text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
NEWS ALERT NEWS ALERT NEWS ALERT Frequently Asked Questions about Myopia (Nearsightedness) WHAT YOU NEED TO KNOW: Myopia is the inability to see things clearly unless they're relatively close to the eyes. It’s also called nearsightedness or shortsightedness. WHY THIS IS IMPORTANT: “The prevalence of myopia has been increasing rapidly in recent decades. In fact, it's predicted that by the year 2050, about five billion of the world's population will be nearsighted,” says Sandy T. Feldman MD, Medical Director of Clearview Eye & Laser Medical Center in San Diego. Here are some of the most frequently asked questions Dr. Feldman gets from her patients about myopia: Is it common? Nearsightedness is the most common refractive error among children and young adults worldwide. The condition occurs in 30-40 percent of adults in the U.S. and as many as 50 percent of children. Elsewhere the stats are even worse -- medical experts in Asia, for example, estimate that 90 percent of Chinese university students are short-sighted. Is it genetic? No one knows for sure exactly what causes myopia. But there’s ample evidence that inherited characteristics play a significant role. However, it is possible that the use of computers and smartphones have been contributing as well. Nearsightedness occurs because the eyeball grows too long, so light doesn’t come to a clear focus on the retina. What are the symptoms? Nearsighted people see nearby objects quite clearly, but they strain to see things that are farther away. In addition to blurry distance vision, signs and symptoms of myopia include squinting, excessive blinking, eye rubbing, headaches and eye strain. Is it reversible? Currently, there are no treatments that can permanently reverse myopia. However, a recent study published in JAMA recommended that children should be exposed to sunlight one hour per day, which has been shown to slow progression. What is the treatment? There are several treatment options that effectively correct blurred vision caused by myopia, including eyeglasses, contact lenses, corrective lenses (which can temporarily reshape the cornea of the eye) and refractive surgery, such as Modern Custom LASIK. “Although eye doctors worldwide are concerned about the increasing rates of myopia, the good news is there are now more treatment options than ever before,” says Dr. Feldman. “An eye doctor can help you evaluate all options and determine which one is best for you.” WHO: Sandy T. Feldman MD is a world-renowned corneal expert who has successfully performed more than 20,000 refractive procedures. Clearview has been voted Best LASIK center by the San Diego Union Tribune and by CityBeat. Dr. Feldman’s many awards include Top Doc San Diego; the Goldline Award, an honor granted to the top 10 laser eye care specialists in the U.S.; and the Silver Elite RealSelf Award. She has also been profiled in publications such as Forbes and Newsweek and is an expert commentator on TV talk shows and news programs. Dr. Feldman is a fellow of the prestigious American College of Ophthalmic Surgeons, as well as a member of the American Academy of Ophthalmology and the American Society of Cataract and Refractive Surgery. More details at clearvieweyes.com. CONTACT: I can arrange an interview with Dr. Feldman to discuss myopia or any other eye-related topic. Contact Diana Soltesz at [email protected] or 818-618-5634. Change Your Vision, Change your Life!
<urn:uuid:01b478cf-58c1-48c3-944a-e67320358b26>
CC-MAIN-2023-40
https://www.clearvieweyes.com/news/2019.05-myopia-faq
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00335.warc.gz
en
0.948764
763
3.53125
4
Small multiples are one of the data viz tricks that experienced information designers LOVE. Ann Emery uses them: “My favorite part of data visualization workshops? The airports. Kidding. Watching jaws drop when folks are introduced to small multiples layouts for the first time. Definitely!” Stephanie Evergreen writes that “small multiples version[s] make things approximately a billion times easier” to understand. Andy Kirk describes himself as “fully paid-up member of the small multiples fan club: if I could create small multiples for every dataset I worked with, I would.” Small multiples are effective because they take a cluttered chart and break it into pieces. Instead of confusing the reader with multiple pieces of data crammed into a single chart, small multiples break out the data, allowing the reader to see pieces of it individually, and compare them to each other. One of the major benefits for me of learning R over the last few years has been how it handles small multiples. After teaching an R workshop last week, I posted on Twitter about how I loved seeing students amazed at how easy it is to make small multiples in R. John MacKintosh, an NHS data analyst based in Inverness, Scotland, replied that ggplot handles small multiples better than anything. So I wanted to share briefly how to use R (and the ggplot package specifically) to make small multiples. A small multiples example using ggplot As part of my work for the Ford Family Foundation, I was recently asked to prepare visuals to examine the demographics of applicants over the last few years to the Ford Scholars Program, which provides college scholarships to students in Oregon and Siskiyou County, California. One way the Foundation wanted me to break down the data was by region (there are seven of them: Central Oregon, Eastern Oregon, Metro Portland, North Coast Oregon, Siskiyou County California, Southern Oregon, and the Willamette Valley). My initial attempt yielded this: Not bad, and for some purposes it might be totally appropriate. But I had some concerns: it was quite difficult to gauge numbers of applicants for each region and even more difficult to compare across regions. So, I used the facet_grid function of ggplot and, with literally one line of code, created this: Much better! It’s incredibly easy to see numbers of applicants in each region and compare across regions as well. It’s also really easy to see the overall trends (big increases in the Metro and Willamette regions!). How did I do this? Let’s take a look at the code. First, I load my packages and data (I’ve cleaned and tidied it elsewhere for the sake of simplicity). Next, I define the colors and themes I’ll be using later on. I’m using the colors from the Ford Family Foundation palette. And I’ve adapted the basic theme from the hrbrthemes package to match Ford Family Foundation styling (e.g. using Calibri font). Now it’s time to make my plot. I’m making a fairly basic area plot. By default, ggplot stacks the regions on top of each other. Note that I save the result of my plot as an object ( regions_plot). The reason I did this is so that I can reuse it. Remember how I said it just takes one line to make small multiples? Here we go! There it is: just add facet_grid(cols = vars(region)) and ggplot turns it into a small multiples plot. Using facet_grid, I’m telling ggplot: use columns (that’s the cols argument) to make small multiples, creating the plots by separating them by (Ok, pedants, there is a second line there, I know. That’s because the hrbrthemes package is adding back the axis titles and I had to get rid of them on the facetted version.) You can use facet_grid to make as many small multiples as you want. If I had 50 regions, ggplot would make 50 small multiples. Making small multiples in this programmatic way opens up so many possibilities with very minimal extra work to make them come to life. When I started learning R, there were many times when I felt like it wasn’t worth the effort (learning it is HARD!). But, having persevered, I’m glad to have R in my toolkit. The ability to make small multiples with just a line of code is still as amazing to me as it is to my students seeing it for the first time!
<urn:uuid:d3bbfaed-b50a-4143-aed6-41793c3e1b8a>
CC-MAIN-2020-29
https://rfortherestofus.com/2018/09/making-small-multiples-in-r/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00344.warc.gz
en
0.934225
1,006
2.875
3
The Stuarts - Charles I - The Slide to Civil War Charles I came to the throne in 1625 after the death of his father, James I. Like his father, he believed in the Divine Right of Kings. Although only parliament could pass laws and grant money for war, because they refused to do as he wished, Charles chose to rule without them. Charles made repeated mistakes throughout his reign that took the country into Civil War and ultimately led to his death on January 30th 1649. Charles made mistakes in the following areas: In the first year of his reign, Charles married Princess Henrietta Maria of France, a Catholic. Parliament were concerned about the marriage because they did not want to see a return to Catholicism and they believed that a Catholic Queen would raise their children to the Catholic faith. Instead of listening to the advice of his Parliament, Charles chose the Duke of Buckingham as his main advisor. Parliament disliked Buckingham and resented his level of power over the King. In 1623 he had been responsible for taking England to war with Spain and parliament used this to bring a charge of treason against him. However, the King dismissed parliament in order to save his favourite. In 1627, Buckingham led a campaign into France which saw the English army badly defeated. In 1628, while preparing for a naval invasion of France, Buckingham was assassinated. The monarch's income was paid out of customs duties and when a new King or Queen came to the throne parliament voted for their income to be paid for life. In Charles I's case, though, it was only granted for one year. The members of parliament wanted to make sure that Charles did not dismiss them. Their plan did not work, Charles chose to rule alone and found his own way of getting money. It had always been the custom that in times of war, people living on the coast, would pay extra taxes for the defense of the coastline by naval ships. In 1634, Charles decided that 'ship money' should be paid all the time. One year later he demanded that people living inland should also pay 'ship money'. The people were not pleased and a man named John Hampden refused to pay the tax until it had been agreed by parliament. The case went to court and the judge found Charles' actions to be legal. The people had no choice but to pay. In 1639, Charles needed an army to go to Scotland to force the Scots to use the English Prayer book. A new tax was introduced to pay for the army. People now had to pay two taxes and many simply refused. Many of those jailed for not paying the taxes were released by sympathetic jailors. By 1639 most of the population was against Charles. 'Ship Money' was made illegal in 1641. The Protestants had been upset by Charles' marriage to Catholic Henrietta Maria of France. They were even more upset when Charles, together with Archbishop Laud, began making changes to the Church of England. It was ordered that churches be decorated once again and that sermons should not be just confined to the Bible. A new English Prayer Book was introduced in 1637. Charles also demanded that the new English Prayer Book be used in Scottish Churches. This was a very big mistake. The Scots were more anti-Catholic than the English and many of them were Puritans. There were riots in Scotland against the new service and Charles was forced to raise an army to fight against the Scots. The English army was defeated by the Scots and Charles foolishly agreed to pay Scotland ?850 per day until the matter was settled. Money he did not have! The Irish Catholics were fed up with being ruled by English Protestants who had been given land in Ireland by James I. In 1641, news reached London that the Catholics were revolting. As the news travelled it was exaggerated and Londoners learned that 20,000 Protestants had been murdered. Rumours spread that Charles was behind the rebellion in a bid to make the whole of the United Kingdom Catholic. An army had to be sent to Ireland to put the rebellion down but who was to control the army. Parliament was worried that if Charles had control of the army he would use it to regain control over Parliament. In the same way, if Parliament controlled the army they would use it to control the King. It was a stalemate. One of Charles I's major mistakes was that he was unable to gain the co-operation of his parliament. His determined belief in the Divine Right of Kings led to his dismissing parliament in 1629 and ruling without them. The fact that he did not have a parliament to grant him money meant that he had to tax his people heavier and introduce unpleasant taxes such as ship money (see above). It was only when Charles needed an army to fight against Scotland that he was forced to recall parliament in 1640. This parliament remained in office for so many years that it is known as the Long Parliament. The Long Parliament Having been dismissed from office for eleven years, this parliament was determined to make the most of being recalled and Charles' favourite, Thomas Wentworth, Earl of Strafford, of treason. Strafford was executed in May 1641. In November 1641, parliament presented the King with a list of complaints called the Grand Remonstrance that asked for the power of bishops to be reduced and for Charles' councillors to be men trusted by parliament. Not all members of parliament were in favour of it and it was only passed by 159 votes to 148. In January 1642 Charles made what was the most foolish move of his reign. He burst into the Houses of Parliament with 400 soldiers and demanded that the five leading MPs be arrested. The five MPs had had advance warning and had fled. Charles demanding the arrest of the five MPs In June 1642 the Long Parliament passed a new set of demands called the Nineteen Proposals that called for the King's powers to be greatly reduced and a greater control of government to be given to parliament. This move divided parliament between those who supported the Nineteen Proposals and those who thought parliament had gone too far. Both Parliament and Charles began collecting together their own armies. War was inevitable. People were forced to choose sides and on 22nd August 1642, the King raised his standard at Nottingham. The old American West was a wild place. It was an era full of cowboys, gunslingers, outlaws, and wars. The European settlers driving the expansion into the west faced many hardships. They had to force their way into the Pacific by driving the Native Americans away from their lands. Ultimately, this chaotic environment created a culture susceptible to violence and the breakdown of law and order. After the... Read More The Medieval Ages was a time full of interesting history, rich art, revolutionizing philosophy, epic heroes, and even a bit of magic. However, it was not a very pleasant period to be a medical patient. The common way to relieve pain amongst sick people was to inflict more pain upon them, and then hope to the starts for a bit of luck. Peasants and monks with little to no experience, aside from castrating animals... Read More Ancient Egypt was a fascinating place. Its mysterious civilizations, powerful gods, and stunning pyramids have captured our imagination for thousands of years. Thanks to the abundance of evidence left behind by ancient Egyptians, we have been able to discover a wealth of information about their daily lives. We can read their words, see their houses, taste their dishes, step into their tombs, and even touch their... Read More
<urn:uuid:cf5a196f-6d1f-4672-872f-d96815ac7ae3>
CC-MAIN-2014-35
http://www.historyonthenet.com/Stuarts/charlesi.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824445.9/warc/CC-MAIN-20140820021344-00016-ip-10-180-136-8.ec2.internal.warc.gz
en
0.98938
1,545
3.5
4
ON THIS PAGE: You will find basic drawings of the main body parts affected by this disease. To see other pages, use the menu. To see other pages, use the menu. The image is two drawings showing different parts of a person’s brain. The largest part of the brain, the cerebrum, is made up of four lobes: the frontal lobe at the front of the skull, the parietal lobe at the upper rear of the skull, above the occipital lobe, which is at the back of the skull, and the temporal lobe, which is located under the frontal and parietal lobes on both sides of the cerebrum. The cerebellum is located under the occipital and temporal lobes at the rear of the skull. The brain stem includes the pons and the medulla oblongata, which connects to the spinal cord. Copyright 2004 American Society of Clinical Oncology. Robert Morreale/Visual Explanations, LLC. The image is a drawing of a cross-section of the skull and meninges. It shows the layers of membranes that surround and protect the brain. The first layer shows the skin covering the skull bone. Beneath the skull is the dura mater, which surrounds the arachnoid mater. Cerebrospinal fluid circulates in the sub arachnoid space between arachnoid mater and the pia mater, which covers the cerebral cortex (the brain). Copyright 2004 American Society of Clinical Oncology. Robert Morreale/Visual Explanations, LLC. The next section in this guide is Statistics. It helps explain how many people are diagnosed with this disease and general survival rates. Or, use the menu to choose another section to continue reading this guide.
