. A person’s waistline can influence his or her oral health, but the reverse is also true. People who have poor oral health are more likely to have poor nutrition, which can negatively affect weight management. For example, if you have severe toothaches, loose teeth, or missing teeth, you might think twice before reaching for healthy foods like crunchy apples, carrots, and almonds. You might prefer softer foods that are easier to eat, like sugar-laden muffins that can add to your waistline. Oral health and weight management benefit from the same lifestyle choices. Although it can be disheartening to learn about the ways oral health and weight management can be negatively affected, there is good news. The same healthy habits that benefit your waistline will also support your oral health. For example, if you’re trying to lose weight by cutting out soda, you’ll also have a lower risk of tooth decay. Another trick is to brush your teeth immediately after a meal so you won’t be tempted to keep snacking. The entire team at University Associates in Dentistry is committed to helping you improve your oral health and overall wellness. New and current general dentistry patients in Chicago can give us a call at (312) 704-5511 to request a dental consultation. We always welcome your questions and concerns about your oral care routine. - Dental History - Gum Disease - Dental Implants - Dental Health - Teeth Whitening - Sleep Apnea - Bad Breath - Dental Veneers - Sports Dentistry - Dental Bridges - Dental Crowns - Tooth Loss - CT Scans - DEXIS CariVu
<urn:uuid:a87c3ec0-bb90-46f4-a0dc-54d44de99972>
CC-MAIN-2019-51
https://blog.uadchicago.com/blog/2019/01/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.954832
1,460
2.921875
3
Did you know? 1 in 4 girls and 1 in 6 boys will experience some form of sexual abuse by age 18.* Disclosing abuse takes bravery. If a child has trusted you with a disclosure of abuse, it is imperative that you act on the child's behalf. Together, we can help begin the healing. Statistics prove that 90% of alleged offenders are a person the child or family knows and often trusts, but only 1 in 10 children will ever disclose this violation of their innocence. When it comes to abuse, prevention isn't only possible, it is pivotal to the health and safety of our community. Learn what you can do to help stop the cycle of abuse. In 2018, Children's Home Child Advocacy Center provided forensic interviews and advocacy for 350 children and their families. Help us help others.
<urn:uuid:70f821cf-e494-4f9f-902e-08cd5ecb9814>
CC-MAIN-2019-51
https://chssd.org/CAC/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.962042
168
3.15625
3
|Saint Isaac's Cathedral| |Affiliation||State Russian Museum| |Location||Saint Isaac's Square 4, | |Architect(s)||Auguste de Montferrand| |Style||Late Neoclassical, Byzantine and Greek (cross church)| 260,000 m3 (volume) |Length||104.5 m (interior)| 111.3 m (stairs) |Width||91 m (interior)| 97.6 m (stairs) |Interior area||7,000 m2 (interior) | 8,000 m2 (stairs) |Height (max)||101.52 m (top cross)| 31.5 m (nave interior) 80 m (dom ceiling) |Dome dia. (outer)||25.8 m| Saint Isaac's Cathedral or Isaakievskiy Sobor (Russian: Исаа́киевский Собо́р) is a cathedral that currently functions as a museum in Saint Petersburg, Russia. It is dedicated to Saint Isaac of Dalmatia, a patron saint of Peter the Great, who had been born on the feast day of that saint. It was originally built as a cathedral but was turned into a museum by the Soviet government in 1931 and has remained a museum ever since. In 2017, the Governor of Saint Petersburg offered to transfer the cathedral back to the Russian Orthodox Church, but this was not accomplished due to the protests of St Petersburg citizens opposing the offer. The church on St Isaac's Square was ordered by Tsar Alexander I, to replace an earlier structure by Vincenzo Brenna, and was the fourth consecutive church standing at this place. A specially appointed commission examined several designs, including that of the French-born architect Auguste de Montferrand (1786–1858), who had studied in the atelier of Napoleon's designer, Charles Percier. Montferrand's design was criticised by some members of the commission for the dry and allegedly boring rhythm of its four identical pedimented octastyle porticos. It was also suggested that despite gigantic dimensions, the edifice would look squat and not very impressive. The members of the commission, which consisted of well-known Russian architects, were also particularly concerned by necessity to build a new huge building on the old unsecure foundation. The emperor, who favoured the ponderous Empire style of architecture, had to step in and solve the dispute in Montferrand's favour. The cathedral took 40 years to construct, under Montferrand's direction, from 1818 to 1858. The building of the cathedral took so long, that it left an idiom to Finnish language: rakentaa kuin Iisakinkirkkoa (To build like the church of Isaac) when speaking of long-term construction projects. To secure the construction, the cathedral's foundation was strengthened by driving 25,000 piles into the fenland of Saint Petersburg. Innovative methods were created to erect the giant columns of the portico. The construction costs of the cathedral totalled an incredible sum of 1 000 000 gold rubles. Under the Soviet government, the building was stripped of religious trappings. In 1931, it was turned into the Museum of the History of Religion and Atheism, the dove sculpture was removed, and replaced by a Foucault pendulum. On April 12, 1931, the first public demonstration of the Foucault pendulum was held to visualize Copernicus’s theory. In 1937, the museum was transformed into the museum of the cathedral, and former collections were transferred to the Museum of the History of Religion (located in the Kazan Cathedral). During World War II, the dome was painted over in gray to avoid attracting attention from enemy aircraft. On its top, in the skylight, a geodesical intersection point was placed, to determine the positions of German artillery batteries. With the fall of communism, the museum was removed and regular worship activity has resumed in the cathedral, but only in the left-hand side chapel. The main body of the cathedral is used for services on feast days only. On January 10, 2017 Georgy Poltavchenko, the Governor of St. Petersburg, announced that the cathedral would be transferred to the Russian Orthodox Church . The key protocols of the transfer were defined by the order issued by St. Petersburg’s Committee on Property Relations on December 30, 2016. The document expired on December 30, 2018. The new order can be issued upon request from the Russian Orthodox Church, but no such request has yet been submitted.. The transfer of Saint Isaac's Cathedral in use the ROC agreed in January 2017, but the decision has caused discontent of the townspeople, who defended the status of the museum. The decision of the city authorities was disputed in the courts. Currently, the status of the building is museum. Today, church services are held here only ecclesiastical occasions. The neoclassical exterior expresses the traditional Russian-Byzantine formula of a Greek-cross ground plan with a large central dome and four subsidiary domes. It is similar to Andrea Palladio's Villa La Rotonda, with a full dome on a high drum substituted for the Villa's low central saucer dome. The design of the cathedral in general and the dome in particular later influenced the design of the United States Capitol dome, Wisconsin State Capitol in Madison, Wisconsin, and the Lutheran Cathedral in Helsinki. The exterior is faced with gray and pink stone, and features a total of 112 red granite columns with Corinthian capitals, each hewn and erected as a single block: 48 at ground level, 24 on the rotunda of the uppermost dome, 8 on each of four side domes, and 2 framing each of four windows. The rotunda is encircled by a walkway accessible to tourists. 24 statues stand on the roof, and another 24 on top of the rotunda. The cathedral's main dome rises 101.5 metres (333 ft); its exterior is gilded. The dome is decorated with twelve statues of angels by Josef Hermann. These angels were likely the first large sculptures produced by the then novel process of electrotyping, which was an alternative to traditional bronze casting of sculptures. Montferrand's design of the dome is based on a supporting cast iron structure. It was the third historical instance of cast iron cupola after the Leaning Tower of Nevyansk (1732) and Mainz Cathedral (1826). The cathedral's bronze doors, covered in reliefs by Ivan Vitali, are patterned after the celebrated doors of the Battistero di San Giovanni in Florence, designed by Lorenzo Ghiberti. Suspended underneath the peak of the dome is a sculpted white dove representing the Holy Spirit. Internal features such as columns, pilasters, floor, and statue of Montferrand are composed of multicolored granites and marbles gathered from all parts of Russia. The iconostasis is framed by eight columns of semiprecious stone: six of malachite and two smaller ones of lazurite. The four pediments are also richly sculpted. The interior was originally decorated with scores of paintings by Karl Bryullov and other great Russian masters of the day. When these paintings began to deteriorate due to the cold, damp conditions inside the cathedral, Montferrand ordered them to be painstakingly reproduced as mosaics, a technique introduced in Russia by Mikhail Lomonosov. This work was never completed. William Handyside and other engineers used a number of technological innovations in the construction of the building. The portico columns were raised with the use of large wooden frameworks before the walls were erected. The building rests on 10,000 tree trunks that were sunk by a large number of workers into the marshy banks upon which the cathedral is situated. The dome was gilded by a technique similar to spraypainting; the solution used included toxic mercury, the vapors of which caused the deaths of sixty workers. The dozen gilded statues of angels, each six metres tall, facing each other across the interior of the rotunda, were constructed using galvanoplastic technology, making them only millimeters thick and very lightweight. St. Isaac's Cathedral represents the first use of this technique in architecture. The meticulous and painstakingly detailed work on constructing the St. Isaac's Cathedral took 40 years to complete. This extended construction left an expression in the Finnish language, rakentaa kuin Iisakin kirkkoa ("to build like St. Isaac's Church"), for lengthy and never-ending megaprojects. The first St. Isaac's Church (Lithography of Auguste de Montferrand's drawing, 1710) Floorplan of St. Isaac's Cathedral St. Isaac blessing the Emperor Theodosius and his wife Flaccilla Interior of the cathedral View a 360 Panorama here View of the main iconostasis, showing the malachite and lapis lazuli columns Iconostasis of one of the side chapels Interior of the great dome, honoring the Holy Spirit Twelve great gilt angels, taking the part of the caryatides, support consoles on which stand the bases of the pilasters which form the interior row of the dome and separate the windows. They are twenty-one feet high, and were made by the galvanoplastic process in four pieces, whose welding together is invisible. They could in this manner be made so light that, in spite of their dimensions, they would not be too heavy for the cupola. This crown of gilt angels, poised amid a flood of light, and shining with rich reflections, produces an extremely rich effect. |Wikimedia Commons has media related to Saint Isaac's Cathedral.|
<urn:uuid:dd516081-9f1e-40c6-928f-44c57d5ef5f3>
CC-MAIN-2019-51
https://readtiger.com/wkp/en/Saint_Isaac's_Cathedral
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.949839
2,044
2.765625
3
Leda Atomica is a painting by Salvador Dalí, made in 1949. The picture depicts Leda, the mythological queen of Sparta, with the swan. Leda is a frontal portrait of Dalí’s wife, Gala, who is seated on a pedestal with a swan suspended behind and to her left. Different objects such as a book, a set square, two stepping stools and an egg float around the main figure. In the background on both sides, the rocks of Cap Norfeu (on the Costa Brava in Catalonia, between Roses and Cadaqués) define the location of the image. After the atomic bomb was dropped on Hiroshima, Dalí took his work in a new direction based on the principle that the modern age had to be assimilated into art if art was to be truly contemporary. Dalí acknowledged the discontinuity of matter, incorporating a mysterious sense of levitation into his Leda Atomica. Just as one finds that at the atomic level particles do not physically touch, so here Dalí suspends even the water above the shore—an element that would figure into many other later works. Every object in the painting is carefully painted to be motionless in space, even though nothing in the painting is connected. Leda looks as if she is trying to touch the back of the swan’s head, but doesn’t do it. Dalí shows us the hierarchized libidinous emotion, suspended and as though hanging in midair, in accordance with the modern ‘nothing touches’ theory of intra-atomic physics. Leda does not touch the swan; Leda does not touch the pedestal; the pedestal does not touch the base; the base does not touch the sea; the sea does not touch the shore. . . .” Leda Atomica is organized according to a rigid mathematical framework, following the “divine proportion”. Leda and the swan are set in a pentagon inside which has been inserted a five-point star of which Dalí made several sketches. The five points of the star symbolize the seeds of perfection: love, order, light (truth) willpower and word (action). The harmony of the framework was calculated by the artist following the recommendations of Romanian mathematician Matila Ghyka. In reference to the classical myth Dalí identified himself with the immortal Pollux while his deceased older brother (also called Salvador) would represent Castor, the mortal of the twins. Another equivalence could be made regarding the other twins of the myth, Dalí’s sister Ana María being the mortal Clytemnestra, while Gala would represent divine Helen. Salvador Dalí himself wrote: «I started to paint Leda Atómica which exalts Gala, the metaphysical goddess and succeeded to create the “suspended space”». Dalí’s Catholicism enables also other interpretations of the painting. The painting can be conceived as Dalí’s way of interpreting the Annunciation. The swan seems to whisper her future in her ear, possibly a reference to the legend that the conception of Jesus was achieved by the introduction of the breath of the Holy Ghost into the Virgin Mary’s ear. Leda looks straight into the bird’s eyes with an understanding expression of what is happening to her and what will happen in the future to her and to her unsure reality. Dalí’s transformation of Mary is the result of love as if he created his love to Gala, like God to Mary
<urn:uuid:a539c855-d100-46f6-a5a7-726fd6ef2845>
CC-MAIN-2019-51
https://thegenealogyofstyle.wordpress.com/tag/gala/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.962299
739
3.015625
3
The Baby Boomer generation covers individuals born from around 1948 to 1959. Many of the individuals in this age range are quickly approaching retirement after decades of work. Unfortunately, there are major concerns about this shift to retirement, as some people feel that their generation wasn’t taught how to handle personal finances. This claim may seem bold on the surface, but let’s go over the statistics behind it, and focus on how: - Baby Boomers Can Increase Their Knowledge of Personal Finances - Younger Generations Can Plan to Handle Their Financial Needs Personal Finance Knowledge and the Baby Boomers So, what weren’t the Baby Boomers taught about personal finance? Many people first consider the stock market when trying to answer that question. After all, the stock market has changed a lot over the last few decades, and a lot of the rules about how if functioned were easy to miss. While it is true that the tricks to managing stocks and bonds – along with keeping a diversified portfolio – were not taught to many in the Baby Boomer generation, there are other financial concerns involving: Many in the Baby Boomer generation – around 70 million people – have simply not saved for retirement. In fact, one study in 2014 reported that around 33% of Baby Boomers had saved nothing for their retirement. Baby Boomers who have saved for retirement have usually put away insufficient funds. Median retirement savings for the group hovered at $200,000. While this looks like a large number, many experts say you will need around $1 million to reach the end of your retirement. High Amounts of Debt Baby Boomers are also carrying significantly more debt than older generations. Studies have determined that – on average – Baby Boomers are carrying more than $100,000 in debt. Many members of this generation are still carrying a mortgage after they reach 65. Handling Personal Finances Now So, if some Baby Boomers did not get the financial education they needed when they were younger, what does that mean? High levels of debt and poor retirement savings can force individuals to continue working for longer. A lack of retirement savings and the burden of debt can also force retirees to fall back on their family members or social services. This could create a strain in some areas of the country, especially where the population of Baby Boomers continues to increase. States like South Carolina, Florida, and Arizona could all be impacted. Some of the younger members of the Baby Boomer generation still have time to increase their retirement savings. Anyone can take steps to handle high levels of debt. Some options for getting rid of debt can include: - Refinancing a Mortgage - Consolidating Credit Card Debt - Paying Off Debt with a Lump Sum Payment Getting the funds for a lump sum payment may not be as impossible as it sounds. Some individuals may be able to take out a low-interest personal loan from their bank or credit union. Individuals in many states, for example in the south can also get immediate funds with a title loan in South Carolina. Learn More About Your Personal Finances Today The Baby Boomer generation is not the only cohort in the U.S. that could benefit from learning more about personal finances. Millennials – along with members of Gen Z and Gen X – could all gain financial security by learning about: - The Best Steps for Retirement Saving - Real Estate Investing - Tips for Handing the Stock Market Keeping your debt low and your savings high can ensure that you are ready when you retire, no matter what generational group you belong to. Focusing on eliminating your debt and setting up a retirement account today is a great way to start handling your personal finances.
<urn:uuid:70bf6c95-f542-4a25-b215-f639aa3e4167>
CC-MAIN-2019-51
https://www.earlyintime.com/2019/03/12/baby-boomers-the-generation-that-wasnt-taught-how-to-handle-personal-finances/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.958702
757
2.71875
3
If any state implements prohibition, it will have to forego the excise revenue from sale of alcoholic beverages Prohibition, or a ban on the sale of alcoholic beverages, is a measure listed in the directive principles of state policy in the constitution of India. These guidelines are not judicable, but as the name suggests, expected to be followed voluntarily by governments. After Nitish Kumar’s big victory in the 2015 assembly elections in Bihar, where he promised to impose prohibition if elected, the policy has been gaining political traction. J Jayalalithaa toyed with the idea in Tami Nadu before her death. The previous Congress-led government in Kerala had tried partial prohibition, envisaging a complete ban on alcohol by 2025. The newly elected government in Andhra Pradesh is also taking steps to curtail the liquor business, and has announced a takeover of all retail outlets selling alcohol. The political and moral arguments around prohibition notwithstanding, it could be an expensive experiment for state governments, especially in the post-Goods and Services Tax (GST) era. An analysis of the Reserve Bank of India’s Study of State Finances, which was released this week, corroborates this view. GST has been a landmark tax reform in India. It abolished multiple taxes on goods and services across India’s 29 states and replaced them by uniform taxes. This has brought much-needed parity in taxes and cut a lot of red tape in facilitating free movement of goods and services across India’s states. While GST has brought these benefits, it has also eroded the fiscal autonomy of states. As GST rates are decided in the GST Council comprising all states and the centre, individual states have much less freedom to decide tax rates according to their needs. In the post-GST period, the share of states’ own revenues in their total tax revenues has come down. This means that their dependence on the central pool of taxes has increased. India’s fiscal federalism has a provision of sharing of central taxes with state governments. The terms of this distribution are decided by the Finance Commission every five years. The fifteenth Finance Commission is expected to submit its report next month. There is speculation that the commission would tilt the fiscal balance in favour of the centre. The centre is not expected to share revenue earned through cess levied on various taxes. A Mint analysis by Tadit Kundu has shown that the share of cess in central government revenues has been steadily increasing under the current government and has reached almost 15%. This means that the divisible share of central revenues has been steadily coming down. To be sure, states do have the power to tax some important goods and services even in the post-GST regime. Petroleum products, tobacco, alcoholic beverages are some such commodities. Another major source of state government revenues is the stamp duty levied on property transactions. Tax generating ability of petroleum products is contingent on international oil prices. Both central and state governments face pressure to cut taxes when oil prices are higher. This was seen last year when both central and state governments cut excise and value added tax (VAT) on petrol and diesel to bring down retail prices of petrol and diesel. This leaves state excise (from alcoholic beverages) and stamp duty and registration fees (mainly levied on sale of property) as the major sources where state governments have autonomy to levy taxes. If one were to exclude SGST (rates of which are decided in the GST Council) from states’ own revenues, the share of state excise and stamps and registration fees in states’ own revenues has increased significantly, from around 20% to 40%, in the post-GST regime. The importance of these two taxes in states’ own revenue shows an interesting trend. State excise was twice as important for states compared to stamp and registration fees in the early 1990s. This started changing as India’s real estate boom started in the early 2000s, and stamp and registration fees overtook state excise in terms of share in states’ own tax revenues by 2005-06. This growth stopped from 2008-09 onwards, the year when the financial crisis struck the US, triggering a global slowdown. As of now, state excise revenues seem to be surging ahead of stamp and registration fees in terms of share in states’ own revenues. Any state which implements prohibition will also have to forego state excise which comes from sale of alcoholic beverages. This will also entail surrendering a major, and more importantly, autonomous source of revenues for the state exchequer. Source- Hindustan Times.
<urn:uuid:cf8ccf72-e16b-4760-9230-bf6aec0fb537>
CC-MAIN-2019-51
https://www.gststation.in/post-gst-prohibition-could-be-an-expensive-experiment-for-states/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.9703
926
2.71875
3
Phoenix quote: Legionella bacteria is potentially fatal and the risks must be managed properly and in accordance with the law. A key element is to ensure staff involved in maintenance of workplace premises are properly trained. Our courses on Legionella are available at https://www.phoenixhsc.co.uk/e-learning-courses/legionella-awareness-course more information on this matter can also be found below. Legionellosis is a collective term for diseases caused by legionella bacteria including the most serious Legionnaires’ disease, as well as the similar but less serious conditions of Pontiac fever and Lochgoilhead fever. Legionnaires’ disease is a potentially fatal form of pneumonia and everyone is susceptible to infection. The risk increases with age but some people are at higher risk including: · people over 45 years of age · smokers and heavy drinkers · people suffering from chronic respiratory or kidney disease · diabetes, lung and heart disease · anyone with an impaired immune system The bacterium Legionella pneumophila and related bacteria are common in natural water sources such as rivers, lakes and reservoirs, but usually in low numbers. They may also be found in purpose-built water systems such as cooling towers, evaporative condensers, hot and cold water systems and spa pools. If conditions are favourable, the bacteria may grow increasing the risks of Legionnaires’ disease and it is therefore important to control the risks by introducing appropriate measures. Where does it come from? Legionella bacteria are widespread in natural water systems, e.g. rivers and ponds. However, the conditions are rarely right for people to catch the disease from these sources. Outbreaks of the illness occur from exposure to legionella growing in purpose-built systems where water is maintained at a temperature high enough to encourage growth, e.g. cooling towers, evaporative condensers, hot and cold water systems and spa pools used in all sorts of premises (work and domestic). How do people get it? People contract Legionnaires’ disease by inhaling small droplets of water (aerosols), suspended in the air, containing the bacteria. Certain conditions increase the risk from legionella if: · the water temperature in all or some parts of the system may be between 20-45 °C, which is suitable for growth · it is possible for breathable water droplets to be created and dispersed e.g. aerosol created by a cooling tower, or water outlets · water is stored and/or re-circulated · there are deposits that can support bacterial growth providing a source of nutrients for the organism e.g. rust, sludge, scale, organic matter and biofilms What are the symptoms? The symptoms of Legionnaires' disease are similar to the symptoms of the flu: · high temperature, feverishness and chills; · muscle pains; · headache; and leading on to · pneumonia, very occasionally · diarrhoea and signs of mental confusion Legionnaires’ disease is not known to spread from person to person. What you must do If you are an employer, or someone in control of premises, including landlords, you must understand the health risks associated with legionella. This section can help you to control any risks. Duties under the Health and Safety at Work etc Act 1974 (HSWA) extend to risks from legionella bacteria, which may arise from work activities. The Management of Health and Safety at Work Regulations (MHSWR) provide a broad framework for controlling health and safety at work. More specifically, the Control of Substances Hazardous to Health Regulations 2002 (COSHH) provide a framework of actions designed to assess, prevent or control the risk from bacteria like Legionella and take suitable precautions. The Approved Code of Practice: Legionnaires’ disease: The control of Legionella bacteria in water systems (L8) contains practical guidance on how to manage and control the risks in your system. As an employer, or a person in control of the premises, you are responsible for health and safety and need to take the right precautions to reduce the risks of exposure to legionella. You must understand how to: · identify and assess sources of risk · manage any risks · prevent or control any risks · keep and maintain the correct records · carry out any other duties you may have Identify and assess sources of risk Carrying out a risk assessment is your responsibility. You may be competent to carry out the assessment yourself but, if not, you should call on help and advice from either within your own organisation or from outside sources, e.g. consultancies. You or the person responsible for managing risks, need to understand your water systems, the equipment associated with the system such as pumps, heat exchangers, showers etc, and its constituent parts. Identify whether they are likely to create a risk from exposure to legionella, and whether: · the water temperature in all or some parts of the system is between 20–45 °C · water is stored or re-circulated as part of your system · there are sources of nutrients such as rust, sludge, scale, organic matter and biofilms · the conditions are likely to encourage bacteria to multiply · it is possible for water droplets to be produced and, if so, whether they can be dispersed over a wide area, e.g. showers and aerosols from cooling towers · it is likely that any of your employees, residents, visitors etc are more susceptible to infection due to age, illness, a weakened immune system etc and whether they could be exposed to any contaminated water droplets Your risk assessment should include: · management responsibilities, including the name of the competent person and a description of your system · competence and training of key personnel · any identified potential risk sources · any means of preventing the risk or controls in place to control risks · monitoring, inspection and maintenance procedures · records of the monitoring results and inspection and checks carried out · arrangements to review the risk assessment regularly, particularly when there is reason to suspect it is no longer valid If you conclude that there is no reasonably foreseeable risk or the risks are low and are being properly managed to comply with the law, your assessment is complete. You may not need to take any further action at this stage, but any existing controls must be maintained and the assessment reviewed regularly in case anything changes in your system. Managing the risk As an employer, or person in control of premises, you must appoint someone competent to help you meet your health and safety duties and to take responsibility for controlling any identified risk from exposure to legionella bacteria. A competent person, often known as the responsible person, is someone with sufficient authority, competence, necessary skills, knowledge of the system, and experience. The appointed responsible person could be one, or a combination of: · one or more workers · someone from outside your business If there are several people responsible for managing risks, e.g. because of shift-work patterns, you must make sure that everyone knows what they are responsible for and how they fit into the overall risk management of the system. If you decide to employ contractors to carry out water treatment or other work, it is still the responsibility of the competent person to ensure that the treatment is carried out to the required standards. Remember, before you employ a contractor, you should be satisfied that they can do the work you want to the standard that you require. Preventing or controlling the risk You should first consider whether you can prevent the risk of legionella by looking at the type of water system you need, e.g. identify whether it is possible to replace a wet cooling tower with a dry air-cooled system. The key point is to design, maintain and operate your water services under conditions that prevent or adequately control the growth and multiplication of legionella. If you identify a risk that you are unable to prevent, you must introduce a course of action ie a written control scheme, which will help you to manage the risk from legionella by implementing effective control measures, by describing: · your system, e.g. develop a schematic diagram · who is responsible for carrying out the assessment and managing its implementation · the safe and correct operation of your system · what control methods and other precautions you will be using · what checks will be carried out, and how often will they be carried out, to ensure the controls remain effective · ensure that the release of water spray is properly controlled · avoid water temperatures and conditions that favour the growth of legionella and other micro-organisms · ensure water cannot stagnate anywhere in the system by keeping pipe lengths as short as possible or removing redundant pipework · avoid materials that encourage the growth of legionella (The Water Fittings & Materials Directory link to external website references fittings, materials, and appliances approved for use on the UK Water Supply System by the Water Regulations Advisory Scheme) · keep the system and the water in it clean · treat water to either control the growth of legionella (and other microorganisms) or limit their ability to grow · monitor any control measures applied · keep records of these and other actions taken, such as maintenance or repair work If you have five or more employees you have to record any significant findings, including those identified as being particularly at risk and the steps taken to prevent or control risks. If you have less than five employees, you do not need to write anything down, although it is useful to keep a written record of what you have done. Records should include details of the: · person or persons responsible for conducting the risk assessment, managing, and implementing the written scheme · significant findings of the risk assessment · written control scheme and details of its implementation · details of the state of operation of the system, i.e. in use/not in use · results of any monitoring inspection, test or check carried out, and the dates These records should be retained throughout the period for which they remain current and for at least two years after that period. Records kept in accordance with (e) should be retained for at least five years.
<urn:uuid:1f3f16af-f0cf-45f4-8467-d3e2ea8ad05a>
CC-MAIN-2019-51
https://www.phoenixhsc.co.uk/blog/what-is-legionnaires-disease.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.939947
2,110
3.421875
3
No toys, no art supplies - just the brushstrokes and fun provided by nature. Westgarth Kindergarten's Bush Kinderis the first of its kind in Australia. A forest kindergarten - immersed in natural delights. Children are encouraged to play, learn and explore out in the natural environment, whatever the weather forecast. Forest Schooling was first developed in 1927 in Wisconsin. In the early 1950's the idea was introduced in Sweden, Wales and other European countries with great success. The main aim of Forest Schooling is to encourage spatial awareness, motor skill development, exploration with all the senses and empowering children in a natural environment. Westgarth Kindergarten's bush kinder takes place in the Darebin Parklands. In an era awash with social media and video games, this seems like the natural and beautiful choice for any child, to connect with themselves and the natural world at large. Just wanted to let you know that the Westgarth Bush Kinder program is part of a regular kindergarten program with enrollments being administered by the Darebin Council for local families. The are many bush kinders starting up around Victoria so if you are interested in this program it is worth making some inquiries at the kindergartens in your local area. You may even want to assist your local kindergarten in starting up a bush kinder program based on this model.
<urn:uuid:e6c8a0ae-112f-4ba2-b931-dc9339916076>
CC-MAIN-2019-51
https://www.weekendnotes.com/bush-kinder/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00052.warc.gz
en
0.932821
279
2.5625
3
The results of an exciting pilot project that shares climate and water data across international borders, called the Climate-Hydrologic Information Sharing Pilot, is set to be released to the public on April 16, 2013. The data sharing program was developed by the team that led highly successful Water and Environmental Hub project. Anyone is invited to register for this webinar, at which time the engineering reports of the project will also be released. The Climate-Hydrologic Information Sharing Pilot is a virtual observatory system for water resources, and represents the first time that international governments and agencies have come together to share observations and forecasts in one accessible location. It allows people to view water information from the Souris and Milk Rivers, which run through the USA and Canada. The pilot also features observations from the Great Lakes. The project is led by the Open Geospatial Consortium, and sponsored by Natural Resources Canada, the US Geological Survey, and the US Environmental Protection Agency. The technology for the virtual observatory was developed by Explorus Data Solutions, the spinout from the Cybera-led Water and Environmental Hub project.
<urn:uuid:cb433588-d2a8-4e43-9961-06b6c474c61b>
CC-MAIN-2019-51
http://www.cybera.ca/news-and-events/news/open-water-data-takes-a-big-step/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.947717
224
2.71875
3
The language of many Deaf individuals is British Sign Language (BSL). BSL is a language in its very own right, which is a different and particular from English. The language varies from English because of the linguistic structure; in this manner English in a composed structure may not be comprehended by an individual utilizing BSL. There are 70,000 BSL clients in Britain as of now, as showed by the Department of Work and Pensions. As of now, there is a National Shortage of mediators in the UK. On the eighteenth March 2003, BSL was acknowledged authoritatively as a language by the UK Government. What do BSL Interpreters do? A BSL mediator encourages correspondence between an individual who utilizes BSL and individual who utilizes a communicated in language. They may likewise translate from composed English. Translating is an intricate procedure that requires a decent information on the two dialects and societies. As English and BSL are dialects with totally extraordinary sentence structures, in this manner a BSL/English translator consistently need to hold up until the sentence is done, before beginning to decipher into the other language. Where do Interpreters Work? Mediators are required in a numerous kinds of circumstances, for example, prospective employee meet-ups, Gatherings in the work environment, instructive classes and tests, emergency clinic arrangements, Mediators can either function as an independently employed translator or work through Interpreting Agencies found across the nation, for example, a British communication via gestures translator Diversus Interpreting. BSL Interpreters are as of now enlisted with CACDP (the Council for the Advancement of Communication with Deaf People). Translators can be enlisted with registries, for example, CACDP, ASLI (Association of Sign Language Interpreters), and the on-line catalog of RAD (Royal Association for Deaf individuals). As of now, there is a national deficiency of BSL Interpreters, which implies that they are probably going to be reserved well ahead of time and can generally look for some kind of employment. The Council for the Advancement of Communication San Francisco with Deaf People (CACDP) is be body BSL Interpreters in England or Wales ought to be enlisted with. They can likewise be individuals from the Association of Sign Language Interpreters (ASLI). A BSL Interpreter enrolled with is relied upon to contend or have passed a course perceived broadly. The base standard in BSL for Interpreters is CACDP Stage 3/Level 3 NVQ (National Vocational Qualification) or proportional. The preparation empowers the Interpreter to have accomplished concurred models in Interpreting and in British Sign Language. English Sign Language courses run all through the nation in junior colleges, nearby communities for hard of hearing individuals, and private associations. Educators of BSL are generally local to the utilization of gesture based communication and furthermore have an important instructing capability.