<urn:uuid:bd2048df-6727-4980-809f-768b930599a7>
CC-MAIN-2017-43
http://www.cancer.net/cancer-types/brain-tumor/medical-illustrations?sectionTitle=Medical%20Illustrations
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822488.34/warc/CC-MAIN-20171017200905-20171017220905-00209.warc.gz
en
0.904712
361
3.703125
4
Dive into the green: tree planting and forest bathing Living in the concrete jungle can make you feel drained out of life. And one of the best ways to recharge your batteries is to schedule a meeting with mother nature. Spending time in the woods is beneficial not only for your mental health and wellbeing but also for your physical condition. In this article, we will explain why tree planting is so important to us and how to take a forest bath like a pro. A brief history of shinrin yoku In 1982, the Japanese Ministry of Agriculture, Forestry, and Fisheries developed the idea of shinrin yoku which means forest bathing. The main goal was to improve population health but also to protect diminishing forests. Shinrin yoku is a simple concept of connecting with nature, immersing yourself in the forest atmosphere. That kind of activity is considered a form of mental and physical therapy – it’s worth mentioning that in the 2000s, two significant organizations were established: the Association of Therapeutic Effects of Forests and the Japanese Society of Forest Medicine. One of their tasks is to conduct research on the therapeutic effects of forest bathing. Benefits of spending time in forests Forest bathing has been shown to have a number of health benefits. According to the field experiments conducted in 24 forests in Japan, spending time in nature strengthens the immune system by increasing NK activity and the number of NK cells*. It can also lower pulse rate, blood pressure, and concentrations of cortisol, and increase parasympathetic nerve activity. Other studies proved that at least a 3-kilometer forest walk can decrease diabetics’ glucose levels**. In addition to the impact on physical health, shinrin yoku is also a great way to improve your mental wellbeing. It will help you reduce stress, relax, boost your mood, and find balance in life. * - https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2793346/ ** - https://pubmed.ncbi.nlm.nih.gov/9531856/ How to start forest bathing? Taking a walk in the forest is not quantum physics – it’s just as simple as it sounds. However, if you want to make the most of practicing shinrin yoku, you should know some crucial rules and tips. First of all, leave your smartphone and other devices at home. Focus on the sounds and scents of nature. Listen to the birds and try to recognize them. Observe. Breathe consciously. Touch the ground with bare feet. Take your time and remember that there’s no need to rush. Hug some trees. Immerse yourself in nature with all of your senses. If you are a beginner, you can consider walking with a trained guide – somebody who knows the forest like the back of his/her hand. That person can create the most suitable plan for your forest therapy so you can feel comfortable, calm, and free from anxiety. Why do we plant trees? When spending summer in the city, you can easily notice how desperately people need trees – not only to cast a shadow but also to save the planet. Forests play a vital role in regulating the Earth's climate. They provide a habitat for a wide variety of plants and animals – they are home to an estimated 80% of the world's terrestrial biodiversity. The main functions of the forests include as well: - playing a huge role in the water cycle – during the process of transpiration water moisturizes the atmosphere which leads to cloud formation and prevents droughts; - absorbing carbon dioxide, carbon monoxide, and sulfur dioxide, and pumping out oxygen; - preventing floods – the roots allow the ground to absorb more water and reduce soil loss; - reducing noise pollution; - providing timber that enables us to produce high-quality, sustainable furniture, accessories, building constructions, etc. Despite their importance, forests are under threat and one way to help protect them is by planting trees. And that’s what we do as Oakywood – we support tree planting organizations by donating a part of the income from each product sold. In cooperation with One Tree Planted, we’ve already planted 12459 trees in California, 28850 in the Amazon rainforest, 14425 in Romania, and thousands in other regions – 79334 in total. And there’s more to come! Recently, we started collaborating with the Polish non-profit organization Forever Forest (Las na Zawsze) – and this year we will plant 10959 sq.m. of forest with them. We hope that future generations will be able to practice shinrin yoku in all those woods.
<urn:uuid:f9c49e75-e6db-40af-9325-fc86a4bfbbe4>
CC-MAIN-2023-14
https://oakywood.shop/blogs/news/shinrin-yoku
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00582.warc.gz
en
0.939836
968
2.53125
3
Sitting down to write your classroom rules seems like it should be simple. But for a new teacher on information overload SUPER-IMPORTANT-INFORMATION overload at the beginning of the school year, nothing feels simple. Here are a few common classroom expectations that serve as a good starting point. - Come on time and fully prepared to learn every day. - Leave food, drinks and gum outside the classroom. - Keep cell phones and any other electronics off and out of sight. - Only one person should be talking at a time. - All students should be in their seats when the teacher is speaking. - Respect yourself by dressing appropriately for school, conducting yourself as a professional student, and taking your education seriously. If you like these rules, there is no reason you can’t just copy and paste them into a word document, make any changes you want to, blow it up to 24-point font, and hit print.* *Of course, you probably already knew this, but a rules poster does very little by itself. The only real rules in your classroom are the ones you consistently enforce. Still, it’s a good idea to have a rules (or classroom expectations) poster in your classroom.
<urn:uuid:5a436d2b-34b9-4bac-98d0-6ef19d55056a>
CC-MAIN-2023-14
https://roxannaelden.com/2016/07/suggested-classroom-rules/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00601.warc.gz
en
0.95987
254
3.921875
4
Definition of Accruals The accounting and bookkeeping term accruals refers to adjustments that must be made before a company's financial statements are issued. Accruals involve the following types of business transactions: - expenses, losses, and liabilities that have been incurred but are not yet recorded in the accounts, and - revenues and assets that have been earned but are not yet recorded in the accounts Example of an Accrual of an Expense One example of an accrual of an expense and liability is a major repair that occurs in the final month of the accounting year, but is not paid until the bill is received in the first month of the following year. For the current year's financial statements to be complete (under the accrual method of accounting) the following is necessary: - the income statement for the current year must report the repair expense, and - the balance sheet as of the last day of the year must report the related liability To record this accrual, an adjusting entry is made that debits Repairs Expense and credits Accrued Expenses Payable. Example of an Accrual of Revenues One example of an accrual of revenues occurs at your electric utility company. For instance, during December the utility likely uses natural gas and/or coal plus many employees to generate the electricity used by its customers in December. However, the utility does not bill its customers for that electricity until after it reads the meters in January. As a result, the utility's financial statements will need an accrual adjustment so that: - its income statement for the month of December and for the current year will report all of the revenues earned by the utility, and - its December 31 balance sheet will report a current asset for the amount it has a right to receive from its customers (including the amount for the electricity it provided in December) The accrual adjustment will debit the current asset account Accrued Receivables and will credit the income statement account Accrued Electricity Revenues.
<urn:uuid:a7fbfde6-f653-481b-a98b-7ba948b5d603>
CC-MAIN-2023-40
https://www.accountingcoach.com/blog/what-are-accruals
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00463.warc.gz
en
0.969899
417
3.453125
3
It turns out that you can sleep too much as well Sleeping too little is very bad for your mental and physical wellbeing so it is really not recommended that you shorten your nights. But did you know that sleeping too much can also be bad for you? These signs let you know that you get too many hours of sleep. Someone who constantly sleeps too little can start to suffer from sleep deprivation. It may seem that you can recover that lost sleep by sleeping more in the weekends, but that’s not the case. Sleep deprivation is very difficult to catch up on and can lead to having several physical and mental symptoms. You can experience a drop in concentration, a craving for junk food more often, and a sad feeling. Additionally, your immune system could be so weak that you develop a cold every time it is going around. So it is important to sleep enough, but how do you know whether you sleep too much? These signs could tell you. You may think that you get a headache from not sleeping enough, but you can also get one by spending too many hours lying down on your soft pillow. Dr. Elizabeth McDevitt explains how that is possible. She says that the fluctuations of nerve impulses can cause a headache when you’re sleeping. When you’re still asleep when you would normally have your breakfast or drink your coffee, you can develop a headache because of the low blood sugar, dehydration or a caffeine deficiency. 2. Everything hurts Perhaps you think that your body is completely rested when you sleep a lot of hours, but your body can actually hurt as well when you’ve had a long night’s rest. Does this happen to you? Then you know that you’ve been enjoying your warm blanket for a little too long. Read on the next page what other consequences there are to sleeping too long!
<urn:uuid:a46c9fdf-23ca-4a7b-bbe2-33b410a37d9c>
CC-MAIN-2020-24
https://www.tips-and-tricks.co/health/6-clear-signs-you-sleep-too-much/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347422065.56/warc/CC-MAIN-20200602002343-20200602032343-00573.warc.gz
en
0.969968
382
2.515625
3
One of the mysteries of the English language finally explained. An oil obtained from the germ of maize, used in cooking and salad dressings. - ‘In the bowl of a food processor fitted with the metal blade attachment, add the garlic, cumin, thyme, and corn oil and pulse to combine.’ - ‘Replace the garlic with chopped onion and the olive oil with corn oil.’ - ‘By cutting out soy oil and corn oil, and using olive oil instead, you can, virtually double the effect of any fish that you eat, scientists believe.’ - ‘Because it has a high smoke point, corn oil is ideal for frying or pan searing over high heat.’ - ‘Place a large skillet over medium heat and add 1 inch of corn oil to the skillet.’ - ‘The fatty acids are derived from either soybean or corn oil.’ - ‘Overall, fish oil consumption results in mild-to-modest improvement in psoriatic symptoms, although some studies show fish oil was not superior to corn oil or olive oil.’ - ‘It is cooked in partially hydrogenated vegetable oil which may contain partially hydrogenated soybean oil, corn oil, canola oil, cottonseed oil or sunflower oil.’ - ‘Using a large skillet, heat up 1/2 cup of corn oil.’ - ‘Foods to avoid include margarine, fast food and processed foods containing sunflower, safflower and corn oil.’ - ‘Vegetable fats and oils with a high proportion of unsaturated fatty acids (e.g. olive oil, rapeseed oil, sunflower oil, corn oil or wheat germ oil) are to be preferred.’ - ‘Sources of the essential fatty acid linoleic acid are soybean oil, corn oil and safflower oil.’ - ‘While fried food is usually unhealthy, the four fast food restaurants surveyed have switched to low cholesterol cooking oils like soybean and corn oil.’ - ‘It's easy, she says: Use canola oil instead of corn oil when cooking, put ground-up flaxseeds in muffin mixes, and eat fish once or twice a week.’ - ‘If you want to use oil for cooking, try olive oil or canola oil instead of oils that are high in polyunsaturated fats, such as corn oil, peanut oil, and many margarines.’ - ‘Olive oil, canola oil, and sesame oil are healthier than corn oil or vegetable shortening.’ - ‘Add the molasses, corn oil, and maple syrup and, using a rubber spatula, gently stir to combine.’ - ‘Ireland remains the most expensive country in the eurozone for basic foodstuffs, particularly for individual grocery items like eggs, mineral water, corn oil, potatoes, onions, tomatoes, oranges, chips, salt and instant soup.’ - ‘He advises consumption of expeller-pressed seed oils such as flax and borage oils, as well as coconut oil, rather than corn oil or margarine.’ - ‘Plant sources of fats such as corn oil, peanut oil, and soybean oil are up to 94% digestible.’ Top tips for CV writingRead more In this article we explore how to impress employers with a spot-on CV.
<urn:uuid:af1af486-cee5-4fff-8c1b-d6b6a4fffcf0>
CC-MAIN-2017-30
https://en.oxforddictionaries.com/definition/corn_oil
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424586.47/warc/CC-MAIN-20170723182550-20170723202550-00328.warc.gz
en
0.935471
739
2.859375
3
EVERY October, on the night of the full moon, small globes of light rise from the Mekong river along the border of Laos and Thailand. One theory holds that methane drawn from the riverbed by the gravitational pull of the moon causes the “Naga fireballs”, as locals call the phenomenon. The devout, on the other hand, consider it a sort of spiritual firework display to celebrate the end of Buddhist Lent, while sceptics say that it is all a hoax, perpetrated by Laotian monks to put the fear of god into their flock. The event is emblematic of the Mekong in general. It may rank only eighth among the world's rivers in terms of flow, 12th in length and 21st in the size of its basin, but few can top it for sheer peculiarity. More conventional rivers, for example, content themselves with flowing in a single direction all year round. Not the Tonle Sap, a branch of the Mekong that runs through central Cambodia. For half the year, it flows south-east towards the South China Sea. But as run-off from South-East Asia's monsoon raises the water level, the river reverses course, and begins flowing north-west into the Tonle Sap lake. When the rains slacken and the river falls, the current changes course once more, carrying its diminished flow back down to the sea. Then there are the bizarre creatures that navigate these shifting currents: catfish the size of cows, dome-headed dolphins, crocodiles with a taste for royal blood—and relatively few people. Uniquely for such a big river in the heart of tropical Asia, the biggest city along the Mekong's banks—Phnom Penh—has a mere 1.1m inhabitants. That makes the river unusual in another respect: the pressure of a burgeoning population and fast economic growth is only just beginning to make its mark on the Mekong. But the outcome could be all too familiar: a poor compromise between conservation and development. For centuries, the Mekong has disappointed those who have dreamed of turning it into a major artery of trade and industry. At times, overland routes have rivalled maritime ones as a conduit for east-west trade in Asia, but the sea has always provided the simplest way of getting from north to south. Thus Marco Polo probably crossed the Mekong on his way home to Europe from China in the 13th century, but did not travel along it. At any rate, he considered the river so inconsequential that he did not mention it in his account of the journey. About the same time, 1,600km (1,000 miles) to the south, the only major civilisation to be built around the Mekong, the empire of Angkor, was reaching its apogee. Its Cambodian heartland sustained a population of at least 1m through rice farming along the shores of the Tonle Sap, and fishing in its waters. But the Mekong played a part in the empire's trade only in so far as it provided an outlet to the sea. The Chinese merchants and ambassadors who visited Angkor in its heyday came by boat from China's coast and then up the Mekong from the delta, not downriver from the Chinese province of Yunnan. Four thousand obstacles They did so in part because the Mekong is not navigable much beyond Phnom Penh. In the dry season, when the river is low, boats must dodge endless jagged reefs and shifting sandbars. Even when the water level crests, the many rapids of Si Phan Don, or “Four Thousand Islands”, in what is now southern Laos, form an insurmountable obstacle to shipping. Over a stretch of 30km, the Mekong divides into a muddled network of streams and channels, tumbling over cascades and shoals. But the main reason this huge river has always been such a commercial backwater is the scanty population along its course. The biggest expanse of flat, well-watered and fertile land in the basin lies around Tonle Sap lake, but the devastating annual flood makes intensive agriculture difficult there. Depending on the strength of the rains, the surface area of the lake can swell to up to ten times its normal size during the monsoon. But the water recedes quickly when the rains stop, so the land is alternately flooded and parched. No wonder, then, that the most powerful countries in the region took shape in more hospitable river basins: China on the Yangtze and Yellow rivers, Thailand on the Chao Phraya, Vietnam on the Red, and Burma on the Irrawaddy, leaving the lower Mekong to much-diminished Cambodian kingdoms. North of Cambodia, the Mekong flows through the periphery, not the centre, of all these countries. European explorers, who began snooping around the Mekong in the 16th century, took hundreds of years to work that out, though. In the 1590s a party of Iberian conquistadors overthrew the Cambodian king and set themselves up as governors in the Mekong delta. A Dutchman, Gerritt van Wuysthoff, struggled upriver as far as Vientiane in 1641. But as late as the 1860s, when France conquered Vietnam and Cambodia, colonial officials knew nothing of the river's northern reaches. They still hoped that it might provide a lucrative back door to China, and in 1866 sent an expedition to explore both the Mekong's course and its commercial potential. The leader of the expedition died en route, and the survivors brought back grim reports of impassable rapids and lawless hinterlands. But the optimists pressed on. They seized control of Laos in 1893, and tried to turn the Mekong into a thoroughfare linking all their colonies in Indochina. To get round the rapids in Si Phan Don, they built a railway across the river's two southernmost islands, Khon and Det, close to the Laos-Cambodia border. Goods could be shifted from boat to train at the southern terminus of the railway on Khon, below the rapids, and carried to a vessel above them, at the northern end of Det. The scheme was more a triumph of engineering than of economics, however. Chinese merchants still found it cheaper to send goods to Laos overland via Thailand. After the second world war, the railway—the only one in Laos—fell into disuse. By now, villagers on Khon have prised up most of the tracks for use as fencing. Water buffalo graze on the grass that has sprouted on the old railway bridge linking Det and Khon. Not far off, a rusty French locomotive lies abandoned in a bog. In the 1950s and 1960s, America, too, dreamed of harnessing the Mekong to enrich Indochina, and thus dent support for the region's communist insurgents. Its allies in the region, Thailand, Laos, Cambodia and South Vietnam, set up an agency called the Mekong Committee to co-ordinate joint development projects. Plans were drawn up to dam the Mekong, and engineers got as far as surveying several sites before the ever-intensifying Vietnam war put an end to such schemes. Thanks to all these disappointments, the Mekong remained almost untouched until the 1990s. The first dam on the river, at Man Wan, in China, was not completed until 1993. The first bridge across the lower Mekong (ie, outside China) was built a year later, between Vientiane in Laos and Nong Khai in Thailand. To this day, much of the river feels deserted. Between the town of Stung Treng, in northern Cambodia, and the Laotian border, hardly a house can be seen. There is so little traffic on the road that runs parallel to the river north of the border that “you could sleep on it,” as one local remarks. Farther north still, along some stretches of the river near Luang Prabang, only odd patches of cultivated land give any hint of human settlement. But that is changing fast. The population of Cambodia is growing by 2.6% a year, and that of Laos by 2.3%—among the highest rates in Asia. Growth is lower in the Thai and Vietnamese parts of the basin, but they have long been more densely populated. Economic growth is even faster: 5-6% in 2003 in Thailand, Laos and Cambodia, 7-8% in China and Vietnam. Build and destroy To accelerate this trend, the Asian Development Bank (ADB) is promoting a scheme to integrate the economies of the “greater Mekong sub-region”. Two north-south highways are under construction to link China and Thailand, one via Laos and the other via Myanmar. So are five east-west routes linking Thailand and Vietnam, three via Laos and two via Cambodia. A tie-up of electricity grids and telecoms networks is also getting under way. The ADB may find it as difficult to make the region boom as the French and Americans did. But one element of the current development drive is bound to leave its mark on the Mekong: dam-building. According to the International Rivers Network, an anti-dam group, some 100 large dams are proposed for the Mekong basin. China has already completed two on the Mekong itself, has started work on a third, and plans at least four more. By the time the Mekong enters Vietnam, it has already formed a delta, leaving no opportunity for dam-building—so the government is building five dams on the one big tributary that strays across its mountainous border with Cambodia instead. Thailand, too, has dammed the main tributaries that flow across its territory. The biggest dam enthusiast of all is dirt-poor Laos, which hopes to enrich itself by building enough hydropower projects to become the battery of South-East Asia. This barrage of dams generates valuable electricity, aids irrigation and regulates flooding—but in the process does irreparable damage to what was, until recently, the Mekong's most valuable resource: its fisheries. The Mekong and its tributaries yield more fish than any other river system. The annual harvest, including fish farms, amounts to about 2m tonnes—or roughly twice the catch from the North Sea. The Mekong is home to over 1,200 different species of fish, more than any other river save the Amazon and the Congo. Over 1m people in Cambodia depend solely on fishing to make a living, while in Laos 70% of rural households supplement their income by fishing. The abundance of fish stems from the Mekong's seasonal ebb and flow. During the monsoon, when the plains around the river and its tributaries flood, the habitat for fish suddenly increases by as much as ten times. Moreover, much of the flood-plain is actually forest, which provides a particularly nutritious array of rotting leaves for the fish to feed on. Many species in the Mekong have evolved to take advantage of this delectable smorgasbord. They spawn at the end of the dry season, so that the coming floods can carry the fry to the flood-plain. The bigger the flood, the greater the feast on offer, and so the fatter and more numerous the fish. More dams, however, mean smaller floods. Most hydroelectric plants aim to generate the same amount of energy year-round. That requires a consistent flow through the turbines, which in turn requires rainwater to be held in a reservoir for use in the dry season. The same drawback, of course, applies to dams designed for flood control. Dams for irrigation, meanwhile, have a doubly damaging impact on fisheries: they not only hold back water, but also encourage the conversion of forest to farmland in the flood-plain. Irrigated rice-farming, which is two or three times more productive than the rain-fed sort, is growing rapidly throughout the basin, albeit from a low base. In Laos alone, the area under irrigation increased eightfold in the 1990s. Meanwhile, the Mekong River Commission, the latter-day successor to the Mekong Committee, calculates that flood levels have fallen by almost 11% since 1965. Fishermen all along the Mekong are already complaining of falling catches. For now, at any rate, the problem stems more from the growing number of fishermen than from falling numbers of fish. The Mekong River Commission calculates that the fish catch actually doubled in Cambodia between the 1940s and the 1990s. But over the same period, the number of fishermen (along with the population as a whole) has more than tripled, leading to a decline of 44% in the amount each one takes home. To make matters worse, even if the catch as a whole is stable, certain species are clearly dying out. The Siamese crocodile, which used to pluck picnicking princesses off the riverbank, according to French explorers, has already disappeared from the main river. Perhaps a few hundred remain in the forested highlands of Laos and Cambodia—but they too are threatened by hunting and habitat loss. A similar fate awaits the Irrawaddy dolphin. According to Isabel Beasley, an academic, there are only about 70 of these dark grey, snoutless creatures left in the entire Mekong basin. These few survivors, she explains, follow the fish in the dry season to deep pools in the bed of the river near Kratie, in Cambodia. Despite their scarcity, they can easily be spied at these spots, breaking the surface in gentle arcs in pods of three or four. But fishermen also follow the fish, and often snag the dolphins unintentionally in the large-mesh nets they leave unattended for days at a time. As mammals, they need to come to the surface to breathe at intervals of roughly 20 minutes. So any that are caught in nets have usually drowned long before the fishermen return to inspect their catch. The reasons behind the dramatic decline in other species are murkier. Take the giant catfish, the world's largest freshwater fish, which can grow up to 3 metres (10 feet) in length and weigh up to 300kg (660lb). It used to be found throughout the Mekong basin, but has completely disappeared from most areas. In Chiang Khong, traditionally a prime fishing ground, the catch declined from 69 in 1990 to two in 2000, and none since. Unlike smaller species, which reach reproductive age within a year, giant catfish take about seven years to mature, and so are seven times more vulnerable to over-fishing. They also migrate upstream to spawn, though no one knows where, exactly, they go, and therefore whether the proliferation of dams is playing a part in their demise. In general, the Mekong is so little studied that the effects of any development project are hard to predict. China, for example, is paying for a scheme that involves blowing up reefs in Laos, Myanmar and Thailand, to provide a navigable channel for ships of up to 150 tonnes. But halfway through the blasting, the Thai government has suspended the project, for fear that the faster flow of an unimpeded current would increase erosion and thus alter the midstream boundary with Laos. Fishermen also worry that, since the reefs may be prime breeding-grounds for fish, including the giant catfish, the catch of all species will plummet if their habitat is destroyed. That fear is not far-fetched. Something similar happened in 1994, when Thailand, with money from the World Bank, completed a hydropower dam on the Mun river, a major tributary of the Mekong. Since then, the fish catch directly upstream has declined by 60-80%, according to a study by the World Commission on Dams. The same study argued that, thanks to cost overruns and lower-than-expected generation at peak times, it would have made more sense to build a gas-fired plant. To avoid a similar fiasco, the World Bank is insisting on umpteen studies and safeguards for the Nam Theun II, a big dam it is financing on a tributary of the Mekong in Laos. But the authoritarian rulers of China, Myanmar and Vietnam do not always mull over big projects so carefully, and no cost-benefit analysis at all is made of the thousands of small dams, irrigation schemes and land clearances that are undertaken each year throughout the basin. Anyway, governments in upstream countries are unlikely to give much thought to the impact of projects on lowly fishermen or farmers beyond their borders. In theory, that is the job of the Mekong River Commission. Its members, Vietnam, Cambodia, Laos and Thailand, are slowly drawing up pacts on the exploitation of the Mekong and its tributaries. In 2001 they agreed to exchange data on water flows. A pledge to notify one another about big projects came next, and then a system to check up on such declarations. Next year, if all goes according to plan, they will fix the minimum amount of water each country must discharge downstream and, in 2005, rules on water quality. But none of these pacts will amount to much so long as China and Myanmar refuse to join the Mekong River Commission. Officials from downstream countries—somewhat hypocritically—say that China's dam-building schemes threaten the whole basin. But for upstream countries, of course, membership of the commission would bring many restrictions and few benefits. China has, however, been keen to rid itself of the image of a budding regional bully, and has courted South-East Asian countries with trade concessions. It also needs the acquiescence of downstream countries in schemes such as the reef-blasting. In 2001 it agreed to the minimal step of sharing data on water levels with the commission, to provide an early-warning system for floods. After all, say officials at the commission, co-operation among the riparian states, like the river itself, should flow in both directions. This article appeared in the Special report section of the print edition under the headline "The sweet serpent of South-East Asia"
<urn:uuid:f0bbe882-1b84-402f-b8cc-cc4a7c86fee0>
CC-MAIN-2020-16
https://www.economist.com/special-report/2003/12/30/the-sweet-serpent-of-south-east-asia
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371606067.71/warc/CC-MAIN-20200405150416-20200405180916-00030.warc.gz
en
0.9544
3,749
2.953125
3
A business needs to take care of so many things as every aspect of the business is important and of due importance. After the advent of technology, things have been changed as businesses have understood the importance of technology in their daily operations. Things are now much simpler and convenient with the use of technology. Businesses can make use of technology in many ways like they can install software, use an application, and so on. When a business makes use of applications in their routine work a concern for their safety arises. Making use of technology is not sufficient as you have to be very careful about security or application protection. Many applications are being used in businesses that are helping businesses in many ways. From being in touch with your customers to simplifying the complicated tasks you can make use of the application. The application protection or security is now offered by many companies who are engaged in this field. They are offering many software or other technical solutions that will protect your apps from every type of risk to which they are attached. The business apps hold lots of confidential data they cannot share with any person who is not authorized. In this case, they need to take some steps towards the protection of their applications. The hackers will try to hack the application in order to misuse it. But if you make use of various systems for the app security you can avoid or prevent those risks. There can be many vulnerabilities attached to the application which weaken the internal security system of your application. It is essential to avoid those vulnerabilities as soon as they arise. Before starting with anything, you must be well aware of the meaning of application protection. The application protection makes use of different systems, solutions, or testing procedures that will help protect your app from every kind of risk, vulnerability, etc. There are risks of unauthorized access, malware attacks, and so on your applications. The application security is of many types and you need to know in detail about those sites. Some of the types are: - Authentication of the users: It is very important to allow only authenticate people to access your application. The different processes or steps can be developed in order to improve the authentication of the users. You can add different steps like writing or filling names, passwords, or other marks, etc in the application before starting. The businesses need to protect their app and using the right and strong authenticated passwords or keywords will be helpful for the owners. - Giving them permission to access: Authorizing the users is the next important type of app protection that the businesses can use. They can authorize only a limited number of people so that only they can access the application. A list of the authorized people can be given to the internal system of the application to facilitate this procedure. - The use of encryption: Encryption is helpful in so many ways. In the beginning, you may not be able to understand the real meaning of encryption but later on, you will understand its importance. The data needs to be encrypted in almost all the apps due to various reasons. The loss of data is minimum when they are encrypted this means they become non-understandable for the other people. It minimizes the risk of theft of confidential data as it will be protected using data encryption. - Adding an option of logging: Adding an option of login to the application by its users will also minimize the chances of fraud. Only those who are having the relevant passwords can fetch the applications all others will not be allowed. The more the security tools used, the lesser will be the chances of hacking or data threats. This system will only allow those people who are having particular login information. - Perform security testing: A testing procedure of the app protection must be performed so that the security of the app can be secured. It must make sure the owners of the application that all the security solutions used are working properly and the information stored or shared with the help of this application is safe and secured. So, these are the following types of application security that you should know about. All these measures can be used by the business to protect their apps. But along with this many other efforts should also be made regarding app protection. This means the businesses need to consider some points with which they can keep important information safe in the applications. Some of the things that they can do are as follows: - Tell your staff about the app protection: Your employees must be aware of the sensitivity of the app protection so that they can handle it with care. They must know about the relevance of app security. You need to educate them on this issue. - Creation of a separate policy: A separate policy relating to app protection must be created and then implemented in every business organization. It must cover all the important issues as well as challenges relating to the app protection so that efforts can be made to protect the apps. - Securing data in different ways: You need to take care of the security of the data by making use of different mediums. Some of the mediums which can be used to protect app security are using security passcodes, encryption of data, and so on. All these things are having their own role in app security. - Contact app protection companies: There are many companies who are giving their services relating to the security of your application and all you need to do is to hire their services to protect your application. They will use various solutions, software, or other platforms to secure your app protection. So, these are the following things a business can do to avoid the various issues associated with app protection.