<urn:uuid:569c8668-7ec1-4d50-9ded-2377e2a0492b>
CC-MAIN-2019-51
http://www.estaticarts.co.uk/a-career-in-british-sign-language-interpreting/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.923547
634
2.984375
3
Post your answer Ayers Rock (called Uluru by Aborigines) is in the center of Australia. The continent which includes the coordinates of 30 south latitude and 135 east longitude is Australia. ANSWERED AT 06/12/2019 - 04:01 PM QUESTION POSTED AT 06/12/2019 - 04:01 PM The correct answer is option D - Marble. The marble is a metamorphic rock that forms when limestone is under the heat and pressure of metamorphism. It is composed mainly of the mineral Calcite and it generally contains other minerals such as quartz, graphite, micas, etc. Besides, the characteristics swirls of the colored marbles varieties are usually the result of the mixture of various mineral impurities such as sand or iron oxides. Marble is commonly used as a building material and for sculpture. ANSWERED AT 06/12/2019 - 04:00 PM QUESTION POSTED AT 06/12/2019 - 04:00 PM The two main parts of the Christian Bible are the New Testament (describing the teachings of Jesus and his apostles) and the Old Testament (describing the teachings before Jesus: this part is shared with Judaism). ANSWERED AT 06/12/2019 - 03:48 PM QUESTION POSTED AT 06/12/2019 - 03:48 PM It is in the Southwest direction. ANSWERED AT 06/12/2019 - 03:43 PM QUESTION POSTED AT 06/12/2019 - 03:43 PM The Atlantic Coastal Plain would be my guess. ANSWERED AT 06/12/2019 - 03:19 PM QUESTION POSTED AT 06/12/2019 - 03:19 PM Australia is in the Southern Hemisphere, as is most of Africa. The U.S. and Asia are in the Northern Hemisphere. ANSWERED AT 06/12/2019 - 02:52 PM QUESTION POSTED AT 06/12/2019 - 02:52 PM I remember it like this: I saw 9/11 attacks in Europe AFTER i came back from school: so Europe, to the east of US, is much be more "advanced" in time. So the more east you go: the later it is, the more west you go, the earlier it is. So if you travel west, you will be an hour earlier, so the time is one hour behind. ANSWERED AT 06/12/2019 - 02:09 PM QUESTION POSTED AT 06/12/2019 - 02:09 PM Yes, this is true. If it's like a dictatorship, it's referred to as "absolute monarchy". Example today: Swaziland If it's a part of democracy, it's a constitutional or parliamentary monarchy. Example: UK ANSWERED AT 06/12/2019 - 01:37 PM QUESTION POSTED AT 06/12/2019 - 01:37 PM First of all, Africa is MOSTLY in eastern Hemisphere: only a small part of Africa is in the western Hemisphere. And also: Africa is joined by land to other lands in the eastern Hemisphere: Asia and Europe and as a result has more contact with them then with Americas, from which it's separated by oceans. ANSWERED AT 06/12/2019 - 12:31 PM QUESTION POSTED AT 06/12/2019 - 12:31 PM Mineral discoveries shape the settlement of the West by miners rushed to the area, boom-towns, spurred the building of railroads and many moved to the West. Miners were drawn to the West in 1859 as a result of they discovered gold and silver in western Nevada. This became referred to as the reformist deposit that was named once Henry Comstock. Miners hurried to the realm, boom-towns, stimulated the building of railroads and plenty of rapt to the West. ANSWERED AT 06/12/2019 - 12:20 PM QUESTION POSTED AT 06/12/2019 - 12:20 PM It was Suleyman I, also called Suleyman the Magnificent. He captured Belgrade in 1521. He even laid a siege to Vienna in 1529, but he didn't win. Still - Vienna is pretty far, and this means all the areas UNTIL Vienna were taken by him- a huge portion of Europe! ANSWERED AT 06/12/2019 - 12:16 PM QUESTION POSTED AT 06/12/2019 - 12:16 PM Panhandle, is the right answer. The Florida Panhandle is the northwestern portion of the United States's Florida State, are a piece of land about 200 miles in length and 50 to 100 miles broad, extending between Georgia on the north, Alabama on the north and the west to the South by the Gulf of Mexico. Its eastern border is arbitrarily determined. ANSWERED AT 06/12/2019 - 11:50 AM QUESTION POSTED AT 06/12/2019 - 11:50 AM The most explored parts of the Northern American Continent were the north east south east and middle west. ANSWERED AT 06/12/2019 - 11:24 AM QUESTION POSTED AT 06/12/2019 - 11:24 AM B. Water erosion it was eroded mostly by the colorado river ANSWERED AT 06/12/2019 - 09:46 AM QUESTION POSTED AT 06/12/2019 - 09:46 AM Radar is most often used to "determine exact locations". Radar refers to a detection framework that utilizes radio waves to decide the range, point, or speed of articles. It can be utilized to distinguish flying machine, ships, rocket, guided rockets, engine vehicles, climate arrangements, and territory. A radar framework comprises of a transmitter delivering electromagnetic waves in the radio or microwaves space, a transmitting reception apparatus, an accepting receiving wire (regularly a similar receiving wire is utilized for transmitting and getting) and a recipient and processor to decide properties of the object(s). ANSWERED AT 06/12/2019 - 09:26 AM QUESTION POSTED AT 06/12/2019 - 09:26 AM Prehistory is the history before any records (as in, detailed reliable records, such as writing), for which only very indirect evidence is available such as archaeological funds. So- there could be no weather reports from pre-history! if there were, we would call this time "history" - the correct answer is d. ANSWERED AT 06/12/2019 - 09:16 AM QUESTION POSTED AT 06/12/2019 - 09:16 AM ANSWERED AT 06/12/2019 - 08:50 AM QUESTION POSTED AT 06/12/2019 - 08:50 AM The English-speaking population first came to Australia after it was discovered by the Dutch and claimed by the British, but Australia was a penal colony and this was mainly how it's English-speaking population first came to Australia. A penal colony is when you send convicted criminals or people regarded as undesirable to a colony, so for Australia this specifically meant convicted criminals and prisoners of war from Ireland. ANSWERED AT 06/12/2019 - 08:16 AM QUESTION POSTED AT 06/12/2019 - 08:16 AM Y'know, This isn't exactly a question... But I'll answer it. Yes??? ANSWERED AT 06/12/2019 - 06:18 AM QUESTION POSTED AT 06/12/2019 - 06:18 AM Does this help? http://www.enotes.com/homework-help/why-did-framers-include-principles-they-did-395587 ANSWERED AT 06/12/2019 - 05:56 AM QUESTION POSTED AT 06/12/2019 - 05:56 AM B. False- Israel lies on the Mediteranean! C. False- Israel isn't! now, the question is, do they have oil? Well, Jordan, does, a lot, Israel- not so much. So it seems like there really isnt a good answer! still, i'd choose A if had to make a choice. ANSWERED AT 06/12/2019 - 05:50 AM QUESTION POSTED AT 06/12/2019 - 05:50 AM The coordinates that you gave are almost those of the city of Anchorage. Anchorage is the capital of Alaska so this is also the answer to this question: Alaska ANSWERED AT 06/12/2019 - 05:06 AM QUESTION POSTED AT 06/12/2019 - 05:06 AM I give one, for example: when I was travelling on Malta, I found a lot of Roman remains: catacombs, mosaics, a remain of a Roman house. Malta is an island so they must have used sea travel to get there. ANSWERED AT 06/12/2019 - 04:21 AM QUESTION POSTED AT 06/12/2019 - 04:21 AM No one..Nicolai Copernicus said the Sun was the Center of the Solar System...Solar System and Universe has a big difference. ANSWERED AT 06/12/2019 - 04:19 AM QUESTION POSTED AT 06/12/2019 - 04:19 AM The Puget Sound is the body of water located along the northwest coast of Washington State. It forms an interconnected system of waterways and a basin with major connections to the Pacific Ocean. A Sound is a large ocean inlet that is larger than a Bay and wider than a Fjord. The major connection to the Pacific Ocean is called the Strait of Juan de Fuca—Admiralty Inlet. The two minor connections to the Pacific Ocean are known as Deception Pass and Swinomish Channel. ANSWERED AT 06/12/2019 - 04:07 AM QUESTION POSTED AT 06/12/2019 - 04:07 AM 2. Rhode Island and Providence Plantations 3. Delaware led the process, then New Hampshire became the ninth state to be the Constitution. 4. New Hampshire 6. New Jersey? 9. Delaware, Pennsylvania, New Jersey,Georgia, Connecticut, Massachusetts Bay,Maryland, South Carolina, New Hampshire, Virginia, New York, North Carolina, andRhode Island and Providence Plantations. 12. Georgia, but the map of the U.S was very different back then. 13. China, India and Brazil were rated among the leading producers worldwide, followed by the United States ANSWERED AT 06/12/2019 - 03:41 AM QUESTION POSTED AT 06/12/2019 - 03:41 AM Mesopotamia was divided into 2 groups or kingdom. The first one is the Sumerian, they are the people who spoke unrelated language to any modern language. And the other one is the Semitics, they are the people who spoke language related to modern Arabic and Hebrew. Sumerians lives near the great river and built their first city in there. While semitic became the dominant language of places like Akkadian, Amorite, Assyrian and Aramaic. So these are the region where semitic lived. ANSWERED AT 06/12/2019 - 03:09 AM QUESTION POSTED AT 06/12/2019 - 03:09 AM The Pima and Hopi were part of the Indian culture. The Hopi are thought to have descended from the Anasazi and they are classified as Pueblo Indians. The Pima’s on the other hand are thought to have descended from the Hohokam culture. Though they have descended from different cultures but they are part of the Indian culture. The Pima’s, mostly resided in the region which is now known as the central and southern Arizona. The Hopi tribe on the other hand lived in the northeastern Arizona. ANSWERED AT 06/12/2019 - 02:43 AM QUESTION POSTED AT 06/12/2019 - 02:43 AM The landform that includes Nevada and parts of five neighboring states is called The Great Basin. The five neighboring states that have parts of great Basin in it are Utah, California, Oregon, Wyoming and Idaho. The half of Utah falls in the Great Basin. The Great Basin Divide actually separates the watersheds that lead to the Pacific Ocean from the Great Basin. The great Basin covers about 209,162 square miles. This is a very dry region and most of the water either evaporates or sinks inside the ground to flow into different ANSWERED AT 06/12/2019 - 02:41 AM QUESTION POSTED AT 06/12/2019 - 02:41 AM Savannas are a dry grassland surrounded by many deserts. ANSWERED AT 06/12/2019 - 02:36 AM QUESTION POSTED AT 06/12/2019 - 02:36 AM
<urn:uuid:c0cb8b2c-2c3e-4cba-bc55-e78ace5adf35>
CC-MAIN-2019-51
https://assignmentgrade.com/in-what-part-of-australia-is-ayers-rock-located-athe-center-bthe-west-cthe-east-coast-dthe-shore-of-the-coral-sea-59179/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.925829
2,759
3.3125
3
Dementia is one of several medical conditions associated with increased rates of depression. Depression in Alzheimer’s disease (AD), the most common form of dementia, occurs in up to 25 percent of patients, and is more frequently diagnosed in patients with mild to moderate AD. Even higher rates of major depression have been linked to dementias associated with Parkinson’s disease and strokes. Understanding what makes dementia patients particularly susceptible to depression is a focus of current research. One hypothesis is that depression occurs as a psychological reaction to the diagnosis of and limitations brought on by dementia. However, studies have not conclusively shown a correlation between rates of depression in patients with dementia and their awareness or insight into their disease. A second hypothesis is that physiological causes of dementia may also play a role in the development of depression. Post mortem studies of AD patients have revealed the loss of certain brain cells that are also associated with depression. Also, the high incidence of depression seen after stroke has led researchers to explore how reduced blood flow to the brain that occurs with stroke may cause cellular damage that may also be linked to depression. However research has yet to reveal conclusively that dementia and depression share pathophysiological mechanisms, underscoring the need for further investigation. Distinguishing symptoms of depression from those of dementia can be challenging, even for clinicians experienced in this area. Diagnosis of depression in a patient with dementia should take the following into account: - Other medical causes – The first step in the evaluation of an older adult with possible depression, with or without dementia, is to rule out possible medical causes through a careful history, and physical and laboratory evaluations. The patient’s medical history should include a review of medications, and the physical examination should screen for infections, metabolic disorders and malignancy. - Family and other caregivers– Because dementia is likely to affect a patient’s memory, it is important to involve those close to the patient in providing medical history. - Symptoms that are unlikely to be mimicked by dementia - Symptoms of dementia including apathy, impaired concentration, and loss of appetite may be difficult to distinguish from similar symptoms of depression. Symptoms more closely associated with depression include feelings of guilt and hopelessness, the belief that one is being punished, and thoughts of death or suicide. - Personal or family history – Personal history of depression or history of depression in first-degree relatives are both risk factors for developing depression late in life. A common misconception about persons with dementia and depression is that they are unable to benefit from psychotherapy. A growing body of research disputes that belief. Depending on how far the dementia has progressed, a patient may respond to cognitive-behavioral psychotherapy, and persons with advanced dementia may still benefit from behavior therapy as well as individualized art, music, and recreational therapies. Antidepressant medication may benefit some patients with dementia and depression. Drug therapies come with a unique challenge for these patients: because cognitive impairment can affect medication compliance, there needs to be a system in place to ensure that patients take their medication as prescribed. Depression can compound the disability experienced by patients with dementia. While diagnosing and treating depression can be challenging in these cases, the effort can be rewarded by improved quality of life for patients. Additional research is needed to identify effective therapies for this increasingly prevalent condition. Don’t miss part III, subscribe to the Hebrew SeniorLife blog and receive an email notification whenever new blogs are published. Memory Care at Assisted Living at NewBridge on the Charles NewBridge on the Charles offers the Gilda and Alfred A. Slifka Memory Care Assisted Living Residences to seniors with early stage and mid-stage Alzheimer's Disease and/or a related dementia. The Memory Care Assisted Living Residences at NewBridge on the Charles provides a personalized and meaningful assisted living experience for residents based on the history, preferences and goals of each individual. Short-term stays now available.
<urn:uuid:540087d0-aacf-431a-a22c-5b291b45d1e4>
CC-MAIN-2019-51
https://blog.hebrewseniorlife.org/depression-among-older-adults-dementia-double-trouble
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.93887
798
3.328125
3
In what year was the safety pin patented? Walter Hunt, of New York, NY, received patent #6,281 for the safety pin. Hunt’s pin was made from one piece of wire, which was coiled into a spring at one end and a separate clasp and point at the other end, allowing the point of the wire to be forced by the spring into the clasp. The safety pin was invented while Walter Hunt was twisting a piece of wire, trying to think of something that would help him pay off a fifteen dollar debt. He later sold his patent rights to the safety pin for four hundred dollars to the man that he owed the money to. The patent for the safety pin was granted on April 10, 1849. Walter Hunt was extremely creative, and in 1834 he built America’s first sewing machine, which also used the first eye-pointed needle. Walter Hunt’s other inventions included: a forerunner of the Winchester repeating rifle, a flax spinner, knife sharpener, streetcar bell, hard-coal-burning stove, artificial stone, road sweeping machinery, velocipedes, ice ploughs and mail making machinery. Tonight, we had a total of 28 people check in to the Net and, of those, 6 had the correct answer to the Trivia Question. Congratulations to: - Jerry – KD6JPD - Augie – KK6LBF - Mark – W6MWL - Leon – AF6TT - Louie – AD6UP - Bob – KB6YVA Thank you to everyone for supporting us by checking in to the weekly Net.
<urn:uuid:b70cba1a-662b-4c1c-9270-8858d00534f8>
CC-MAIN-2019-51
https://larepeater.org/2014/04/10/trivia-question-for-april-10-2014-the-safety-pin/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.965006
343
3.015625
3
English Literature & Writing This class is unique in the sense that it is a mix of 8th-12th grade English. However, because of the smaller class sizes, each class is able to accommodate each student’s specific needs and understanding. In this class, students will perform close critical readings of literature in a variety of genres from both the British and the American traditions, as well as a sampling of world literature based upon each term. Students are expected to write critically and analytically about the literature they read….students can expect to read a number of novels, plays, essays, poems, and short stories. Basic grammar, sentence structure, spelling and vocabulary will also be incorporated within the lesson plans. Students will be required to work on projects, group work, essays and reading work along with any applicating assignments.
<urn:uuid:f2292751-b4a7-468e-8415-485a798582ff>
CC-MAIN-2019-51
https://maplelakeacademy.education/english/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.959589
168
3.015625
3
Aimé-Fernand-David Césaire was a poet, playwright, philosopher, and politician from Martinique. In his long life (he was born on June 26, 1913, and died April 17, 2008), Césaire accomplished much in each of these roles, a rare feat as the disparate talents required for each rarely coincide in one person. In turn mayor of Fort-de-France, deputy to the French National Assembly for Martinique, and President of the Regional Council of Martinique, this prolific writer and intellectual was also co-founder of Négritude, a ‘literary movement of the 1930s, ’40s, and ’50s that began among French-speaking African and Caribbean writers living in Paris as a protest against French colonial rule and the policy of assimilation.’ (Encyclopædia Britannica). The Stanford Encyclopedia of Philosophy describes Négritude as ‘the self-affirmation of black peoples, or the affirmation of the values of civilization of something defined as “the black world” as an answer to the question “what are we in this white world?”’. The term was chosen so as to be provocative, a way of re-claiming the word nègre which had become a racial slur, while simultaneously shocking those who heard or read it into paying attention. Through his philosophy, political writing, and especially his poetry and plays, the world pays attention still. Learn more about the great Aimé Césaire: Aime Cesaire: Martinician Author and Politician ~ by the editors of Encyclopædia Britannica Aimé Fernand David Césaire (1913-2008) ~ by Sylvia Lovina Chidi, as chapter 1 of The Greatest Black Achievers in History – Négritude ~ by Souleymane Bachir Diagne for The Stanford Encyclopedia of Philosophy ~ Ordinary Philosophy is a labor of love and ad-free, supported by patrons and readers like you. Any support you can offer will be deeply appreciated!
<urn:uuid:4820146f-8cf1-4d9b-bf7d-51565a78e364>
CC-MAIN-2019-51
https://ordinaryphilosophy.com/tag/aime-fernand-david-cesaire/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.958539
431
2.953125
3
Posted to PFAF blog on 19 June 2018, updated with new featured image 11 October 2018. Many would agree that homegardening is going to be an important part of the solution to climate change. Eric Toensmeier has written about temperate as well as tropical homegardening traditions in China, where homegardens generate six times the income of farmland of the same size. He goes on to write about the movement to develop homegardens which emerged in Australia in the 1970s, and in Western temperate and even boreal regions such as the United States, Canada, Europe, one of the driving forces behind this having been the permaculture movement. Toensmeier writes that permaculture-inspired homegardens have been successful not only in humid temperate and boreal regions but also in arid and semi-arid temperate (such as Nevada and Colorado in the United States), in Mediterranean climates, and arid tropics and subtropics (such as Jordan and Arizona). Toensmeier sees great potential in homegardening in cold climates, but points to the lack of domestication of sufficient perennial crops besides fruits. The solution may be for homegardeners to follow the lead of Mandy Barber at Incredible Vegetables, where a wide variety of edible perennial crops are bring grown. Plants For A Future (PFAF) arose out of research carried out by Ken and Addy Fern on their 28 acre site in Cornwall. For ten years the charity which maintains the online database has been based in Dawlish, in the home of Chris Marsh and David Gearing. We are not plants experts but over the years have grown a reasonable variety of the usual vegetables and fruit crops. But having recently visited several local projects focusing on edible perennials we decided we should get some practical experience of growing some of these more unusual crops. We decided to learn by creating a new area for edible perennials in our garden, and starting with plants and advice from Incredible Vegetables. Our garden is on a one-in-five slope and we are ‘getting on a bit’ so we needed the area for our new bed to be terraced. More soil had to be brought in, and our first planting was of clover and phacelia seeds and potatoes, to make the soil ready for more permanent plantings next year. We also had four Hablitzia Tamnoides perennial spinach plants which Mandy gave us last year to start us off. They grew splendidly then, but had to be moved into pots while the new plot was terraced. This year, planted in the new bed, they struggled but are now getting going. Mandy told us that after five years Hablitzias can get to be six feet high, and then you get a big yield, with the main harvest coming in April to June, before other fresh greens are available. We also had a Daubenton’s kale plant Mandy gave us and a ‘walking onion’ we bought after her talk to Teign Estuary Transition Group in March. We have been discussing PFAF’s forthcoming book on Edible Shrubs with Mandy, and a year on from our first visit to Incredible Vegetables we have been back. We wanted to see the site again – like Ken Fern she calls it her ‘Field’ despite it being a gorgeously diverse garden and research site. We were curious to see which plants to be featured in Edible Shrubs are on her site, and how Mandy’s research project on Nine Star Broccoli is progressing. Also Mandy had promised us some more plants for our new perennials bed. We came away with four small Apios Americana or Hopniss, Indian potato, which she advised should be planted together in a large bottomless pot in soil with plenty of grit, and a tepee of canes for the plants to climb up; a Mashua, (Tropaeolum Tuberosum), which is related to garden nasturtiums; two Yacon and a Nine Star Perennial Broccoli. We looked again at Maddy’s plot and she also showed us round the adjacent forest garden to see plants which will feature in the forthcoming book on Edible Shrubs. (The forest garden is maintained by Ruth and Alex, other members of the group of eight friends who jointly own the 5½ acre site) In Mandy’s plot: [In Edible Shrubs list: ‘Aronia melanocarpa, Black Chokeberry’ https://www.pfaf.org/user/Plant.aspx?LatinName=Aronia+melanocarpa ] Mandy received this plant as a gift from someone who was moving from their allotment, so it’s a rescue plant she’s had for one year. Gooseberry in the fruit cage that’s full to overflowing with soft fruit plants. [In Edible Shrubs list: ‘Ribes uva-crispa, Goodberry’ https://www.pfaf.org/user/Plant.aspx?LatinName=Ribes+uva-crispa ] [In Edible Shrubs list: ‘Thymus vulgaris, Common Thyme’ https://www.pfaf.org/user/Plant.aspx?LatinName=Thymus+vulgaris ] In the forest garden: [In Edible Shrubs list: ‘Prunus cerasifera, Cherry Plum’ https://www.pfaf.org/user/plant.aspx?LatinName=Prunus+cerasifera ] Cherry Plums were planted on one edge of the plot as windbreaks, they are six years old. They have been prolific fruiters, although we saw relatively few fruits developing this year, possibly due to the cold spring conditions. [In Edible Shrubs list: ‘Ugni molinae, Chilean guava’ https://www.pfaf.org/user/plant.aspx?latinname=Ugni+molinae ] This produces fruit late in the year, which is small and sweet, tasting like bubblegum. (but the variety is unknown). It has edible berries. [In Edible Shrubs list: ‘Fuchsia coccinea, Scarlet fuchsia’ https://www.pfaf.org/User/Plant.aspx?LatinName=Fuchsia+coccinea ] [In Edible Shrubs list: ‘Eleagnus umbellata, Autumn Olive’ https://pfaf.org/user/Plant.aspx?LatinName=Elaeagnus+umbellata ] First planted 2011-12, fruits later in the year. Martin Crawford advised on what to grow here, with these as windbreak plants; they are now very dense. [In Edible Shrubs list: ‘Eleagnus rhamnoides, Sea Buckthorn’ https://www.pfaf.org/user/plant.aspx?LatinName=Hippophae+rhamnoides ] Male and female plants together. Fruit is good when made into smoothies. (Sagara from East Devon Forest Garden has huge plants.) Ruth and Alex and friends plan to plant tree collards here in the forest garden to try a very mixed planting. We mentioned edible shrubs mainly producing fruits, so their yields tend to be big harvests at particular times, then nothing. Mandy said fruiting can be spread by choosing species and varieties which fruit from early to late. They invite friends come to help pick for a share of the harvest. We agreed there is an issue with preserving the crop, refrigeration being a climate change and ozone layer problem (due to high energy use, and poor or absence of control of the damaging gases in refrigerants when appliances are scrapped), and jams etc. requiring lots of sugar or other sweeteners. We were shown the extensive bed newly planted with Nine Star Broccolis, for the research project. These are protected by fine black enviromesh held up by pots on sticks, for protection against root fly and cabbage white, until end of September. In between the plants there is crimson clover and the soil is dusted with granulated lime. The plants are individually labelled but there is also a separate plan. There are 225 plants, which is enough to form useful conclusions, although the advice is that ideally 1000s are needed for research. There are 12 types/sources, 20 of each type. Other plants we saw in Mandy’s garden: ‘Salad Blue’ potatoes. There was a bed newly planted with various squashes interspersed with nasturtiums to attract pollinators, and help cover bare earth instead of planting into fabric. (The local cafés like edible flowers, borage, calendula, violas and nasturtiums.) Around that area were tree collards from a kale expert in Norway. They have flowered but carried on growing. At one end of the bed there were red sweetcorn with the squashes. Mandy may add beans, perhaps mashua in between later. Tree collards, grown from cuttings taken in April. Tigrilia, which has edible flowers and tubers. Purple tree collard French perpetual leek Back home we prepared a section of our new bed to receive the plants we were given. We cleared an area cutting down the clover and phacelia, which had grown very thickly. When the new terraced beds were created last winter the soil level needed to be raised. The imported material provided by the landscapers was newly created compost from a council-run facility, rather than regular topsoil. They mixed the new material with the existing soil by rotavating. At the time we thought this would produce a good result, but we have found that it is remained claggy and hard to plant into without a lot of manual preparation. Anyway, as soon as the preparation was finished we planting the new arrivals, adding a light compost mix into the immediate growing area. The four Apios Americana needed special treatment. We cut the bottom out of a large plastic pot and set it in the ground, filled it short of the brim with compost including grit, then planted all four plants and put a pyramid of canes for them to grow up. Eric Toensmeier, The Carbon Farming Solution (White River Junction, Vermont, 2016), p. 44.
<urn:uuid:e76d5b16-9809-48bf-82c6-193f35d856bc>
CC-MAIN-2019-51
https://pfaf.org/plants/edible-perennials-on-a-small-scale-with-incredible-vegetables/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.950931
2,242
2.796875
3
September 21st is International Day of Peace. As an athlete, it’s hard to have peace of mind at a tournament or match with all the whistles, screams, and rush of everything happening around you. Stress from life can build up and cause you to have a bad game. Meditate: to focus one’s thoughts on: reflect on or ponder over Remember the championship game where you missed your serve every time you went back to the line? Or the bad passes that your teammates had to work harder to get the ball back in play? Stress, pain, or nerves; whatever the reason you were off your game, meditation can help. Everyone’s nerves get the better of them every now and then, but meditation will help you focus on your game. Meditation has shown many benefits for athletes. Imagine not feeling nervous before stepping onto the court for a big match, visualizing the win and achieving it, and being able to breathe better while on the court. - Sit up straight, right hand in the palm of the left or hands resting on your knees. Head looking straight forward in a relaxed position. Meditation can be done seated in a chair or on the floor, legs crossed. - Close your eyes and breathe. - Focus on your breathing and the inhale and exhale, if needed breathe for a four count to help concentrate. - After a few moments, start taking deeper breaths. Relax your mind and listen to the sounds around you. Let your mind empty. - As your mind empties, keep breathing and allow the stress to leave your body. - Start for 2-3 minutes and gradually add more time as you develop your practice. Professional and college athletes are taking notice of meditation and incorporating it into their athletic routines. Even four-time Olympic Medalist Kerri Walsh Jennings does it! New York Magazine
<urn:uuid:3bb4b816-4bae-409b-bf58-3ca5a5821708>
CC-MAIN-2019-51
https://side-out.org/sport-health/how-to-better-your-game-and-focus-through-meditation/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.942473
384
2.703125
3
Q: I learned very early in my career that contacts should be “Open to Alarm” and “Close on Status.” This term was used to eliminate the confusion of normally energized, de-energized, and shelf conditions. We always specify form C so we can use contact most appropriate for the application. This guideline avoided hazards from a broken wire. I would like to get your advice on what would be an excellent industrial reference to reinforce this with operators. Hiten A. Dalal, P.E., PMP Control & Automation Engineering team leader A: Prompted by the important topic you brought up, I will not only answer the question, but I will give a brief overview of switches and switching in general. This subject is also discussed in my handbook, in Chapter 4.21 of the 4th edition of the 2nd Volume. Another fine discussion can be found at https://en.wikipedia.org/wiki/Switch. As to the basics of swithches and contacts, I’m sure you know that a manual electric switch consists of the switching contacts, an actuator to bring the contacts together, terminals to connect the contacts to the conductor of an electric circuit, the insulating mounting provisions, and the enclosure, either separate from or integral to the mounting for the contacts. The switch is operated by moving the contacts closer together until the applied voltage causes an electrostatic failure of the gap. The ensuing electron flow heats the cathode and cools the anode contact until molecular welding occurs, creating a continuous metallic path and completing the circuit. Contact resistance is a measure of the degree to which the insulating gas remains between the contacts, preventing welding over their entire bearing area. It is directly proportional to contact pressure. You also know that switching action refers to the positions assumed by the contact in response to actuator motion. The two basic types include momentary action, which provides a contact closure and subsequent reopening with one actuation, and maintained action, which requires separate actuation to transfer the contacts from one extreme position to another and back. Other special switch types include: - Mechanical bail, which allows operation of only one control at a time, physically inhibiting depression of others. Automobile radio selectors are a typical example. - Electrical bail, which allows delayed or remote actuation, including sequencing of several controls. Solenoid operators frequently sequence rotary selectors or ganged push-buttons. - Sequential action, which opens one contact set in a specified order in relation to other contacts in the same control system. This type may involve simultaneous operation of several contact sets and repeated opening and closing of one contact set during one actuation. Now, coming to your specific question concerning contact arrangements, the number, type and arrangement of contacts and circuits determines the switching capacity. Table 1 lists the related terminology. The usual abbreviations used include: Normally open (NO): The circuit is open (current does not flow) when the contacts are not actuated. Moving them to the other extreme position completes (closes) the circuit. Normally closed (NC): The circuit is complete when the switch is not operated. Moving the contacts opens the circuits, interrupting current flow. Number of poles (P): The number of conductors in which current will be simultaneously started or interrupted by one operation of the switch. Number of throws (T): The number of positions at which the contacts will provide complete circuits. Since contacts usually have only two extreme positions, switches are either single-throw or double-throw. As shown in Figure 1, Form C contacts are composed of a normally-closed contact pair and a normally-open contact pair that are operated by the same actuator device. Instead of the term Form C, industrial users often use the alternate name SPDP (single-pole, double-throw) for this configuration. There is a common electrical connection between a contact of each pair that results in only three connection terminals. These terminals are usually labelled as normally open, common, and normally closed (NO-C-NC). These contacts are quite frequently found in electrical switches and relays as their common contact element provides a mechanically economical method of providing a higher contact count. A: We always used Form C relays for all applications, and used both contacts for the logic. The result was that a 1-0 or 0-1 were the only acceptable readings: 1-1 or 0-0 always indicated a fault (contact or wiring). We didn’t have a standard for a difference between alarm and status. I realize that this makes logic diagramming and programming a little more difficult, but reliability is far more important. Dick Caro , CEO, CMC Associates ISA Life Fellow A: NO, NC refer to the relay being de-energized or powered off. So, to have “open to alarm” condition, the NO contact would be used for this. A loss of power would look like the alarm condition. A good reference is https://en.wikipedia.org/wiki/Electrical_contacts. Bruce B. Burton R&D program manager A: NO and NC are the fundamental blocks of understanding any logic, be it soft or hardware. Normal condition is defined as energized condition and when plant/equipment/machine is running in normal condition, logic is true. NC means normally-closed contact. NO means normally-open contact. When the relay coil is de-energized, NC contact becomes open, and NO contact closes. For alert and emergency shutdown (ESD) logic, a break-to-alarm philosophy is employed so that during an emergency, NC contact will become open and trip/provide alarm. Normally, high (H) and high high (HH) switches (level, pressure, etc) are designed as NC. Low (L) and low low (LL) contacts are defined as NO. You can call me at +971504874184 for a detailed discussion. Deputy manager C&I, Petrofac A: This is very good observation, because this is not a well understood issue in many industrial and medical applications. Plus, there are unique issues when working with fiber optic sensor/switch systems. Fiber optic sensor systems consist of the sensor, fiber optic link and controller (which incorporates a relay providing dry contacts). Sensors typically use two fibers so the sensor, link and controller form a continuous optical loop when connected. The two states are referred to as MonitoringState and EmergencyState. The relay contacts (NO or NC) are used as is appropriate to the application. A microswitch plunger is mechanically triggered to the opposite state (moves an internal mirror so that the optical circuit is broken). In the normal monitoring state, the optical circuit is ON and continuity exists between the E-stop/switch and corresponding controller. With the E-stop in reset position, if the microswitch requires plunger DOWN, then NO order option is chosen. If the microswitch requires plunger UP, then NC order option is chosen. The emergency state is triggered by power loss, fiber optic link damaged, fiber optic disconnection or E-stop activated (plunger down breaks the internal optical circuit).