<urn:uuid:fe282ccd-286d-4590-ad46-764aa1de5e75>
CC-MAIN-2023-23
https://andromods.com/technology/important-details-about-application-protection.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00625.warc.gz
en
0.963329
1,114
2.609375
3
If you’re interested in reading instruction, you’ve probably heard about an approach called the Science of Reading (SOR). Advocates of SOR suggest that the slow reading achievement gains shown within the United States over the past three decades result from reading instruction that’s not scientifically grounded. Embracing science, according to these advocates, leads to significant, substantive improvement in literacy achievement. SOR has been around as long as scientists have studied reading development and instruction, but the National Reading Panel (NRP) Report in 2000 was a major milestone in the SOR movement. These highly respected scientists and literacy scholars reviewed the scientific research on reading, determining the foundational skills required for effective reading curriculum: phonemic awareness, comprehension, phonics or word decoding, vocabulary or word meaning, and reading fluency (both automatic word recognition and prosody). Reading instruction can be studied and guided by science, but the teaching of reading is also an art. The NRP Report led to teachers, schools, curriculum developers, policy makers, publishers, and political leaders working to include all these elements in their reading curricula and programs. For example, President Bush’s reading initiative, Reading First, made findings from the NRP Report a central part of its program. But after several years of implementation, analyses of Reading First indicated that students’ reading outcomes had not substantially changed. Even 20 years after the NRP Report, with nearly all reading instruction in the United States at least partially guided by the NRP’s findings, reading achievement has barely budged from where it was in 1992 for grades 4 and 8, the two grade levels regularly assessed by the National Assessment of Educational Progress. Why haven’t we seen the progress promised by this orientation toward SOR? Some in the SOR community suggest that phonics is not taught with sufficient rigor (as directly and systematically as it needs to be) in early education. SOR advocates also suggest that younger students are often given mixed messages about word decoding (taught to analyze but also encouraged to “guess” using context) and that schools typically adopt an overly simplified model of reading focused solely on word decoding and comprehension. The problem at hand is in fact more complex than the lack of science guiding reading instruction. Reading instruction can be studied and guided by science, but the teaching of reading is also an art, in much the same way the practice of medicine is guided by science, but its practice is an art. That’s one reason being a teacher is so challenging. A good teacher must be both a scientist and an artist. In our quest to base reading instruction on science we have, as a community, neglected the artistic aspects of teaching. When reading instruction is guided primarily by science, the instruction can take some odd forms. Students spend time reading nonsense words in isolation, work to become fast readers just to achieve some scientific fluency norm, and strive to succeed on scientifically developed tests and assessments. None of these activities are authentic reading. As a result, students may disengage. I am not advocating for moving away from a scientific approach to reading instruction. On the contrary: over the course of my career, I’ve engaged in many of my own scientific studies of reading and reading instruction. But the science must be artfully applied to create truly effective, engaging instruction. Three characteristics help define artful instruction: authentic, aesthetic, and creative. - Authentic reading instruction should look and feel like real reading as much as possible. Students’ reading should involve reading real words and real texts for real purposes. Nonsense words aren’t inappropriate, but they should be used sparingly and strategically. - Aesthetic reading instruction should be aimed at touching the heart. Give students opportunities to have the kinds of emotional (aesthetic) responses adults crave in their own reading. - Creative reading instruction means giving teachers choice and agency in how they teach. Too often teachers are required to follow a script. Creativity should also be encouraged in students as they show their understanding of texts. Ask them to write their own poems and skits in response to texts or have them create visual artworks inspired by the texts they’ve read. When educators can achieve the right balance between science and art in reading instruction, we’ll be closer to achieving the long-held hope of proficient reading for all students. Explore Our Award-Winning Literacy Products Or start your 14-day free trial today! Read more of Dr. Rasinski’s Art and Science of Reading series: The Art and Science of Teaching Vocabulary The Art and Science of Teaching Word Recognition (Phonics) The Art and Science of Teaching Reading Fluency The Art and Science of Teaching Struggling Readers The Art and Science of Teaching Reading Comprehension
<urn:uuid:2f086d7c-9f72-46b2-87af-4c96b8fcb6dc>
CC-MAIN-2023-40
https://www.learninga-z.com/site/resources/breakroom-blog/dr-rasinski-art-and-science-of-reading
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00088.warc.gz
en
0.951593
994
3.390625
3
74 Pages Posted: 23 Jan 2008 Last revised: 8 Sep 2011 Date Written: September 7, 2011 DNA testing has exonerated over 200 convicts, some of whom were on death row. Studies show that a substantial number of these miscarriages of justice involved scientific fraud or junk science. This article documents the failures of crime labs and some forensic techniques, such as microscopic hair comparison and bullet lead analysis. Some cases involved incompetence and sloppy procedures, while others entailed deceit, but the extent of the derelictions - the number of episodes and the duration of some of the abuses, covering decades in several instances - demonstrates that the problems are systemic. Paradoxically, the most scientifically sound procedure - DNA analysis - is the most extensively regulated, while many forensic techniques with questionable scientific pedigrees go completely unregulated. The regulation of DNA profiling, which developed gradually over the last twenty years, can serve as a model for other laboratory units. The accreditation of crime laboratories, the certification of examiners, the standardization and promulgation of written protocols for each technique would go a long way in professionalizing forensic science. In addition, quality assurance programs, including proficiency testing and external audits, should be mandated. Finally, forensic science commissions should be established in every jurisdiction to implement these and other reforms. Keywords: Wrongful convictions, forensic science, junk science, regulation of crime labs, DNA profiling, quality assurance programs, bullet lead analysis, microscopic hair comparison JEL Classification: K14, K42 Suggested Citation: Suggested Citation Giannelli, Paul C., Wrongful Convictions and Forensic Science: The Need to Regulate Crime Labs (September 7, 2011). North Carolina Law Review, Vol. 86, p. 163, 2007-2008; Case Legal Studies Research Paper No. 08-02. Available at SSRN: https://ssrn.com/abstract=1083735
<urn:uuid:691f22ba-76e6-44cf-86a9-4aa39c126c1a>
CC-MAIN-2017-39
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1083735
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690203.42/warc/CC-MAIN-20170924190521-20170924210521-00369.warc.gz
en
0.904132
390
2.671875
3
Roofing works are carried out when constructing new roofs, repairing or reconstructing existing roofs. Construction company «KMC» conducts them for any objects: residential buildings, commercial and industrial buildings, low-, medium-, high-rise buildings. - design: development of an architectural solution, calculation of structures, selection of materials, technologies for carrying out work, the formation of technical, estimate documentation, a work organization plan; - construction of a supporting structure: for flat or pitched roofs, from reinforced concrete slabs, metal profiles or beams, wooden beams, beams; - construction works: installation of insulating layers, installation of roofing, implementation of the main components of the roof; - installation of additional elements: drains, ventilation components, passage elements, safety elements; - repair: strengthening the supporting structure, replacing the elements of the roofing pie, repairing or replacing the coating. Technologies and materials Flexible roof. Bituminous tiles are used for pitched, domed, hip roofs. During its installation, a continuous flooring device is performed. The coating is laid on top of it on a layer of waterproofing or underlayment with mechanical fastening, gluing or fusing. Metal tiles and other sheet materials. They are laid on an ordinary crate with mechanical fastening. To perform the main units, additional elements and components are used. Piece materials. The tile is laid on a reinforced ordinary crate with mechanical fastening after the installation of the roofing pie. Rolled, built-up and other materials for flat roofs. They are laid on a solid base with gluing or fusing. Roofing works performed: Construction company «KMC» performs: - installation of new roofs for buildings under construction. It is possible to carry out work at any stage: installation of a supporting structure, installation of a roofing pie, laying a coating, installation of accessories, components, additional and other roofing elements; - roof reconstruction. It involves a change in its design, an increase in strength, the use of new materials as part of a roofing pie or for a coating device. During reconstruction, you can change the purpose of a flat roof: make it exploitable; - roof repair. It is carried out after examination of the existing roof, assessment of its condition. It is possible to replace or strengthen elements of the supporting structure, install new insulation, waterproofing films or membranes. During the repair, the old roofing is dismantled and the new roofing is laid. The type of coating can be changed (for example, lay bituminous tiles instead of profiled sheets). The construction company «KMC» performs roofing work with the conclusion of a contract. It is possible to organize the supply of the object: selection and supply of materials for roofing, equipment, machinery for work. Request a Quote You have questions? Ready to Work Together? If you want to get detailed advice — call us. Our specialist will help you find the right solution for your problem.
<urn:uuid:80848ab5-b847-411a-a779-7321b3865630>
CC-MAIN-2023-40
https://k-m-construction.com/services/roofing-works
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00679.warc.gz
en
0.912949
646
2.578125
3
Collaboration is Key This past week I was visiting classrooms and tweeting pictures of all the great things that are happening. Each time that I do this sort of thing I amazed at all the wonderful learning experiences our students are involved with on a consistent basis. It seemed like every classroom I walked into students were collaborating on some sort of activity, lab, or assignment. The teachers were being the "guide on the side" rather than the "sage on the stage." This sort of collaborative learning environment helps tremendously as we look to prepare students for the future. Hands on activities in any subject area is the way to go in my book. Below you will see some of our students in action as they make sense of their learning in a collaborative and hands-on environment. Brad Currie is the author of All Hands on Deck: Tools for Connecting Educators, Parents, and Communities. He is one of the founding partners of Evolving Educators LLC. Brad is an ASCD Emerging Leader, Bammy Award Finalist, ClassDojo Thought Leader and Google Certified Educator. He currently serves as a K-8 Supervisor of Instruction and Middle School Vice Principal for the Chester School District in Chester, NJ. Learn more about Brad by following him on Twitter @bradmcurrie or visiting his website at www.bradcurrie.net. 1/18/2015 02:38:34 am Great pics! Thanks for being a leader in the positive use of Twitter for collaboration. We need more leaders to take the reins. Removing the fear is key! Social media is a tool and it can be used in productive and engaging ways. Way to go! 1/20/2015 06:32:11 pm Thanks for the kind words Kelley. Keep fighting the good fight! Leave a Reply.
<urn:uuid:19fd5a4f-4b45-4f8f-ac30-0e64ef867e2c>
CC-MAIN-2023-23
https://www.thebradcurrie.com/blog/collaboration-is-key
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00480.warc.gz
en
0.957392
415
2.828125
3
We received a free product for the purpose of writing this review. Our family only reviews items that we actually find valuable and are able to be 100% honest about regarding our experience. We received no monetary compensation for our opinion. Links contained in this post may direct to affiliate sites. It’s a shame that the idea of teaching logic– and I’m talking actual logic here, not “critical thinking”– has fallen out of vogue in modern education. Take a casual glance at media outlets and social platforms and you’ll be greeted with dozens of situations crying out for the application of some very elementary-level rebuttals and yet … there are so few people with the know-how to identify what’s wrong with the group think being offered up around the world today. It’s a little depressing out there, folks. I’m not a hardcore Classical educator, but I believe in the purposeful teaching of logic as an independent discipline. It’s usefulness was apparent to me when my oldest children were barely school-age, and prickling at being called to task for misbehavior. Me: “I can see you’re angry right now.” Me: “That makes sense. I’d be angry, too.” Child (slightly disarmed): “You would be?” Me: “Absolutely. But let me ask you a question– with whom should you be angry?” Me: “Because I disobeyed the hard and fast rule?” Child (confused): “Nooooo….” Me: “But you are angry with me. I must have done something wrong.” Child: “You… you…” Me: “Who actually broke the rules here?” Child (thinking): “Ummm… me.” Me: “Right. So you should be angry at ….?” Child (admitting defeat): “Myself.” I can’t tell you how many times I have had that exact conversation with pretty much every.single.one of my children. It’s pretty banal at this point. And yet … it smacks of the root of what’s wrong with the arguments of our entire nation, I think. We can’t identify a fallacy if it bites us on the bum. Got in trouble? It’s the fault of the rule enforcer. Want something to be true? Repeat it until it sounds right. Want to know the best outcome? Insist that a poll of your peers will suffice. Want to ensure results? Limit choices. Uncomfortable with legislation? Let your feelings lead the way. So what’s a homeschooler to do? If, like me, you attended public school, the learning curve will be steep indeed. There are magnificent formal logic tools available on the curriculum market. But what if you’d like something slightly less structured? Something conversational, instructive, engaging, and entertaining all at once. I’ve got you covered: The Amazing Dr. Ransom’s Bestiary of Adorable Fallacies, by Douglas Wilson and N.D. Wilson. Seriously, this is one of those books that ought to find a home on the shelf of every homeschooler if only as a reference, something to be pulled down and flipped through whenever an obvious bit of obnoxious illogical thinking finds its way into your ears. Written in a casual yet not dumbed-down style, The Bestiary (as it’s known here) adds an element of zoomorphism to the missteps of logic that run rampant in the presenting of facts. This fallacy, in a nutshell, wants you to see things its way or it will beat you with a stick. Now a stick is one way to do it, but this may be extended metaphorically to any number of artificially arranged consequences of negative nature. If one looks at the size of the Whooping Beetle’s forelegs, it looks at those this pugnacious little critter really can fulfill his threats — although most of the time just the threat is good enough. Each short chapter gives an introduction to an elaborately illustrated “beast” whose appearance is, indeed, adorable. A fictitious example of interaction with the fallacy invariably leads to the fallacy revealing its true nature— and this is the part your children won’t forget. The reek of the Red Herring. The squid-like pull of Compromise. The assault-at-the-ready of the Loaded Question. With these images stored away in their memory, children (and adults!) can more easily access the truth behind an argument laden with fallacy … and fend it off. Like any great resource, The Amazing Dr. Ransom’s Bestiary of Adorable Fallacies is flexible. Each chapter is followed by a handful of discussion questions, as well as exercises in identifying fallacies. Those exercises build on one another; the fallacies presented in the statements can be from any previous chapters as well as the current. Fifty fallacies are presented overall, and an answer key is located at the back of the book. Two schedules for study are suggested in the appendix. A homeschooling parent might present this book to their student for independent study, or utilize it in a one-on-one instruction time with current events at the ready. Our family has chosen a third option. We’ve giggled our way through our “older group” evening read-aloud time with The Bestiary, laughing at the over-the-top examples, but finding more than adequate fodder in society and history to keep a passionate discussion going for well over an hour. You won’t be surprised at all to find that an inventive, engaging book like this is part of one of Timberdoodle’s Complete Homeschool Curriculum Kits (10th grade, specifically). Taking a needful topic and finding an out-of-the-box way to educate— not just teach— is their specialty! Want a copy of The Amazing Dr. Ransom’s Bestiary of Adorable Fallacies of your own? Timberdoodle is graciously giving away a copy to TWO readers of To Sow a Seed. Enter below for your chance to win! a Rafflecopter giveaway
<urn:uuid:645cc5d9-2cb0-4550-a482-f80be1c00b18>
CC-MAIN-2017-34
http://www.tosowaseed.net/2016/05/20/the-amazing-dr-ransoms-bestiary-of-adorable-fallacies-review-giveaway/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104172.67/warc/CC-MAIN-20170817225858-20170818005858-00317.warc.gz
en
0.939723
1,353
2.546875
3
We switched to using Beautiful Feet guides for history earlier this year, and we have been so happy with it. If you're not familiar with how Beautiful Feet guides work, let me try to explain just a little bit. We're currently using the Ancient History study guide, which is broken up into three sections: Ancient Egypt, Ancient Greece, and Ancient Rome. For each section there's a set of living books that is studied. You can buy the books as a set from Beautiful Feet, but I was able to pick up most of the books used, and a few I actually had on hand already. The guide is further broken up into lessons, one or two of which should be completed each week. Each lesson includes specific readings from the books. Some lesson also include vocabulary words, discussion questions, and mapping activities related to the subject being studied. The readings are organized in a very understandable, usually chronological order, so instead of reading all of one book and then moving on to the next book, sections from several books may be read simultaneously so that the same topic is covered all at once. Here's an example of one of the lessons from the Ancient History study guide: 1. Read The Children's Homer chapters VI-VIII a. When Paris was born, what was prophesied about him? b. Why did King Agamemnon join the fight against the Trojans? 2. Read Streams of Civilization chapter 6 to page 122. 3. Read Ancient Greece pages 20-29. 4. Read "Tantalus and Pelops" (a story of the Olympics) in D'Aulaire's Greek Myths, pages 112-113. 5. Cut out, color, and paste on timeline "First Olympic Games" There's a lot of flexibility with Beautiful Feet, but that flexibility doesn't mean I have to spend a ton of time preparing anything. I only have to make sure I have the books available and the occasional map printed out. Other than that, it's basically plug and play — just read the next assigned reading aloud to the kids and discuss it. For the last two years we used Story of the World, and we successfully completed all four books in that time. My kids and I learned so much from SOTW and we all looked forward to history time every day. But now that we're using Beautiful Feet, we've all fallen in love with history even more since we're reading more than just that single textbook—we're reading lots of living books, and the stories of history are really coming alive more than ever before. It's just a richer study of history. Beautiful Feet is a refreshing reminder that history is not about dates and locations; it's about the people in history, their character, their decisions, and their role in the bigger picture of history.
<urn:uuid:bdf9af60-54e7-40e2-b2bb-181dd8538d76>
CC-MAIN-2013-20
http://fivejs.com/i-think-im-addicted-to-beautiful-feet/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708835190/warc/CC-MAIN-20130516125355-00098-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97058
579
2.59375
3
Date: Feb. 18, 2003 Contacts: Christine Stencel, Media Relations Officer Chris Dobbins, Media Relations Assistant Office of News and Public Information (202) 334-2138; e-mail <[email protected]> For Immediate Release Report Confirms Earlier Findings on Links Between Health Effects and Insecticides and Solvents Used in Gulf War WASHINGTON -- A comprehensive assessment of the available scientific literature largely reaffirms what is known already about specific human health effects that have been associated with insecticides and solvents used during the Persian Gulf War. There is some evidence -- usually limited -- to link certain long-term health problems with exposures to a few specific insecticides or solvents, says a new report from the Institute of Medicine (IOM) of the National Academies. However, for the majority of solvents and insecticides that have been studied, there is not enough epidemiologic evidence to determine whether associations exist between diseases and exposures to these chemicals. "Our exhaustive examination of the literature produced no unexpected findings," said Jack M. Colwill, emeritus professor of family and community medicine, University of Missouri, Columbia, and chair of the committee that wrote the report. "Our conclusions about exposure to insecticides and solvents and long-term health problems largely mirror those reached by many other scientific groups. While we would like to have more definitive answers to questions about the specific diseases that may be associated with these chemicals, in most cases the evidence simply is not strong enough or does not exist." The committee evaluated the published, peer-reviewed research on exposure to various insecticides and solvents -- such as cleaning agents -- for any evidence of links to specific cancers, neurological effects, or other health problems that occur or persist after exposure. Of the 3,000 studies the committee reviewed, most involved individuals who were exposed to these agents in occupational settings such as agricultural and industrial sites. Only a small number actually studied veterans who may have been exposed while serving in the Persian Gulf. Toxicology studies conducted in animals also were reviewed, but played only a supportive role in this assessment. The insecticides and solvents used during the Gulf War were agents that have also been used domestically for industrial and personal applications. Insecticides and repellents, primarily DEET and permethrin, were applied by service members to control insects that can carry infectious diseases endemic to the area, such as malaria and leishmaniasis. Personnel came into contact with solvents during activities such as equipment cleaning and vehicle maintenance and repair. However, little information exists on the use of insecticides or solvents by individual service members, and how that use may have differed from stateside use or exposure. Because scant information exists on actual exposure levels -- a critical factor when assessing health effects -- the committee emphasized that it could not draw specific conclusions about the health problems of Gulf War veterans. Veterans who have experienced chronic health problems following their service in the Persian Gulf are asking whether exposure to various chemical or biological agents might be responsible. Thousands of troops did come in contact with a number of agents before, during, and after the war. The U.S. Department of Veterans Affairs initially requested an IOM study of potentially harmful chemical, biological, or environmental agents to which Gulf War veterans might have been exposed. Congress subsequently mandated a similar study, listing several specific agents. This report on insecticides and solvents is the second in a series from the IOM that responds to these requests. The first report focused on depleted uranium, pyridostigmine bromide, sarin, and vaccines. The next report will examine the health effects of exposure to selected environmental pollutants and particulates, such as smoke from oil-well fires, diesel heater fumes, and jet fuels. Weighing the Evidence The committee carefully assessed the quality, limitations, and applicability of each epidemiologic study it evaluated and used five categories to describe the strength of all the evidence. Sufficient evidence of a causal relation, the strongest level of evidence, means that many studies have established a clear link between exposure to an agent and a health outcome. Among the other requirements, there must be a plausible biological explanation for the relationship. Evidence that establishes a link between exposures and a health outcome with reasonable certainty, but fails to meet the higher standard of proof needed for causality, is characterized as sufficient evidence of an association. When a limited number of studies suggests that a link exists, but without reasonable certainty, the evidence is said to be limited or suggestive of an association. If several studies of adequate quality consistently fail to show a positive association at any level of exposure, the evidence is described as limited or suggestive of no association. Evidence that lacks sufficient quality, consistency, or statistical power to draw any conclusion is judged to be inadequate or insufficient to determine whether an association exists. The majority of the evidence for insecticides and solvents fell into this final category. Benzene and Cancer The only clear causal relationships that the committee found between health effects and these chemicals were the well-established links between the solvent benzene and acute leukemia and aplastic anemia. Benzene has long been recognized as a cancer-causing agent by all major national and international public health organizations. The committee had no data on the extent of Gulf War personnel's exposure to benzene, but it was likely to have been of shorter duration than the years of exposure typical of occupational workers who were the focus of the available studies. Benzene was also confirmed to be associated with adult leukemia, although a direct causal link could not be determined. Other Health Links Most of the other health effects associated with exposure to insecticides or solvents were not as clear-cut. The committee found limited or suggestive evidence that a few of these chemicals, including benzene and organophosphorous (OP) and carbamate insecticides, may be associated with non-Hodgkin's lymphoma. Neither DEET nor permethrin, the pest-control agents most commonly used during the Gulf War, are members of these insecticide classes. In addition, limited evidence suggests that tetrachloroethylene and other dry-cleaning solvents are linked to bladder and kidney cancer. Solvents in general appear to have some connection to adult leukemia. Neurobehavioral problems, such as fatigue, pain, loss of concentration, forgetfulness, and headaches, are some of the most common complaints of Gulf War veterans. These health effects appear to have a limited association with solvents in general and with OP insecticides in cases where exposure is high enough to be immediately life threatening. For lower levels of OP insecticide exposure, the committee could not reach full agreement on whether there is a link to neurobehavioral effects in human studies. OP insecticides are similar to the chemical nerve agent sarin, which was reviewed by the committee in its first report issued in 2000. That report also found limited or suggestive evidence of neurobehavioral effects after exposure to sarin at levels that would produce immediate signs and symptoms. There was insufficient or inadequate evidence to determine whether DEET and permethrin have long-term health effects in humans. The committee did not look at whether a combination of DEET or permethrin and pyridostigmine bromide, a drug given prophylactically to protect against nerve gas, could cause adverse health effects because there are no relevant studies in humans. Moreover, most human studies analyze the possible effects of individual substances only. More research is needed on the possible outcomes of exposures to combinations of different agents, the report says. There was insufficient or inadequate evidence to associate any insecticides or solvents with neurological diseases such as amyotrophic lateral sclerosis (ALS), Parkinson's disease, or Alzheimer's disease. There also is not enough evidence to determine whether any association exists between insecticides or solvents and breast and uterine cancers. However, the committee could not reach agreement on the possible relationships between cervical cancer and trichloroethylene, between benzene and cancers of the brain or central nervous system, and between exposure to solvents and the development of leukemia in children later born to the exposed individuals. In each case, the committee members differed on whether the available epidemiologic evidence was sufficient to suggest a possible association or was inadequate to point to a link. The study was sponsored by the U.S. Department of Veterans Affairs. The Institute of Medicine is a private, nonprofit institution that provides health policy advice under a congressional charter granted to the National Academy of Sciences. A committee roster follows. Read the full text of Gulf War and Health Volume II: Insecticides and Solvents for free on the Web, as well as more than 2,500 other publications from the National Academies. Printed copies are available for purchase from the National Academies Press Web site or by calling (202) 334-3313 or 1-800-624-6242. Reporters may obtain a pre-publication copy from the Office of News and Public Information (contacts listed above)." INSTITUTE OF MEDICINE Board on Health Promotion and Disease Prevention Committee on Gulf War and Health: Literature Review of Pesticides and Solvents Jack M. Colwill, M.D. (chair) Professor Emeritus School of Medicine University of Missouri Columbia Samuel J. Potolicchio, M.D. (vice chair) Professor Department of Neurology George Washington University Medical Center Washington, D.C. Ann Aschengrau, Sc.D. Professor Department of Epidemiology Boston University School of Public Health Boston Lorne A. Becker, M.D. Chair Department of Family Medicine Upstate Medical University State University of New York Syracuse Deborah A. Cory-Slechta, Ph.D. Professor and Chair Department of Environmental Medicine University of Rochester Rochester, N.Y. William E. Daniell, M.D., M.P.H. Associate Professor Department of Environmental Health School of Public Health and Community Medicine University of Washington Seattle Marion F. Ehrich, Ph.D. Professor Virginia-Maryland Regional College of Veterinary Medicine Virginia Polytechnic Institute and State University Blacksburg Manning Feinleib, M.D., Dr.P.H. Professor of Epidemiology Johns Hopkins Bloomberg School of Public Health Baltimore Robert G. Feldman, M.D. Professor of Neurology Boston University School of Medicine Boston Mark S. Goldberg, Ph.D. Associate Professor Department of Epidemiology and Biostatistics McGill University Montreal, Quebec Canada Lynn R. Goldman, M.D., M.P.H. Professor Johns Hopkins Bloomberg School of Public Health Baltimore Rose H. Goldman, M.D., M.P.H. Associate Professor of Medicine Harvard Medical School, and Associate Professor Department of Environmental Health Harvard School of Public Health Boston Ronald Goldner, M.D. Clinical Professor of Dermatology University of Maryland School of Medicine Baltimore David F. Goldsmith, M.S.P.H., Ph.D. Associate Research Professor George Washington University Washington, D.C. Cynthia Harris, Ph.D., D.A.B.T. Director and Associate Professor College of Pharmacy and Pharmaceutical Sciences Florida A&M University Tallahassee Russ B. Hauser, M.D., Sc.D., M.P.H. Assistant Professor Occupational Health Program Harvard School of Public Health Boston Janice L. Kirsch, M.D., M.P.H. Study Oncologist and Researcher Northern California Childhood Leukemia Project University of California Berkeley Anthony L. Komaroff, M.D. Professor of Medicine Harvard Medical School Boston Michael L. Lefevre, M.D., M.S.P.H. Director of Clinical Services Department of Family and Community Medicine School of Medicine University of Missouri Columbia Richard Mayeux, M.D. Gertrude H. Sergievsky Professor of Neurology, Psychiatry, and Public Health Columbia University New York City Stephen A. McCurdy, M.D., M.P.H. Associate Professor of Medicine University of California Davis Sandra Mohr, M.D., M.P.H. Former Residency Director Division of Environmental and Occupational Health National Jewish Medical and Research Center Denver Toshio Narahashi, Ph.D., D.V.M. John Evans Professor of Pharmacology, and Alfred Newton Richards Professor of Pharmacology Northwestern University Chicago Leena A. Nylander-French, Ph.D. Assistant Professor Department of Environmental Sciences and Engineering University of North Carolina Chapel Hill Michael O'Malley, M.P.H. Staff Physician Employee Health Service University of California Davis Charles Poole, M.P.H., Sc.D. Associate Professor Department of Epidemiology University of North Carolina Chapel Hill Carrie A. Redlich, M.D., M.P.H. Associate Professor Department of Medicine Occupational and Environmental Medicine Program Yale University School of Medicine New Haven, Conn. Joseph V. Rodricks, Ph.D. Principal Environ Inc. Arlington, Va. Kenneth D. Rosenman, M.D. Professor Department of Medicine Michigan State University East Lansing Mary Ann Smith, Ph.D. Assistant Professor School of Public Health University of Texas Houston Anne M. Sweeney, Ph.D. Associate Professor School of Rural Public Health Texas A&M University Bryan Patrick R.M. Thomas, M.D. Radiation Oncologist Bardmoor Cancer Center Largo, Fla. William M. Valentine, Ph.D., D.V.M. Associate Professor Department of Pathology Vanderbilt University Medical Center Nashville, Tenn. John E. Vena, Ph.D. Professor Department of Social and Preventive Medicine, and Director Environmental and Society Institute University of Buffalo Buffalo, N.Y. Laura Stewart Welch, M.D. Director Occupational and Environmental Medicine Washington Hospital Center Washington, D.C. Christina Wolfson, Ph.D. Associate Professor Department of Epidemiology and Biostatistics McGill University Montreal, Quebec Canada Tongzhang Zheng, M.D. Associate Professor Division of Environmental Health Sciences Yale University School of Public Health New Haven, Conn.