<urn:uuid:c9434c58-6e1a-46bc-9266-dabf4b8c3193>
CC-MAIN-2019-51
https://www.controlglobal.com/articles/2019/understanding-switch-configurations/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.925217
1,493
2.671875
3
On a recent Tuesday morning at the West Jordan library outside Salt Lake City, Peter Sadler was carefully stabbing an orange with a syringe. "Try to be as calm and collected as you can. Then gently, just place the needle in the orange and then inject the fluid," Sadler explained to several onlookers. Sadler works with Utah Naloxone, a nonprofit that teaches people how to use the fast-acting overdose reversal drug. He was there teaching librarians from around Salt Lake County. Trainings like this are increasingly common. The nonprofit holds them at universities, addiction recovery centers and hospitals. But this day marked a new development. That's because Salt Lake County is likely the first library system in the country to stock and distribute naloxone kits. Utah Naloxone and Intermountain Healthcare donated 400 kits which are now at 18 library branches. A little over 50 kits have been picked up to date, staff said. "Libraries are strategically placed around the county. It's a very comfortable environment for people to seek access for this," Sadler said. It's a new role for librarians, one that's being promoted by public health and drug enforcement officials but met with caution by some researchers. The idea came from a past overdose training between librarians and Utah Naloxone. Crista Warren was at the training with Sadler. She's the manager at the nearby Riverton library. "We have tax forms, we have e-books, we have books and audio things, we have great things to entertain our kids and programs, but this is something that can help someone save their lives," Warren said. According to the Centers for Disease Control and Prevention (CDC), around 115 people die from an opioid overdose every day in the U.S. Naloxone, also known commercially as Narcan, has been around since the 1970s . It used to be a prescription-only drug, but as the nation grapples with the devastating opioid epidemic many states have adopted laws to make it more accessible. And it's not only the public health community that's endorsing it. "It's literally just a miracle drug," said Brian Besser, the Drug Enforcement Administration's top agent in Utah. "From a public safety perspective, especially from a DEA perspective, we want to see Narcan and naloxone get into the hands of as many people as possible, whether it's private homes, educational institutions, faith-based institutions." Besser said. "We want to see that because if it saves lives, it saves lives. It's just that simple." There's no doubt that naloxone saves lives. But Anita Mukherjee, an economist at the University of Wisconsin worries that increasing access to the drug could create a false safety net. "There's no area in the U.S. where we see a statistically significant reduction in mortality because of naloxone access," Mukherjee said. Mukherjee recently co-authored a paper on what she calls the 'unintended consequences' of increased access to naloxone. Her state-by-state analysis showed no reduction in overdose deaths. In fact, according to her research, in the Midwest a 14 percent increase in opioid overdoses corresponded with increased access. Mukherjee worries that increase naloxone access to the drug could be changing how people act. "People might take more risks because you've basically now reduced the risk of death from overdose," Mukherjee said. She emphasized naloxone is an important life-saving drug. But she cautions that the overall effects on death rates are negligible if people don't get treatment for their addiction. Mukherjee's research has gotten considerable ushback from the public health community. Jennifer Plumb, a pediatrician and the co-founder of Utah Naloxone, said she disagrees with Mukherjee's conclusions and with the quality of the study. "You better have a pretty rigorous methodology and pretty good measures put into place if you're going to start making judgements like 'Boy this is either a net zero or possibly even making it worse,'" she said. Plumb questioned the researchers' use of Google search data to assess increased interest and awareness of naloxone. She said they also hadn't taken into account other changes, like states having not expanded Medicaid, which would lead to fewer treatment providers. Plumb stressed the importance of naloxone access programs at preventing overdose deaths. Sometimes this involves the same drug user getting the overdose reversal drug multiple times. And she says with a disease as complex as opioid addiction that's important if they're ever going to get into recovery. "Nothing is perfect in this realm, and of course naloxone isn't perfect either," she said. "Except if you can get it to somebody in time, it's perfect at making sure somebody's not dead." Correction (7/30/18): a previous version of this story misspelled the name the name Christa Warren as Chrystal Ward.
<urn:uuid:60516c2a-8031-41be-9ebc-94f812d96b35>
CC-MAIN-2019-51
https://www.kuer.org/post/public-libraries-get-your-tax-forms-summer-reading-lists-and-opioid-overdose-kits
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.968164
1,058
2.546875
3
Uninterruptible power supply |This article needs additional citations for verification. (March 2009)| An uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically mains power, fails. A UPS differs from an auxiliary or emergency power system or standby generator in that it will provide near-instantaneous protection from input power interruptions, by supplying energy stored in batteries, supercapacitors, or flywheels. The on-battery runtime of most uninterruptible power sources is relatively short (only a few minutes) but sufficient to start a standby power source or properly shut down the protected equipment. A UPS is typically used to protect hardware such as computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, fatalities, serious business disruption or data loss. UPS units range in size from units designed to protect a single computer without a video monitor (around 200 volt-ampere rating) to large units powering entire data centers or buildings. The world's largest UPS, the 46-megawatt Battery Electric Storage System (BESS), in Fairbanks, Alaska, powers the entire city and nearby rural communities during outages. - 1 Common power problems - 2 Technologies - 3 Other designs - 4 Applications - 5 Difficulties faced with generator use - 6 Communication - 7 Batteries - 8 Standards - 9 See also - 10 References - 11 External links Common power problems The primary role of any UPS is to provide short-term power when the input power source fails. However, most UPS units are also capable in varying degrees of correcting common utility power problems: - Voltage spike or sustained overvoltage - Momentary or sustained reduction in input voltage - Noise, defined as a high frequency transient or oscillation, usually injected into the line by nearby equipment - Instability of the mains frequency - Harmonic distortion: defined as a departure from the ideal sinusoidal waveform expected on the line UPS units are divided into categories based on which of the above problems they address,[dubious ] and some manufacturers categorize their products in accordance with the number of power-related problems they address. The three general categories of modern UPS systems are on-line, line-interactive or standby. An on-line UPS uses a "double conversion" method of accepting AC input, rectifying to DC for passing through the rechargeable battery (or battery strings), then inverting back to 120 V/230 V AC for powering the protected equipment. A line-interactive UPS maintains the inverter in line and redirects the battery's DC current path from the normal charging mode to supplying current when power is lost. In a standby ("off-line") system the load is powered directly by the input power and the backup power circuitry is only invoked when the utility power fails. Most UPS below 1 kVA are of the line-interactive or standby variety which are usually less expensive. For large power units, dynamic uninterruptible power supplies are sometimes used. A synchronous motor/alternator is connected on the mains via a choke. Energy is stored in a flywheel. When the mains power fails, an Eddy-current regulation maintains the power on the load as long as the flywheel's energy is not exhausted. DUPS are sometimes combined or integrated with a diesel generator that is turned on after a brief delay, forming a diesel rotary uninterruptible power supply (DRUPS). A fuel cell UPS has been developed in recent years using hydrogen and a fuel cell as a power source, potentially providing long run times in a small space. The offline/standby UPS (SPS) offers only the most basic features, providing surge protection and battery backup. The protected equipment is normally connected directly to incoming utility power. When the incoming voltage falls below or rises above a predetermined level the SPS turns on its internal DC-AC inverter circuitry, which is powered from an internal storage battery. The UPS then mechanically switches the connected equipment on to its DC-AC inverter output. The switchover time can be as long as 25 milliseconds depending on the amount of time it takes the standby UPS to detect the lost utility voltage. The UPS will be designed to power certain equipment, such as a personal computer, without any objectionable dip or brownout to that device. The line-interactive UPS is similar in operation to a standby UPS, but with the addition of a multi-tap variable-voltage autotransformer. This is a special type of transformer that can add or subtract powered coils of wire, thereby increasing or decreasing the magnetic field and the output voltage of the transformer. This is also known as a Buck–boost transformer. This type of UPS is able to tolerate continuous undervoltage brownouts and overvoltage surges without consuming the limited reserve battery power. It instead compensates by automatically selecting different power taps on the autotransformer. Depending on the design, changing the autotransformer tap can cause a very brief output power disruption, which may cause UPSs equipped with a power-loss alarm to "chirp" for a moment. This has become popular even in the cheapest UPSs because it takes advantage of components already included. The main 50/60 Hz transformer used to convert between line voltage and battery voltage needs to provide two slightly different turns ratios: One to convert the battery output voltage (typically a multiple of 12 V) to line voltage, and a second one to convert the line voltage to a slightly higher battery charging voltage (such as a multiple of 14 V). The difference between the two voltages is because charging a battery requires a delta voltage (up to 13–14 V for charging a 12 V battery). Furthermore, it is easier to do the switching on the line-voltage side of the transformer because of the lower currents on that side. To gain the buck/boost feature, all that is required is two separate switches so that the AC input can be connected to one of the two primary taps, while the load is connected to the other, thus using the main transformer's primary windings as an autotransformer. The battery can still be charged while "bucking" an overvoltage, but while "boosting" an undervoltage, the transformer output is too low to charge the batteries. Autotransformers can be engineered to cover a wide range of varying input voltages, but this requires more taps and increases complexity, and expense of the UPS. It is common for the autotransformer to cover a range only from about 90 V to 140 V for 120 V power, and then switch to battery if the voltage goes much higher or lower than that range. In low-voltage conditions the UPS will use more current than normal so it may need a higher current circuit than a normal device. For example to power a 1000-W device at 120 V, the UPS will draw 8.33 A. If a brownout occurs and the voltage drops to 100 V, the UPS will draw 10 A to compensate. This also works in reverse, so that in an overvoltage condition, the UPS will need less current. The online UPS is ideal for environments where electrical isolation is necessary or for equipment that is very sensitive to power fluctuations. Although once previously reserved for very large installations of 10 kW or more, advances in technology have now permitted it to be available as a common consumer device, supplying 500 W or less. The initial cost of the online UPS may be higher, but its total cost of ownership is generally lower due to longer battery life. The online UPS may be necessary when the power environment is "noisy", when utility power sags, outages and other anomalies are frequent, when protection of sensitive IT equipment loads is required, or when operation from an extended-run backup generator is necessary. The basic technology of the online UPS is the same as in a standby or line-interactive UPS. However it typically costs much more, due to it having a much greater current AC-to-DC battery-charger/rectifier, and with the rectifier and inverter designed to run continuously with improved cooling systems. It is called a double-conversion UPS due to the rectifier directly driving the inverter, even when powered from normal AC current. In an online UPS, the batteries are always connected to the inverter, so that no power transfer switches are necessary. When power loss occurs, the rectifier simply drops out of the circuit and the batteries keep the power steady and unchanged. When power is restored, the rectifier resumes carrying most of the load and begins charging the batteries, though the charging current may be limited to prevent the high-power rectifier from overheating the batteries and boiling off the electrolyte. The main advantage to the on-line UPS is its ability to provide an electrical firewall between the incoming utility power and sensitive electronic equipment. Voltage and frequency independent |This section does not cite any references or sources. (August 2011)| Voltage and Frequency Independent (VFI) is a type of online uninterruptible power supply (UPS) devices that offer protection against some common faults, such as power failures, frequency fluctuations, voltage swings and peaks, as well as low voltage and surges. In accordance with industrial standard IEC 62040-3, when a UPS is classified in class 1, this means within a time period from 100 to 5, the output voltage is not allowed to deviate from the tolerance range of +/- 30% under any conditions. This requirement can only be achieved using VFI technology. VFI UPSs are therefore in class 1. Hybrid topology / double conversion on demand These hybrid designs do not have official designations, although one name used by HP and Eaton is "double conversion on demand". This style of UPS is targeted towards high-efficiency applications while still maintaining the features and protection level offered by double conversion. A hybrid (double conversion on demand) UPS operates as an off-line/standby UPS when power conditions are within a certain preset window. This allows the UPS to achieve very high efficiency ratings. When the power conditions fluctuate outside of the predefined windows, the UPS switches to online/double-conversion operation. In double-conversion mode the UPS can adjust for voltage variations without having to use battery power, can filter out line noise and control frequency. Examples of this hybrid/double conversion on demand UPS design are the HP R8000, HP R12000, HP RP12000/3 and the Eaton BladeUPS. Ferro-resonant units operate in the same way as a standby UPS unit; however, they are online with the exception that a ferro-resonant transformer is used to filter the output. This transformer is designed to hold energy long enough to cover the time between switching from line power to battery power and effectively eliminates the transfer time. Many ferro-resonant UPSs are 82–88% efficient (AC/DC-AC) and offer excellent isolation. The transformer has three windings, one for ordinary mains power, the second for rectified battery power, and the third for output AC power to the load. This once was the dominant type of UPS and is limited to around the 150 kVA range. These units are still mainly used in some industrial settings (oil and gas, petrochemical, chemical, utility, and heavy industry markets) due to the robust nature of the UPS. Many ferro-resonant UPSs utilizing controlled ferro technology may not interact with power-factor-correcting equipment.[further explanation needed] A UPS designed for powering DC equipment is very similar to an online UPS, except that it does not need an output inverter. Also, if the UPS's battery voltage is matched with the voltage the device needs, the device's power supply will not be needed either. Since one or more power conversion steps are eliminated, this increases efficiency and run time. Many systems used in telecommunications use an extra-low voltage "common battery" 48 V DC power, because it has less restrictive safety regulations, such as being installed in conduit and junction boxes. DC has typically been the dominant power source for telecommunications, and AC has typically been the dominant source for computers and servers. There has been much experimentation with 48 V DC power for computer servers, in the hope of reducing the likelihood of failure and the cost of equipment. However, to supply the same amount of power, the current would be higher than an equivalent 115 V or 230 V circuit; greater current requires larger conductors, or more energy lost as heat. Most PCs can be powered with 325 V DC. This is because most ATX switching power supplies convert the AC input voltage to approximately 325 V DC (230 × √). On units with a voltage selector switch, the 115 V setting enables a voltage doubler that puts the top half of the AC wave in one capacitor, and the bottom half in the other capacitor. This mode uses half of the bridge rectifier and runs twice as much current through it. The 230 V setting simply rectifies the AC using the full bridge rectifier, and puts the it into both capacitors. These two capacitors are hardwired in series. These power supplies can almost always be safely run on 280–340 V DC long as the selector is in the 230 V position. They will not work at all with DC power in the 115 V position; with 162 V DC applied, nothing will happen because only one capacitor is being charged; if 325 V is applied, the fuse and a surge suppressor or capacitor will blow. Power supplies with Active-PFC are usually auto-ranging and have no voltage selector switch. They usually have one input capacitor; it is charged to 320-400 V DC by a boost-mode power supply that is part of the PFC circuit. It is uncertain how various auto-ranging and Active-PFC power supplies will respond to having DC power applied when they are expecting AC 50–60 Hz power. A laptop computer is a classic example of a PC with a DC UPS built in. High voltage DC (380 V) is finding use in some data center applications, and allows for small power conductors, but is subject to the more complex electrical code rules for safe containment of high voltages. A rotary UPS uses the inertia of a high-mass spinning flywheel (flywheel energy storage) to provide short-term ride-through in the event of power loss. The flywheel also acts as a buffer against power spikes and sags, since such short-term power events are not able to appreciably affect the rotational speed of the high-mass flywheel. It is also one of the oldest designs, predating vacuum tubes and integrated circuits. It can be considered to be on line since it spins continuously under normal conditions. However, unlike a battery-based UPS, flywheel-based UPS systems typically provide 10 to 20 seconds of protection before the flywheel has slowed and power output stops. It is traditionally used in conjunction with standby diesel generators, providing backup power only for the brief period of time the engine needs to start running and stabilize its output. The rotary UPS is generally reserved for applications needing more than 10,000 W of protection, to justify the expense and benefit from the advantages rotary UPS systems bring. A larger flywheel or multiple flywheels operating in parallel will increase the reserve running time or capacity. Because the flywheels are a mechanical power source, it is not necessary to use an electric motor or generator as an intermediary between it and a diesel engine designed to provide emergency power. By using a transmission gearbox, the rotational inertia of the flywheel can be used to directly start up a diesel engine, and once running, the diesel engine can be used to directly spin the flywheel. Multiple flywheels can likewise be connected in parallel through mechanical countershafts, without the need for separate motors and generators for each flywheel. They are normally designed to provide very high current output compared to a purely electronic UPS, and are better able to provide inrush current for inductive loads such as motor startup or compressor loads, as well as medical MRI and cath lab equipment. It is also able to tolerate short-circuit conditions up to 17 times larger than an electronic UPS, permitting one device to blow a fuse and fail while other devices still continue to be powered from the rotary UPS. Its life cycle is usually far greater than a purely electronic UPS, up to 30 years or more. But they do require periodic downtime for mechanical maintenance, such as ball bearing replacement. In larger systems redundancy of the system ensures the availability of processes during this maintenance. Battery-based designs do not require downtime if the batteries can be hot-swapped, which is usually the case for larger units. Newer rotary units use technologies such as magnetic bearings and air-evacuated enclosures to increase standby efficiency and reduce maintenance to very low levels. - A motor driving a mechanically connected generator, - A combined synchronous motor and generator wound in alternating slots of a single rotor and stator, - A hybrid rotary UPS, designed similar to an online UPS, except that it uses the flywheel in place of batteries. The rectifier drives a motor to spin the flywheel, while a generator uses the flywheel to power the inverter. In case No. 3 the motor generator can be synchronous/synchronous or induction/synchronous. The motor side of the unit in case Nos. 2 and 3 can be driven directly by an AC power source (typically when in inverter bypass), a 6-step double-conversion motor drive, or a 6-pulse inverter. Case No. 1 uses an integrated flywheel as a short-term energy source instead of batteries to allow time for external, electrically coupled gensets to start and be brought online. Case Nos. 2 and 3 can use batteries or a free-standing electrically coupled flywheel as the short-term energy source. In large business environments where reliability is of great importance, a single huge UPS can also be a single point of failure that can disrupt many other systems. To provide greater reliability, multiple smaller UPS modules and batteries can be integrated together to provide redundant power protection equivalent to one very large UPS. "N+1" means that if the load can be supplied by N modules, the installation will contain N+1 modules. In this way, failure of one module will not impact system operation. Many computer servers offer the option of redundant power supplies, so that in the event of one power supply failing, one or more other power supplies are able to power the load. This is a critical point – each power supply must be able to power the entire server by itself. Redundancy is further enhanced by plugging each power supply into a different circuit (i.e. to a different circuit breaker). Redundant protection can be extended further yet by connecting each power supply to its own UPS. This provides double protection from both a power supply failure and a UPS failure, so that continued operation is assured. This configuration is also referred to as 1+1 or 2N redundancy. If the budget does not allow for two identical UPS units then it is common practice to plug one power supply into mains power and the other into the UPS. When a UPS system is placed outdoors, it should have some specific features that guarantee that it can tolerate weather with no effect on performance. Factors such as temperature, humidity, rain, and snow among others should be considered by the manufacturer when designing an outdoor UPS system. Operating temperature ranges for outdoor UPS systems could be around −40 °C to +55 °C. Outdoor UPS systems can be pole, ground (pedestal), or host mounted. Outdoor environment could mean extreme cold, in which case the outdoor UPS system should include a battery heater mat, or extreme heat, in which case the outdoor UPS system should include a fan system or an air conditioning system. UPS systems can be designed to be placed inside a computer chassis. There are two types of internal UPS. The first type is a miniaturized regular UPS that is made small enough to fit into a 5.25-inch CD-ROM slot bay of a regular computer chassis. The other type are re-engineered switching power supplies that utilize dual AC or DC power sources as inputs and have built-in switching control units. The way efficiency is measured varies, and there are a number of reasons for this. Many UPS manufacturers claim to have the highest level of efficiency, often using different sets of criteria in order to reach these figures. The industry norm can be argued to be anything between 93%-96% when a UPS is in full operational mode, and to reach these figures companies often put their UPS in an ideal scenario. Efficiency figures on site are often much closer to the 90% mark, due to varying power conditions. Difficulties faced with generator use A problem in the combination of a "double conversion" UPS and a generator is the voltage distortion created by the UPS. The input of a double conversion UPS is essentially a big rectifier. The current drawn by the UPS is non-sinusoidal. This can cause the voltage from the AC mains or a generator to also become non-sinusoidal. The voltage distortion then can cause problems in all electrical equipment connected to that power source, including the UPS itself. It will also cause more power to be lost in the wiring supplying power to the UPS due to the spikes in current flow. This level of "noise" is measured as a percentage of "Total Harmonic Distortion of the current" (THD(i)). Classic UPS rectifiers have a THD(i) level of around 25–30%. To reduce voltage distortion, this requires heavier mains wiring or generators more than twice as large as the UPS. There are several solutions to reduce the THD(i) in a double conversion UPS: Passive power factor correction: Classic solutions such as passive filters reduce THD(i) to 5–10% at full load. They are reliable, but big and only work at full load, and present their own problems when used in tandem with generators. Active power factor correction: An alternative solution is an active filter. Through the use of such a device, THD(i) can drop to 5% over the full power range. The newest technology in double conversion UPS units is a rectifier that doesn't use classic rectifier components (thyristors and diodes) but high frequency components. A double conversion UPS with an IGBT rectifier and inductor can have a THD(i) as small as 2%. This completely eliminates the need to oversize the generator (and transformers), without additional filters, investment cost, losses, or space. |This section requires expansion. (December 2009)| Power management (PM) requires - The UPS to report its status to the computer it powers via a communications link such as a serial port, Ethernet and Simple Network Management Protocol, GSM/GPRS or USB - A subsystem in the OS that processes the reports and generates notifications, PM events, or commands an ordered shut down. Some UPS manufacturers publish their communication protocols, but other manufacturers (such as APC) use proprietary protocols. The basic computer-to-UPS control methods are intended for one-to-one signaling from a single source to a single target. For example, a single UPS may connect to a single computer to provide status information about the UPS, and allow the computer to control the UPS. Similarly, the USB protocol is also intended to connect a single computer to multiple peripheral devices. In some situations it is useful for a single large UPS to be able to communicate with several protected devices. For traditional serial or USB control, a signal replication device may be used, which for example allows one UPS to connect to five computers using serial or USB connections. However, the splitting is typically only one direction from UPS to the devices to provide status information. Return control signals may only be permitted from one of the protected systems to the UPS. As Ethernet has increased in common use since the 1990s, control signals are now commonly sent between a single UPS and multiple computers using standard Ethernet data communication methods such as TCP/IP. The status and control information is typically encrypted so that for example an outside hacker can not gain control of the UPS and command it to shut down. Distribution of UPS status and control data requires that all intermediary devices such as Ethernet switches or serial multiplexers be powered by one or more UPS systems, in order for the UPS alerts to reach the target systems during a power outage. To avoid the dependency on Ethernet infrastructure, the UPSs can be connected directly to main control server by using GSM/GPRS channel also. The SMS or GPRS data packets sent from UPSs trigger software to shutdown the PCs to reduce the load. The run-time for a battery-operated UPS depends on the type and size of batteries and rate of discharge, and the efficiency of the inverter. The total capacity of a lead–acid battery is a function of the rate at which it is discharged, which is described as Peukert's law. Manufacturers supply run-time rating in minutes for packaged UPS systems. Larger systems (such as for data centers) require detailed calculation of the load, inverter efficiency, and battery characteristics to ensure the required endurance is attained. Common battery characteristics and load testing When a lead–acid battery is charged or discharged, this initially affects only the reacting chemicals, which are at the interface between the electrodes and the electrolyte. With time, the charge stored in the chemicals at the interface, often called "interface charge", spreads by diffusion of these chemicals throughout the volume of the active material. If a battery has been completely discharged (e.g. the car lights were left on overnight) and next is given a fast charge for only a few minutes, then during the short charging time it develops only a charge near the interface. The battery voltage may rise to be close to the charger voltage so that the charging current decreases significantly. After a few hours this interface charge will spread to the volume of the electrode and electrolyte, leading to an interface charge so low that it may be insufficient to start the car. Due to the interface charge, brief UPS self-test functions lasting only a few seconds may not accurately reflect the true runtime capacity of a UPS, and instead an extended recalibration or rundown test that deeply discharges the battery is needed. The deep discharge testing is itself damaging to batteries due to the chemicals in the discharged battery starting to crystallize into highly stable molecular shapes that will not re-dissolve when the battery is recharged, permanently reducing charge capacity. In lead acid batteries this is known as sulfation but also affects other types such as nickel cadmium batteries and lithium batteries. Therefore it is commonly recommended that rundown tests be performed infrequently, such as every six months to a year. Testing of strings of batteries/cells Multi-kilowatt commercial UPS systems with large and easily accessible battery banks are capable of isolating and testing individual cells within a battery string, which consists of either combined-cell battery units (such as 12-V lead acid batteries) or individual chemical cells wired in series. Isolating a single cell and installing a jumper in place of it allows the one battery to be discharge-tested, while the rest of the battery string remains charged and available to provide protection. It is also possible to measure the electrical characteristics of individual cells in a battery string, using intermediate sensor wires that are installed at every cell-to-cell junction, and monitored both individually and collectively. Battery strings may also be wired as series-parallel, for example two sets of 20 cells. In such a situation it is also necessary to monitor current flow between parallel strings, as current may circulate between the strings to balance out the effects of weak cells, dead cells with high resistance, or shorted cells. For example, stronger strings can discharge through weaker strings until voltage imbalances are equalized, and this must be factored into the individual inter-cell measurements within each string. Series-parallel battery interactions Battery strings wired in series-parallel can develop unusual failure modes due to interactions between the multiple parallel strings. Defective batteries in one string can adversely affect the operation and lifespan of good or new batteries in other strings. These issues also apply to other situations where series-parallel strings are used, not just in UPS systems but also in electric vehicle applications. Consider a series-parallel battery arrangement with all good cells, and one becomes shorted or dead: - The failed cell will reduce the maximum developed voltage for the entire series string it is within. - Other series strings wired in parallel with the degraded string will now discharge through the degraded string until their voltage matches the voltage of the degraded string, potentially overcharging and leading to electrolyte boiling and outgassing from the remaining good cells in the degraded string. These parallel strings can now never be fully recharged, as the increased voltage will bleed off through the string containing the failed battery. - Charging systems may attempt to gauge battery string capacity by measuring overall voltage. Due to the overall string voltage depletion due to the dead cells, the charging system may detect this as a state of discharge, and will continuously attempt to charge the series-parallel strings, which leads to continuous overcharging and damage to all the cells in the degraded series string containing the damaged battery. - If lead-acid batteries are used, all cells in the formerly good parallel strings will begin to sulfate due to the inability for them to be fully recharged, resulting in the storage capacity of these cells being permanently damaged, even if the damaged cell in the one degraded string is eventually discovered and replaced with a new one. The only way to prevent these subtle series-parallel string interactions is by not using parallel strings at all and using separate charge controllers and inverters for individual series strings. Series new/old battery interactions Even just a single string of batteries wired in series can have adverse interactions if new batteries are mixed with old batteries. Older batteries tend to have reduced storage capacity, and so will both discharge faster than new batteries and also charge to their maximum capacity more rapidly than new batteries. As a mixed string of new and old batteries is depleted, the string voltage will drop, and when the old batteries are exhausted the new batteries still have charge available. The newer cells may continue to discharge through the rest of the string, but due to the low voltage this energy flow may not be useful, and may be wasted in the old cells as resistance heating. For cells that are supposed to operate within a specific discharge window, new cells with more capacity may cause the old cells in the series string to continue to discharge beyond the safe bottom limit of the discharge window, damaging the old cells. When recharged, the old cells recharge more rapidly, leading to a rapid rise of voltage to near the fully charged state, but before the new cells with more capacity have fully recharged. The charge controller detects the high voltage of a nearly fully charged string and reduces current flow. The new cells with more capacity now charge very slowly, so slowly that the chemicals may begin to crystallize before reaching the fully charged state, reducing new cell capacity over several charge/discharge cycles until their capacity more closely matches the old cells in the series string. For such reasons, some industrial UPS management systems recommend periodic replacement of entire battery arrays potentially using hundreds of expensive batteries, due to these damaging interactions between new batteries and old batteries,within and across series and parallel strings. - EN 62040-1-1:2006 Uninterruptible power systems (UPS) – Part 1-1: General and safety requirements for UPS used in operator access areas - EN 62040-1-2:2003 Uninterruptible power systems (UPS) – Part 1-2: General and safety requirements for UPS used in restricted access locations - EN 62040-2:2006 Uninterruptible power systems (UPS) – Part 2: Electromagnetic compatibility (EMC) requirements - EN 62040-3:2001 Uninterruptible power systems (UPS) – Part 3: Method of specifying the performance and test requirements - Battery room - Emergency power system - IT baseline protection - Power conditioner - Fuel cell applications - Surge protector - Switched-mode power supply (SMPS) - Switched-mode power supply applications - "Electricity storage: Location, location, location … and cost - Battery storage for transmission support in Alaska". eia.gov. Energy Information Administration (EIA). 2012. Retrieved July 23, 2012. - E-book on choosing a UPS topology based on application type "Avoiding Trap Doors Associated with Purchasing a UPS System" (PDF). - Solter, W. (2002), A new international UPS classification by IEC 62040-3, doi:10.1109/INTLEC.2002.1048709 - Detailed explanation of UPS topologies "High-Availability Power Systems, Part I: UPS Internal Topology" (PDF). November 2000. - Staco Energy – UPS On-line vs. Offline"UPS On-Line Uninterruptible Power Supply Backup Power Source". - Notes on the Troubleshooting and Repair of Small Switchmode Power Supplies: Switching between 115 VAC and 230 VAC input. Search the page for "doubler" for more info. Retrieved August 2012. - My Ton (Ecos Consulting), Brian Fortenbery (EPRI), William Tschudi (LNBL). DC Power for Improved Data Center Efficiency, Lawrence Berkeley National Laboratory, January 2007 - Active Power. . 15 Seconds versus 15 Minutes: White Paper 107 Designing for High Availability. - PSCPower. Hybrid Rotary UPS white paper. Power Quality and Rotary Systems. - Detailed explanation of optimized N+1 configurations"Balancing Scalability and Reliability in the Critical Power System: When Does N + 1 Become Too Many + 1?" (PDF). - Detailed explanation of UPS redundancy options"High-Availability Power Systems, Part II: Redundancy Options" (PDF). - Refer to safety standard IEC 60950-22 or a local derivative according to location e.g. EN 60950-22 (Europe); UL 60950-22 (USA) - Raymond, Eric Steven. UPS HOWTO, section 3.3. The Linux Documentation Project, 2003–2007. - Generex, User Manual: Multi-XS is an active RS232 data switch, designed to handle serial communications of one UPS with up to 5 / 10 computers http://www.generex.de/generex/download/manuals/manual_MULTIXS_en.pdf - APC AP9207 Share-UPS, User Manual, pp. 6–7, Port 1 is called the Advanced port because it supplies smart signaling, which provides the advanced capabilities available to a server running PowerChute plus software. The Advanced port provides full access to the Computer Interface port of the UPS. Ports 2–8 on the rear panel of Share-UPS are called Basic ports because they supply simple UPS signaling for On Battery and Low Battery conditions in the UPS. http://www.apcmedia.com/salestools/ASTE-6Z5QCB_R0_EN.pdf - An example of an Ethernet UPS controller: Liebert IntelliSlot Web Card Communications Interface Card http://emersonnetworkpower.com/EN-US/PRODUCTS/MONITORING/FORLARGEDATACENTER/ADVANCEDMONITORING/Pages/LiebertIntelliSlotWebCardCommunicationsInterfaceCard.aspx - APC Application Note #67, APC Network Management Card Security Implementation http://www.apcmedia.com/salestools/VAVR-5ZJSVU_R2_EN.pdf - "How to calculate battery run-time". PowerStream Technologies. Retrieved 2010-04-26. - Saslow, Wayne M. (2002). Electricity, Magnetism, and Light. Toronto: Thomson Learning. pp. 302–4. ISBN 0-12-619455-6. - Maintaining Mission Critical Systems in a 24/7 Environment By Peter M. Curtis, pp. 261–262 - Emergency and backup power sources: preparing for blackouts and brownouts By Michael F. Hordeski - Leonardo Energy, Maintenance Manager's Guide, Section 2.1 http://d5.leonardo-energy.org/webfm_send/4011 - APC Inc, Knowledgebase article: What is the expected life of my APC UPS battery?, Answer ID 8301, http://nam-en.apc.com/app/answers/detail/a_id/8301/kw/runtime+calibration/session/L3RpbWUvMTMyMTMxMzA4My9zaWQvM0pOZkE3Sms%3D - The Data Center Journal: Maintaining and Testing Your UPS System to Ensure Continuous Power, Section: Maintaining a Battery Bank, http://www.datacenterjournal.com/facilities-news/306-electricalElectrical/2639-maintaining-and-testing-your-ups-system-to-ensure-continuous-power - BTECH Inc, BTECH's Focus – Predicting Battery Failure http://www.btechinc.com/btech-focus-battery%20failure.shtml and Installation Manual, page 18, showing sensor wires for each cell/battery on a battery string, and also note that the current transducer sensors to detect cross-string series-parallel current recirculation http://www.btechinc.com/docs/S5/S5%20Installation%20Manual.pdf - Battery and Energy Technologies, Cell Balancing, Woodbank Communications Ltd, Chester, UK http://www.mpoweruk.com/balancing.htm - Battery Asset Management: VRLA ageing characteristics, Bart Cotton, founder and CEO, Data Power Monitoring Corporation, Batteries International, Jan 2005 https://datapowermonitoring.com/pdfs/battery_asset_mgmt.pdf |Wikimedia Commons has media related to Uninterruptible power supply.| - Scott Siddens (February 2007), UPS on the front line, Plant Engineering, archived from the original on 2009-11-09 - Cottuli, Carol (2011), Comparison of Static and Rotary UPS, Schneider Electric, White Paper 92 rev. 2, retrieved April 7, 2012 - Rasmussen, Neil (2011), The Different Types of UPS Systems, Schneider Electric, White Paper 1 rev. 7, retrieved April 7, 2012 - VanDee, Dawn (March 1, 1999), "Rounding Up Rotary UPS Features", EC&M (Penton Business Media), retrieved April 7, 2012 - UPS Basics. Eaton Corporation. 2012. Retrieved 2014-01-08. - Rastogi, Geetika (2013), Running UPS in Economy Mode To Save Energy Summarys, Riello-PCI, White Paper, retrieved April 22, 2014
<urn:uuid:cc2f1fbe-1224-45c3-af04-04917b6d475b>
CC-MAIN-2019-51
https://www.redwireservices.com/wp-content/uploads/2011/06/Uninterruptible_power_supply
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.908453
8,232
3.265625
3
A wedge is a type of simple machine that is a variation of another simple machine, the inclined plane, which makes it easier to move something to a higher or lower location. However, wedges, made from two inclined planes, are used to cause separations. Shovels, scissors, axes, pick axes, saws and ice picks are all examples of wedges that push things apart. Other wedges that drive into materials and force them to split are chisels, jackhammers, bulldozers, snow plows, horse plows, airplane wings and bows of boats or ships. Though separation of materials is clearly involved, some wedges, such as staples, push pins, tacks, nails, zippers and doorstops, are ultimately used to hold things together. When a wedge is narrow, or when it has a sharp point, it is more effective at separating things. For example, narrow fork tines force bits of food apart better than thick tines do. A knife is also a wedge, and sharper knives slice food with less effort. Needles are wedges that come in a variety of sizes and shapes in order to complete different tasks. It is inefficient to use a ballpoint needle, which is rounded, when working with densely woven fabric such as denim. A sharp-point needle pushes through the stiff material better.