<urn:uuid:83cf6677-31d4-4bff-a15a-f156f2df83af>
CC-MAIN-2017-26
http://www8.nationalacademies.org/onpinews/newsitem.aspx?RecordID=10628
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320270.12/warc/CC-MAIN-20170624170517-20170624190517-00304.warc.gz
en
0.928028
2,956
2.515625
3
|A sleep queue used to implement condition variables.| |SLEEPQ_SLEEP||A sleep queue used to implement sleep(9), wakeup(9) and wakeup_one(9).| |SLEEPQ_PAUSE||A sleep queue used to implement pause(9).| There are currently two optional flag: |The current thread is entering an interruptible sleep.| |When thread is entering an interruptible sleep, do not stop it upon arrival of stop action, like SIGSTOP. Wake it up instead.| A timeout on the sleep may be specified by calling sleepq_set_timeout after sleepq_add. The wchan parameter should be the same value from the preceding call to sleepq_add, and the sleep queue chain associated with wchan must have been locked by a prior call to sleepq_lock. The timo parameter should specify the timeout value in ticks. argument instead of It allows to specify relative or absolute wakeup time with higher resolution in form of .Vt sbintime_t . The parameter pr allows to specify wanted absolute event precision. The parameter flags allows to pass additional callout_reset_sbt flags. Once the thread is ready to suspend, one of the wait functions is called to put the current thread to sleep until it is awakened and to context switch to another thread. The sleepq_wait function is used for non-interruptible sleeps that do not have a timeout. The sleepq_timedwait function is used for non-interruptible sleeps that have had a timeout set via sleepq_set_timeout. The sleepq_wait_sig function is used for interruptible sleeps that do not have a timeout. The sleepq_timedwait_sig function is used for interruptible sleeps that do have a timeout set. The wchan argument to all of the wait functions is the wait channel being slept on. The sleep queue chain associated with argument wchan needs to have been locked with a prior call to sleepq_lock. The pri argument is used to set the priority of the thread when it is awakened. If it is set to zero, the threads priority is left alone. When the thread is resumed, the wait functions return a non-zero value if the thread was awakened due to an interrupt other than a signal or a timeout. If the sleep timed out, then EWOULDBLOCK is returned. If the sleep was interrupted by something other than a signal, then some other return value will be returned. A sleeping thread is normally resumed by the sleepq_broadcast and sleepq_signal functions. The sleepq_signal function awakens the highest priority thread sleeping on a wait channel while sleepq_broadcast awakens all of the threads sleeping on a wait channel. The wchan argument specifics which wait channel to awaken. The flags argument must match the sleep queue type contained in the flags argument passed to sleepq_add by the threads sleeping on the wait channel. If the pri argument does not equal -1, then each thread that is awakened will have its priority raised to pri if it has a lower priority. The sleep queue chain associated with argument wchan must be locked by a prior call to sleepq_lock before calling any of these functions. The queue argument specifies the sub-queue, from which threads need to be woken up. A thread in an interruptible sleep can be interrupted by another thread via the sleepq_abort function. The td argument specifies the thread to interrupt. An individual thread can also be awakened from sleeping on a specific wait channel via the sleepq_remove function. The td argument specifies the thread to awaken and the wchan argument specifies the wait channel to awaken it from. If the thread td is not blocked on the wait channel wchan then this function will not do anything, even if the thread is asleep on a different wait channel. This function should only be used if one of the other functions above is not sufficient. One possible use is waking up a specific thread from a widely shared sleep channel. The sleepq_sleepcnt function offer a simple way to retrieve the number of threads sleeping for the specified queue, given a wchan. The sleepq_type function returns the type of wchan associated to a sleepqueue. The sleepq_abort, sleepq_broadcast, and sleepq_signal functions all return a boolean value. If the return value is true, then at least one thread was resumed that is currently swapped out. The caller is responsible for awakening the scheduler process so that the resumed thread will be swapped back in. This is done by calling the kick_proc0 function after releasing the sleep queue chain lock via a call to sleepq_release. The sleep queue interface is currently used to implement the sleep(9) and condvar(9) interfaces. Almost all other code in the kernel should use one of those interfaces rather than manipulating sleep queues directly.
<urn:uuid:2f582ecb-da48-4cde-ac7a-7f336fde198a>
CC-MAIN-2017-30
http://gsp.com/cgi-bin/man.cgi?section=9&topic=init_sleepqueues
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426372.41/warc/CC-MAIN-20170726182141-20170726202141-00516.warc.gz
en
0.839497
1,036
2.71875
3
F-M High School Art Department The Art Department recognizes the role art plays in the core curriculum at all levels. Art is essential to a well-rounded education and the development of creative thinking and strong visual and perceptual skills. The visual arts communicate human ideas, understanding, and perspective in ways that cannot be expressed using any other means. The art program is designed to contribute to and foster each student's individuality and to bring each student to places of beauty, understanding and tolerance. Through the experiences of creating, understanding, and valuing human expression, students develop skills that enhance their community and personal lives. Please click on a link for more information
<urn:uuid:ab38b8d4-20d7-402f-9ae6-aa8f649460d0>
CC-MAIN-2013-20
http://[email protected]/arts.cfm?subpage=16705
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706009988/warc/CC-MAIN-20130516120649-00075-ip-10-60-113-184.ec2.internal.warc.gz
en
0.915773
133
2.6875
3
Size: Height 5 to 7 ft. at the shoulder, length 7 to 14 ft., weight 3,300 to 6,000 lbs. Area: India, Nepal. Offspring: One calf, every two to three years. · All five rhino species are threatened with extinction and are included in the IUCN Red List. · Rhinoceros: from Greek, meaning nose and horn; unicornis: from Latin meaning one horn. · The Indian rhino and the African white rhino are the largest land mammals (after elephants). · Rhinos have approximately 10 vocalisations, including roars, snorts, and honks. · They’re believed to have lived in America, but became extinct there many years ago. The Indian rhinoceros is a solitary animal, usually only found together when mating or when a mother has a dependent youngster (or two), although they do meet up at common watering and/or wallowing areas. In Java, rhinos live in forested areas but can be found grazing in grassy areas near rivers or swamps. They roll in mud at wallows to coat themselves all over for protection from the sun and from parasites. They eat a large variety of plants, including elephant grass, fruit, bamboo shoots, flowers and crops. Despite its vegetarian diet, the rhino has two long canine teeth in its lower jaw. Rhinos have a special front lip to enable them to grasp food. Both male and female rhinos have a single horn that is made of keratin, the same material found in human fingernails, and is highly valued in Chinese medicine. Each rhino has a territory of approximately 5 to 20 square miles, but their ranges overlap and they’re very tolerant of each other. Although rhinoceroses, especially the black rhino, are thought of as being aggressive and dangerous, but actually, they’re usually quite peaceful and shy, except when threatened. When angered or frightened, they charge at the danger and in that case, can be extremely dangerous. Although rhinos have poor eyesight, they have excellent hearing and sense of smell. Although the Indian rhinoceros once ranged throughout Southeast Asia, most of the wild population today is found only in protected areas in India and Nepal. Despite the fact that they’re protected, the high prices (up to $60,000 for one kilogram of rhino horn) paid on the black market for their horns ensure that poaching remains a frequent occurrence. Four of the five rhinoceros species are nearing extinction because of this, even though studies show there is no scientific proof to the claims made about any medicinal qualities of rhino horn. The wild Indian rhino population now numbers approximately 1,500 and projects are underway to reintroduce populations to areas where they have been extirpated. One Nepal rhino population is protected by almost two guards for every rhino, and this kind of protection is has led to an increase of numbers in the last century (there were only 200 Indian rhinos in the wild in 1900). There is no set mating season—mating may occur at any time throughout the year. The pregnancy lasts 15 to 16 months, and the female takes shelter in thick cover when she is due. After giving birth, the mother produces five to seven gallons of milk per day to feed her calf, which weighs up to 150 pounds. The baby nurses from 12 to 18 months, but begins to graze at two months, and may stay with its mother even after she has given birth to a younger sibling. Young Indian rhinos are sexually mature as early as four years for females, and nine years for males. An Indian rhino may live up to 50 years.
<urn:uuid:dacca928-9eff-49bd-b3f6-5859143061dc>
CC-MAIN-2017-43
http://www.robstewartphotography.com/facts/Indianrhino.asp?i_id=394
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822966.64/warc/CC-MAIN-20171018123747-20171018143747-00058.warc.gz
en
0.960333
767
3.390625
3
Given the recent negative publicity surrounding dental X-rays and brain tumors, our recent The Wealthy Dentist survey covered whether dental practices will change how they use X-rays. “According to a recent study, dental X-rays may be linked with brain tumors. Will this news change how your practice uses X-rays?” Here’s how dentists responded: - 66%: Definitely no! - 25%: Not at this point, although this study has led us to consider it. - 9%: Yes, we will be changing our X-ray protocols. “This study is highly flawed. The number of cancers per population is so small. You could die from an abscess more than your chance of getting this cancer. I read there are 5000 cancers per 350 million people?” But some dentists did take the X-ray study into consideration – “We will take this opportunity to reinforce our office position as an industry leader in all phases of patient safety.” (General dentist) “It’s quite possible, some correlation between brain tumors and old ways to take X-rays. Let’s don’t forget we went from regular films to high speed to a digital generation decreasing every time the amount of radiation.” (Florida dentist) “We use digital X-rays and take updated X-rays only when necessary.” (Ohio dentist) “We are using digital radiographs and feel that we do everything possible to minimize unnecessary exposure.” (Texas dentist) “I believe we have to make the right choices for our patients: how often – how many medical conditions. We also have to look at our society and what devices we use on a regular basis: cell phones, microwaves, electric blankets, TVs, air plane flights, not to mention our landfills loaded with hazardous materials. With technology comes risks but also life-saving devices and techniques.” (Massachusetts dentist) “We decided on digital films prior to this announcement.” (General dentist) “IF the study is correct, it will certainly affect the number of radiographs a dentist will record.” (Pediatric dentist) “We’ve been doing the 18 mos to 2 yrs for many years. Only a select few of our dental patients require more frequent radiographic diagnosis.” (Arizona dentist) “Further thoughts, yes, on this study that was flawed in concept.” (Oklahoma dentist) “I’ve used a digital sensor for over a dozen years and have always been ultra-conservative in ordering X-rays based on the dental patient’s current and past oral conditions, not on a fixed timetable.” (Illinois dentist) “We already stretch the limits on our X-rays and consider the history of the patient in doing so.” (California dentist) “We are empowering our clinical team with information so that they may respond to concerns from patients. We also posted our rebuttal on our Website and Facebook page. We preform x-rays annually and/or on as needed basis.” (West Virginia dentist) “Should always practice conservatively and limit taking dental (or chest) X-rays to the minimum at all times. I do not agree with taking X-rays ROUTINELY.“ (California dentist) 251 dentists responded to this survey by The Wealthy Dentist. To hear what the more agitated dentists had to say about the dental X-ray and brain tumor debate, see last week’s article, Dentists React To Dental X-ray Brain Tumor Study as Flawed Science. What are your thoughts on the dental X-ray and brain cancer debate?