<urn:uuid:2fe134fe-dbdf-4970-a21d-b574bddb44ef>
CC-MAIN-2019-51
https://www.reference.com/math/examples-wedges-b986da01eb3caf97
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00092.warc.gz
en
0.949713
276
3.703125
4
|Native to||United States| |Region||Southern Oregon and northern California| |Ethnicity||170 Klamath and Modoc (2000 census)| |Extinct||2003, with the death of Neva Eggsman| Klamath (//), also Klamath–Modoc (/ /) and historically Lutuamian (//), is a Native American language that was spoken around Klamath Lake in what is now southern Oregon and northern California. It is the traditional language of the Klamath and Modoc peoples, each of whom spoke a dialect of the language. By 1998, only one native speaker remained. and by 2003, this last fluent Klamath speaker who was living in Chiloquin, Oregon, was 92 years old. As of 2006 there were no fluent native speakers of either the Klamath or Modoc dialects. Klamath is a member of the Plateau Penutian language family, which is in turn a branch of the proposed Penutian language family. Like other proposed Penutian languages, Plateau Penutian languages are rich in ablaut, much like Indo-European and Afro-Asiatic languages. Further evidence for this classification includes some consonant correspondences between Klamath and other alleged Penutian languages. For example, the Proto-Yokuts retroflexes */ʈ ʈʼ/ correspond to Klamath /tʃ tʃʼ/, and the Proto-Yokuts dentals */t̪ t̪ʰ t̪ʼ/ correspond to the Klamath alveolars /t tʰ tʼ/. |Close||i ~ ɪ||iː| |Open-mid||e ~ ɛ||ɛː||o ~ ɔ||ɔː| |Open||a ~ ɑ||ɑː| Most consonants can be geminated. The fricative /s/ is an exception, and there is evidence suggesting this is a consequence of a recent sound change. Albert Samuel Gatschet recorded geminated /sː/ in the late 19th century, but this sound was consistently recorded as degeminated /s/ by M. A. R. Barker in the 1960s. Sometime after Gatschet recorded the language and before Barker did the same, */sː/ may have degeminated into /s/. Klamath word order is conditioned by pragmatics. There is no clearly defined verb phrase or noun phrase. Alignment is nominative–accusative, with nominal case marking also distinguishing adjectives from nouns. Many verbs obligatorily classify an absolutive case. There are directive and applicative constructions. - Klamath at Ethnologue (18th ed., 2015) - Lane, Valeree. "Chiloquin man helps Klamath Tribal members embrace first language". Herald and News. Retrieved 2018-03-01. - Hammarström, Harald; Forkel, Robert; Haspelmath, Martin, eds. (2017). "Klamath-Modoc". Glottolog 3.0. Jena, Germany: Max Planck Institute for the Science of Human History. - Laurie Bauer, 2007, The Linguistics Student’s Handbook, Edinburgh - Chen, 1998; Maudlin, 1998, - Haynes, Erin F. "Obstacles facing tribal language programs in Warm Springs, Klamath, and Grand Ronde" (PDF). Coyote Papers. 8: 87–102. Archived from the original (PDF) on 2010-07-09. Retrieved 2012-08-30. - Golla, Victor. (2011). California Indian Languages. Berkeley/Los Angeles, California : University of California Press. ISBN 9780520266674 - "Language - Klamath Tribes". klamathtribes.org. The Klamath Tribes. Retrieved May 2, 2018. - Blevins, 2004, p. 279. - Blevins, 2004, pp. 279–80. - Blevins, 2004. - Rude, 1988. - Barker, M. A. R. (1963a). Klamath Texts. University of California Publications in Linguistics, volume 30. Berkeley/Los Angeles: University of California Press. - ———. (1963b). Klamath Dictionary. University of California Publications in Linguistics 31. Berkeley/Los Angeles: University of California Press. - ———. (1964). Klamath Grammar. University of California Publications in Linguistics 32. Berkeley/Los Angeles: University of California Press. - Barker, Philip. (1959). The Klamath language. Dissertation, University of California, Berkeley - Blevins, J. (2004, July). Klamath sibilant degemination: Implications of a recent sound change. IJAL, 70, 279–289. - Chen, D. W. (1998, April 5). Blackboard: Lost languages; Kuskokwim not spoken here. New York Times. - de Angulo, Jaime (1931). The Lutuami language (Klamath-Modoc). Société des Américanistes. OCLC 27210767. - Maudlin, W. S. (1998, April 17). Yale linguists part of effort to save dying languages. The Yale Herald. Retrieved May 6, 2008 - Rude, Noel (1987). Some Sahaptian-Klamath grammatical correspondences. Kansas Working Papers in Linguistics, 12:67-83. - Rude, Noel (1988). Semantic and pragmatic objects in Klamath. In In Honor of Mary Haas: From the Haas Festival Conference on Native American Linguistics, ed. by William Shipley, pp. 651–73. Berlin: Mouton de Gruyter. - Rude, Noel (1991). Verbs to promotional suffixes in Sahaptian and Klamath. In Approaches to Grammaticalization, ed. by Elizabeth C. Traugott and Bernd Heine. Typological Studies in Language 19:185-199. New York and Amsterdam: John Benjamins Publishing Company. - Coville, Frederick Vernon (1897). Notes on the plants used by the Klamath Indians of Oregon. Retrieved 2012-08-30. Includes Klamath language plant names. - Gatschet, Albert S. (1890). "The Klamath Indians of southwestern Oregon". Retrieved 2012-08-30. - Gatschet, Albert S. (1880). The numeral adjective in the Klamtah language of southern Oregon. Retrieved 2012-08-30. - Gatschet, Albert S. (1878). "Sketch of the Klamath language of Southern Oregon". Retrieved 2012-08-30. - The Klamath Tribes Language Project - Languages of Oregon: Klamath - Klamath-Modoc language, native-languages.org - Modoc language overview at the Survey of California and Other Indian Languages - Klamath language, California Language Archive - OLAC resources in and about the Klamath-Modoc language - Klamath Bibliography
<urn:uuid:5ebc1cbe-0896-4043-913a-8a45101abcb3>
CC-MAIN-2019-51
http://en.turkcewiki.org/wiki/Klamath-Modoc_language
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.655811
1,568
3.796875
4
Efficacious drug transporters First drug delivery method developed for mitochondrial diseases What do Huntington’s disease, Lou Gehrig’s disease (familial amyotrophic lateral sclerosis; the disease the physicist Stephen Hawking is suffering from) and Alzheimer’s disease have in common? The answer is mitochondria; these diseases are now called mitochondrial diseases. These incurable degenerative neurological or neuromuscular diseases, together with apoptosis (programmed cell death) and aging, are understood to occur largely at mitochondria sites. What then are mitochondria? Mitochondria (plural of mitochondrion) are part (organelle) of every cell in the body that contains genetic material. Mitochondria are responsible for processing oxygen thus converting foodstuff we eat into energy in the form of ATP for essential cellular functions; hence mitochondria are called “the powerhouse” of cells. Mitochondria are the only other organelle than nucleus that contains DNA. Nuclear DNA has two copies per cell (except for sperm and egg), and each copy is inherited from the father and the mother. However, mitochondria contain their own DNA (ca. 1 percent of the total DNA), typically 5-10 copies, all inherited from the mother! Mitochondrial medicine is an important newly developing medical subspecialty dealing with the mitochondrial diseases. However, development of therapeutic agents in this area has been extremely slow, at least in part, due to the lack of an appropriate means of delivering a drug selectively to mitochondria. Now this dire situation may change for the better. Professor Sung-Kee Chung of Department of Chemistry and his coworkers in the Bioorganic and Medicinal Chemistry Lab recently reported their progress in developing organelle selective drug delivery vectors in Angewandte Chemie, a premier chemical research journal. (Angewandte Chemie Int. Ed. 2007, 46, 5880) In this paper Dr. Chung and his team describe the design and synthesis of the first molecular transporters that show high intracellular selectivity toward mitochondria. Human tissues and organs, especially the central nervous system including the brain, are tightly guarded by various security barriers. Any effective therapeutic agent must penetrate into these security blankets in order to have the desired curative effects. Thus, for the treatment of the neurological and neuromuscular mitochondrial diseases a drug should overcome the blood brain barrier and selectively target mitochondria. The newly developed drug transporters which are based on the sorbitol scaffold, a sugar-like molecule have shown to be capable of achieving these two goals. “In the following phase of research we will try to actually demonstrate, in collaboration with many biologists and doctors, the efficacy of this technology by delivering therapeutic agents and genes to mitochondrial sites of diseased neural cells.” Dr. Chung said. Professor Sung-Kee Chung Department of Chemistry
<urn:uuid:2d91e228-bfdf-47ff-a680-8a9c1049b9c6>
CC-MAIN-2019-51
http://home.postech.ac.kr/eng/efficacious-drug-transporters/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.910003
592
3.078125
3
If you have teens at home, you know that staying on top of their dental health can be a challenge! Face it: they’re super busy, they no longer let us monitor or assist in their brushing and flossing, and the result is that most parents aren’t sure if their teens are taking care of their teeth! Here are some tips to help you stay on top of your teen’s teeth and encourage them to adopt healthy habits on their own. Put a Ceiling on Soda While you can’t control what your teens drink when they aren’t home, you can do so at home. The sugar in sodas coats the teeth, literally bathing them in acid. Sugar-free sodas are no better, as what they lack in sugar they make up for with flavor additives that erode tooth enamel. Here are 3 tips to mitigate the damage that sodas can inflict on dental health: - Encourage children of any age (as well as yourself) to drink beverages with a straw to limit the contact the beverage has with the teeth. - Rinse the mouth with water after drinking soda or any sugary beverage. This includes fruit juice and sugar-free drinks. - Stock lots of cold, bottled water and/or provide filtered water for water bottles and encourage your teens and kiddos of all ages to choose water over soda or other sugary drinks. Safeguard with Mouth Guards Children of all ages have what’s called “personal fable,” a belief that one is so unique that life’s difficulties will not affect them regardless of their behavior, and that what happens to others won’t happen to them. For that reason, children often do not understand that they should wear a mouth guard every single time that they engage in contact sports, whether it’s organized sports or a pickup game among friends. Here are 2 tips to avoid tooth damage or loss during sports: - Be sure your child has a mouth guard. You can get a custom-fitted mouth guard through our pediatric dental practice or pick up one at a sporting goods store, Target or other outlet. Keep it clean and store in a ventilated container to avoid bacterial growth. - Encourage your child to wear the mouth guard, just as you insist they wear a helmet when skateboarding or riding a bike. It does them no good if it sits in a drawer or sports bag. Oral piercings can have devastating effects on dental health. Unfortunately, they’re still very popular with teens. Oral jewelry can chip or even fracture teeth, damage oral tissues through bacterial infections, puncture the tongue, and more. The sole tip I have about oral piercings is that parents should insist their children not have them. Hone In On Healthy Snacks Kids of all ages love junk food. Make it easy for them to find healthier snacks by stocking the frig and cupboards with fruit, carrot sticks, cheeses, yogurt, popcorn and other foods that can be eaten on the go, in the hand, and taken to school, rehearsals, sports practices & events, and part-time jobs. Ban Bad Breath in Teens Teens worry about their interaction with their peers. They worry about their hair, their clothing, their makeup, their weight—you name it. They also worry about bad breath. You can help your teens with these tips: - Chew sugarless gum made with xylitol that’s approved by the American Dental Association. - Drink lots of water throughout the day to remove food debris. - Cut down on sugar to keep the mouth low on acid and bacteria. Make Tobacco Taboo Kids like to experiment. Studies show they will experiment with weed, tobacco and vaping. Be sure they understand the damage to their teeth when they engage in these habits—particularly the fact that it will discolor their teeth and give them very bad breath, two things that most teens will want to avoid! Set The Example You still have an enormous amount of influence on your teens. Setting a good example with positive dental behaviors, such as brushing & flossing twice a day, abstinence from tobacco, choosing water over sugary drinks and twice-yearly visits to the dentist will go a long way in molding their behaviors. The Bottom Line Here in our Lower Manhattan pediatric dental practice, we treat children of all ages, including teens. If we haven’t seen your teen within the past six months, please make an appointment by calling at 212-267-0029.
<urn:uuid:683feac4-9e88-4b41-85b4-e34326e24381>
CC-MAIN-2019-51
http://ismilekids.com/blog/2019/08/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.949854
948
2.71875
3
Presentation on theme: "The Hare and The Tortoise Originally told by Aesop."— Presentation transcript: The Hare and The Tortoise Originally told by Aesop Tier 1 Story Jacob’s Ladder Goals & Objectives Habits of Mind The Hare was once boasting of his speed before the other animals. "I have never yet been beaten," said he, "when I put forth my full speed. I challenge any one here to race with me." The Tortoise said quietly, "I accept your challenge." "That is a good joke," said the Hare; "I could dance round you all the way." "Keep your boasting till you've won," answered the Tortoise. "Shall we race?" So a course was fixed and a start was made. The Hare darted almost out of sight at once, but soon stopped and, to show his contempt for the Tortoise, lay down to have a nap. The Tortoise plodded on and plodded on, and when the Hare awoke from his nap, he saw the Tortoise just near the winning- post and could not run up in time to save the race. Then the Tortoise said: "Slow but steady progress wins the race." Students will be able: Ladder B B1: Details - To list specific details or recall facts related to the text or generate a list of ideas about a specific topic or character. B2: Classifications - To categorize different aspects of the text or identify and sort categories from a list of topics or details. B3: Generalizations - To make general statements about a reading and/or idea within the reading, using data to support their statements. Ladder C C1: Literary Elements-To identify and explain specific story elements. C2 : Inference—To use textual clues to read between the lines and make judgments about specific textual events, ideas, or character analysis. C3: Theme and Concept—To identify a major theme or ideas common throughout the text. F1: Understanding Words – to identify and explain the meaning of figurative language or new vocabulary within the context of a story or poem. F2: Thinking About Words – to analyze the use of words within the context as related to the theme of a text. F3: Playing With Words – to accurately apply figurative language and new vocabulary to newly created contexts. Habits of Mind Working Interdependently Thinking about Thinking (metacognition) Innovating, Creating, Imagining Refer to Jacob’s Ladder Story Table for Ladder B, C & F Thinking Questions. Tier 2 Rigor (Discussion) High Level Strategies with Ladder B & C Questions Discussion Strategies: Think-Pair-Share, Write-around, Sequencing pictures, Commercial role playing Choose 2 of 3 questions below to complete. B1: In this fable, the turtle won by being persistent. How can you prioritize as many qualities as you can that help you win? B2: Classify all the words used in B1 into three or more categories. C2: What do you think makes this fable unusual or unexpected? Support your answer with examples from the story. Tier 3 Rigor (Discussion) High Level Strategies with Ladder B & C Questions Discussion Strategies: Think-Pair-Share, Write-around; role play. Choose 2 of 3 questions below to complete. B3: Based on what you know about qualities that help you win what two statements can you write that are true about all winners. C1: Compare and contrast the hare and the tortoise. Print out the Venn diagram on last slide. C3: Why do you think the tortoise made the statement: “Slow but steady progress wins the race”? Defend your answer with story examples or your own personal experience. Choose one of the writing ideas to complete. Be creative. 1.Plan a new ending for the story. Include 4 different settings in your new ending. Produce a wordless book or strategy of your choice to retell the story ending. 2. Draw a model of the racecourse on a 11” x 18” piece of construction paper. Discuss different symbols you might use. A red star might show the starting spot. A green triangle is the tree where the hare stopped. Glue a small picture of the hare on a paper clip and do the same with the tortoise. Generate a Hare and Tortoise game. S uggested project strategies: Create a puppet show; Design a poster, flyer, brochure; Make wordless books
<urn:uuid:412ed295-04fe-4452-b7a0-4984713d2994>
CC-MAIN-2019-51
http://slideplayer.com/slide/5936861/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.912286
947
3.640625
4
“What is Mindfulness?” I feel that perhaps the most simple and clear definition is one given by renowned mindfulness expert and teacher Jon Kabat-Zinn: “Mindfulness means paying attention in a particular way: on purpose, in the present moment, and nonjudgmentally.” Let’s look to the wisdom of Dan J. Siegel, another leader in the world of Western mindfulness for his explanation: “Mindfulness in its most general sense is about waking up from a life on automatic, and being sensitive to novelty in our everyday experiences. With mindful awareness the flow of energy and information that is our mind enters our conscious attention and we can both appreciate its contents and come to regulate its flow in a new way. Mindful awareness, as we will see, actually involves more than just simply being aware: It involves being aware of aspects of the mind itself. Instead of being on automatic and mindless, mindfulness helps us awaken, and by reflecting on the mind we are enabled to make choices and thus change becomes possible.” “Cool, so it can help me regulate my attention and make changes! So what does that do for my everyday life?” Buddhist monk Thich Nhat Hanh says simply: “When we are mindful, deeply in touch with the present moment, our understanding of what is going on deepens, and we begin to be filled with acceptance, joy, peace and love.” Wow! That sounds pretty good. But is it really as good as it sounds? As the “Community of Interbeing UK” States: “Mindfulness is now being recognised as offering significant benefits in mental and physical well-being. With it, we can train our minds to improve our memory, concentration, creativity, and resilience to deal with life’s challenges. It is believed to improve our immune systems, heart and circulatory health, and is now widely used in pain management. With it we can also gain the insight to live more peacefully and joyfully every moment of every day.” How do I get started with practicing mindfulness?” May 1st 2018 I am running a Mindfulness Basics Masterclass! Click here for more info.
<urn:uuid:46ff99ba-77a6-4b34-b759-7c3b8fdd0b45>
CC-MAIN-2019-51
http://www.reawakening-natural-resilience.com/uncategorized/what-is-mindfulness/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.948479
471
2.53125
3
Those lights are used to show obstacles that may interfere with the aircraft's course, such as antennas, buildings, wind turbines, and they are mandatory. The name of those lights is Aircraft Warning Lights, and here is an article from Wikipedia about them. Yes, the lighting is helpful for collision avoidance. The red lights are helpful, but the white strobes can be even better for visibility. When I am flying very low to the ground I am far more concerned about towers and windmills (or occasionally high tension power lines) than buildings. Fortunately all of my really low flying for work is done during daylight hours, but in heavy overcast or other low-light conditions the lights are very helpful. Most tall buildings are in congested areas and most flight operations will be required to maintain an altitude of 1000 feet or more above such structures. The presence of towers in excess of 500 feet, and especially in excess of 1000 feet, in uncongested areas posses a much more credible threat to VFR low level flight. The FAA describes the standards for structure and tower lighting in AC70/7460-1L. Generally, any structure that exceeds 200 ft AGL should be marked and/or lighted. Note that, though the lighting may be mandatory, it may be NOTAMed out of service. For example: !SFF 02/009 SFF OBST TOWER LGT (ASR 1060807) 473535.00N1171750.00W (5.5NM S SFF) 3971.1FT (352.4FT AGL) OUT OF SERVICE To answer your question directly, no, they are not used to indicate that you are too close to the ground. Some of them are over 1500 feet high. They are used so you do not fly into them for obvious reasons or fly too close to them for less obvious reasons: - Some are powerful transmitters and can interfere with the systems on the aircraft. - Towers often have support wires which extend a long way from the obstacle with the light and do not have lights themselves. Too close to the ground is figured out by looking; by the altimeter; by charts and by planning. The red light just means "keep away!" Whilst this paper focusses primarily on the ability of high powered EMR sources to cause ignition sparks up to 30kms away (!), it also shows how dangerous they are up to hundreds of metres away. If anyone remains unconvinced that powerful transmitters need to be avoided by aircraft, please let me know and I'll do some more digging, but for now, I have an "all nighter" I need to pull to deliver a project tomorrow so I may be some time.... Before the lights were installed, this happened... (second picture via Pinterest) A better picture of this incident (a 1915 Sopwith Baby at Horsea Island in 1917) appears in the front of the 1925 edition of the "Admiralty Handbook of Wireless Telegraphy" in a slightly snarky advert, captioned "A proof of the quality of Elwell masts".
<urn:uuid:6fb09699-4c39-4c6d-ac31-c1fa04fbc90b>
CC-MAIN-2019-51
https://aviation.stackexchange.com/questions/25572/is-it-true-that-the-red-lights-on-building-antennas-help-the-aircraft-detect-vi
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.949205
647
2.5625
3
What is information? The lack of a working definition plagued both science and the emerging telecommunications industry until the arrival of Claude Shannon and his famous 1948 paper, “A Mathematical Theory of Communication”, based on his cryptography work during WWII while at Bell Labs. The landmark article is considered the founding work of the field of information theory, and would augment Shannon’s earlier groundbreaking research at MIT into the design of digital circuits and digital computers. - As a measure of entropy (the formula exactly mirrors Boltzmann’s definition of thermodynamic entropy) - As the resolution of uncertainty - As a measure of surprise While that first definition has captured the attention of the likes of physicist Stephen Hawking and has implications for cosmology, black holes and a holographic universe, it’s the latter two that are of interest to us for the moment. It was also Shannon who coined the term, “bit”, for “binary digit”, but unlike everyone up to that point, he didn’t define information as simply a quantitative count of words, characters, or even his own bits, but instead saw information more in terms of what unexpected content the message conveyed. For example, which of the following contains more information: You might think there is more information content in an infinite string of 1’s, but there’s really no value beyond the first “1”, as I can write the same thing as 0.(1), or even as 1/9, whereas the second example, 001, assuming I’m in binary, reduces the uncertainly down to one of eight possible values for three bits (23). Shannon was adamant about this uncertainty aspect of information. Information was a stock price you didn’t know, an unexpected weather forecast, perhaps affecting crops or shipping routes, or finding out who dunnit at the end of a murder mystery. The uncertainty is resolved: the stock price went down, the storm will miss the coastline, the butler was innocent this time. That was information. Even more counterintuitive is the notion that the character string with the most information content would be one that is completely random, for to duplicate it you would have to rewrite it exactly, it cannot be simplified or compressed (π, contrary to what you might think, would NOT be a high information number, for although the digits are random, π itself is not – it’s the result of a mathematical calculation that can be specified with a finite number of characters, my favorite being this one from Ramanujan). Most information strings fall somewhere in between, with many of the characters being redundant – English has an estimated redundancy of 75%, meaning that the information content of its words and characters is a mere 25%. 75%? That much? Try this: I’m going to ask you to guess the next letter in this sentence: “HE SET THE BOOK DOWN ON THE ____.” Your first guess might be a “D”, but if I said that was incorrect, your next guess would likely be a “T”, and if I confirmed that, you could then correctly rattle off the next four letters of “table” without hesitation. You would be quite surprised if I said that guess was also wrong, the word I was looking for was “terrarium”. Yes indeed, English has a lot of redundancy, which in a language is actually a good thing, for it helps reinforce and clarify the meaning via repetition and error correction (“If u cn rd ths u cn gt a gd jb w hi pa!”). The element of surprise, the resolution of uncertainty – that’s information. The kind of information you get from analytics: - Correlations (“I had no idea those two things were related, let alone how strongly!”) - Forecasting (“I had no idea our seat-of-the-pants forecasts were worse than a random walk!”) - Clustering (“Did you know 38% of our customers buy these two items together on the same shopping trip?”) - Networks (“Did you know that the second most frequent path leading to a new purchase starts on the Tech Support page?”) - Treemap (“85% of our aged inventory is sitting in just three warehouses?”) - Geo (“Notice how the highest customer sat scores are clustered around the regional DCs.”) - Decision Trees (“Interesting how two-thirds of our quality problems seem to involve a combination of one particular component supplier running on one particular production line.”) - Histogram (“It’s pretty obvious that our failure rates don’t fit a normal distribution profile at all.”) - Bar chart (“I would never have thought that the brands performed so differently in the different channels.”) - Bubble chart (“I would never have thought the new product ramp-ups would differ so widely by product group.”) - Scatter plot (“Turns out our marketing responses aren’t random at all – look at that nice regression fit line!”) One last application, event stream processing, perhaps best highlights the contrast between data and information. The information content from an equipment sensor, reporting no significant variation from the norm for temperature, pressure or RPMs, hour after hour after hour, is minimal, a lot like that infinite string of "1s". It's the infrequent but critical out-of-tolerance reading that's the real news, and the ability to react quickly is the value. Initially there was a fair amount of resistance to Shannon’s “uncertainty” and “surprise” definition of information. Depending on their discipline, researchers in the 1950s still wanted information to be defined around “quantity” or “meaning”, but eventually Shannon’s approach won the day, especially among the telecommunication and computer engineers who relied on his insights to design the systems we use today. There’s not much value in telling me something I already know – the value, and the information, lies in learning something new. The same applies to your ability to differentiate yourself in the marketplace – you can’t differentiate, you can’t compete effectively, by going with the crowd. Analytics can be your competitive edge by telling you something neither you, nor the market, already know.
<urn:uuid:e756f741-a4ae-47eb-8f04-274407da4e56>
CC-MAIN-2019-51
https://blogs.sas.com/content/sascom/2015/12/01/tell-me-something-i-dont-know/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.957814
1,375
3.046875
3
Subglacial plume liftoff Marine-terminating glaciers, such as those along the coastline of Greenland, often release meltwater into the ocean in the form of subglacial discharge plumes. Though the existence of these plumes can dramatically alter the ice loss along the front of a glacier, the conditions surrounding their genesis remain poorly constrained. In particular, little is known about the geometry of subglacial outlets and the extent to which seawater may intrude into them. To tackle this problem, we developed a theory that describes the steady-state dynamics of a salt wedge confined within a rectangular channel. This approach makes the critical assumption that the dynamics near a subglacial outlet is fundamentally similar to that of a salt wedge estuary. This theory predicts the length of a non-entraining salt wedge as a function of the Froude number, the slope of the channel, and coefficients for interfacial and wall drag. In conjunction, we also carried out a series of idealized laboratory experiments, wherein freshwater was pumped through a narrow channel that is submerged within a larger tank of saline water. Using these experimental results, we demonstrate that our two-layer theory is able to accurately capture the evolution of a salt wedge interface, provided suitable drag coefficients are used. Applying our theory to the geophysical scale, we find that typical subglacial outlets can support seawater intrusions on the order of several kilometers. This result suggests that the ocean has a strong tendency to undercut the face of marine-terminating glaciers. Note: This work was supported by the WHOI GFD program. Publication(s): “The dynamics of a subglacial salt wedge,” Wilson, E, A. Wells, I. Hewitt, and C. Cenedese, in prep
<urn:uuid:39b39259-5441-4e76-a4f2-5fa0a57a83cc>
CC-MAIN-2019-51
https://earlew.com/project/subglacial-salt-wedge/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.93165
368
2.75
3
The Effects And Dangers Of Online Advertisements Creative Commons CC BY 4.0 Human life has developed in many aspects since the evolution of computer started. The main function of creating new technologies is to make human life easier. New technologies are being invented everyday which creates limitless opportunities for developers to make use of these technologies to serve a specific purpose or task. The Advertising used to be print paper or TV ads. Today mobile and online video creates new ways to contact with customers. Today Ads are kind of the most popular online advertising market in the world and trading ad spaces over the Internet. Currently the social online ads like Facebook and YouTube have some preferred set of users they wish to reach by showing their ads but some cases force the users to watch their Advertising. Ethan Zuckerman wad created the first pop-up advertising on the web was 15-Aug-2014. The pop-up advertising most using in the pc application and browser, and APPs for smartphone. The small internet windows that pop up on your screen can be useful, annoying or dangerous often used by advertisers to get your attention or by viruses to trick you into clicking on them. This guide gives them basic information about your identity. Some dangerous pop-up can leak your private information like your name, number, credit card member, and etc. In this paper we sum up, all these facts contribute to show how danger the pop-up advertising with developing new pop-up advertising to leak the user identity.
<urn:uuid:75986598-b3dd-4e3b-9653-cbf1f644693f>
CC-MAIN-2019-51
https://it.overleaf.com/articles/the-effects-and-dangers-of-online-advertisements/qstsvpyyddpy
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.910139
298
2.765625
3
The 'Ebi' (Lobster) pattern symbolises longevity. Lobster patterned Kimono were used by the Ichikawa (Kabuki opera) family who adopted the 'Ebi-Kotobuki' (Long life Lobster) as a secondary komon (family crest) from early 18th century (presumably 1703 to about 1930). This Katagami also features a design of carved jagged lines to make it look like woven Ikat, called ‘Urumi gata’ (looks like Kasuri). Kasuri (Ikat) is a woven pattern. This is a style applied to patterns from the late Edo period (1780-1867) to the present. In collections from around 1850 to the Meiji Era (1868-1911) of the Northeastern region of Japan, Urumi gata is often seen. This is one of around 400 Japanese katagami stencils which are part of the Silver Studio Collection. The stencils were produced in Japan as a way of applying patterns to fabric, mainly kimonos. The katagami collected by the Silver Studio were used by their designers as reference material to produce their own Japanese-inspired patterns.
<urn:uuid:b4612565-ede8-4445-ab12-d2e831879e12>
CC-MAIN-2019-51
https://moda.mdx.ac.uk/object/k3-16/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.960655
257
2.984375
3
Cyber-harassment or bullying — harmful or disruptive online behavior, including posting false rumors, threats (including reasonably perceived), offensive remarks, disclosing a victim’s personal information or personal attacks upon them, and pejorative labels or names (i.e. hate speech). This can also include internet trolling: harassing in order to elicit a reaction, disruption, or for their own personal amusement. Cyber-stalking can also be considered harassment. ∼ ∼ ∼ ∼ § ∼ ∼ ∼ ∼ Decorum. Decorum? Has decorum become a dying art on the internet and social-media? I have often said to myself over the years that I probably would never have the need to implement, moderate, or enforce blog-etiquette or curb cyber-harassment on my public blog, despite writing openly on unconventional, taboo and controversial topics. I assumed that mature adults would simply move on if they found my subjects unappealing, or offensive to themselves. Moving along on the internet is very easy to do and their choice not to stay or return equally easy. My “explicit” material is on a private blog, offered to curious readers only if personally requesting the admittance via going to my Lifestyle’s Memoirs home page and follow the two-steps. However, with some internet users that is not always the case. After 13+ years of blogging, the reach of the world wide web, and WordPress’ exceptional networking initiatives between bloggers, I think it has become necessary. Is that a good thing, bad thing, or simply cyber-users following the rising trend of online and social-media bullying-harassment? You decide. Nonetheless, beginning Oct. 2nd, 2017, for my Commenters and Followers, hereafter are my expected Rules of Conduct: - Be respectful to others. If you wouldn’t say it to someone’s face, then don’t say it online either. While it seems easier to say something hurtful or disrespectful without standing in front of them, remember that many online bloggers are real people with real feelings affected by words. Not everyone has impervious skin. - Be aware of strong language composition, all CAPS, and exclamation points. Read everything you’ve typed out loud before clicking. Written text can easily be misunderstood or misread. Be cognizant of multiple interpretations of words and sentence structure. Identify potential confusions before clicking. - Be careful and wise with your humor and sarcasm. There’s no need to avoid being funny/humorous; the world certainly needs lots of laughter! That said, make double sure you are being interpreted as being funny, not rude. Emoticons and smileys are helpful when conveying sarcasm or humor. If you do not use emoticons, then type in parentheses your intended sarcasm/humor. - Yes, grammar and spelling matter. This would appear self-explanatory, however, poor grammar or spelling quickly leads to a minefield of problems and confusion. Articulating yourself is paramount when discussing serious topics; try your best to use correct grammar and spelling during those times. - Cite your sources when requested. Please specify when offering your personal opinion versus a specific source(s). If someone requests clarification on source(s), please provide this within a reasonable amount of time. Cumulative consensus on a subject, idea, claim, or concept carries much more weight and truth than incessant PERSONAL opinions. - Have a valid link to your valid WordPress or associated blog and profile. If the topic(s) being blogged about and subsequent comments on it are of a serious, significant nature like religious belief/faith, politics, legitimate history, etc., then be wise and courteous enough to voluntarily share your background, education level attained, life and/or work experience, publications you’ve made, etc, with a link to your own About Page with perhaps a CV, Dossier, or sufficient information about why you think you are competent to write and/or comment about it. In other words, if you want to be taken seriously as a possible knowledgeable, intelligent proponent or adversary of a topic, then at least have the integrity to try and openly, honorably volunteer your credentials and expertise. - Show attempts of patience and leniency. Not everyone is perfect 100% of the time. We all forget or neglect some common courtesies sometimes. When dealing with total cyber-strangers, make some effort toward patience and leniency. I like the 3-strike rule: by the second infraction, a very concise, explicit warning SHOULD deter further inappropriate or disrespectful behavior. For imperfect humans, online conversations are much more tricky than face-to-face. - Show attempts of two-way engagement. In other words, sometimes or often ask others questions. Do not simply and repeatedly publicize your own personal beliefs, opinions, or rhetoric — utilize your own blog for those views — while ignoring other’s participation or engagement with you. Show your willingness to exchange ideas and consider alternatives; doing so does NOT mean you embrace them hook, line, and sinker. It is however, a show of respect. - Three Strikes, Into Time-Out. Not following these rules of conduct after two clear warnings from myself, warrants you being put into Comment-Moderation for review first until further notice or comment-approval, or you genuinely apologize (in a comment(s)) and demonstrate improved conduct. For today (Dec. 7, 2019), I think these are the simple 9-rules. I may find in the future a need to refine or (slightly?) modify them, but this will be the essence of expected conduct on my blog. I appreciate all efforts to respect them and others. Thank you.