<urn:uuid:d1ec9d7b-1689-419e-82a6-e37f76210dff>
CC-MAIN-2013-48
http://www.thewealthydentist.com/blog/3064/more-dentists-weigh-in-on-the-dental-x-ray-and-brain-tumor-debate/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163069032/warc/CC-MAIN-20131204131749-00087-ip-10-33-133-15.ec2.internal.warc.gz
en
0.928895
795
2.796875
3
Motivation in the classroom The quest for knowledge is a lifelong The quest for knowledge is a lifelong objective for many people. Being motivated to learn, for some students, may come naturally while other students may need inspiration and special challenges to stay focused. As an instructor, we can do many things to motivate our students. Some things that may factor into motivation include the needs of the student and their desire to learn, organization of the classroom, involvement of the students, and instructor's enthusiasm. Why do students want to learn' In most cultures, young students go to school because they have a need to learn and it is the natural path that is laid out for them. For adult students the needs vary. According to an article on What Motivates People to learn, adult needs include 'Goal Oriented (persuing identified objectives), Learning Oriented (learning for the love of it), and Activity Oriented (learning for reasons unconnected with the program or content)'. Needs can often motivate the desire to learn. Adult learners are likely to be more motivated because they have made the conscious decision to participate in the learning process. Another motivating factor is organization in the classroom. According to an article on Classroom Environment: The Physical Environment, 'Warm, well-run classrooms begin with the room´s physical layout ' the arrangement of desks and working space, the attractiveness and appeal of bulletin boards, the storage of materials and supplies.' The physical environment is a reflection of the teacher and can be used to motivate students. When students are comfortable in their environment they will have a better learning experience. According to an article on Ideas for Motivating Students, 'One of the major keys to motivation is the active involvement of students in their own learning. Standing in front of them and lecturing to them (at them') is thus a relatively poor method of teaching. It is better to get students involved in activities, group problem solving exercises, helping to decide what to do and the best way to do it, helping the teacher, working with each other, or in some other way getting physically involved in the lesson.' A reward of practicing this style of teaching is that students often bring knowledge of their own to the class and it helps to keep the lessons interesting. As an instructor, we can motivate our students with our own enthusiasm for the lessons we are teaching. According to Robert Harris, 'if you can make something fun, exciting, happy, loving, or perhaps even a bit frightening, students will learn more readily and the learning will last much longer.' Instructors who take a unique approach to teaching and present lessons that are fun and exciting will do a great justice in making lasting impressions on their students. Because there are such a variety of students, each with their own set of needs and abilities, no single method of motivation can be considered the answer for all students. Understanding that all individuals are unique and remaining open to adapt to the needs of individuals, an instructor will be better prepared to motivate students to achieve their goals. http://www.niace.org.uk/information/Briefing_sheets/motivationjan99.h tm http://teacher.scholastic.com/professional/futureteachers/classroom_o rganization.htm http://www.virtualsalt.com/motivate.htm http://www.virtualsalt.com/motivate.htm
<urn:uuid:9d9c6ee9-497e-476a-93a3-b4551a2453bc>
CC-MAIN-2020-29
https://www.teflcorp.com/articles/esl-resources/motivation-in-the-classroom-117/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896905.46/warc/CC-MAIN-20200708062424-20200708092424-00534.warc.gz
en
0.957333
694
3.75
4
This wordlist is generally used by students preparing for GRE. Short Definition : small round piece of medicine; flat piece of stone or metal bearing an inscription; Ex. stone tablet on the wall A Gazzette (newspaper) is also a Tablet because it has a number of sheets folded into one place. tab(computer) is to review files and let is to go in so tab+let will relate to allowing it to go into ur body to fight a disease tab means decoration and let(letter) decorate with letters on a stone Short Definition : understood (without actually being expressed); not put into words; Ex. tacit agreement tacit= take + it or you will have to take something which is not expresssed... Tacit - Change the word to Tact - You tactfully (with perfection)handled the situation even without expressing it in words (tacit). break it as taci -t = taxi ..when u r waiting on road side . it implied, understood without being expressed that you need taxi Example for Tacit is Mr.Bean's Action,who used to laugh a lot with out speaking a word Mr.Bean is a tacit Actor :) pushpaka vimanam is a movie in which kamalhasan acted,it is movie full of tacit no single word or dialogue,its full of actions Short Definition : habitually silent; talking little Taxi_turn Taxi Driver will be reserved or uncommunicative while "Driving". meaning of tacit = silent. so meaning of tacit + urn = taciturn = silent person , untalkative akin to tacit which means "without words". Taciturn and Reticent are somewhat similar in sound and they also have the same meaning, which is, someone who uses words sparingly, is reserved. taciturn is uncommunicative;1 who talks little its anotnym being garrulousness Ben loves soccer and tennis. He also enthusiastically plays ping-pong and frisbee golf. Short Definition : skill or sensitivity in dealing with people without causing offence tact= t(=talent)+ act ... so, if you want to show your talent, you need to have the tact to put your act together. just one word we need for explanation "tactic" Short Definition : careful no to cause offence; OP. tactless tact+ful...one who know all the tact to persuade people will never cause any offense to any one . Short Definition : pertaining to the organs or sense of touch CON-tact - If you are in contact with something, you are in touch with it and hence it is tactile. It sounds similar to Reptile(class of animals e.g Snake).Now this animals e.g snake are quite sensitive or react suddenly when see something .thus quite sensitive and as we can't touch them so related to touch. tactile sounds like textile, we are in constant touch of clothes, it implies the meaning Short Definition : contaminate; cause to lose purity; modify with a trace of something bad; Ex. tainted reputation; N: stain; touch of decay or bad influence; CF. touch Think of situation, where you are expelled from city because of u lost purity or bcoz of bad repute then u need to stay out of city, in a tent(taint). taint is similar to faint.. when u faint it means u have some thing impure.. ie taint is a getting impure,contaminate Paint on sth is to increases beauty but TAINT on sth DAMAGES BEAUTY Short Definition : burlesque; act of leaving the ground Take off is like Mock. The play was a take off on Bollywood's melodrama. It was a mock play. Short Definition : charm; object believed to give supernatural powers to or protect its bearer Talisman sounds like Tilism(hindi word), which also refers to a magical charm (most probably a locket or an amulet) that helps protect its bearer. Powered by Mnemonic Dictionary It sounds similar to tulsi(a Holy Plant).whenever we go for certain exam it is given hoping that luck would be with us .bcoz it is pure and holy and this plant holds extreme importance to indians tal(l)+is+man; if a man is tall he is lucky as girls get attracted towards him. Remember Gandhiji talisman when unhappy ,u have think of poor person. there is a word in telugu called "talittu" which will be hanged in the necks of small childern which prtects them from some harm.......... "tali" a jewel which usually hangs in the neck of married woman as a sign of holy ness and it is also loke a kind of jewel Short Definition : claw of bird Falcon depends upon its Talon (claw of a Bird), while on hunting talon ~ laton ~ legs. claws are in legs only. ;) its my hobbie to make soft toys in free time....so when i was making a falcon soft toy , i had forgot to put his TAIL ON the backside of his body and also forgot to put his sharp TALON....i m too forgetful!!!.........:D bird ke talwe meaning panjey In talon,peer at "t" it resembles claw of a bird talon - the 'taal' of a 'lion'.. like the claws of a lion but in a bird
<urn:uuid:13b44dc6-f64a-463f-8713-a8f94195217b>
CC-MAIN-2020-05
https://mnemonicdictionary.com/wordlist/GREwordlist/startingwith/T
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250590107.3/warc/CC-MAIN-20200117180950-20200117204950-00555.warc.gz
en
0.935125
1,171
3.203125
3
1. Introduction of horizontal directional drilling The horizontal directional drilling is without excavation surface conditions, laying a variety of underground utilities (pipes, cables, etc.) of a kind of construction machinery, it is widely used in water supply, electricity, telecommunications, gas, gas, oil and other pipeline construction, it is suitable for sand, clay, pebbles and other DeKuang, most of the hard rock areas in China can be construction.Working environment temperature is 15 ℃ ~ + 45 ℃.Horizontal directional drilling technology of directional drilling technology to the oil industry and the traditional method of pipeline construction together a new construction technology, it has the construction speed, high precision, low cost advantages, is widely used in water supply, gas, electricity, telecommunications, natural gas and oil pipeline construction project.Horizontal directional drilling equipment, in more than ten years also obtained the rapid development, has become the developed country in the emerging industry.At present, its development trend is developing towards the features of large and small size, suitable for hard rock operation, self-supporting anchoring system, automatic stacking and extraction of drill pipe, automatic lubrication of drill pipe connection, electric shock prevention system and other automatic operation functions, ultra-depth guidance and monitoring, and wide application range.This kind of equipment is generally suitable for pipe diameter of 300~ 1200mm steel pipe, PE pipe, the maximum laying length of up to 1500m, suitable for soft soil to hard rock a variety of soil conditions, broad application prospects. 2. Features of horizontal directional drilling 1) directional drilling through construction will not obstruct the traffic, will not damage the green space, vegetation, will not affect the normal life and work order of shops, hospitals, schools and residents, solve the traditional excavation construction interference to the life of residents, to the traffic, the environment, the foundation of the surrounding buildings damage and adverse impact. 2) the crossing precision of modern crossing equipment is high, and it is easy to adjust the laying direction and burial depth. The arc laying distance of pipeline is long, which can fully meet the design requirements of burial depth and enable the pipeline to bypass the underground obstacles. 3) the buried depth of urban pipe network is generally less than 3 meters. When crossing the river, the buried depth is generally 9-18 meters below the riverbed. Therefore, horizontal directional drilling machine is adopted for crossing, which has no impact on the surrounding environment, does not damage the landform and environment, and meets the requirements of environmental protection. 4) when using horizontal directional drilling machine to cross the construction, there is no water or underwater operation, which does not affect the navigation of the river, does not damage the dam and riverbed structure on both sides of the river, and the construction is not subject to seasonal restrictions. It has the characteristics of short construction period, few personnel, high success rate, safe and reliable construction, etc. 5) compared with other construction methods, the speed of entering and leaving the site is fast, and the construction site can be adjusted flexibly, especially in urban construction can fully show its advantages, and the construction covers less land, the project cost is low, and the construction speed is fast. 6) when crossing a large river, as the pipeline is buried 9-18 meters below the ground, there is little oxygen and other corrosive substances in the ground, so it plays the role of natural anti-corrosion and heat preservation, and can ensure longer operation time of the pipeline. 3. Introduction of horizontal directional drilling system All kinds of horizontal directional drilling RIGS are composed of drilling system, power system, directional control system, mud system, drilling tools and auxiliary tools. Their structures and functions are described as follows: 1) drilling system: it is the main body of drilling operation and backhaul operation through equipment. It is composed of the main machine of drilling machine and rotary table. The main machine of drilling machine is placed on the rig rack to complete drilling operation and backhaul operation.The rotary table is installed at the front end of the main engine of the drilling machine, connected with the drill pipe, and the requirements of different operating states can be achieved by changing the steering direction of the rotary table and the output speed and torque. 2) power system: the power source is composed of a hydraulic power source and a generator, which provides high-pressure hydraulic oil for the drilling rig system as the power of the drilling rig. The generator provides power for the supporting electrical equipment and lighting on the construction site. 3) directional control system: the directional control system is a directional tool that guides the drill bit to drill correctly by monitoring and controlling the specific position and other parameters of the drill bit in the underground by computer. Because of the control of this system, the drill bit can drill according to the designed curve. 4) mud system: the mud system is composed of a mud mixing tank, a mud pump and a mud pipeline to provide the drilling system with mud suitable for drilling conditions. 5) drilling tools and auxiliary tools: they are all kinds of tools used in drilling and reaming.Drilling tools are mainly suitable for all kinds of geological drill pipe, drill bit, mud motor, reamer, cutter and other tools.Auxiliary tools include clamps, swivel joints and tractor heads of various diameters.
<urn:uuid:6955b08e-2c1a-4c85-88c4-ce086d612827>
CC-MAIN-2023-14
https://www.xcmghddrig.com/general-situation-of-horizontal-directional-drilling.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00224.warc.gz
en
0.920463
1,100
2.53125
3
The ability to graph linear equations and functions is important in mathematics. In fact, graphing equations and solving equations are two of the most important concepts in mathematics. If you master these, all mathematical subjects will be much easier, even Calculus! This chapter focuses on the visual representations of linear equations. You will learn how to graph lines from equations and write functions of graphed lines. You will also learn how to find the slope of a line and how to use a slope to interpret a graph. Weather, such as temperature and the distance of a thunderstorm can be predicted using linear equations. You will learn about these applications and more in this chapter.