<urn:uuid:8cdfe353-d401-4af7-b471-a23b600ed76d>
CC-MAIN-2019-51
https://professortaboo.com/professors-netiquette/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.925286
1,192
2.90625
3
The British Aircraft Corporation One-Eleven, was a British short-range jet airliner of the 1960s and 1970s. Conceived by Hunting Aircraft, it was developed and produced by the British Aircraft Corporation when Hunting merged into BAC along with other British aircraft makers in 1960. The One-Eleven was designed to replace the Vickers Viscount on short-range routes. It was the second short-haul jet airliner to enter service, the first being the French Sud Aviation Caravelle. Due to its later service entry, the One-Eleven took advantage of more efficient engines and airline experience of jets. This made it popular, with over half of the sales at its launch being in the largest and most lucrative market, the United States. The One-Eleven was one of the most successful British airliner designs, and served until its widespread retirement in the 1990s due to noise restrictions. This information is from Wikipedia, the free encyclopedia. Click here to read the full article. Years Manufactured: 1963 - 1989 Platform Type: Fixed Wing, Passenger Initial Maker: British Aircraft Corporation (BAC) Final Maker: British Aircraft Corporation (BAC)
<urn:uuid:f59ece58-cff6-4d1d-8313-d4e4d72b19c3>
CC-MAIN-2019-51
https://rochesteravionicarchives.co.uk/platforms/bac-1-11
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.961247
240
2.765625
3
The Rogue Native Plant Partnership (RNPP) formed organically after several meetings among local land managers to discuss the challenges surrounding native plant material availability in the Rogue Basin starting in August 2016. It quickly became clear that improved coordination among local growers and land managers was needed to meet the native plant and seed related needs for local restoration work while supporting a viable local native plant economy. Since its genesis, RNPP has developed into a diverse partnership of over 40 organizations including federal and state agencies, local non-profits, commercial growers, indigenous tribes, land trusts, and other private landowners who meet regularly to take on the many native plant-related challenges faced in the Rogue Basin. Through regular stakeholder meetings and the work of a part-time coordinator, RNPP has cultivated a list of stakeholder concerns, a 5-year plan for dealing with these concerns. RNPP also built a partnership website (www.roguenativeplants.org) with an events calendar, resources library, and an online marketplace for native plants and seeds. They also coordinate regular volunteer-powered seed collection events aimed at educating the public about native plants while providing wild-collected seed for local restoration projects. Progress towards fulfilling RNPP’s mission would not be possible without the support of a number of funding organizations including the Bureau of Land Management, Klamath Siskiyou National Forest, US Fish and Wildlife Service, Oregon Department of Transportation, the Nature Conservancy, Oregon State Parks and through RBP’s role as fiscal sponsor for these funding opportunities. Looking forward, RNPP is positioned as leader and innovator within the realm of native plant materials in Southern Oregon and Northern California with plans to build on past successes while continuing to develop more solutions to the challenges faced in the Rogue Basin surrounding native plant production and procurement. To read more about the RNPP, visit their website at: https://www.roguenativeplants.org/
<urn:uuid:35bf4f5f-3faf-4951-b734-03b0751947e8>
CC-MAIN-2019-51
https://roguebasinpartnership.org/rogue-native-plant-partnership/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.941161
394
2.53125
3
Poster presented at the General Meeting of the Global Alliance against Respiratory Diseases in Beijing. Background: Worldwide, 6 people out of 10 have no access to treatment, or are not encouraged to follow it. Air pollution alone kills 7 million people yearly, reduces our life expectancy by 20 months, and costs 6% the gross world product. Devices to assess lung capacity remain often unavailable in low / middle income countries. Actions: We co-create inclusive, open science knowledge: open source breath and air quality controllers, and libre / gratis education to reduce risks and make care fun. Learnings: Awareness: breath as a way to feel life, from childhood. Universal health: mutualizing resources to end poverty. Partnership: reducing barriers with remote participation. Published in full open access on Zenodo. DOI: 10.5281/zenodo.1344628.
<urn:uuid:f5095a60-ec54-4846-ac17-dc54a93bf885>
CC-MAIN-2019-51
https://tag.hexagram.ca/research/mutual-care-taking-collectively-creating-our-respiratory-wellbeing-with-open-sciences/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.898926
180
2.953125
3
There are so many natural connections between the MI theory and Arts Integration. Some of them are obvious when you consider some of the Smarts that are identified: music, kinesthetic, visual/spacial, linguistic. But the MI theory goes even further with the other Smarts: logical, naturalistic, interpersonal and intrapersonal. However, even these smarts are based in and a product of an education embedded in the arts. Example: Music listening and music creation are very logical and mathematical. There are patterns and rhythms in what we hear and create. There are ratios of sound that make certain chords pleasing to the ear and others dissonant. We can also see mathematical concepts in art: shapes, patterns, etc. Example: Art is a reflection of the world around us (as is all the arts). When we study visual art, we learn to see, really SEE and observe our environments. Through the arts we interact with nature as well. Forming sculptures of trees, mimicking colors and shades of grass – these are ways nature affects the art we create. Example: Interpersonal relationships are embedded in music and dance. When I drag out the bag of percussion instruments, my students’ faces light up and when we start playing – Woah! Community is being built! Each individual contributes to the whole, creating a fabulous piece of music. With partner and group dancing, the same is true. It is a wonderful thing to see a group of students working together to make an organized square dance happen flawlessly. And my personal favorite is the line dance or circle dance. These dances were made to bring people together, smile and enjoy each other. Example: Art, being an expression of self is possibly the perfect intrapersonal activity. Many art forms can be done for the self: playing an instrument, singing, dancing, writing, painting, sketching, sculpting, observing. The arts are a venue for reflection and appreciation of your accomplishments, mistakes, failures and successes. The Multiple Intelligences can provide a wonderful way to embody an Arts Integration program that also fosters student autonomy. (Just always remember that you need to stay true to the art form when planning for true arts integration.) Two specific things I have taken away from this short time of rekindling my admiration of the MI theory: Allow students to realize their talents and intelligences: - Teach the students what the intelligences are. - Give them opportunities to explore them. (choice time or structured lessons and activities) - Give students autonomy to choose how to reflect and show what they have learned through the MIs. - Crystallize, don’t Paralyze their potential! Identifying students intelligences and needs as learners. - Observe students as the work and play. - Look at students’ misbehaviors as a cry for help. “I need to learn this way!” - Go out of your comfort zone and provide opportunities to learn that are not your most-developed intelligence. - Loose a little control and allow students more autonomy over their learning. On a side note: I am so happy to have taken this opportunity to read and discover more about MI. This has whet my appetite for the Smarts once again and reignited my desire to implement and integrate them more into my teaching. This will be a topic I continue to explore in an upcoming series. (Next is Music and Literacy!) If you would like to join me by guest blogging, please email me and let me know. You are also always encouraged to comment to any of the Multiple Intelligences posts (and other posts as well!) Photo Credit: This painting was created by Sue Scott, Fellow with OKA+ Schools. Please visit okaplus.org.
<urn:uuid:419fa67f-371d-4958-980b-04cb0ddddc47>
CC-MAIN-2019-51
https://theinspiredclassroom.com/2011/02/multiple-intelligences-and-arts-integration/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.947702
779
3.6875
4
Pi. XI has for its base a topographic map of the region, with contour lines 100 feet apart. These contour lines indicate heights above the sea, and they are numbered accordingly. The lines for every even 500 feet are made heavier than the others. Contour lines are lines of equal elevation, consequently they are drawn along the slopes of valleys like level irrigation ditches, in this case 100 feet apart vertically, extending up the side valleys, and running out around the points of projections. They encircle detached hills, and an isolated hill rising 500 feet above the plain would be indicated by five of the 100-foot contour lines. From the fore going statement, it will be seen that contour lines are crowded near together on steep slopes, but are widely separated on the plains and in the river bottoms. Thus, they indicate the shape of the land as well as its elevation.
<urn:uuid:272fbd77-1162-4e64-af48-dd0261abdc83>
CC-MAIN-2019-51
https://www.forgottenbooks.com/en/books/PreliminaryReportontheGeologyandWaterResourcesofNebraskaWestoftheOneHundredandTh_10914500
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.916076
182
3.828125
4
– Container plants are more sensitive to drying soil, especially at warm-and-hot temperatures, which can reduce harvest quality and quantity, shorten the harvest period, and lead to premature bolting. Soils may dry rapidly in containers, so monitoring and regular watering of vegetables and herbs in containers is important. Pay close attention to soil moisture and frequency of irrigation. Most plants and trees are harmed by any wilting. Extended and repeated wilting may be especially damaging. Many vegetables are harmed by water stress at any stage of growth or fruiting. – Nutrients may be exhausted quickly in containers, particularly for heavy feeders, when containers are densely planted, or plant size is large (3 to 4 times or larger in approximate volume) in comparison to the container. It may be necessary to add compost or nutrient-rich amendments and refresh mulch every month or so when growing in containers. – Containers allow you to move plants to follow seasonal changes in sun, to shaded areas during heat waves/hot summers, to warmer areas during winter, and to protected areas when necessary in response to winds or other shifting environmental issues. Rolling planters, plant stands, or carts allow for ease in moving container plants without the strain of lifting. – Check that holes in the bottoms of containers are large and numerous enough to ensure good drainage for nearly all food-producing and ornamental plants, and if necessary, add or enlarge drainage holes. – GardenZeus recommends a soil mix of at least 2/3 sand and topsoil when growing vegetables in containers, with some organic matter or compost. Potting soils with high proportions of organic matter tend to shrink and collapse over the course of a growing season as soil microbes and macro organisms like insects digest and decompose the organic matter, which results in falling soil levels. The resulting shallow soils in containers may be insufficient for plants to yield well, and may cause stress to plants by drying rapidly or exposing roots. – Think ahead before planting about vertical growth and support. A trellis or structure for climbing will help many vegetable and ornamental plants to remain manageable, receive enough sunlight, and maximize production in small spaces. – If you know you may have difficulty maintaining consistent soil moisture, consider using self-watering containers, which have trays or reservoirs of water under pots, and a wicking mechanism, such as cloth or soil tubes. These can be purchased or made yourself. – Container plants may grow roots down into the soil beneath their containers. This can reduce frequency of watering and increase yields as plants connect to the larger living systems in soil, but also can result in shock to plants as they are uprooted when containers are moved. – Plants in containers are sensitive to salt burn, especially when they go for months or years without rain. Water that comes out of home faucets and hoses in most urban municipal areas contains minerals to maintain alkalinity in city water and avoid corrosion of pipes and the infrastructure of city water systems. As water evaporates from pots, it leaves minerals behind in soils that can build up and cause burned, dead, brown leaf tips and leaf edges for potted plants (indoors and outdoors). As this progresses and worsens over months and years, it will eventually kill most plants. All indoor and outdoor potted plants should be flushed thoroughly every 2 to 4 months by soaking pots in a bucket, sink, or large container (at below soil level to avoid creating a mess) and then running water through the pots for several minutes. Plants in containers should not need flushing for a few months after being exposed to natural rainfall that thoroughly soaks and drains through the potted soil.
<urn:uuid:c4909268-4805-44e3-868d-664df333fd65>
CC-MAIN-2019-51
https://www.gardenzeus.com/tips-for-container-vegetable-gardening/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.934149
746
3.640625
4
Kusunku (or Kung Siang Chin) Kusunku was a Chinese military advisor who came from China to Okinawa at the request of Okinawa’s king. He lived in Okinawa from 1756-1761. He was a master of Kempo. ‘Satunushi’ ‘Tode’ Sakugawa (1733-1815) Sakugawa was a student of Takahara and the Okinawan teacher of Soken Matsumura. Takahara suggested that his student, Sakugawa go to train with Kusunku. Sakagawa formulated the ‘Kusanku’ kata to honour his teacher (Kusunku) and record his teachings after his death. Sokon “Bushi” Matsumura (1796-1893) Sokon was aStudent of Sakugawa and teacher of Itosu. Matsumura taught Itosu the kata Kusunku (later known as Kanku-dai) among others. Yatsutsune “Ankoh” Itosu (1830-1915) A student of Sokon Matsumura’s, Itosu created the ‘Sho’ (lesser) version of Kusanku (possibly to counter the then popular use of a bo staff in combat). Gichen Funakoshi (1868-1957) Funakishifounded Shotokan karate (incorporating ‘Kusunku’ but changed the name to ‘Kanku’). Funakoshi adopted both the ‘Dai’ (greater) and ‘Sho’ (lesser) version of the Kanku kata into his style, although modified the cat stances into back stances. While many styles incorporate Kanku-sho, GKR derives it’s from Shotokan karate.
<urn:uuid:a5d5570c-2bae-4f63-85ea-03802269098b>
CC-MAIN-2019-51
https://www.gkrkarate.com/about-gkr/black-belt-2nd-dan/kanku-sho-lineage-to-gkr/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.936917
414
2.828125
3
Hamilton Avenue is a STEM magnet school. STEM stands for Science, Technology, Engineering and Math education. STEM is based on the idea of educating students in an interdisciplinary approach that integrates instruction based on real-world applications and hands-on, problem-based learning. We create an inquiry-based learning environment where students explore the world by asking questions, making discoveries and conducting experiments in the quest for new understandings. Students are given of time to think, process, explore and develop their own testable questions to help direct their own learning. Students are encouraged to apply their learning to real world situations to deepen their understanding.
<urn:uuid:479a06cb-680c-408c-9a7e-635c2eb3581e>
CC-MAIN-2019-51
https://www.greenwichschools.org/hamilton-avenue-school/academics/stem
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.951316
125
2.609375
3
TLF ID L9931 Test your understanding of how the transformations of spinning and extruding can change some of the most basic 2D shapes (such as squares, triangles and circles) into various 3D shapes, such as cylinders, cones and different prisms. Visualise the effect of a particular transformation on a selected 2D shape. Predict whether the result will match a given 3D shape. View and print a report of your results. This assessment object is one in a series of two objects.
<urn:uuid:3f22695d-eb42-4d73-95d5-0a8211fe2c08>
CC-MAIN-2019-51
https://www.scootle.edu.au/ec/viewMetadata.action?id=L9931&q=&topic=%22Transformation%20(Geometry)%22&start=0&sort=relevance&contentsource=&contentprovider=&resourcetype=&v=text&showBookmarkedResources=&showLomCommercialResources=false&field=title&field=text.all&field=topic&contenttype=all&contenttype=%22Interactive%20resource%22&contenttype=%22Tablet%20friendly%20(Interactive%20resource)%22&contenttype=%22Collection%22&contenttype=%22Image%22&contenttype=%22Moving%20image%22&contenttype=%22Sound%22&contenttype=%22Assessment%20resource%22&contenttype=%22Teacher%20guide%22&contenttype=%22Dataset%22&contenttype=%22Text%22&contenttype=%22Mobile%20app%22&commResContentType=all&commResContentType=%22App%20(mobile)%22&commResContentType=%22Audio%22&commResContentType=%22Book%20(electronic)%22&commResContentType=%22Book%20(printed)%22&commResContentType=%22Digital%20item%22&commResContentType=%22Learning%20object%22&commResContentType=%22Other%22&commResContentType=%22Printed%20item%22&commResContentType=%22Software%22&commResContentType=%22Teacher%20resource%22&commResContentType=%22Video%22&userlevel=all&userlevel=(0%20OR%201%20OR%202)&userlevel=(3%20OR%204)&userlevel=(5%20OR%206)&userlevel=(7%20OR%208)&userlevel=(9%20OR%2010)&userlevel=(11%20OR%2012)&kc=any&lom=true&scot=true&follow=true&topiccounts=true&rows=20&suggestedResources=L9931,L9932,M016282,M010523,M009039,M013289,M009166,M012248,M015449,M021072,L1071,M021828,M008830,M009032,M015772&fromSearch=true
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.905943
102
2.953125
3
Gauge reference pressure is a pressure measured relative to atmospheric or barometric pressure. The most used pressure reference is gauge pressure which is signified by a (g) after the pressure unit (e.g. 30 psi g), and means that the pressure measured is the total pressure minus atmospheric pressure. There are two types of gauge reference pressure which are called vented gauge (vg or g) and sealed gauge (sg). A vented gauge pressure transmitter for example allows the outside air pressure to be exposed to the negative side of the pressure sensing diaphragm, via a vented cable or a hole on the side of the device, so that it always measures the pressure referred to ambient barometric pressure. Thus a vented gauge reference pressure sensor should always read zero pressure when the process pressure connection is held open to the air. - Recordable indicator and sensor up to 30000 psi for pressure test rig - Vacuum gauge to measure both absolute & negative gauge pressure - 50 psi g freshwater pressure transducer with 10 Vdc output signal - KL1 Cable Junction Box for Submersible Level Transmitters Request info on vented gauge reference range pressure measurement products for your application. A sealed gauge reference is very similar except that atmospheric pressure is sealed on the negative side of the diaphragm. This is usually adopted on high pressure ranges such as hydraulics where atmospheric pressure changes will have a negligible effect on the accuracy of the sensor so venting is not necessary. This also allows some manufacturers to provide secondary pressure containment as an extra precaution for pressure equipment safety if the burst pressure of the primary pressure sensing diaphragm is exceeded. There is another way of creating a sealed gauge reference and that is to seal a high vacuum on the reverse side of the sensing diaphragm. Then by adjusting the electronics the output signal is offset by 1 bar so the pressure sensor reads close to zero when measuring atmospheric pressure. A sealed gauge reference pressure transducer will never read exactly zero because atmospheric pressure is always changing and the reference in this case is fixed at 1 bar. - 15000 psi combined pressure gauge and logger with USB interface - Logger for verifying water supply pressure over 7 days - 5000 psi hydraulic pressure transmitter with M12 electrical connector - Submersible sensor for measuring sludge pressure in pipe Request info on sealed gauge reference range pressure measurement products for your application. Pressure Range Related Terms More pages related to pressure range technical terms.
<urn:uuid:aa0ef19a-1e94-40e4-87cc-31c3472cbac1>
CC-MAIN-2019-51
https://www.sensorsone.com/gauge-reference-pressure/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.887309
513
3.203125
3
A fifth force of nature may have been discovered by scientists at the Institute for Nuclear Research at the Hungarian Academy of Sciences (Atomki). The team was closely monitoring how an excited helium atom emitted light as it decayed, and the particles ended up splitting at an unusual angle, 115 degrees, which couldn’t be explained by known physics. They called this new particle X17 because they calculated its mass at 17 megaelectronvolts. Read more for a video and additional information. Around three years ago, these Hungarian researchers published a similar paper in Physical Review Letters, as they were studying another isotope, beryllium-8, as it decayed down to a ground state. They saw electrons and positrons splitting off from the atom at around a 140-degree angle. We introduced such a new particle, which nobody saw before, and which existence could not be understood by the widely accepted ‘Standard Model’ of particle physics, so it faced scrutiny,” said Attila Krasznahorkay, the study’s lead scientist.
<urn:uuid:e43cdb24-3ebe-4135-b51b-d765dce3c15e>
CC-MAIN-2019-51
https://www.techeblog.com/fifth-force-of-nature/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.96324
221
3.6875
4
Numbers Song | Counting Numbers 1 to 10 | Kids Songs | Baby Rhymes Ding Dong Bell | Nursery Rhymes | Kids And Toddlers Song Good Morning Crocodile | Original Song | Nursery Rhymes | Baby Rhymes | Kids Songs Hello Hello Song | Nursery Rhymes | Original Song | Kids Rhymes | Children Videos wake up in the morning | morning song | nursery rhymes farmees | original song | kids rhymes Kids, if you see a jolly good fellow walking by your kindergarten, then don’t hesitate to sing the ‘He’s A Jolly Good Fellow’ nursery rhyme. This short and simple baby rhyme celebrates the joys of being happy and jolly no matter what happens to you. The ‘He’s a Jolly Good Fellow’ children song encourages toddlers like you to be smiling and happy, and to spread that happiness through your baby songs and nursery rhymes! Because if you are a jolly good fellow, then nobody can deny it! So come on and celebrate the happiness of your fellow preschoolers with this happy rhyme! Music and Lyrics: Copyright USP Studios™ Video: Copyright USP Studios™
<urn:uuid:f60031d1-6987-47a5-81ef-6e92530a4590>
CC-MAIN-2019-51
https://www.uspstudios.co/video/he-is-jolly-good-fellow-nursery-rhymes-childrens-rhymes-kids-songs-baby-videos/5873ce527ca576062f6471bd/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00252.warc.gz
en
0.780544
252
2.71875
3
What is high blood pressure? Blood pressure is the force of your blood as it flows through the arteries in your body. Arteries are blood vessels that carry blood from your heart to the rest of your body. When your heart beats, it pushes blood through your arteries. As the blood flows, it puts pressure on your artery walls. This is called blood pressure. High blood pressure (also called hypertension) happens when your blood moves through your arteries at a higher pressure than normal. Many different things can cause high blood pressure. If your blood pressure gets too high or stays high for a long time, it can cause health problems. Uncontrolled high blood pressure puts you at a higher risk for stroke, heart disease, heart attack, and kidney failure. There are 2 types of high blood pressure. Primary hypertension. This also is called essential hypertension. It is called this when there is no known cause for your high blood pressure. This is the most common type of hypertension. This type of blood pressure usually takes many years to develop. It probably is a result of your lifestyle, environment, and how your body changes as you age. Secondary hypertension. This is when a health problem or medicine is causing your high blood pressure. Things that can cause secondary hypertension include: - kidney problems - sleep apnea - thyroid or adrenal gland problems - some medicines. Symptoms of high blood pressure Most people who have high blood pressure do not have symptoms. This is why it’s sometimes called “the silent killer.” It is very important to have your blood pressure checked regularly. Some people experience headaches, nosebleeds, or shortness of breath with high blood pressure. However, those symptoms can mimic many other things (serious or non-serious). Usually, these symptoms occur once blood pressure has reached a dangerously high level over a period of time. What causes high blood pressure? Food, medicine, lifestyle, age, and genetics can cause high blood pressure. Your doctor can help you find out what might be causing yours. Common factors that can lead to high blood pressure include: - A diet high in salt, fat, and/or cholesterol. - Chronic conditions such as kidney and hormone problems, diabetes, and high cholesterol. - Family history, especially if your parents or other close relatives have high blood pressure. - Lack of physical activity. - Older age (the older you are, the more likely you are to have high blood pressure). - Overweight and obesity. - Race (non-Hispanic black people are more likely to have high blood pressure than people of other races). - Some birth control medicines. - Tobacco use or drinking too much alcohol. How is high blood pressure diagnosed? High blood pressure is diagnosed with a blood pressure monitor. This is a common test for all doctor visits. A nurse will place a band (cuff) around your arm. The band is attached to a small pump and a meter. He or she will squeeze the pump. It will feel tight around your arm. Then he or she will stop and watch the meter. This provides the nurse with 2 numbers that make up your blood pressure. The top number is your systolic reading (the peak blood pressure when your heart is squeezing blood out). The bottom number is your diastolic reading (the pressure when your heart is filling with blood). You may also hear the doctor or nurse say a blood pressure is “120 over 80.” - Normal blood pressure is less than 120 on top and less than 80 on the bottom. - Prehypertension levels are 120-139 on top and 80-89 on the bottom. - High blood pressure, stage 1 is 140-159 on top and 90-99 on the bottom. - High blood pressure, stage 2 is 160 or higher on top and 100 and over on the bottom. The higher your blood pressure is, the more often you need to have it checked. After age 18, have your blood pressure checked at least once every two years. Do it more often if you have had high blood pressure in the past. Can high blood pressure be prevented or avoided? If your high blood pressure is caused by lifestyle factors, you can take steps to reduce your risk: - Lose weight. - Stop smoking. - Eat properly. - Lower your salt intake. - Reduce your alcohol consumption. - Learn relaxation methods. If your high blood pressure is caused by disease or the medicine you take, talk to your doctor. He or she may be able to prescribe a different medicine. Additionally, treating your disease (such as controlling your diabetes) can help reduce your high blood pressure. High blood pressure treatment Treatment usually begins with changes you can make to your lifestyle to help lower your blood pressure and reduce your risk of heart disease. Additionally, your doctor may prescribe medicine to lower your blood pressure. These are called antihypertensive medicines. The goal of treatment is to reduce your blood pressure to normal levels. Your doctor may prescribe medicine that’s easy to take and has few, if any, side effects. This treatment is highly successful. If your blood pressure can only be controlled with medicine, you’ll need to take the medicine for the rest of your life. It is common to need more than one medicine to help control your blood pressure. Don’t stop taking the medicine without talking with your doctor. Otherwise, you may increase your risk of having a stroke or heart attack. Living with high blood pressure Controlling your high blood pressure is a lifelong commitment. You will always need to monitor your weight, make healthy food choices, exercise, learn to cope with stress, avoid smoking, and limit your alcohol intake. If you need medicine to control your high blood pressure, you will likely need it all your life. Additionally, you will need to get used to regular blood pressure checks. Your doctor may want you to come to the office regularly. Or you may be asked to check your blood pressure at home and keep track of your numbers for your doctor. Some pharmacies and retail clinics have blood pressure machines on site. You can buy your own, automated arm blood pressure cuff for use at home. Your doctor may want you to check your blood pressure several times a day. Another option is to use an ambulatory (wear as you are moving about) blood pressure monitor. Questions to ask your doctor - Can children have high blood pressure? - How much salt is too much salt? - What are hidden sources of salt? - Can second-hand smoke lead to high blood pressure? Copyright © American Academy of Family Physicians This information provides a general overview and may not apply to everyone. Talk to your family doctor to find out if this information applies to you and to get more information on this subject.
<urn:uuid:2e9cff46-af0f-4047-bdbe-826a81afca3a>
CC-MAIN-2019-51
https://andrewsmedicalcare.com/high-blood-pressure/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.934783
1,413
3.625
4
In this tutorial I will cover some of the uses of netcat, known as the “TCP/IP Swiss army knife”. Netcat is a very powerful and versatile tool that can be used in diagnosing network problems or in penetration testing. There are many netcat variations, some are more recent and have been rewritten to include more features. Let’s look at the original netcat man page: netcat is a simple unix utility which reads and writes data across net- work connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. Ok, so let’s see some of the many ways we can use netcat. First, let’s see what we can glean from using netcat to connect to an FTP server: 1 2 3 4 5 6 7 As you can see, there is some information available about the server, including the type of the FTP server, the number of logged in users and the maximum number allowed, the local time of the system, the fact that anonymous logins are disallowed, and that it’s possible to connect via IPv6. Depending on the configuration of a server, the information disclosed could be pretty detailed, or sparse and misleading, as to not give away too much info to a potential attacker. Now let’s try banner grabbing from an HTTP server by sending a HEAD request: 1 2 3 4 5 6 7 8 9 10 11 12 13 This information can vary as well, this time the bit we’re interested in is the server version and the operating system. Sometimes there is more to be discovered, like the PHP version that powers the server etc. Let’s now look at how easy it is to use netcat for a very simple chat server. In the above command I told netcat to listen on port 4444. The -v flag is for more verbose output. Now, from a different terminal window (or machine), connect to that port with netcat and start typing stuff. You will see the output being echoed in the server window. If you type stuff back from the server window, you will see it printed in the client window: To transfer files between 2 machines, netcat can be used in the following way. On one computer, let’s tell netcat to listen on a port and push a file to the socket: Bascially, this takes the file and pushes it on the listening socket, ready to be pulled by a client that connects to that port. Now, from another computer, connect to the listener and redirect whatever you receive to a file: 1 2 3 Now we can check that we have a new file named transfer.txt which has the same contents as the file that was offered by the server, confidential.txt. Note that netcat doesn’t give any indication of the transfer progress or its completion. Netcat can also be used as a very basic port scanner: 1 2 3 Here we scanned the range of ports between 1 and 1000 and we determined that ports 21 and 80 are open. The -n switch disables DNS lookup, the -z is for not sending any data, thus reducing the time it requires to talk to the ports. And the -w1 tells netcat to wait 1 second before determining that a connection occurred. This is a TCP only scan. For UDP, add the -u flag. Netcat’s port forwarding ability could be useful in a variety of scenarios, from bypassing traffic restrictions in a secure environment to using a proxy (or more) to conduct a MITM attack. For this example, I will be using the following: 1 2 3 On the relay, use the following command: This sets up a listener on port 4444. The -c flag specifies a shell command to be executed by the /bin/sh shell (if the system doesn’t have such a shell, you can use the -e flag to execute a command or file instead. On a Windows machine, for instance, you could run cmd.exe or a batch file containing your desired commands). So, in the above, the proxy will forward connections it receives on port 4444 to the victim machine on port 22. From the attacker machine, connect to the proxy: Bingo! We can see that there is an SSH server waiting for someone to log in. On the victim machine, let’s confirm that we have a connection: So the victim is unaware of the real source of the connection! It sees the connection as originating from the relay machine. Remote backdoor – Bind shell Once an attacker has exploited a victim machine, he may want to return afterwards and have a nice, cozy backdoor waiting for him. If there is a direct connection between the 2 machines, netcat can be used to bind a shell to a port and wait for the attacker to connect. The shell will have the privileges of the user who spawned it, so it’s best to have administrative privileges for full power over the system. On the machine you want to backdoor, use netcat to bind the shell: Now from another machine, use netcat to connect to it on that port and your shell will be waiting for you. Keep in mind there won’t be any prompt or anything like that. Just type commands in the terminal. The more common way to use netcat for backdooring is to spawn a reverse shell that connects back to the atacker. This is useful in case the victim is behind a NAT or in a protected internal network that can’t be directly accessed from the internet. So, let’s get on with it and start a listener on the attacking machine: Now let’s connect from the victim machine: Basically, the victim machine sent the attacker a shell, and now we control the victim again. I used the -n switch as well to disable all those pesky inverse lookups. It is possible to set up a very simple honeypot using netcat. I grabbed the banner for the Pure-FTPd server and copied it to a file called banner.txt. Now start listening on port 21 and serve that banner for visitors: The additional -v flag is for extra verbosity and the data received is piped to a log file. Now, from another machine, let’s connect to port 21 and see what we get: Here we’re seeing the familiar FTP banner even though there’s no real FTP server running. We send some random data and now let’s check on the other machine that this data has been logged: Of course, you might want netcat to keep on listening and not stop after every connection. Consider writing a script for that or look into versions that have continuous connection options. Netcat can also be used to sniff traffic from a specific port. One machine has Pure-FTPd running on port 21. On the same machine, we’ll use netcat to listen on some other port and execute a script: The script file contains the following: The -o flag is for hex dumping the traffic. This script tells netcat to hex dump the traffic that comes to port 21 and write it to the /root/log file. And on the command line I used netcat to listen on port 4444 and call this script. Now let’s try connecting from another machine to the port that netcat listens on: Since this is a test lab and I already knew about the FTP server being sniffed, I tried to log in directly. Let’s check what got logged on the other machine: cat /root/log | more There we go! We have a file containing the traffic to port 21, and we can see the attempt to log in has failed with the given credentials. But when a legitimate user will log in, we will have the right username and password. Yes, you can even copy hard disks over the network with netcat, in conjunction with the dd program. On the system that you want to copy from, run this: And on the machine you’re copying to: Be careful when performing operations on hard drives, best to test them on virtual machines first than realizing you just wiped your HDD. I hope by now you realize how powerful netcat can be and its usefulness in a variety of scenarios. Of course, during a real penetration test or uhm, hack attempt, you will probably want to encrypt your traffic with cryptcat or something, since by now, all the IDS vendors are including signatures for netcat. Also, the examples were kept simple for ease of understanding, but in the real world netcat would be chained together with other tools to create complex and stealthy attacks. If more of us valued food and cheer and song above hoarded gold, it would be a merrier world. — J.R.R. Tolkien
<urn:uuid:ce654fc6-7452-4b9c-9d16-252febf3184c>
CC-MAIN-2019-51
https://chousensha.github.io/blog/2014/05/31/network-tools-netcat/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.916229
1,914
2.859375
3
This book provides an introduction to the SQLite database product. SQLite is a zeroconfiguration, standalone, relational database engine that is designed to be embedded directly into an application. Database instances are self-contained within a single file, allowing easy transport and simple setup. Using SQLite is primarily written for experienced software developers that have never had a particular need to learn about relational databases. For one reason or another, you now find yourself with a large data management task, and are hoping a product like SQLite may provide the answer. To help you out, the various chapters cover the SQL language, the SQLite C programming API, and the basics of relational database design, giving you everything you need to successfully integrate SQLite into your applications and development work. The book is divided into two major sections. The first part is a traditional set of chapters that are primarily designed to be read in order. The first two chapters provide an indepth look at exactly what SQLite provides and how it can be used. The third chapter covers downloading and building the library. Chapters Four and Five provide an introduction to the SQL language, while Chapter Six covers database design concepts. Chapter Seven covers the basics of the C API. Chapter Eight builds on that to cover more advanced topics, such as storing times and dates, using SQLite from scripting languages, and utilizing some of the more advanced extensions. Chapters Nine and Ten cover writing your own custom SQL functions, extensions, and modules. To complete the picture, the ten chapters are followed by several reference appendixes. These references cover all of the SQL commands, expressions, and built-in functions supported by SQLite, as well as documentation for the complete SQLite API. Если вам понравилась эта книга поделитесь ею с друзьями, тем самым вы помогаете нам развиваться и добавлять всё больше интересных и нужным вам книг!
<urn:uuid:fed42527-7da9-45d4-9397-e1b16db10d90>
CC-MAIN-2019-51
https://codernet.ru/books/sql/using_sqlite_kreibich/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.852886
507
3.265625
3
The children of immigrants in schools - United States, Immigration Commission (1907-1910), creator Dillingham, William P. (William Paul), 1843-1923 Falkner, Roland P. Croxton, Frederick C. (Frederick Cleveland), 1871-1960 Simonds, Frances W. United States, Congress., Senate., Committee on Immigration. - Place Of Origin: - District of Columbia - Creation Date: - 5 v. ; 23 cm. - Digital Format: - Books and documents - School enrollment--United States Children of immigrants--Education--United States School enrollment--United States--Statistics Children of immigrants--Education--United States--Statistics School attendance--United States Universities and colleges--United States United States--Emigration and immigration - "Presented by Mr. Dillingham." "December 5, 1910.--Referred to the Committee on Immigration and ordered to be printed, with illustrations." "[Vol. I], ... prepared by Fred C. Croxton and Frances W. Simonds, is a summary of data collected in 37 cities by Roland P. Falkner ... [Vols. II-V] contain general tables in which the various data are shown by cities, with explanatory text and comment by Dr. Falkner"--Letter of transmittal, v. 1, p. iv. - Reports of the Immigration Commission ; v. 29-33 Senate document (United States. Congress. Senate) ; 61st Congress, no. 749 Open Collections Program at Harvard University - JV6415 .A3 - Widener Library, Harvard University - Record ID: - HOLLIS Record:
<urn:uuid:216898db-f8b8-4e7f-92f9-69323a28da99>
CC-MAIN-2019-51
https://curiosity.lib.harvard.edu/immigration-to-the-united-states-1789-1930/catalog/39-990067936350203941
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.785912
362
2.890625
3
‘Breakfast’ literally means to ‘break the fast’ that occurs overnight. After approximately 12 hours without fuel, it’s easy to see why breakfast is considered the most important meal of the day. As the first source of energy that your body receives, your breakfast should provide the essential nutrients and fluids needed to kickstart the day. Skipping this most important of meals means your body doesn’t have what it needs to perform basic functions, causing blood sugar levels to drop and you to feel hungry sooner, which means you’re more likely to reach for unhealthy foods later on. But it’s not just about whether you eat breakfast or not. What you eat, and how much, is equally as important. A simple carbohydrate-based breakfast such as toast or pastries does not provide the amount of protein you need in each meal, and may actually make you feel more hungry throughout the day. This is a common culprit for unhealthy food choices. The statistics and research findings below help to put this into perspective: A protein-rich breakfast has been shown to reduce cravings during the day and help in controlling your appetite 1. Research shows that skipping breakfast is closely linked with weight gain and overeating later in the day 2. Eating breakfast was found by scientific researchers to help reduce total daily calorie intake 3. Results from a clinical study suggested that not eating breakfast is associated with a higher Body Mass Index (BMI)4 and poorer eating behaviours 5. 61% Europeans miss breakfast more than once a week, according to a recent survey. Of those people, 47% blame a lack of time as their excuse 6. Looking for a breakfast that ticks the boxes for both health and taste? Try this recipe for the perfect breakfast bowl: 2 Scoops Formula 1 Strawberry 250 ml Almond Milk 1 Cup Strawberries 1 tbsp Oats Desiccated Coconut (Optional Topic) Blend the Formula 1 powder and milk, and then serve in your favourite bowl – topping it with strawberries, banana and oats! Kcal: 315 | Carbs: 43g | Protein: 14g | Fat: 11g | Fibre 9g To select and order your tasty nutritious filling shake for more energy and a better shape change visit my online shop, review, select, pay and the products will be at your door within three days! www.richardhowlett.goherbalife.com Remmember the products have a 30 day guarantee, so the only thing you have to do is get started. 1 Hoertel, A., Matthew, J. W. & Leidy, H. J. (2014) Nutrition Journal: 2014, 13:80. 2 Kobayashi , F., et al. (2014). Obes Res Clin Pract. 2014 May-Jun;8(3). 3 De Castro, J. M. (2004). Journal of Nutrition; January 1, 2004 vol. 134 no. 1 104-11. 4 Keski-Rahkonen, A.et al (2003). European Journal of Clinical Nutrition (2003) 57, 842–853. doi:10.1038/sj.ejcn.1601618 5 O’Neil CE, Nicklas TA, Fulgoni V (2014). J. Academic Nutrition & Diet. 2014 Dec;114(12 Suppl):S27-43. Goyal R, Julka S. (2014) Indian Journal of Endocrinol Metab. 2014 Sep;18(5):683-7. 6 CEEREAL European breakfast survey (2007). “Breakfast habits in Europe: Trends, Challenges and Priorities” – http://www.ceereal.eu – facts and figures, March 2007.
<urn:uuid:1e014a3e-8a90-4fe4-b1b1-efa938c228ba>
CC-MAIN-2019-51
https://giftofhealthblog.com/2019/01/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.905774
783
2.84375
3
09 Oct Miracle Material Is this the new miracle material for the future? Just under ten years ago, the Dutch-British physicist Andre Geim stumbled across a substance that would revolutionize the way we understand matter and win him and his colleague Kostya Novoselow the 2010 Nobel Prize for Physics. It was graphene — a one atom thin substance. The Professor of Physics at Manchester University talks to CNN about discovering the first ever 2-dimensional material. CNN: Graphene has been described as a 'miracle material', but what exactly is it? Andre Geim: It's the thinnest material you can get — it's only one atom thick. A tiny amount can cover a huge area, so one gram could cover a whole football pitch. It's the strongest material we are aware of because you can't slice it any further. Of course, we know that atoms can be divided into elementary particles, but you can't get any material that is thinner than one atom, or it wouldn't count as a material anymore. Graphene is stronger than diamond; it shows extraordinary heat conductance; it conducts electricity a thousand times better than copper — the list goes on. We're talking about probably 20 superlatives which apply to graphene. Another surprise is that you can just about see it with the naked eye, even though it's only one atom thick! CNN: Your scotch-tape method for discovering the material has gone down in science history. Tell us about that. AG: We were trying to make graphite as thin as possible using lab equipment and for many months we struggled to make it thinner than 10,000 layers. Then we had a kind of Eureka moment. We were using scotch tape on a regular basis in the lab to clean the surface of the graphite. We would look at what was happening on the surface of the graphite and throw the scotch tape in the bin. Then we decided to take the tape out of the bin and look at it under the microscope and we saw really transparent pieces of graphite — graphene. CNN: Your discovery was certainly a surprise to the science world, but was it a surprise to you? AG: Yes. We live in a 3-dimensional world. My physics intuition, developed over the last thirty years, told me that this material shouldn't exist. And if you had asked 99.9% of scientists around the world they would have said the idea of a 2D material was rubbish and that graphene shouldn't exist. And in most cases they would have been right, but in the case of graphite or graphene, and a dozen other materials like it, our intuition was completely wrong. You can reach this limit of one-atom-thin layers. CNN: But what exactly is graphene useful for? AG: Because of its range of extraordinary properties, people are considering using graphene in a myriad of different applications. For example, because graphene is so strong, people want to use it to reinforce plastics, making them conductive at the same time. Because it's transparent and conducts electricity, people want to use it in applications like mobile phone screens, touch screens, TV screens and so on. People are also considering using it to go beyond silicon technology and make our integrated circuits even denser and speedier. Those are just few examples. CNN: What is the future for graphene? AG: I don't dare try to predict the future, but if the speed of development of the last ten years is of any guidance we can expect to see graphene everywhere soon. Typically it takes 40 years for a new material to move from an academic lab into a consumer product, but within less than ten years graphene has jumped from our lab into an industrial lab and now there are pilot products all over the world. Governments around the world and probably more than 100 companies are spending billions on researching these materials. So, it probably deserves the superlative of the fastest developing material as well.
<urn:uuid:f5ebe525-8afd-477a-a2d2-d8b9dd533dcb>
CC-MAIN-2019-51
https://iconicstrata.com.au/miracle-material/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.969733
815
3.375
3
Despite your best intentions and efforts, it is inevitable: At some point in your life, you will be wrong. Mistakes can be hard to digest, so sometimes we double down rather than face them. Our confirmation bias kicks in, causing us to seek out evidence to prove what we already believe. The car you cut off has a small dent in its bumper, which obviously means that it is the other driver’s fault. Psychologists call this cognitive dissonance — the stress we experience when we hold two contradictory thoughts, beliefs, opinions or attitudes. For example, you might believe you are a kind and fair person, so when you rudely cut someone off, you experience dissonance. “Cognitive dissonance is what we feel when the self-concept — I’m smart, I’m kind, I’m convinced this belief is true — is threatened by evidence that we did something that wasn’t smart, that we did something that hurt another person, that the belief isn’t true,” said Carol Tavris, a co-author of the book “Mistakes Were Made (But Not by Me).” She added that cognitive dissonance threatened our sense of self. “To reduce dissonance, we have to modify the self-concept or accept the evidence,” Ms. Tavris said. “Guess which route people prefer?” Or maybe you cope by justifying your mistake The psychologist Leon Festinger suggested the theory of cognitive dissonance in the 1950s when he studied a small religious group that believed a flying saucer would rescue its members from an apocalypse on Dec. 20, 1954. Publishing his findings in the book “When Prophecy Fails,” he wrote that the group doubled down on its belief and said God had simply decided to spare the members, coping with their own cognitive dissonance by clinging to a justification. “Dissonance is uncomfortable and we are motivated to reduce it,” Ms. Tavris said. When we apologize for being wrong, we have to accept this dissonance, and that is unpleasant. On the other hand, research has shown that it can feel good to stick to our guns One study, published in the European Journal of Social Psychology, found that people who refused to apologize after a mistake had more self-esteem and felt more in control and powerful than those who did not refuse. “In a way, apologies give power to their recipients,” said Tyler Okimoto, an author of the study. “For example, apologizing to my wife admits my wrongdoing; but apologizing also gives her the power to choose whether she wants to alleviate my shame through forgiveness, or increase my shame by holding a grudge. Our research has found that people experience a short-term increase in their feelings of personal power and control after refusing to apologize.” Feeling powerful may be an attractive short-term benefit, but there are long-term consequences Refusing to apologize could potentially jeopardize “the trust on which a relationship is based,” Mr. Okimoto said, adding that it can extend conflict and encourage outrage or retaliation. When you refuse to admit your mistakes, you are also less open to constructive criticism, experts said, which can help hone skills, rectify bad habits and improve yourself over all. “We cling to old ways of doing things, even when new ways are better and healthier and smarter. We cling to self-defeating beliefs long past their shelf life,” Ms. Tavris said. “And we make our partners, co-workers, parents and kids really, really mad at us.” Another study, from the Stanford researchers Carol Dweck and Karina Schumann, found that subjects were more likely to take responsibility for their mistakes when they believed they had the power to change their behavior. This is easier said than done, though, so how exactly do you change your behavior and learn to embrace your mistakes? The first step is to recognize cognitive dissonance in action Your mind will go to great lengths to preserve your sense of identity, so it helps to be aware of what that dissonance feels like. Typically, it manifests as confusion, stress, embarrassment or guilt. Those feelings do not necessarily mean you are in the wrong, but you can at least use them as reminders to explore the situation from an impartial perspective and objectively question whether you are at fault. Similarly, learn to recognize your usual justifications and rationalizations. Think of a time you were wrong and knew it, but tried to justify it instead. Remember how it felt to rationalize your behavior and pinpoint that feeling as cognitive dissonance the next time it happens. Mr. Okimoto said it also helped to remember that people were often more forgiving than you might think. Traits like honesty and humility make you more human and therefore more relatable. On the flip side, if it is undeniably clear that you are in the wrong, refusing to apologize reveals low self-confidence. “If it is clear to everybody that you made a mistake,” Mr. Okimoto said, “digging your heels in actually shows people your weakness of character rather than strength.” Read more: propertyupdate.com.au
<urn:uuid:e73c9b13-7514-410e-b8a6-9804be3b4c7c>
CC-MAIN-2019-51
https://mypropertyvalue.com.au/why-its-so-hard-to-admit-youre-wrong/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.963569
1,113
2.640625
3
About this image Postcard reference: 2335. The river goes underground soon after its source and re-emerges in Poole's Cavern to flow down into the town centre of Buxton via Pavilion Gardens. It is culverted through Buxton, then runs through Cheedale, Miller's and Monsal Dale, then on to Ashford in the Water. At that point the Wye finally seems to begin to relax and widen into a broad river valley leading to Bakewell. The Domesday book entry calls the town 'Badequella', meaning Bath-well. The town was built on the Wye at a spot where it was fordable and in 924 Edward the Elder ordered a fortified borough to be built here. Bakewell has one of the oldest markets in the area, dating from at least 1300, and the bridge helped with the crossing of animals to the market. The spot shown here now has riverside walks and is popular for feeding the ducks and trout. The 5 span bridge over the river Wye was built in the 14th Century. It marks the Eastern entrance to the town. The river then moves past Haddon Hall and the junction with the Lathkill before flowing on to Rowsley and the junction with the Derwent.
<urn:uuid:9f319abd-4384-4003-8c60-aa20797e2533>
CC-MAIN-2019-51
https://picturethepast.org.uk/personalised/greeting-card/design/landscape-greeting-card/poster/dcbm300026/posterid/dcbm300026.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.970402
260
2.75
3
Ultracold atoms could provide 2D window to exotic 1D physics Rice physicists propose new vantage point to observe quantum fractionalization Credit: Matthew Foster/Rice University Rice University physicists Matthew Foster and Seth Davis want to view a vexing quantum puzzle from an entirely new perspective. They just need the right vantage point and a place colder than deep space. “There’s a process in strongly interacting physics where fundamental particles, like electrons, can come together and behave as if they were a fraction of an electron,” said Davis, a graduate student in Foster’s research group. “It’s called fractionalization. It’s a really exotic, fundamental process that shows up theoretically in many places. It may have something to do with high-temperature superconductivity, and it could be useful for building quantum computers. But it’s very hard to understand and even harder to measure.” In a recent paper in Physical Review Letters, Foster and Davis, both theoretical physicists, proposed an experiment to measure fractionalization not in electrons but in atoms so cold they follow the same quantum rules that dictate how electrons behave in quantum materials, a growing class of materials with exotic electronic and physical properties that governments and industry are eying for next-generation computers and electronic devices. Quantum materials include high-temperature superconductors, one of the most puzzling mysteries in physics, and materials that exhibit topological phases, which earned its discoverers the 2016 Nobel Prize in Physics. The latter is the only place physicists have unambiguously measured fractionalization, in an exotic electronic state called the fractional quantum Hall effect. In this state, flat two-dimensional materials conduct electricity only along their one-dimensional edges. “That’s a 2D example,” said Foster, assistant professor of physics and astronomy at Rice. “And it’s clear that fractionalization is occurring there because if you measure the conductance of these edge states they behave as though they’re made of particles that behave like one-third of an electron. “There are no real particles carrying one-third of the electric charge,” he said. “It’s just the effect of all the electrons moving together in a such a way that if you create a local excitation, it will behave like an electron with one-third of a charge.” Foster and Davis said the main motivation for describing their ultracold atomic test was to be able to observe fractionalization in a system that is very different from the fractional quantum Hall example. “What we’re aiming at is just seeing this physics in one other context in an unambiguous way,” said Foster, a member of Rice’s Center for Quantum Materials (RCQM). Their proposed experiment calls for laser-cooling atoms to act as stand-ins for electrons. In such experiments, lasers oppose the motion of atoms, progressively slowing them to colder and colder temperatures. The cold atoms are trapped by other lasers that form optical waveguides, one-dimensional channels where atoms can move left or right but cannot go around one another. The quantum behavior of the atoms in these one-dimensional guides mimics the behavior of electrons in 1D wires. “All of the individual elements of the experiment have been developed, but we don’t believe they’ve been put together in a single experimental setup,” Foster said. “That’s where we need the help of experimentalists who are experts in laser-cooling.” To observe fractionalization in an ultracold system, Foster and Davis propose creating a set of parallel 1D waveguides that are all in the same two-dimensional plane. A few additional atoms would populate the 1D guides near the center of the experiment. “So we’ll start with the 1D ‘wires,’ or guides, and the initial density in the middle, and then we’ll drop some of the lasers and allow the atoms to interact between the wires in a kind of 2D mesh,” Foster said. “We can very accurately describe the 1D system, where strong interactions cause the atoms to behave in a correlated way. Because the whole system is quantum mechanical and coherent, those correlations should get imprinted on the 2D system. “Our probe is letting go of that extra bump of density and watching what it does,” he said. “If the atoms in the 1D guides are not interacting, then the bump will just spread out between the wires. But, if there was initial fractionalization due to correlated effects in the wires, what we can confidently calculate is that the density will do something completely different. It will go the other direction, flying down the wires.” Foster said he’s interested in discussing the feasibility of the test with ultracold atomic experimentalists. “We know it can take years to build and perfect some of the experimental setups for these kinds of experiments,” Foster said. “As theorists, we know the ingredients we need, but we don’t know the ones that will be most challenging to implement or if it may be easier to modify some setups as opposed to others. That’s where we’ll need the help of our experimental colleagues.” The research was supported by the National Science Foundation, the Army Research Office and the Welch Foundation. The researchers used the National Science Foundation-supported DAVinCI supercomputer administered by Rice’s Center for Research Computing and procured in a partnership with Rice’s Ken Kennedy Institute for Information Technology. RCQM leverages global partnerships and the strengths of more than 20 Rice research groups to address questions related to quantum materials. RCQM is supported by Rice’s offices of the Provost and the Vice Provost for Research, the Wiess School of Natural Sciences, the Brown School of Engineering, the Smalley Institute for Nanoscale Science and Technology and the departments of Physics and Astronomy, Electrical and Computer Engineering, and Materials Science and NanoEngineering. High-resolution IMAGES are available for download at: CAPTION: Rice University physicists Seth Davis (left) and Matthew Foster have proposed a new experiment to measure quantum fractionalization in ultracold atoms. (Photo by Jeff Fitlow/Rice University) CAPTION: In an ultracold atomic experiment proposed by Rice University physicists Matthew Foster and Seth Davis, quantum fractionalization would be observed by density waves propagating in the direction of 1D quantum waveguides (left). In the absence of fractionalization (right), density waves would spread in a perpendicular direction. (Image courtesy of Matthew Foster/Rice University) The DOI of the Physical Review Letters paper is: 10.1103/PhysRevLett.122.065302 A copy of the paper is available at: https:/ This news release can be found online at news.rice.edu. Follow Rice News and Media Relations on Twitter @RiceUNews. Located on a 300-acre forested campus in Houston, Rice University is consistently ranked among the nation’s top 20 universities by U.S. News & World Report. Rice has highly respected schools of Architecture, Business, Continuing Studies, Engineering, Humanities, Music, Natural Sciences and Social Sciences and is home to the Baker Institute for Public Policy. With 3,962 undergraduates and 3,027 graduate students, Rice’s undergraduate student-to-faculty ratio is just under 6-to-1. Its residential college system builds close-knit communities and lifelong friendships, just one reason why Rice is ranked No. 1 for lots of race/class interaction and No. 2 for quality of life by the Princeton Review. Rice is also rated as a best value among private universities by Kiplinger’s Personal Finance. To read “What they’re saying about Rice,” go to http://tinyurl. Related Journal Article
<urn:uuid:2bb63c7c-7449-4e9e-8a73-718699a7e1ab>
CC-MAIN-2019-51
https://scienmag.com/ultracold-atoms-could-provide-2d-window-to-exotic-1d-physics/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.924159
1,687
3.0625
3
GSK, Merck HPV Vaccines not linked to Two Health Conditions, Review Reports The HPV (human papillomavirus) vaccines created by GlaxoSmithKline and Merck are not linked to complex regional pain syndrome (CRPS) and postural orthostatic tachycardia syndrome (POTS), an investigation conducted by the European Medicines Agency and its Pharmacovigilance Risk Assessment committee concluded. CRPS is a syndrome that involves chronic pain in a limb. POTS is a condition that occurs when one's heart rate increases abnormally. It can lead to symptoms such as dizziness, fainting, weakness, headache, nausea, fatigue and pains. The committee conducted a detailed safety review and found that "evidence does not support a causal link between" the cervical cancer vaccines (Cervarix, Gardasil/Silgard and Gardasil-9) and the two syndromes. There have been some reports of either syndrome starting after HPV vaccination. For the review, the committee looked into published research, clinical trials and reports. The agency said in a statement, "There is no reason to change the way the vaccines are used or amend the current information...The benefits of HPV vaccines...continue to outweigh their risks. The safety of these vaccines, as with all medicines will continue to be carefully monitored." The HPV vaccine is recommended for all girls between nine and 26-years-old. The vaccine is also recommended for boys to help reduce risk of HPV cases. It can protect against cervical cancer and other HPV-related cancers. The EMA estimated that at least 72 million people throughout the world have gotten the vaccine.
<urn:uuid:43ab4f86-999f-49ec-8f5c-6d7972018a80>
CC-MAIN-2019-51
https://www.counselheal.com/articles/14913/20151105/gsk-merck-hpv-vaccines-not-linked-to-two-health-conditions-review-reports.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.947464
342
3.03125
3
How to Create, Open, and Save Numbers Documents on Your MacBook Numbers ships with a selection of templates on your MacBook that you can modify quickly to create, open and save a new spreadsheet. (For example, after a few modifications, you can easily use the Budget, Loan Comparison, and Mortgage templates to create your own spreadsheets.) How to create a new Numbers document To create a spreadsheet project file, follow these steps: Click the Launchpad icon in the Dock. Click the Numbers icon. Numbers displays the Template Chooser window. Click the type of document you want to create in the list to the left. The document thumbnails on the right are updated with templates that match your choice. Click the template that most closely matches your needs. Click Choose to open a new document using the template you selected. How to open an existing spreadsheet file on MacBook If a Numbers document appears in a Finder window (or you use Spotlight to search for it or it’s included in the All my Files location), you can just double-click the Document icon to open it; Numbers automatically loads and displays the spreadsheet. However, it’s equally easy to open a Numbers document from within the program. Follow these steps: From Launchpad, click the Numbers icon to run the program. Press cmd+O to display the Open dialog. Click the desired drive in the Devices list at the left of the dialog and then click folders and subfolders to drill down until you’ve located the desired Numbers document. If you’re unsure of where the document is, click the Search box at the top-right corner of the Open dialog and type a portion of the document name or even a word or two of text it contains (using the pop-up menu that appears). Double-click the spreadsheet to load it. If you want to open a spreadsheet you’ve been working on over the last few days, choose File →Open Recent to display Numbers documents that you’ve worked with recently. The Template Chooser window also sports both an Open Recent button and an Open Existing File button. Convenience is A Good Thing! Save Those MacBook Spreadsheets! With the Auto Save feature built into Mountain Lion, you’re no longer required to save on a regular basis — however, if you a fan of not retyping any data at all, save your spreadsheets often (just in case of a power failure or a coworker’s mistake). Follow these steps the first time you save your spreadsheet to your hard drive: If you’re saving a document that hasn’t yet been saved, the Save As sheet appears. Type a filename for your new spreadsheet. Click the Where pop-up menu and choose a location to save the file. To save your document directly to Apple’s iCloud, choose iCloud as your destination — you can open your iCloud documents from another Mac or from any iOS device running iWork for iOS 1.61 or later. (Naturally, you’ll need to enter the same Apple ID on any device before using it to access the documents stored in your iCloud space.) If you choose a location other than iCloud, you can click a common location, such as your desktop, Documents folder, or Home folder. If the location you want isn’t listed in the Where pop-up menu, you can also click the down-arrow button next to the Save As text box to display the full Save As dialog. Click the desired drive in the Devices list and then click folders and subfolders to drill down until you reach the desired location. You can also create a new folder in the full Save As dialog. After you save a Numbers document for the first time, you can create a version of that document by choosing File→Save a Version. To revert the current document to an older version, choose File→Revert Document. You can choose to revert to the last saved version, or you can click Older Version to browse multiple versions of the document and choose one of those to revert to.
<urn:uuid:be09f55a-f4db-4779-b8e5-a938f3eadbcc>
CC-MAIN-2019-51
https://www.dummies.com/computers/macs/macbook/how-to-create-open-and-save-numbers-documents-on-your-macbook/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.849051
852
2.546875
3
The CDC Just Confirmed the First Case of Ebola in the U.S. The Centers for Disease Control (CDC) confirms a Dallas patient has been diagnosed with Ebola, making this the first case of Ebola confirmed in the United States. WFAA-8 reports that the patient has been held in "strict isolation." The Associated Press reported Monday evening that patient has been admitted to Texas Health Presbyterian Hospital after showing signs of the Ebola virus. In a press conference Tuesday evening, the CDC confirmed that the patient traveled from Liberia to visit family in the U.S. on September 19, and developed symptoms on September 26. CDC Director Tom Frieden outlined the next steps for treating the disease and preventing its spread, including caring for the patient, identifying all the people who may have had contact with the patient and monitoring them for fever for 21 days. Frieden repeated, "I have no doubt that we will control this case of Ebola so that it does not spread." The CDC released a statement on the Texas diagnosis: The person sought medical care at Texas Health Presbyterian Hospital of Dallas after developing symptoms consistent with Ebola. Based on the person’s travel history and symptoms, CDC recommended testing for Ebola. The medical facility isolated the patient and sent specimens for testing at CDC and at a Texas lab participating in the CDC’s Laboratory Response Network. CDC and the Texas Health Department reported the laboratory test results to the medical center to inform the patient. A CDC team is being dispatched to Dallas. “Ebola can be scary. But there’s all the difference in the world between the U.S. and parts of Africa where Ebola is spreading. The United States has a strong health care system and public health professionals who will make sure this case does not threaten our communities,” said CDC Director, Dr. Tom Frieden, M.D., M.P.H. “While it is not impossible that there could be additional cases associated with this patient in the coming weeks, I have no doubt that we will contain this.” This isn't the first time Americans have fretted the arrival of Ebola on U.S. soil. In August, 27-year-old Brooklyn grad student Eric Silverman was quarantined at Mount Sinai Hospital after complaining of symptoms that resembled the deadly Ebola virus. Silverman had traveled to Sierra Leone, where West Africa's Ebola outbreak has been the most pronounced and vivid, in July. The hospital eventually concluded that Silverman had avoided the infection and released him. Additionally, Reuters also notes that while the West Africa epidemic "has overwhelmed regional health sectors still struggling to rebuild after years of civil war and turmoil," the U.S. won't have the same experience. The country's medical facilities, like Emory University Hospital (where two doctors infected with the virus were treated and released in August), are far better equipped to isolate Ebola before it becomes a full-scale outbreak. "The National Institutes of Health recently admitted an American doctor exposed to the virus while volunteering in Sierra Leone. Four other patients have been treated at hospitals in Georgia and Nebraska," the Associated Press reports. Despite the fact that the U.S. is prepared to deal with the disease, Ebola is no picnic for even the most advances nations. The CDC recently projected that between 550,000 and 1.4 million people in West Africa could be infected with the deadly Ebola virus by Jan. 20, 2015, and that won't stay in West Africa. That state and federal agencies are exercising an abundance of caution — and Americas, an abundance of vigilence, is absolutely the right response. Editors Note: Mar. 3, 2015 An earlier version of this article cited Associated Press reporting, but did not include quotations around the cited passage. The story has been updated to fully attribute the Associated Press' language.
<urn:uuid:7b92f684-04c4-4873-8aa7-91015a51dec6>
CC-MAIN-2019-51
https://www.mic.com/articles/100076/the-cdc-just-confirmed-the-first-case-of-ebola-in-the-u-s
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.959309
785
2.703125
3
Students and volunteers help us build and monitor living shorelines up and down the coast. These projects allow students to connect with nature while participating in hands-on restoration efforts. Groups learn about why living shorelines are important as well as what types of creatures call them home. Living Shorelines 101 Living shorelines are a method used to protect tidal shores from erosion. Unlike traditional techniques such as jetties, groins, and bulkheads, living shorelines use natural elements like oyster shells or native marsh grasses. These natural elements work to stabilize the shore and provide critical habitat at the same time. Other materials used in living shorelines may include: wood, limestone, rip rap or constructed oyster domes. Living shorelines offer many benefits, including: - Providing food and shelter for many creatures - Serving as critical nurseries for important marine species - Filtering pollutants from stormwater runoff, the number one source of pollution along the coast - Protecting the land from wave energy, storm surges and tides - Providing aesthetic value, enhanced views, and a sense of place Classrooms to Marshes - The North Carolina Coastal Federation educates students about living shorelines through interactive lessons both in the classroom and along local shorelines. High school and college students help by bagging recycled oyster shells, building reefs, planting marsh grasses and monitoring living shoreline projects. Middle and Elementary school students also help to plant marsh grasses. - At the Fred and Alice Stanback Coastal Education Center in Wrightsville Beach, the federation offers a Touch Tank Program each Tuesday throughout the summer months. For More Information The federation works with numerous schools on living shoreline projects. The classroom and field activities are correlated to the N.C. Standard Course of Study objectives to help teachers integrate the program into their courses. If you are interested in learning more about the federation’s educational opportunities for students, please contact one of our educational coordinators.
<urn:uuid:de0ecdc8-a38a-44ea-8e01-7e4225f96c2d>
CC-MAIN-2019-51
https://www.nccoast.org/project/living-shorelines-education-program/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.914302
403
3.8125
4
IN THIS CHAPTER Defining PDF forms Understanding forms editing Auto creation of PDF forms Getting familiar with form fields Setting field properties Acrobat PDF forms and HTML forms are the most popular types of electronic forms in existence today. We're all familiar with HTML forms and most of us have filled out these kinds of forms when making online purchases. PDF forms are standardized in many industries such as government, education, and large business organizations. And most of us are also familiar with PDF forms like those used by the U.S. Internal Revenue Service for income tax preparation. As a designer, you may be called upon to create PDF forms where your clients want to host the forms on Web sites, distribute forms on CD-ROMs, or use forms for electronic file exchanges. With the marvelous design tools you have available in the Creative Suite and the use of Adobe Acrobat (Pro, Pro Extended, or Acrobat Standard edition), you have great opportunities to create attractive and powerful dynamic PDF forms.
<urn:uuid:3eac8b86-9a19-4fc5-9a5a-884d808abaf7>
CC-MAIN-2019-51
https://www.oreilly.com/library/view/adobe-creative-suite/9780470584767/ch27.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.895278
204
2.796875
3
CDFW scientist transporting oiled seabirds on an ATV. The primary role of the MWVCRC (Marine Wildlife Veterinary Care and Research Center) is to provide a state-of-the-art facility, equipment, and trained personnel in a state of readiness to enable best achievable capture, care, and rehabilitation of marine wildlife (primarily sea otters, marine birds, and pinnipeds) affected by oil spills and/or other pollution events. In addition to the cleaning and rehabilitation facility, the MWVCRC maintains mobile veterinary labs, several boats, and other equipment for the capture and care of marine wildlife. As a keystone facility of the Oiled Wildlife Care Network (OWCN), the MWVCRC shares the OWCN’s mission of best achievable capture and care for wildlife exposed to petroleum in the environment. The MWVCRC was funded (pursuant to CA Government Code §8670.37.5) and built with a specific goal of being able to care for up to 150 sea otters, 10 pinnipeds, and 125 birds during oil spills, and is the designated primary care facility for all oiled sea otters in California. The MWVCRC cared for an individual oiled sea otter, named “Olive,” in 2009. Cleaning of Olive, who now has her own FaceBook page, provided a good opportunity to test protocols developed during a sea otter washing study conducted between 2004 and 2008. The MWVCRC is currently working with the OWCN on a revision and expansion of protocols for response to oiled otters. For general information on OSPR response to oiled wildlife, see our Wildlife Response page.
<urn:uuid:7bd3276e-8b8f-4362-bf82-cf67cdcf8f79>
CC-MAIN-2019-51
https://www.wildlife.ca.gov/OSPR/Science/MWVCRC/Spill-Response-Program
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00412.warc.gz
en
0.9393
356
2.828125
3
Stages of the IoT testing: definition, characteristics What is IoT? IoT (Internet of Things) – is a special ecosystem, that combines a lot of various useful components: route vehicles, home automated system, medical equipment, different microchips and so on. These and other components can keep and send information. With the help of such technology, you can easily manage different devices remotely. Examples of IoT-devices All the IoT objects can be divided into such kinds: - Portable systems. Different fitness bands and/or Apple Watches are easily synchronized with other portable devices to transmit the data. With their help, we can exchange the data, watch some info about our health: heart rate, organism activity, sleep cycle, etc.; - Web system and web development. CitySense utility can collect the data about lighting, and automatically turn on/off the outside light. There’re a lot of available programs, which manage traffic lights remotely, and can tell the interested people about the number of parking spaces; - Today there’re special systems that can watch human health and are actively used in the hospitals. The basis of their functionality is approximate data, such services can easily control necessary medicine strength. For example, UroSense utility can monitor the liquid level in the organism by itself, and if it’s needed, this program can raise it. Doctors get to know about the patient’s condition through a wireless network. Opportunities, which are open thanks to IoT-things - RFID (modern radiofrequency identification), EPC (electronic program code); - NFC (“near field communication”) – allows two devices to interact on a smooth basis. This technology can be found in devices as a function for contactless transactions. - This is actively used in situations with a short range and in systems of portable devices. - Z-Wave. Modern radio low-frequency technologies, that are used for managing the home automatics, light and so on; - Wi-Fi. It’s probably the most popular network for IoT system (exchange of data, messages, and information). Let’s take a look at the illustrative example, in order to understand correctly the main point of IoT functioning. There’s a modern system to analyze medical indications, which can monitor the human health conditions (heart rate, temperature and a sufficient level of a liquid in an organism). All information is displayed in a special structured system: there’re web files and libraries. Doctors decide themselves, should the patient take medicine or not. In practice, there’re some common approaches to test the productivity of internal IoT design. Next, we will sort them out. - A full usability testing should be done for every produced device and ecosystem; - According to a designed medical gadget, it has to be totally simple and easy to use; - It’s important to make a very clever system, which could not only send the client a message, but create reports in case of errors, and inform a user about it in due time; - A system should have a special option, that will record an event, which will be totally clear for a final user of this product. If it’s impossible to add such a parameter, all the info about the event should be saved into the database; - The functions of processing the incoming information and data exchange between developed products are tested very carefully. Safety of IoT functioning - Information is the main basis for the activity of connected peripherals. That’s why it is so important to test the program for the possibility of unauthorized access to the database. You have to check how qualitatively user data are encrypted; - In case of UI, it’s needed to check, if it has security, based on a safe password. - The operative ability to connect to the network and general IoT functioning is very important because we’re talking about a special system, applied in a medical field; - There’s checking of an available network, where data transmission can be done; - All scripts are explored when there’s no connection. No matter what’s the system complexity, there’s a chance that sometimes its status can be offline. If the technology isn’t working temporarily, employees of a medical institution should know about it. In other words, they will be able to monitor a patient’s health condition even when the system is in a sleep mode. - You should take into account the fact of importance for healthcare to use just this system; - Testing with 5-10 patients, who have 5-10 devices; - To test the program for general system analysis: actual load, energy consumption, temperature range. Testing for compatibility Such a graph can be always found in any check-list for IoT product testing. - Compatibility of actual OS versions and their integral components; - Cross-browser compatibility; - Devices of different generations; - Types of connections (Bluetooth or Wi-Fi). Testing before release - Pilot testing – is an “important tick” in the check-list; - Only tests in a laboratory can tell us that product is totally functioning with the stated parameters; - During the pilot testing, the amount of users is strictly defined. They do various manipulations with the utility and give their own opinion; - Such opinions are very important, making the released product much better. Testing of program consistency - Application, which system can monitor the current patient’s condition, should pass a lot of tests on technical consistency; - It can happen, that system application passes all stages of testing, but “fail” the testing before the final release; - It’s logically correct to test the product on its consistency to technical standards before the stage of designing and adding. Testing of new versions - IoT – is an original combination of many libraries, OS and developed software; - During any updating – regardless of its nature (system, or separate library) – it’s necessary to do the regression testing. Specialists make corrections of tests strategy in order to avoid the difficulties that can happen during product updating in the future. Difficulties that can be during IoT testing Problem with the soft IoT – is a special system, inside which different services and structural components closely interact. Not only the fact of developed soft productivity is important, but also hardware: special sensors, transducers, and gateways. It’s not enough to check technical serviceability only. Every component is connected to other elements. The architecture of IoT technologies is very multi-faceted, unlike the one of traditional web products. Used model of components and program interaction All components of one network should interact hassle-free in real time. In practice, it is really hard to do. Hence, there’re additional difficulties, which closely interact with IoT (client data safety, compatibility with different software and manipulation with software updates). Data check, coming in real time If you want to manage such information, you need to work hard. It becomes even more difficult because the system can be used in completely different ways and in a special format, that can’t be counted during testing. IoT system includes many components, which are set on completely different operating platforms. Testing is possible only in that case when you can “run the functionality” on the maximum number of available devices. Continuous network access For constant and qualitative functioning of IoT components, it is very important to have a proven network. Data exchange speed has to grow all the time. Any IoT architecture needs to be tested at different conditions of signal transmission, with different internet speed. For example, you can test the network load with the help of virtual networks, which give some information about load testing. But actual data – is always original and unique scripts, and testers team can’t know where exactly difficulties will appear. Tools and tools utilities for the IoT testing There’re many tools and utilities, which are commonly used in the testing of global IoT. They can be divided into groups according to the developed product destination: - Wireshark – is an effective app with the open program code. It is used for analysis of traffic in graphic form, data of input host. Tcdump – although this product doesn’t have GUI, it can do similar actions like Wireshark (client can show current TCP/IP packets, which are passed inside the selected network); - “Hardwire”. JTAG Dongle – is an app, which system can easily find bugs in a program code, and it displays all edits on a step-by-step Digital Storage Oscilloscope – is an opportunity to check some event on the base of notes. Software Defined Radio – is an opportunity of qualitative emulation of the transducer and transmitter for plenty of allocated gateways. IoT technologies – is a dynamic modifying field and many promising ways to develop some useful things. In the near future, IoT can become one of the fundamental aspects of work for many quality assurance organizations. Network architecture, apps for smart devices, specialized linking modules – all these and even more things play a key role in understanding and modification of different technologies and components, which make our life much easier. The methodology of IoT testing can be different depending on the designed ecosystem or architecture. It is very hard to test the Internet of things, but also, this activity is very exciting and useful. It’s some kind of “undeveloped space” with a lot of technical opportunities – there’re so many different systems, devices, and program components, which “in good hands”, can be used for the human well-being!
<urn:uuid:249342de-32cd-4231-95cf-b4f71aa48f0c>
CC-MAIN-2019-51
http://blog.qualitytesting.info/stages-of-the-iot-testing-definition-characteristics/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.920678
2,045
3.375
3
A thoroughly revised and up to date edition of Thomas C. Foster’s classic guide—a full of life and entertaining introduction to literature and literary basics, including symbols, themes and contexts, that shows you the way to make your on a regular basis reading experience more rewarding and enjoyable. While many books can also be enjoyed for their basic stories, there are continuously deeper literary meanings interwoven in these texts. How to Read Literature Like a Professor helps us to discover those hidden truths by taking a look at literature with the eyes—and the literary codes-of the ultimate professional reader, the college professor. What does it mean when a literary hero is traveling along a dusty road? When he hands a drink to his companion? When he’s drenched in a sudden rain shower? Ranging from major themes to literary models, narrative devices and form, Thomas C. Foster provides us with a broad overview of literature—a world where a road ends up in a quest, a shared meal may signify a communion, and rain, whether cleansing or destructive, is never just a shower-and shows us the way to make our reading experience more enriching, satisfying, and fun. This revised edition includes new chapters, a new preface and epilogue, and contains up to date teaching points that Foster has developed during the last decade.
<urn:uuid:76d89edb-77dd-41e0-9c16-2c1d144e73da>
CC-MAIN-2019-51
https://get4school.com/product/how-to-read-literature-like-a-professor-a-lively-and-entertaining-guide-to-reading-between-the-lines-revised-edition/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.945156
274
2.96875
3
Flight is exciting, fun, convenient for travel, and hopefully, a safe hobby, career, or means of travel. Maintenance and inspections of aircraft are absolutely necessary to keep all aircraft safe to fly. Much of the maintenance that an aircraft receives is scheduled and is known to pilots and technicians. Unscheduled maintenance occurs when there is an unexpected issue with the aircraft that must be addressed immediately to ensure the safety of pilots and passengers. While unscheduled and scheduled aircraft maintenance are each performed in different scenarios, they can be connected. Often, the need for unscheduled maintenance is discovered during routine checks and scheduled maintenance. In this event, the unscheduled maintenance can be performed to fix an issue before it ever becomes unsafe or an emergency. Here are a few examples of scheduled maintenance: While many may consider the preflight check to be just that, a check, it is actually a form of maintenance. Before the aircraft ever takes to the air, the pilot uses a checklist to ensure every aspect of the aircraft is on safe working order. The interior of the aircraft, including the cabin and cockpit are thoroughly checked, as well as the vital systems for flight and safety. A visual inspection of the exterior of the aircraft is performed to ensure that there are no abnormalities or damage that could cause a safety issue. The preflight check is an example of scheduled maintenance that can lead to unscheduled maintenance. If anything on the checklist is discovered to be unsafe or in need of repair, a maintenance technician is then contacted to make the repairs, whether they are minor or major. Annual inspections are detailed inspections performed every 12 months and are required for any aircraft used for hire, recreational, or flight instruction purposes. An annual inspection is similar in scope to the 100-hour inspection which includes a review of all the aircraft logbooks and testing and inspecting the engine, flight surfaces, flight controls, and avionics. If any issues are discovered, maintenance is performed. 100-hour inspections are required by the FAA for flight instruction and for hire aircraft. This comprehensive inspection includes nearly every aspect of the aircraft including the interior, exterior, and mechanical operations. Inside the aircraft, the cabin and cockpit are thoroughly inspected. Seats and seatbelts are tested and any loose objects that are discovered must be secured. The avionics, yoke, fuel switches, flight controls, and battery are also inspected and tested. The engine and engine area are inspected and routine maintenance is performed that includes cleaning the spark plugs and changing the oil. All other major components of the aircraft are also inspected, including the fabric and skin of the fuselage, the windows, cabin and cargo doors, and the flight control surfaces, as well as the tires, brakes, struts, and landing gear. Inspection plates, access doors, cowlings, and fairings are removed, and all of the major components of the aircraft are inspected. Unlike 100-hour inspections, 50-hour inspections are not required by the FAA. However, because an oil change is necessary at 50 hours, it is generally recommended to perform at least a cursory inspection of the aircraft at the same time to prevent any issues from arising. Preventative maintenance is often simpler, less expensive, and less time-consuming than emergency, unscheduled maintenance for an issue that could have prevented with a routine check. Saker Aviation employs expert technicians to perform scheduled and unscheduled aircraft maintenance, including major and minor airframe services for major commercial airlines, private and business jets, and military aircraft. We are dedicated to safety and strive to be the very best in the aviation industry.
<urn:uuid:a3594ab6-2fe5-4ee2-b959-fb1fc78feac7>
CC-MAIN-2019-51
https://sakeraviation.com/the-difference-between-unscheduled-and-scheduled-aircraft-maintenance/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.964518
735
2.75
3
We define bullying as “deliberately hurtful behaviour that is repeated over a period of time.” Bullying can take many forms, but the three main types are physical/verbal and indirect. We encourage parents to inform us immediately if they suspect their child is being bullied. The sooner we know, the sooner we can act to stop it! Please see our anti-bullying policy for further details, including early signs of distress. Bullying will not be tolerated in our school. It is everyone’s responsibility to prevent it happening and our policy contains guidelines for all members of the school community. Our Christian value of ‘Friendship’ is promoted and Parables from the Bible are explored to support this. Our school takes part in the National ‘Anti-bullying week’ each year. Activities have included making an anti-bullying graffiti wall, posters, designing t-shirts, making friendship flowers, anti-bullying workshops and entering anti-bullying song competitions. Throughout the year, children are encouraged to report all incidents of bullying to an adult and are supported in developing strategies to combat it, including the use of discussion and role play. Children are also taught awareness of ‘Cyber bullying’ throughout the year and this form of bullying will be dealt with in the same robust manner as any other form of bullying. Year 5 and 6 children are trained as ‘buddies’ to support any pupil who may feel susceptible to bullying or for those who may behave in a bullying way. Training is focused on our Christian values. Click the link below to view our Behaviour Policy:
<urn:uuid:40b45809-82a0-4c60-990d-f1722f06769a>
CC-MAIN-2019-51
https://sturry.kent.sch.uk.88-208-200-194.greenschoolsonline.co.uk/Wellbeing/Anti-Bullying/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.965303
337
3.265625
3
The Road Safety Authority has launched World Remembrance Day for Road Traffic Victims. Over 80,000 people have been seriously injured on Irish roads since the recording of serious injuries began in 1977. To date in 2019 a total of 125 families, friends and communities have lost a loved one. 24,390 people have died on Irish roads since records began. It's equivalent to the population of Balbriggan. RSA holding an event at World Day of Remembrance for Road Traffic Victims. Almost 25,000 people have been killed on Irish roads since 1959. The global day of remembrance takes place on Sunday. pic.twitter.com/wzxgpLQJuC— Ben Finnegan (@_BenFinnegan) November 12, 2019 Transport Minister Shane Ross says it's important people are aware: "If you've seen the families here, some of their family members have died recently, it's poignant in itself. "It's a tragedy for so many families. I suppose what we're trying to do today is hand on the legacy of tragedy to encourage people to take the right measures to be careful in the future. "That's the purpose of today, first memory, but also hopefully to ensure that we have the absolute minimum of road deaths in the future."
<urn:uuid:5c32a7e8-fec3-4a72-a039-ee41aee61802>
CC-MAIN-2019-51
https://www.fm104.ie/news/fm104-news/almost-25000-people-have-died-on-irish-roads-since-records-began/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.969328
265
2.515625
3
Forms of Shiva in Buddhist Tantra: - Located under the feet of many Buddhist deities - Located in the outer entourage of many deity mandalas - As an emanation of Shrishtikantha Lokeshvara - Depicted as the progenitor of the Svarodaya - Others... Maha Deva (Tibetan: lha chen po, English: Great God): also known as Shiva - emanation of Avalokiteshvara. "...Great God, Ishvara, with a body red in colour, like ruby, blazing with light. Having one face, two hands and three eyes, charming and passionate in appearance. In the right [hand] holding aloft a hook to gather the Three Realms and the left a lasso of wind. The hair is bound in a tuft decorated with a crescent moon. Adorned with silks and jewels, naked with a red linga, engorged and erect. The right leg is bent and the left extended in a standing posture. Embraced by the consort, Uma Devi, bright red, beautiful and affectionate. The right [hand] holds a conch shell vessel to the Father and the left a hook; adorned with jewels..." (Min-ling Lochen Dharmashri, 1654-1718. Tibetan source text part II, pp.364-365). "To the discerning pristine awareness body of all conquerors, Emanation body of compassion of the powerful Avalokiteshvara, Benevolent Lord of the World: Mahadeva together with consort, Uma, I pay homage." (Nyingma liturgical verse). The practice of Mahadeva as an independent meditational practice in Tibetan Buddhism is a Revealed Treasure teaching (Tib.: Terma) unique to the Nyingma Tradition of Tibetan Buddhism. It was especially popularized through the Mindrolling Tradition of the Nyingma. Sometimes Lha Chenpo can be found as a minor figure in Mindrolling paintings of Jinasagara Lokeshvara. There are a number of different forms of Lha Chenpo relating to the 'Terma' tradition plus other forms of Shiva found in the various levels of Buddhist Tantra. A few minor practices for Shiva as a front generation can also be found with the intentionan of accomplishing certain worldly aims. One such practice is attributed in the writings of Jamyang Khyentse Wangpo (19th century) to Padampa Sanggye of the 11th century. Jeff Watt 5-2004 [updated 5-2017, 10-2019] Lha Chen: History, Narrative & Myth by Cameron Bailey, December 28th, 2015 The deity known variously as Lha chen (Skt. Mahadeva), Wangchuk Chenpo (Maheshvara), Legden (Shiva), or Rudra is perhaps the most cosmologically significant protector deity in the entire Tibetan Buddhist pantheon. Lelung Zhepe Dorje, in his eighteenth century compilation of protector deity mythology identified him as the "progenitor of all dharma protectors" along with his consort Uma Devi. Rudra-Maheshvara eclipses Mara in tantric Buddhism as the primary adversarial being and Satanic-figure. In fact, the myth of Rudra's subjugation provides what Robert Mayer has called the "charter myth" explaining and justifying the origins of Vajrayana Buddhism. This subjugation myth also provides a literary and doctrinal template for the subjugation of other (lesser) hostile deities, as well as justifying the historical reality of the Buddhist incorporation of certain significant elements of Shaiva tantra, in particular the worship of wrathful Heruka-form deities. Versions of the Rudra subjugation myth appear in some, comparatively early, Yoga Tantras, and are thus canonical for all schools of Tibetan Buddhism. However, the later, more elaborate and gruesomely detailed versions of the myth appear almost exclusively in Nyingma scriptures, and historically there has been a cult devoted to Lha chen and a pervasive tradition of ritually reenacting Rudra's subjugation in the Nyingma school that is without parallel in the Sarma schools. The most elaborate version of the Rudra subjugation myth appears in the Nyingma "Compendium of Intentions" Sutra (which is technically classified as the main Anuyoga Tantra of the Nyingma canon). The story begins with a man named Tharpa Nakpo ("Black Liberator") who many eons ago lived in Abhirati, the Buddha-field of Akshobhya. Tharpa Nakpo, along with his servant, become the students of a guru who teaches the Great Perfection (Dzogchen) doctrine that whatever arises is the enlightened mind. While his servant correctly understands the teachings and becomes enlightened, Tharpa Nakpo badly misinterprets the Great Perfection, taking the teachings to mean that he can perform whatever actions he wants. As an aside, it is interesting to note the parallels between this myth and the classical Hindu myth in which Indra, the king of the gods, and Virochana, the king of the demons, both receive teachings from a sage about the nature of the transcendent Self. While Indra understands the teachings correctly, Virochana misinterprets them, thinking that the Self is nothing more than the physical body. In any case, Tharpa Nakpo and his servant get into an argument about who is correct in their interpretation of the Great Perfection and when they ask their guru to clarify, the guru states that Tharpa Nakpo is wrong. He becomes enraged and banishes both his servant and guru. He then goes to live in the charnel grounds, killing men and eating their corpses and engaging in orgies with prostitutes. When he dies, he is subsequently reborn in the lowest hell for incalculable eons, followed by thousands upon thousands of rebirths in other hells, and then as different types of particularly wretched life-forms, such as vomit-eating spirits. At last, he is finally reborn as Rudra, the son of a rakshasi prostitute who dies in childbirth. According to another version of the myth Rudra was conceived after his mother had sex with three different types of demons and their seed combined within her to produce a hybrid offspring. Horrified, the community buries her along with her mutant son at the base of a poisonous tree named "Sexual Transgression," which is surrounded by pigs, snakes, and birds representing the poisons of ignorance, hatred, and desire. Rudra survives by eating his mothers corpse over the course of many days until he becomes strong enough to crawl out of his grave. He has become a hideous monster with three heads, wings, scaly flesh, claws, smeared with all kinds of repulsive substances and “[w]hoever saw him, their eyes would roll back in terror and they would faint.” Rudra finds he is endowed with practically limitless evil magical power and proceeds to conquer and gain control over every being in the world, starting with the charnel ground spirits, and gradually moving up until he overthrows the gods themselves, stealing their wives for himself. He sets up a kind of palace made of piled corpses and bones on the Isle of Lanka, and due to his malevolence the entire world begins to resemble an hell-realm. Seeing this woeful state of affairs, the buddhas decide that Rudra must be subjugated. They initially send Shakyamuni Buddha who tries to convert Rudra to the Buddhadharma peacefully, but Rudra laughs in his face and drives him off. The buddhas then send a series of wrathful buddhas to attempt to subjugate him by force. Eventually, Vajrapani takes on a form identical to Rudra and impregnates his main consort through deception. From this union, a being called Vajra-Demon is born who goes on to defeat Rudra in combat, painfully subjugates him by eating him, then resurrects him as dharma protector. In other versions of the subjugation, Rudra is eaten by Heruka, shat out, and re-eaten by Ucchushma before he finally submits. In a version where Hayagriva is the subjugating deity, Hayagriva shrinks his body, flies up Rudra's anus and expands his body again so that Rudra bursts and Hayagriva is left wearing his empty skin. Later treasure text revelations by various Nyingma authors give even more radically different accounts of Lha chen's subjugation. The Lha chen revelations of Migyur Dorje (1645- 1667) and Terdak Lingpa (1646-1714), specifically the origin myth of Lha chen found in both cycles, made twenty-four years apart, in east Tibet and central Tibet respectively, are interesting to compare considering the apparent continuity and striking differences. The origin myth in Migyur Dorje's Namcho cycle, said to have been received in a vision from Lha chen himself in 1656, is a strange, at times comical, retelling of the "Compendium of Intentions" myth of Tharpa Nakpo's fall from grace, his mutation into a worldly god of terrifying power, and his subsequent subjugation. In Migyur Dorje's version, an unnamed lapsed monk suffers a series of unfortunate rebirths based less on his own malice, and more on his own bad luck: "Innumerable incalculable eons ago, was born a man. That man became a monk. One time a dog scratched the face of a woman and that monk considered striking punishing the dog, but thought that would be inappropriate. With the angry lips (angry visage) of a dog, [he wished?] to kill the dog. From that wish, his mind fell. That monk jumped into the water. After that he was born as a madman who also jumped into the water. He was born like that 500 times and did that bad behaviour. After that, he was born as a madman. With a single stroke he conquered the madness. A lama called “Dog Lama” bestowed empowerment upon him. He was born as a dog 500 times. After that, he was born as a man. He requested empowerment from a lama whose actions were like the actions of a noxious spirit. He was born as a noxious spirit 500 times. Again, he was born as a man and requested empowerment from “Lama of the Obstructor Spirits.” He was born 500 times as an obstructor spirit. Then he was born as a man again and requested empowerment and made prayers. He was born as a rich man. one hundred horses of that rich man were stolen by a bandit. Seven horse thieves carried them away. He was attacked by enemies who stole all his possessions. Then he became a beggar. He was begging in the region of the enemies and they separated him from whatever [he had] and then set him loose. He begged in the areas of thieves and they beat him. He went begging in the area of the bandits and they buried him in a pit. Then he prayed. In the birth after that he arose as a toxic god-demon who obstructed vows. After that he was born as a pernicious god-demon who was the lord of the charnel grounds. He was killed by the previous protector (Mahakala?). He was reborn as Wangchuk Chenpo. Wangchuk Chenpo is then subdued by Vajrapani, recalling Yoga tantra versions of the myth. After his subjugation and conversion, Wangchuk Chenpo becomes a buddha named Theljang Nawang, who, upon Avalokiteshvara's prompting, recreates his previous worldly form: Avalokiteshvara said to Vajrapani: “It is unsuitable if there is no appearance of a bad Maheshvara.” Then buddha Theljang Nawang, having heard that, from the vajra in his right hand, filled [the space] within a vajra fence with light, which became Maheshvara. There is then a brief reference to Padmasambhava subduing, presumably, this emanated Maheshvara, but Mi 'gyur rdo rje does not elaborate on this part of the story any further. Terdak Lingpa's TCKD cycle, however, contains a history of Lha chen that seems to pick up right where Mi 'gyur rdo rje leaves off, telling the story of Padmasambhava's subjugation of Lha chen while in India, without any mention of Lha chen's previous lives or his cosmic battle with wrathful Buddhist deities. In this story, 500 non-Buddhist teachers, angry at having been defeated in debate by Padmasmbhava, recite mantras in order to summon Lha chen and send him to attack the Buddhist master. But when Lha chen attacks, Padmasambhava easily subdues him (quite peacefully) with a display of power. Lha chen immediately surrenders, is bound under oath, and then sent to slaughter the 500 non-Buddhists in a massive conflagration. Cameron Bailey, December 28th, 2015 'Gter bdag gling pa 'Gyur med rdo rje. 1975. Thugs rje chen po bde gshegs kun 'dus kyi chos skor. 4 vols. Dehra Dun, U.P.: Ven. D.G. Khochen Trulku. Sle lung Rje drung Bzhad pa'i rdo rje. Dam can bstan srung rgya mtsho'i rnam par thar pa cha shas tsam brjod pa sngon med legs bshad. 2 vols. Leh: T.S. Tashigang, 1979. Dalton, Jacob. 2011. The Taming of the Demons: Violence and Liberation in Tibetan Buddhism. New Haven, CT: Yale University. Davidson, Ronald. 1991. “Reflections on the Mahes´vara Subjugation Myth: Indic Materials, Sa-skya-pa Apologetics, and the Birth of the Heruka." In Journal of the International Association of Buddhist Studies 14.2: 197-235. Mayer, Robert. 1998. “The Figure of Mahesvara/Rudra in the rÑin-ma-pa Tantric Tradition.” In Journal of the International Association of Buddhist Studies. 21:2, 271-310.
<urn:uuid:84c529a9-74bd-4999-a439-dd3b7df77406>
CC-MAIN-2019-51
https://www.himalayanart.org/search/set.cfm?setID=559
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.963285
3,098
2.640625
3
Shampoo is such an accepted part of life that you might not think of spending much time examining the ingredients list on the bottle. But it's worth reading the fine print. Certain ingredients can do more harm than good to your hair -- and others may have adverse effects on your overall health. If you see certain ingredients on the label, best to put the bottle back on the shelf and choose another brand. Sulfates are detergents that give shampoos their foamy lather. They go by many names -- sodium lauryl sulfate, sodium laureth sulfate, ammonium laureth sulfate and ammonium lauryl sulfate. Sometimes these compounds are identified only by their initials -- SLS for sodium lauryl sulfate and SLES for sodium laureth sulfate. Sulfates may help your shampoo produce suds, but they can also strip your hair of its natural oils, leaving it overly dry and prone to damage. Sulfates can also irritate the skin. Isopropyl alcohol is sometimes included in shampoos because it cuts through oil effectively. The problem is that it does its job a little too well. Like sulfates, isopropyl alcohol's main concern is that it's extremely drying to your hair, stripping it of moisture. This leaves it prone to frizziness and vulnerable to damage. Propylene glycol is added to shampoos partly to help with their consistency and partly to help your hair and scalp better absorb other ingredients in the shampoo mix. Unfortunately, this compound is a well-known skin and eye irritant -- not a great idea when you think about how often suds end up coursing down the front of your face during a typical shower. Parabens are added to shampoos to act as a preservative -- in other words, to keep bacteria and other microbes from colonizing the contents of your bottle. Sounds like a good idea on paper. Unfortunately, parabens are suspected endocrine disruptors, meaning that they may also play a role in certain cancers. More study is needed to confirm or dispel this link. Avoid anything with the suffix -paraben on the label, such as methylparaben, butylparaben or ethylparaben. Formaldehyde is another chemical used as a preservative in shampoos and other cosmetic products. Unfortunately, it is highly irritating to eyes and skin. It is also a known animal carcinogen, and there is increasing evidence of a possible cancer risk in humans as well. While the concentrations of formaldehyde in shampoos is low, the health risks are clear enough that it's best to avoid this ingredient entirely whenever possible.
<urn:uuid:6e4810e2-cb3f-47f6-8a2f-9fd0b4aed51f>
CC-MAIN-2019-51
https://www.leaf.tv/5082376/ingredients-to-avoid-in-shampoos/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.951636
551
2.734375
3
Dr Karen Masters explains how different galaxies are being classified using crowdsourcing, as part of the Galaxy Zoo project. Based at the University’s Institute of Cosmology and Gravitation, Dr Karen Masters specialises in galaxy formation and evolution and is a Senior Lecturer in Astronomy. Credits to Sloan Digital Sky Survey and to Elizabeth Jenkins for galaxy illustrations. Follow the link to our Did You Know? pages to learn more (http://bit.ly/1BGxoBW)
<urn:uuid:22d324b5-3179-49c9-b287-0fb39963842e>
CC-MAIN-2019-51
https://www.newswise.com/articles/astrophysicist-dr-karen-masters-can-talk-about-nasa-s-cassini-spacecraft
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.842068
100
2.984375
3
“There is but one law for all, namely that law which governs all law, the law of our Creator, the law of humanity, justice, equity – the law of nature and of nations.” – Edmond Burke Mr. Burke’s quote is concise yet compelling, if only for the phrase “the law of humanity justice, equity – the law of nature and of nations.” Despite our differences, of which there are many, the vast majority of human beings knowingly abide by the laws of humanity. No matter our differences, many of us cherish the ideal notion that humans should co-exist despite our conflicting natures. The purpose of this article is not to delve into the sociological evolution of the human race, but to remind us of values that the majority of us share. Call this collective understanding a “social contract,” “laws of humanity,” “laws of being human,” or whatever one may wish. The premise remains the same: we create our path in life with an understanding that certain rules apply to us as a species. In this article, we present 12 laws of being human. These “laws” are what have enabled us to form alliances and defeat those who threaten our very existence. 12 Laws Of Being Human That Will Change Your Life 1. Relationships are key It’s an evolutionary fact: human beings are social creatures. While every one of us possesses introverted, extroverted, or ambivert tendencies, we all require healthy relationships to make our way in this world. All relationships are not created equal. We’ll love, hate/strongly dislike (it happens), accept, disavow, trust and distrust thousands of people through our lifetime. The important thing to remember is not to write people off because of someone else. We need each other. 2. Inner strength can make the difference Miyamoto Musashi, widely considered to be the greatest samurai warrior to ever lived, once said: “There is nothing outside of yourself that can ever enable you to get better, stronger, richer, quicker, or smarter, Everything is within. Everything exists. Seek nothing outside of yourself.” Cultivating our inner strength is paramount to overcoming life’s obstacles. 3. Life is uncertain Obstacles will present themselves – and sometimes during the most inconvenient periods of our life. We have three choices: go over, go through, or remain stagnant. Just remember that every uncertainty and obstacle is an opportunity to strengthen your character. 4. Loneliness afflicts us all By nature, some of us will feel more alone than others; but we all experience a sense of isolation at one point (often many points) during life. Every human that’s ever lived has had to go through times of loneliness, isolation, and despair. 5. Some days are better than others If you wake up in the morning, it’s a gift – a victory. Although that day’s events may unfold into something terrible, at least you were given the opportunity to live another one. Give thanks for that day, and hope for a better tomorrow. 6. Not everyone will like you, and vice-versa Personalities are different; therefore, people are different; therefore, people with different personalities will butt heads. The cool thing is that there’s someone out there waiting to be discovered; someone that you’ll completely vibe with. Chances are you’ve got some in your inner circle. 7. Messing up (again and again) is assured Anyone else think it’s hilarious that some people consider themselves perfect or nearly-perfect (see: narcissism or perfectionism). Admittedly, some of us have made egregious mistakes (including this writer). The important question to ask: did I learn something? Because you’re going to screw something up again – and have the opportunity to learn something, again. 8. Life can be downright unfair People we trusted will break that trust; people we love will disavow that love; people will lie, manipulate, steal, and deliberately attempt to inflict hurt. That’s life. Only a small part of life, but a part of life nonetheless. We’ll grow, we’ll adapt, we’ll become stronger. Because that’s what we do. 9. We’ll experience a broken heart Yes, that third-grade boyfriend or girlfriend that broke up with you on the playground counts (kind of). We date and have our heart broken; we marry and have our heart broken; someone passes, and we have our heart broken. As #8 states clearly: “Life can be downright unfair.” The same applies to many wonderful people who’ve (sometimes, repeatedly) had their good heart broken for no good reason. 10. Our body and mind is ours to take care of Despite the billions and billions of people that have ever lived, nobody has replicated your body and mind. It is important that we learn to accept and love both to live a peaceful, happy existence. You’re special. If for no other reason that nobody like you has, or ever will, exist. Understand your individual nature and take care of yourself. 11. It’s natural to be defensive at times …But it can result in some missed opportunities. This is particularly the case for the risk-adverse, who try to wait for “the right time and place” for just about everything. Sometimes, it’s best to “lower the shield” and give someone or something else a chance. Perhaps most importantly: try not to carry the “excess baggage” of your past. This baggage may result in your missing out on something truly beautiful. 12. A passion is ours to do something with Okay, so maybe our childhood dream of becoming an astronaut didn’t quite pan out. But we believe that within each one of us is a passion waiting to be put to use in some way. It doesn’t matter your age, education, income, or anything else. If you have a deeply-ingrained passion – no matter how elusive it may be – grab hold and make something of it.
<urn:uuid:b6518e1e-6bd9-44a8-a6d7-827cbf1f8636>
CC-MAIN-2019-51
https://www.powerofpositivity.com/12-laws-human-will-change-life/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.944658
1,315
2.59375
3
Getting to Know the World’s Great Artists Tulsa Public Schools – Fifth Grade Visual Arts Assessment Getting to Know the World’s Great Artists Oklahoma Fine Arts Standard Two: Visual Art History and Culture Getting to Know the World’s Great Artists Oklahoma Fine Arts Standard Two: Visual Art History and Culture The student will recognize the development of Visual Art from an historical and cultural perspective doing the following: Describe and place a variety of significant art objects by artist, style, and historical and cultural context. Identify historical themes and cultural purposes of works of art and artifacts. Demonstrate a basic knowledge of several fields of art such as painting, sculpture, drawing, computer graphics, printmaking, architecture, and fiber arts. Identify how visual art is used in today’s world including the popular media of advertising, television, and film. Getting to Know the World’s Great Artists Oklahoma Fine Arts Standard Two: Visual Art History and Culture You will look at the work of three artists from a long time ago. They painted in the 19th and 20th Centuries. Their names are Vincent Van Gogh, Pablo Picasso, and Edward Hopper. Introducing the Art Work of Vincent Van Gogh Self Portrait. (1889). Oil on Canvas. Vincent was an artist for whom things never went right. He never smiled in his self portraits. Yet, the paintings he made are loved the world over. Van Gogh was born in Holland in 1853, but he didn’t become a painter until he had grown up. He had many other jobs first. He was even a minister. He loved his home country of Holland and made many beautiful paintings of the landscape, the windmills, and the common people at work. Do you see the smoke from the factory in the background? Vincent always tried his best at whatever he did. For a while he worked in an art gallery and then a bookstore. Finally, he studied to become a minister. None of these professions made him as happy as when he was painting. Van Gogh’s first paintings were dark in color and showed the life style of the poor people he was helping as a minister. In this painting, the family was so poor they had only a few potatoes to eat for dinner. The dark colors of Van Gogh’s early paintings gave people the message that the lives of the poor people were hard. He kept using the dark colors until he discovered Japanese artwork. He loved the bright colors of the Japanese artists. In 1886 Vincent moved to Paris, France. It was the center of the art world then. He met many painters there. His best friend was another artist, Paul Gauguin. His friend convinced him to move to the South of France, a city called Arles. Here is a picture he painted for his landlord of his own room. He had no money to pay the rent, so the landlord kept the painting. The Starry Night is probably the most beloved of all of Van Gogh’s works. It has been made into cards and posters all over the world. The singer Don McClain even made a song about it. Why do we love this artwork so much? Everyone has different reasons. Some like the swirling colors; some like the way the stars glow; some like the way the little town looks so cozy and safe. Van Gogh belonged to a group of artists called the “Post Impressionists.” The characteristics of their art movements included: • Studying the way changing light would change • colors • Working out of doors quickly so as to capture the • changing light • Painting scenes of the common man • Using small dabs of color placed side by side and • allowing the human eye to blend them • Using intense colors to draw out emotion Does this painting look like it is moving? How did Van Gogh make this landscape look like the wind was blowing? Van Gogh usually put his paint on very thick. Sometimes he painted so fast he didn’t even mix his colors. He used paint right out of the tube (which was a new invention at that time)—in the past artists had to blend paint from power pigment and oil. Van Gogh used so much paint he was always running out. He had to give up buying other things so he could afford to buy his paint. Hardly anyone was interested in Van Gogh’s work while he was alive. He sold only a few drawings and maybe one or two paintings. Today his work sells for millions of dollars to collectors around the world. The colors are so intense in this painting that you can almost smell the flowers or feel the bright sun. Maybe more than any other artist, Van Gogh’s feelings came out in his paintings. That’s why he is one of the world’s greatest artists. You may find Van Gogh’s art work in many museums in the United States. You can really see the brush strokes in person. This is a picture of a museum in Holland called the Van Gogh Museum. The only art work on display is Van Gogh’s! Here is a finger puppet that is sold on the internet….can you guess who this is? Introducing the Art Work of Pablo Picasso Self Portrait (1896). Charcoal. Pablo Picasso was born in Malaga, Spain in 1881. He was just a teenager when he made this self portrait In charcoal. He would go on to become one of the most famous artists of our time. Picasso’s father was an art teacher at the local art institute. Picasso was a lively child. He learned to walk so that he could reach his favorite cookies. He learned to draw at an early age with help from his father. When Picasso became a teenager, he went off to art school in the Spanish town of Barcelona. He was one of the top students there. Picasso graduated from Art School in Barcelona and headed for Paris. For him the city was alive with energy. He almost instantly found the art community and made many friends. While in Paris, he lived in poverty but produced many art works. He had many young friends who were poets and artists. They inspired and supported one another. For three years Picasso painted works that were mostly in shades of blue. His subject matter was the miserable lives of people shunned by society: the poor, the sick, and beggars. Most of these paintings are of people who look sad. For two years Picasso painted his Rose Period paintings. These paintings are mostly done in tones of pink with delicate lines. The mood is less serious than the Blue Period paintings. These people are circus performers. They are chosen by Pablo Picasso to symbolize his feelings about the artist’s condition. In French, “saltimbanques” are buffoons. This is a painting from Pablo’s Cubism period. This period is considered to be the most revolutionary development in the 20th Century. It is a completely new way of representing reality. What are the characteristics of Cubism? • The painting appears flat without any depth that perspective • might give. • The viewer is able to see several sides of an object all at one • time. • The painted objects often appear fragmented or geometric. • Geometric patterns are highlighted. • Often artists used words collaged (pasted) from the • newspaper. In this painting there are three figures, masked and costumed. The three musicians are seated next to each other, behind a table. From left to right they are a pierrot (holding a wind instrument), a harlequin (holding a guitar), and a monk (holding a music score). There is a dog under the table. On April 26, 1937, during the Spanish Civil War, an aerial attack by Nazi bombers acting as allies of the Spanish fascists completely destroyed the Basque town of Guernica in North East Spain. The horror of the event was described by Picasso in his painting entitled “Guernica.” The work reveals Picasso’s deeply held belief in freedom for all, which led him to take the part of the oppressed and victims of violence. The painting does not contain any specific details that tie it to the actual bombing of Guernica. It is a symbol of the devastation caused by all war. It has a universal message: all war is madness. Here is an advertisement for a Citroin (a French made car). This model is called Picasso. What message is the car maker giving by naming it after Picasso? Picasso was a revolutionary artist who changed many traditions in painting. He lived to be a very old man and produced hundreds of painting during his life time. Most cities have museums that own a Picasso. Philbrook Museum had an exhibit a few years ago that displayed some of his work. Introducing the Art Work of Edward Hopper Nighthawks (1942). Oil on Canvas. Edward Hopper was born in Nyack, New York, in 1882. He was one of America’s greatest artists and was known as an American Realist painter.
<urn:uuid:8487c313-c70e-442c-9e1f-5045c457704e>
CC-MAIN-2019-51
https://www.slideserve.com/Roberta/art-assessment-pre-lesson-powerpoint
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.981093
1,908
3.609375
4
We explain: Strange cloud formation over British Columbia Monday, February 23, 2015, 1:11 PM - If you were awake early Sunday in Surrey, B.C., you would have witnessed a bizarre phenomenon that formed in the clouds, prompting many residents of the area to take to social media for answers. The clouds made it seem like something supernatural was going on, but in reality was just a combination of a few events that lead to what many refer to as a 'fallstreak' or 'hole punch cloud'. RELATED: Clouds 101: Test your knowledge What was it, though? Any other meteorologist wanna help me out? Not quite sure what this is. Cool cloud? Contrail? Surrey, BC. Sunrise. pic.twitter.com/Gw761sKe5J— Nathan Santo Domingo (@nathanSD8wx) February 23, 2015 It's certainly pretty bizarre, and definitely something you don't see every day. However, it's entirely natural. No alien or divine intervention required, and it's not harmful in the least. It's a fallstreak hole, so-called because the water in that region of the cloud is falling to earth, producing those pronounced streaks it does, and leaving behind a hole in the cloud. How does this happen? If you've ever taken a close look at weather reports, there's always something included called the dewpoint temperature. This is the temperature the air needs to reach before the water vapour in the air will condense out, to form clouds, fog or dew (or all three!). However, a key 'ingredient' to this condensation is that the water vapour needs something to condense onto - dust, pollen, particulate matter, etc - which are known as cloud condensation nuclei. So, when a cloud forms, each of the millions to billions of tiny water droplets contained within surrounds a grain of dust or pollen or particulate matter. If you cool the droplets in a cloud to below freezing temperatures, they won't necessarily form ice crystals, though. For that, there needs to be even more bits of dust, pollen, etc (which have also been cooled to at or below freezing) for the water droplets to grab hold of. These are called ice nuclei. If there aren't any of these ice nuclei around, because the cloud droplets have 'used up' all potential nuclei in that region of the sky, then the water will remain liquid at below-freezing temperatures - supercooled! MUST SEE: Hypnotic clouds over Lincoln, Nebraska The thing about supercooled water, though, is that it's just waiting for a chance to freeze, and it will take the first and easiest chance it gets! In the case of a fallstreak hole - which is also known by names like skypunch or hole punch cloud - it's usually caused by the introduction of tiny ice crystals directly into the cloud layer. This can happen when an aircraft punches through the cloud layer, and crystals form in the wake of its wings, or on the tips of its wings or propeller blades. As soon as they show up amid all those supercooled water droplets, these ice crystals are suddenly 'mobbed' as the water droplets rush in to freeze and help form larger ice crystals. This forms the streaks in the air, and since lots of water droplets go into producing just one larger ice crystal, this whole process sucks up a lot of the surrounding droplets, tearing a hole in the cloud. As for the rainbow hues seen spread through part of this particular fallstreak hole ... well, that's caused by sunlight being refracted as it passes through the very ice crystals causing the hole to form. It's similar to a parhelion - more commonly known as a sun dog.
<urn:uuid:af60c6f4-6958-49dd-badf-96746d948dd1>
CC-MAIN-2019-51
https://www.theweathernetwork.com/news/articles/fallstreak-the-science-of-cloud-formations/39344/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.9557
801
3.296875
3
GAA and AWS: partnership for water stewardship in agriculture Demonstrating responsible water stewardship is an essential ingredient of sustainable agriculture and a priority focus for GAA. AWS is a global membership-based collaboration with a mission "to lead a global network that promotes responsible use of freshwater that is socially and economically beneficial and environmentally sustainable". A partnership between GAA and AWS, Action Learning Projects help GAA Members identify risks and opportunities at a specific site within company operations and provide insight and support to help companies make informed decisions around integrating water stewardship methodologies and activities into their supply chains in alignment with the AWS Standard. The AWS Standard offers a credible, globally-applicable framework for major water users to understand their own water use and impacts, and to work collaboratively and transparently with others for sustainable water management within the wider water catchment context. Implementers follow the steps and guidance in the AWS Standard to achieve good water stewardship practices that improve site water performance and contribute to wider sustainability goals. The context: natural rubber and water use Asia houses 90 percent of the world’s rubber production, with Indonesia, Thailand and Malaysia together comprising 70 percent of natural rubber production globally. Demand is increasing, with production rates in 2018 seeing a 4.6 percent increase from 2017 levels—primarily supplying raw material to make tires downstream in the supply chain After latex is collected from the rubber tree, the raw material is sent to rubber processing facilities where it is intensively washed, prepared, and dried before it is shipped to tire manufacturers that shape it into a final product for retail. The processing operation is water intensive, often requiring up to five rounds of cleaning. There are site-level and company-wide risks associated with relying on water for rubber processing: fluctuating water supply can present a physical risk; increasing costs of water, cost from transporting water, or operating water treatment facilities can pose a financial risk; and potential allegations related to water pollution from a rubber processing site can result in social and legal risks to a company. Interventions to enhance sustainable water management both at site-level and within a broader catchment can decrease risk and allow companies like Halcyon and HeveaConnect to emerge as leading water stewards in the community and rubber sector as a whole. Visiting PT Hok Tong in Jambi: exploring how to minimize water risk and enhance sustainability Any responsible business or organization should commit to causing no harm to the natural environment and communities and aspire to achieving a net benefit. A clear business case for water stewardship can be made on the basis of physical, regulatory, and reputational risk. For any site, including a rubber processing facility, it is important to first start with understanding the water related risks and challenges the site is facing. Data collection and analysis can inform decision-making and lead to more effective, efficient, and informed commitments and plans for solving these challenges. During the last week of August representatives from GAA, Halcyon, HeveaConnect, and AWS A-P travelled to Jambi, Indonesia to kick off a water stewardship Action Learning Project and gather on-the-ground data at one of Halcyon’s rubber processing factories—PT Hok Tong. To complement this on-site assessment, an online water stewardship survey was also conducted with PT Hok Tong and 17 other Halcyon rubber processing factories in the region. The three-day site visit had multiple goals: - Share with PT Hok Tong, Halcyon, and HeveaConnect staff the key elements of water stewardship and the roles of site-level management and catchment-level dependence. At the site level—in this case the rubber processing plant in Jambi—a site can influence water management through water efficiency and reducing water pollution. At the catchment level, a site can be affected by the actions of others, especially from upstream users, but also downstream impacts. PT Hok Tong is located far downstream within a relatively large catchment, so many companies, communities, and government actors operate upstream and can impact water availability and quality for PT Hok Tong. During the convening, AWS A-P introduced the AWS Standard and certification process to PT Hok Tong and Halcyon staff for their consideration. - Gather available quantitative and qualitative data to understand existing measures, plans, policies, and activities related to how PT Hok Tong uses water in its processes and operates within the catchment with other stakeholders. Action Learning Project participants also sought to tour the broader watershed and a second factory in the area to better understand the context and reflect on a point of comparison. AWS A-P collaborated with the engineering firm PT Witteveen + Bos Indonesia. - Provide preliminary observations and rally on-site and corporate-level support for implementing solutions to enhance water stewardship. AWS A-P and PT Witteveen + Bos Indonesia planned to reflect on data collected during the site assessment and offer initial recommendations that will be expanded on in a long-form report later in 2019. The site-level assessment experience The three days kicked off with presentations from AWS A-P on the AWS Standard and its the framework for water stewardship that includes five key pillars: good water governance; sustainable water balance; good water quality; important water-related areas; and safe water, sanitation, and hygiene for all. The AWS process for certification includes five steps: Gather and Understand; Commit and Plan; Implement; Evaluate; and Communicate and Disclose. Basja Jantowski, Director Indonesia at AWS A-P, presented the initial findings from the data submissions that PT Hok Tong had sent in advance of the site visit. Subsequently engineering firm PT Witteveen + Bos Indonesia presented the catchment map which positioned the site as part of the broader catchment area. Subsequently the group donned boots and hard hats and entered the factory for a tour of the facilities, asking questions and taking notes on waste water management practices; WASH facilities for staff; water recycling between the processing stages; water storage approaches; and intake and output locations. Factory representatives explained the rubber processing operation and timeline, detailing when, where, and how much water was used throughout the duration of various activities. Next, AWS A-P split the group into two teams. One focused on discussing stakeholder engagement; governmental and other initiatives around the site and catchment; and legal compliance. The other focused on water technologies and engineering aspects of PT Hok Tong’s water management process. Information reaped from these discussion sessions helped complete the assessment to establish where PT Hok Tong stands on the path to AWS certification and on their unique water stewardship journey. To build on this, the team loaded into two cars and headed to the larger river next to which PT Hok Tong is positioned, evaluating the embankment and scoping a key part of the wider catchment. They also visited and toured another Halcyon rubber processing factory downstream that was much larger. It provided a strong point of comparison to situate PT Hok Tong in its operational context and provided a basis for some of the recommendations that AWS and Witteveen + Bos could make given a better understanding of Halcyon’s capacity for improvement. Last, AWS A-P offered an initial assessment of the data gathered before and during the site visit, highlighting opportunities to improve water stewardship and reduce water risk. Key recommendations included: - Increase the frequency of emptying sludge storage systems to prevent overflows or other risks and assess the potential of re-using the water; - Increase recycling percentage by using the intake water only for the blanket production line or by adding an extra treatment technique; - Re-install meters at water intake and other crucial points to strengthen data consistency and quality; - Consider using rainwater collection for the domestic and productive water supply; and - Strengthen support activities with rubber farmers in the catchment to reduce water related risks in production regions. Moving forward: the final report In the coming weeks, AWS A-P will work with Halcyon to develop a comprehensive report detailing findings and expanding on recommendations resulting from the PT Hok Tong site assessment and the 18-factory survey. Leaders from company headquarters and the processing site will determine which recommended actions to take forward, and how to leverage the Action Learning Project process and outcomes across other factories in Indonesia and beyond. A public version of will be available so that agribusinesses and other stakeholder can explore how outcomes from this project could inform their own water stewardship efforts. “These past two days have been fruitful and an eye opener for us. We haven’t looked at water the way you look at it. Without water we cannot function but we never had such a comprehensive view of water especially in terms of risk, not only in terms of sustainability. We have learned a lot, especially in terms of…how we assess water as a part of the business risk.” Chee Meng Lee, Quality Assurance, Halcyon “We select our [sustainability] projects very carefully. Very insightful 1.5 days, there are lot of issues raised that are very pertinent. I personally found it very interesting and exciting.” Kavickumar Muruganathan, Deputy Director, Sustainability, HeveaConnect “I am personally excited with the staff we have here [at the site assessment]. It shows the broad interest from the organization at the site level, Hevea Connect and Halcyon. Besides the insights we are getting out of this data, the most important thing is that we have everyone on board. In the end, the outcome of this work will be a site-specific plan that PT Hok Tong will implement and own. We are pleased to see that level of commitment already happening here at the site.” Basja Jantowski, Director Indonesia, AWS Asia-Pacific
<urn:uuid:8e679bce-dd71-4b1d-b0ab-c1f6e57bb1b9>
CC-MAIN-2019-51
https://www.wbcsd.org/Sector-Projects/Global-Agribusiness-Alliance/News/Halcyon-kicks-off-water-stewardship-action-learning-project-at-a-rubber-processing-plant-in-Indonesia
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529745.80/warc/CC-MAIN-20191211021635-20191211045635-00012.warc.gz
en
0.935809
2,022
2.6875
3
What Exactly Is a Bonsai? The aim would be to generate a tree, in miniature, that resembles its counterpart in nature, within the boundaries of a pot. This tree is trained and treated in such a manner; its final impression is that of an aged tree. There are bonsai that because of the training over several years, are considered family heirlooms, passed down from generation to generation. Four most Typical Fashions of the Bonsai Erect: There's the formal and informal upright. Both have just one trunk, which tapers to the top and is wider at the bottom. These forms are often found in nature and therefore are great fashions for novices in the first place. The trunk needs to be visible from your foundation to the top. The trunk of the everyday fashion is allowed to turn and twist while the formal style has a straight trunk. Popular choice sources for both these styles are the juniper, pine, spruce with all the maple added for the everyday fashion. These fashions are frequently put in a round, small diameter pot. Slanting: Nature, especially the wind, often has a hand in the configuration of trees. The slanting style leans to a side at about 60-80 degrees to the base. Consistently have the very first branch projecting opposite the way the trunk is leaning. There may be slight twisting of the trunk or it may be straight. Again, the above mentioned species might be used, but the conifer is the most used. A shallow depth pot using a larger measurement is needed here. Cascade: Such as the erect there are two variations, the Semi- the Cascade and also cascade. Is bent down over time from the components, where these designs will be found in nature. The training for both requires wiring to generate the cascade effect. The total cascade style works on the tall pot as well as the bonsai is trained to go below the underparts of the the pot as time passes. Creating this continual down growth requires persistence and patience, as it isn't natural for the growth of a tree. The semi- cascade would be put in a pot that isn't quite as tall and it isn't allowed to go below the underparts of the the pot. The juniper adapts nicely to the training and these types. A flowering species used for the cascade fashions contain the, azalea, cotoneaster and pyracantha. SHOHIN CHINESE ELM Pre Bonsai Tree Cold Hardy Small leaves Time Remaining: 5d 12h 59m Bonsai Tree Outdoor Chinese Elm Light Humidity Tray Deco Rock Botanical Plants Time Remaining: 25d 17h 47m Buy It Now for only: $27.77 Bonsai Tree Chinese Elm Cascade 10 Years From Root Cutting 7 Tall Quality Pot Time Remaining: 28d 3h 44m Buy It Now for only: $210.00 Bonsai Chinese Elm Ulmus parvifolia Super Trunk Penjing Informal Upright 2 Time Remaining: 9d 10h 2m Buy It Now for only: $40.00 Bonsai Chinese Elm Ulmus parvifolia Twisted Trunk Mame Super Gnarly Trunk Time Remaining: 11d 9h 47m Buy It Now for only: $38.25 Chinese Elm Bonsai Time Remaining: 28d 7h 47m Buy It Now for only: $75.00 Chinese Elm Bonsai Mame Shohin Dwarf Nice Movement Big Fat Trunk Time Remaining: 16d 16h 7m Buy It Now for only: $49.99 Chinese Elm Bonsai Time Remaining: 28d 7h 37m Buy It Now for only: $55.00 Multi-trunk: The multi- trunk has one main trunk, and smaller trunks forming from the side. Additionally, there are the species such as the arboricola that are utilized to re-create the banyan tree that's air roots extending to the bottom. Over time the atmosphere roots become trunk-like. Another specimen is the ficus tree. The multi-trunk styles can be planted on a stone surface that is flat. You'll find those planted on a real stone and even trained to grow from within a crack in a rock. The rocks for this latter group, in set in a round pot that was shallow. All these forms have their distinct names and training procedures. Looking for the best Prebonsai remember to take a look at eBay. Click a link above to reach eBay to uncover some awesome deals sent straight to your doorstep in Goodrich, Texas or any place else.
<urn:uuid:aa47084b-6869-4443-a827-895625f7caea>
CC-MAIN-2019-51
http://bonsaigurus.com/author/adeleperdue/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540544696.93/warc/CC-MAIN-20191212153724-20191212181724-00172.warc.gz
en
0.923062
984
2.515625
3
What Does a Factory Audit mean? Category: Share; Updated on: 2019-04-18 17:47:59; Views: 680 Factory auditors became common in the late 19th century, when many governments enacted the first laws regulating procedures within factories. Some of the first government-employed auditors attempted to root out the use of child labor; in the United Kingdom, the 1833 Factory Act became one of the first to mandate the creation of inspector positions to ensure that children under the age of nine were not used for factory labor. As government regulation of manufacturing expanded, the number of inspectors increased vastly throughout the world. A modern factory may now undergo government inspection for health compliance, safety preparedness, labor law adherence, environmental standards, and quality assurance. We offer the Factory Audit services, our professional auditor will schedule a visit to the factory on-site, and perform the below check, collect some documents with pictures for the clients reference. A. Factory profile B. Human Resources D. Factory Facilities and Environment E. Quality Assurance System F. Incoming Materials Control G. Process and Production Control H. In-house Lab Testing J. Health and Safety - General Information - Factory Coverage & Buildings - Employee Division - Working Hour - Main Production Facility / Machine - Manufactory Process Covered in the Audit Process - Organization Chart of the factory - Business Registration - Quality Management System - Product Certification / Approvals - Company Size Assessment - Foreign Trade Capacity - Research & Development Capacity - Credit or Goodwill - Social Environmental Responsibility - OEM / ODM Experience - Gap Analysis FE focus on if the factory is real exist and legality.
<urn:uuid:a992aa16-f232-4947-970e-f03b44e7cee5>
CC-MAIN-2019-51
http://ctsltd.eu.org/article_details.php?faqID=64
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540544696.93/warc/CC-MAIN-20191212153724-20191212181724-00172.warc.gz
en
0.888735
354
3.015625
3
Plasma is specified in Websters as a “collection of billed bits … having about equal numbers of favorable ions and electrons and displaying some homes of gas however varying from gas in being a good conductor of power …”. You can also consider it as an electrically warmed gas stream. I such as to think about it as a condition where every one of the electrons from every atom is moving from atom-to-atom, rather than simply orbiting. Despite what’s taking place inside a plasma stream, the means to cut steels with it is pretty simple. Take that stream of power flowing with gas, as well as restrict it through a tiny orifice. Now that stream is really thick as well as relocating very fast. The resulting stream can thaw and also blow through the majority of metals quite conveniently. That’s a plasma torch. Plasma cutting torches generally make use of a copper nozzle to tighten the gas stream with the arc moving through it. That arc jumps from an electrode in the lantern to something else– typically the conductive material being cut. That’s a ‘moved arc’. There are some systems that make use of a ‘non-transferred’ arc where it leaps from the electrode back to the nozzle, but those are not normally made use of for reducing. To make sure that indicates that plasma cutting is only utilized for materials that are conductive, primarily light steel, stainless steel, and also lightweight aluminum. However great deals of various other steels and also alloys are conductive too, such as copper, brass, titanium, Monel, Inconel, cast iron, and so on. The issue is that the melting temperature level of some of those steels makes them challenging to reduce with a good quality edge. The electrode is usually made from copper, but with a metal insert at the point where the arc connects. That’s due to the fact that the copper would certainly thaw also quick if the arc attached directly to it. Tungsten makes a wonderful electrode product, so lots of electrodes have a tungsten insert. Some smaller lanterns utilize a ‘pencil’ design electrode made completely out of tungsten with a sharp end. The trouble with tungsten is that it burns up in the existence of Oxygen. So when utilizing Oxygen or compressed air as the cut gas, the insert is made from a product called Hafnium. Hafnium lasts a lot longer in the existence of Oxygen, however, it still puts on a bit with each begin of the arc. So why usage Oxygen in a plasma lantern? The very same factor you utilize Oxygen in an acetylene torch– the Oxygen in the plasma stream responds with mild steel. That is why pure Oxygen is just utilized when cutting mild steel, or ‘carbon steel’. That chemical reaction between the Oxygen in the plasma gas and also the base metal helps to accelerate the cutting procedure and also improves the edge of high quality. However given that Oxygen doesn’t have the very same response with Stainless-steel or Aluminum, less costly gases can be made use of for those steels, like Nitrogen or pressed air (which is mostly Nitrogen anyhow). Various other specialty gases are occasionally used for various other objectives. Argon gas is utilized when plasma marking (a whole other topic). A mixture of Argon as well as Hydrogen is usually used when cutting thicker Stainless Steel or Light Weight Aluminum. Some individuals use a mixture of Hydrogen and also Nitrogen, or Methane and also Nitrogen when cutting thinner Stainless-steel. Each mixture has its benefits (enhanced cut top quality) and also its negative aspects (price & handling). So those are several of the essentials of plasma cutting– an arc lugged in a stream of gas from an electrode with an orifice and after that right into the conductive metal that is being reduced. There are lots of various other considerations that I will certainly address later on, such as swirling gases, kerf, elevation control, arc starting, shield gas, and so on. However, whether it’s hand-held or placed on a CNC device, the essentials coincide.
<urn:uuid:3656cce1-f32f-4060-b773-3b088f0f88ac>
CC-MAIN-2019-51
http://visitenc.com/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540544696.93/warc/CC-MAIN-20191212153724-20191212181724-00172.warc.gz
en
0.959322
868
2.953125
3
Can human beings receive knowledge from non-human sources? One of the issues that occupied the attention of thinkers in India was the question of whether it is possible to find sources of knowledge that are not limited in the ways that all human knowledge is limited. It was universally accepted that anything that is produced by a human author is bound to be fallible, because human beings have limited knowledge and understanding, and human beings see everything from their own particular perspective. Things viewed from one perspective look different when viewed from other perspectives. Even the wisest human being has limited knowledge and understanding and is therefore liable to be unaware of facts that may turn out to be of key importance in a situation. While it was universally accepted that all human understanding is fallible and limited, some Indian schools of thought argued that not all sources of knowledge are necessarily fallible. There were essentially two strategies for arguing for infallible sources of knowledge put forward by non-Buddhists. As for the Buddhists, they tended to reject all claims for a non-human source of infallible knowledge, while still claiming that the teachings of the Buddha have a special status among all teachings composed by human beings. In this module we shall review these issues as discussed by two Buddhists who denied that any teachings come from infallible sources and yet claimed that the teachings of the Buddha are not subject to the same limitations as most teachings of human authorship. It is easier to understand Buddhist positions on philosophical issues by seeing them in the context of what their rivals were saying. In India there were several schools of philosophy against which the Buddhists argued. On the issue of whether knowledge could come to human beings from non-human sources, non-Buddhist schools provided two main options, both of which the Buddhists rejected. The eternal scripture option The strategy favored by the Mīmāṃsā school was to point out that anything that is composed by an author is liable to be erroneous or limited in perspective. The only way to insure that mistakes or perspectival limitations are absent in a body of literature is to have a body of literature that was never composed by any author. And the only way to be sure that a body of literature was not composed by a fallible author is to find a body of literature that was not composed at all by anyone. This, claimed the followers of the Mīmāṃsā school, is exactly what the Vedas are. They are an authorless repository of infallible wisdom that lay out the standards of acceptable and unacceptable human conduct, called dharma and adharma respectively . The infallible author option The strategy favored by followers of the Nyāya school was to posit a body of literature composed by an omniscient author incapable of making mistakes and not prone to viewing things from a limited perspective. So for the followers of the Nyāya school, the Vedas are not eternal works that were never composed by anyone, but rather are works composed by an omniscient and infallible deity who has no ulterior motives and nothing to gain by telling lies. Over the centuries followers of this school argued that the Vedas were revelations to humanity from an omniscient god, which of course required arguing that there is a god who is not only omniscient but benevolent and concerned with the well-being of human beings. Buddhists as a whole were critical of the views outlined above.
<urn:uuid:2d0c214d-7a7a-40e8-905c-23b43d948925>
CC-MAIN-2019-51
http://www.dayamati.org/queries/epistemology/divine-revelation/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540544696.93/warc/CC-MAIN-20191212153724-20191212181724-00172.warc.gz
en
0.97809
696
3.234375
3
Tech Terms: What is Structured Query Language? To learn more about structured query language (SQL), please join us for our TIGER Workshop on October 9 at 9:30 am. There is an abundance of data around us. In the past, it was conventional to store data on bookshelves or in filing cabinets. Nowadays, it’s all about storing online in a database. A database is a systematic way of collecting and managing data. Databases are essential to a prosperous business. And more so, knowing how to access and collect information from a database is a valuable asset to possess. But, in order to retain information from a database, you need structured query language or SQL. What is SQL? In simple terms, structured query language (SQL) communicates with relational databases. Relational databases make up a structure of tables. More specifically, the word “relational” relates to the idea of linking tables as well as creating relationships between structured data. SQL was created to simplify the extraction of data. “It is a kind of language (simple when compared to the likes of C or C++) which enables you to ask all your queries to a database without bothering about the exact type of database.” What is the purpose of using SQL? The purpose of SQL is to insert, search, update, delete, and create information to a database. SQL makes data management easy to accomplish. In fact, it is useful when optimizing and maintaining databases. A few relational database management systems that use SQL include Oracle, MY SQL, Sybase, Microsoft SQL Server, Access, Ingres, etc. Each management system has its own SQL syntax. However, the standard SQL commands such as “select,” “insert,” “update,” and “delete” are useful to accomplish almost everything within a standard database. How does SQL work? For instance, imagine you have an E-commerce business. There is an excel spreadsheet with four tables titles: customers, purchase item, product, purchases. As a company, you want to know the kind of products customers, in a specific state, purchase. It would take too much time to individually analyze and identify each customer under that criteria. So, to pull that data, you develop a query command using “select,” (the “select” statement, or command, allows the user to extract data from tables, based on specific criteria) to retrieve the information you need. select “column1” [,”column2″,etc] from “tablename” [where “condition”]; “SELECT Customers.Fname, Customers.Lname, Customers.state, Product.name, FROM Customers, Product, WHERE (((Customers.state) Like “”*o*””)); Why is it important to learn and know the SQL language? Ultimately, SQL is becoming a universal language. The collection of data happens every second of the day. Therefore, it is vital that you are able to know how to retrieve the information. With SQL, you have the opportunity to optimize and manipulate the data you have collected. Furthermore, SQL is not a difficult skill to learn. Additionally, it can be useful for everyone. And anyone with the basic English language knowledge can learn and be successful. For those who would like to learn, there are resources such as Prequel for beginners or Used the Index Luke for advanced users, to help increase your knowledge of SQL. Of course, SQL is an essential skill to have in this world today.
<urn:uuid:512db789-0d49-4a09-b071-b1dd778d1e4e>
CC-MAIN-2019-51
https://buckeyeinteractive.com/blog/tech-terms-what-is-standard-query-language/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540544696.93/warc/CC-MAIN-20191212153724-20191212181724-00172.warc.gz
en
0.929096
749
3.296875
3