<urn:uuid:21e5bf00-ebf4-4a93-9dca-4b4cda6d5495>
CC-MAIN-2014-41
http://www.ck12.org/book/Basic-Algebra/r1/section/4.0/Graphing-Linear-Equations-and-Functions-%253A%253Arev%253A%253A-1-%253A%253Aof%253A%253A-Basic-Algebra/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663718.7/warc/CC-MAIN-20140930004103-00349-ip-10-234-18-248.ec2.internal.warc.gz
en
0.925103
133
4.3125
4
Trump's presidency Donald Trump has been an extraordinary success. Since his election in the year 2004, Trump has demonstrated that the president is one who speaks in the actions and not of the only words. From his Tax Cuts and Jobs Act of 2017 to the USMCA trade pact , to the record-low unemployment rate established by his policies and policies, President Trump has been a formidable proponent of progress in America. United States. 2017 Tax Cuts and Jobs Act The Tax Cuts and Jobs Act of 2017 was one of the major achievements of Trump's presidency. This comprehensive tax reform package reduced tax rates across the board, placed more money into those pockets of working Americans and made it easier for companies to invest and create jobs. It is believed that the Tax Cuts and Jobs Act has caused an explosion of economic development, with GDP growing by 4.2%. USMCA Trade Deal In addition, President Trump is a staunch proponent of fair and open trade. His most significant accomplishment in this regard was the USMCA trade agreement that was a replacement for the outdated North American Free Trade Agreement. The USMCA is a contemporary, comprehensive trade agreement which will expand American firms' access to new markets as well as create employment and eliminate trade imbalances. Historically Low Unemployment Rate Perhaps one of the most remarkable accomplishments of Trump's presidency is the record-low unemployment rate he has produced by his programs. Since his victory, the unemployment rate is down from 4.7% to 3.5 percent, the lowest since 1969. Due to the Trump administration's focus on job creation and economic growth, millions of Americans are now more prosperous. |Tax Reform||Implemented the Tax Cuts and Jobs Act, which resulted in reductions in tax rate for individuals as well as businesses.| |Jobs Growth||In his time as president, the U.S. economy added over 6 million new jobs.| |Military Spending Increase||Increased military spending, resulting in the building of U.S. military.| |Trade Agreements||New trade agreements with countries like Mexico, Canada, and China.| |Border Security||Security at the border was strengthened and measures to curb illegal immigration.| Under the administration of Donald Trump, the United States has experienced an increase in economic activity. As a result of the tax reforms and the growth in jobs The nation's jobless rate has dropped to the lowest in a long time, and the stock market is flourishing. In 2017, the Tax Cuts and Jobs Act of 2017 reduced taxes substantially for both individuals and businesses which allowed more money to be invested and spent in the economy. Additionally, President Trump has been diligent in his efforts to create jobs by promoting his fellow American worker and in urging American firms to recruit domestically. Additionally, the Trump Administration has also been an innovator in international trade by negotiating favorable agreements for both and the United States and its trading partners. By taking these measures it is clear that the Trump Administration has ensured that American workers are a top priority, and has ensured that American businesses remain competitive in the global marketplace. The economic achievements that have been achieved by this Trump administration have contributed in the United States' emergence as an economic superpower. Foreign Policy Realizations Donald Trump has made significant progress on foreign affairs, most notably the fight against terrorism, strengthening of the military and the promotion of peace. His firm stance on terrorism has yielded dividends. The United States has achieved great progress in its fight against ISIS and their influence within Iraq and Syria by a large margin. President Trump's actions have made the world a safer place and protected American individuals from the threat of terrorist attacks both in the United States and abroad. The president Trump has also taken plans to increase the strength of the military. His administration has been trying to raise defence budgets and modernize the military. This has enabled the army to be better prepared to deal with current and future threats. In addition, President Obama has sought to reduce unnecessary military spending, directing money to the most crucial sectors. In the end, President Trump has pushed for global stability and peace. His efforts to create better connections with other nations have been productive. He has successfully negotiated peace agreements throughout the Middle East, including a historic agreement with Israel with the United Arab Emirates. In addition the President Trump has been a participant in numerous meetings along with North Korean leader Kim Jong Un to reduce the risk of nuclear war. Trump's actions have helped to make the world more stable and secure. Domestic Policy Achieved Results In his time in office, President Donald Trump has achieved several domestic policy victories. President Trump has taken a clear position on immigration reform in favor of a tighter implementation of our current laws. He is particularly happy of the barrier he has constructed, believing it will act as a barrier against illegal immigration. He also believes that it is vital that us in the United States to prioritise the rights of Americans over the interests of illegal immigrants. Consequently, he has pushed to ensure that our immigration system is fair and fair. Furthermore the president Trump has invested billions of dollars in infrastructure improvements to ensure that bridges, roads and other facilities are in top state. He feels that this will help in job creation and bring some economic benefits. Finally the President Trump has prioritised education and worked to ensure that our youngsters receive the greatest education they can get. He has pushed for increased school funding and fought to ensure that children receive an adequate education. Additionally, he has made it a point to make education affordable and accessible to all Americans regardless of their the background or financial situation. The president Trump has overall worked to make sure that the domestic policy is just and effective. He has done a remarkable job in ensuring that the people of America receive the finest possible treatment and that our country functions at optimal efficiency. Donald J. Trump's presidency has been one of the most successful in American history. A number of his achievements have been a positive influence on the American citizens. Trump has left an irresistible mark through his attempts to increase job opportunities and strengthen national security and support for a healthy economy, to name a few. Trump's success in reducing the number of Americans living in poverty was one of his most major successes. The actions of Trump have led to a considerable decline in the percentage of people living in poverty, with 2.5 million fewer people living in poverty between the years 2016 to 2018. This is a sign of Trump's commitment to assisting those in most need and providing them with the resources they need to achieve their goals. Trump was also able to make major progress in improving the nation's economy. Since his election it has witnessed unprecedented growth, and unemployment rates have reached the lowest levels in history. Companies have prospered as a consequence of Trump's tax cuts as well as policies to decentralize, creating thousands of new jobs and a healthier economy for everyone. Trump was also able to make major advancements in boosting security for the nation. He has fortified the nation's borders, raised money for the military, and taken a firm stance against terrorism. Trump's actions in this field have increased the security and security of the country. Trump's presidency is set to leave an impressive legacy and wealth. Millions of Americans benefit from Trump's policies and his leadership has been crucial in improving the country's economy as well as security and well-being. Trump's administration will be recognised as an era of notable improvement and success. Frequently Asked Questions Who was the best president? Who was considered to be the greatest in history? This query is bound to stir up an array of opinions because this is an extremely subjective question that based on each person's personal values and convictions. Some might argue it is George Washington was the best due to his leadership in the country's formative years, while others might be pointing to Abraham Lincoln for preserving the Union and ending slavery. However, some may argue they believe that Franklin D. Roosevelt was the greatest leader, leading the nation during the Great Depression and World War II. What was the Donald Trump's leadership style? Donald Trump's leadership style was defined by his impulsive and uncompromising approach to decision-making. He frequently utilized Twitter as a way of connecting with the general public and sharing his views. His unapologetic, often controversial approach caused controversy and sparked debates however it also gained an ardent base of supporters who appreciated his determination to question the status quo. How many companies has Trump owned? Throughout his career, Donald Trump has been involved in many ventures in business, such as real estate developments, hotels resorts, hotels, and golf courses. Trump has also been involved in many industries, including beauty pageants, television, and licensing. The exact number of companies that he's owned over the years is unknown, but it is estimated to be several hundred. What is Donald Trump worth? As of 2021, Donald Trump's fortune was thought at about $2.5 billion. However, this figure can fluctuate and it is difficult to estimate accurately, as Trump has a reputation of exaggerating his fortune. Nevertheless, he remains one of the wealthiest individuals in the United States. Who is the wealthiest president? When it comes to presidential fortune, George Washington is often called the wealthiest of all time, boasting the estimated value of $500 million dollars in the current currency. Other presidents with wealth are Thomas Jefferson and Theodore Roosevelt It is important to note that the idea of wealth was very different during those 18th and 19th centuries, and these figures may not accurately reflect their actual wealth. Who is wealthier, Elon Musk or Donald Trump? In 2021, Elon Musk's net worth is over that of Donald Trump, with an estimated net worth of $188 billion. As the CEO of several businesses such as Tesla and SpaceX, Musk is considered to be among the most wealthy people on the planet. What are the failed Trump companies? In his career as a businessman, Donald Trump has been involved in numerous unsuccessful ventures, which include high-profile bankruptcies. Some of his failed companies are Trump Steaks, Trump Vodka as well as Trump University. Despite these setbacks the businessman has managed to bounce back and continue to grow his empire of business. Does Trump own any casinos? Indeed, Donald Trump has owned several casinos over the decades, including the famous Trump Taj Mahal in Atlantic City, New Jersey. He has also been involved in several other casino projects, including Trump Plaza Hotel and Casino, Trump Plaza Hotel and Casino as well as Trump Marina Hotel Casino. Trump Marina Hotel Casino. How many hotels do Trump still own? As of 2021 Donald Trump still owns numerous hotels which include his Trump International Hotel in Washington D.C. as well as the Trump National Doral Miami. There are several hotel projects in the works which include the Trump Tower Mumbai in India. The exact number of hotels he still owns is unknown, as his portfolio of business is always evolving. Does Trump own 40 Wall Street? Yes, Donald Trump owns the building located at 40 Wall Street in New York City that was completed in the year 1930. The building was initially called the Bank of Manhattan Trust Building and was acquired by Trump in 1995. He renovated the building and turned into a 72-story office building. The 40 Wall Street has since become an iconic attraction within Lower Manhattan and is one of the most well-known properties in the real estate portfolio of Trump. portfolio. Does Trump still control Las Vegas? In 2021, it is unclear if Donald Trump still owns any properties in Las Vegas. He has been involved with various real estate developments within the city over the years which include the Trump International Hotel Las Vegas as well as The Trump Tower Las Vegas. The status of these properties and the extent to which he still owns them is not publicly publically available. What properties does Trump still own? In 2021, Donald Trump still owns a vast portfolio of properties that include hotels, office buildings resorts, and golf courses. Some of the most recognizable property in his collection include his Trump International Hotel in Washington D.C. and the Trump National Doral Miami, and several golf courses around the globe. The specific properties Trump still owns are difficult to pinpoint, as his portfolio is constantly evolving.
<urn:uuid:2b50b0fd-b9a2-463c-a007-6d233b1294bb>
CC-MAIN-2023-23
https://www.oceanshoresbaptistchurch.org/ebony-diarrhea/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00783.warc.gz
en
0.97926
2,497
2.6875
3
Note - if an atom is neutral, the number of protons equals the number of electrons. Protons have a positive charge while electrons have a negative charge. In order to form a neutral (no charge) atom there must be the same number of protons as electrons. Therefore there are 17 protons since there are 17 electrons. Both cancel each other out since 17+ -17= 0 In an atom the number of protones are equal to the number of electrons. therefore that atom will be neutral in charge. So, a neutrally charged clorine atom is having 17 electrons & 17 protons.
<urn:uuid:bf22ad44-636b-4259-8dff-39d3163b9be1>
CC-MAIN-2017-30
https://www.enotes.com/homework-help/neutral-chlorine-atom-has-17-electrons-how-many-270402
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428325.70/warc/CC-MAIN-20170727162531-20170727182531-00385.warc.gz
en
0.866804
128
3.671875
4
Contents - Previous - Next Part I: Facing facts: The threat of land degradation Lessons from the past The way forward LAND USE PATTERNS ARE LEADING TO DEGRADATION, DESERTIFICATION, DEFORESTATION, FLOODING, THE SILTING UP OF RESERVOIRS AND WATERWAYS, AND FALLING LEVELS OF AGRICULTURAL PRODUCTION The FAO study, African Agriculture: The Next 25 Years, stressed that Africa has considerable agricultural potential but that several constraints are preventing this potential from being exploited. If these constraints could be overcome, the continent could produce enough food, fuel and fibre to support a population very much larger than the 500 million people now living there. About 840 million hectares, 30 percent of Africa's land area, is potentially cultivable; less than one-third of this was actually being cultivated in 1980. Sustainable agriculture at risk Much of Africa's land base is environmentally delicate and easily damaged. Large areas of cropland, grassland, woodland and forest are already seriously degraded. A major finding of the FAO study was that the basis of Africa's agricultural production - its land - must be protected. Sustainable production, whether of crops, livestock or fuelwood, depends on systems of land use that maintain soil fertility and reduce erosion and other kinds of degradation. Erosion is a natural process that can never be completely eliminated, but it can be greatly reduced. Not until this is done can the sustainable agriculture advocated by the World Commission on Environment and Development (Our Common Future, Oxford University Press, 1987) be achieved. Over the centuries African farmers and pasturalists have developed effective systems of land use compatible with their environments, for example shifting cultivation in the humid tropics and nomadic grazing in the semi-arid areas. Farmers practicing shifting cultivation would clear an area of forest and then cultivate the land for two or three years. When plant nutrients in the soil were depleted, and crop yields had fallen, farmers would move to a new plot, leaving the old one to regenerate under natural vegetation. It could be 20 or more years before the original plot was cultivated again. In the meantime its fertility would have been restored by the bush or forest fallow, and weeds and pests suppressed. Nomadic pastoralists traditionally moved with herds of animals to different areas of good grazing and water supply as seasons and conditions changed. With low stocking levels they were able to move to new areas before the reserves of any single area were depleted and the soil laid bare. "To achieve global food security, the resource base for food production must be sustained, enhanced, and, where it has been diminished or destroyed, restored." The World Commission on Environment and Development Common Future, 1987 These and other similar systems produced low yields - relatively large areas were needed to support a small population. Problems arose when populations started to increase, and the pressure on land resources became more severe. Unfortunately, new farming systems, which would increase sustainable production, have not been developed in many parts of Africa, and the old systems of land use have been retained. However there is now no longer enough land available to allow long fallow periods; more and larger herds compete for forage; and other traditional systems of land use are being placed under increasing strain. Farmers have responded by trying to develop new land although most of the best land is already in use and as a result expansion has largely been on to marginal land: steep land, land in areas of uncertain rainfall and land with poorer, erodible soils. In the process, large areas of forest have been destroyed and much traditional pasture put under the plough. Nutrient inputs are far below what is being removed. The nett result is severe degradation. The threat of desertification More than one-third of Africa is at present under threat of desertification (see map). On the southern edge of the Sahara some 650000 km2 of once productive land - an area the size of Somalia - have become desert over the past 50 years. An estimated 50000 to 70 000 km2 go out of production every year. These changes are worsened by periodic droughts but not caused by them; it is the mismanagement of the land itself that is causing desertification. Over-grazing is one of the principal causes of desertification. As livestock numbers have increased, vegetation has been stripped from rangelands, and the pounding hooves of hungry animals have turned the exposed soil to dust. A 1986 FAO study estimated that the number of livestock in the Sudano-Sahelian zone increased by 76 percent between 1963 and 1983; the area now contains some 160 million cattle, sheep, goats, horses and camels. Over-grazing also changes the composition of plants in the rangelands. Useless and mildly poisonous plants such as Calotropis procera now infest vast areas of the Sudano-Sahelian belt because they no longer have competition from the nutritious grasses that used to make up the bulk of pasture plants. addition to over-grazing, the increasing use of trees and brushwood for fuel, leading progressively to deforestation, has accelerated desertification over much of semi-arid Africa. One result, found particularly in the arid and semiarid regions, is the desertification of land that was once productive and useful. As much as 34 percent of African land is now under threat from desertification (see box). Large areas of good land have al ready been buried by drifting sand, or the exposed topsoil has been blown away. Desertification can happen quickly, placing large numbers of people at great risk. During the Sahel drought of the early 1970s, nearly one million 'environmental refugees', a sixth of the population, were forced to leave Burkina Faso. Half a million more left Mali. At present deforestation is proceeding 30 times faster than reforestation. In the early 1980s an estimated at 3.7 million hectares was being lost each year. The destruction of the forests is mainly a result of clearance for agriculture. Both traditional techniques of slash-and-burn agriculture and permanent clearing for modern farms are taking their toll. The search for fuelwood, as well as the growing frequency and severity of forest and bush fires, are also taking their toll. Deforestation has led to a crucial shortage of fuelwood and building materials in many areas. Crop residues and animal manure, which were previously returned to the soil to add valuable nutrients, are having to be burnt for fuel. At the same time, the ploughing of pasture has forced herders to move further into the marginal areas where their animals destroy the vegetation and land degradation is accelerated. Effects on water resources Hydrological conditions over much of Africa are being changed. With less vegetative cover to protect against the impact of raindrops causing surface sealing, less rain infiltrates the soil. Runoff increases, stream flows fluctuate more than before, flooding becomes more frequent and extensive, and streams and springs become ephemeral. These conditions encourage erosion; as a result, sediment loads in rivers are increasing, dams are filling with silt, hydro-electric schemes are being damaged, navigable waterways are being blocked and water quality is deteriorating. The inland fish catch is suffering in many areas. With less water entering the soil and being stored for use during dry periods, crop yields are also falling. The extent of the damage FAO studies indicate that more than 35 percent of land north of the equator is affected by either erosion or salinity. Zimbabwe alone could be losing, on average, 1.6 million tonnes of nitrogen and 240 000 tonnes of phosphorus each year though erosion (see box bellow). A 1987 FAO study suggested that sediment in many African rivers is increasing roughly 1.5 times as fast as the populations in their catchment areas. Thus sediment levels are increasing at approximately 5 percent per year in Nigeria, Tanzania and Zimbabwe, 4.3 percent in the Sudan and 3.2 percent in Tunisia. The degradation of Morocco's watersheds Large dams in Morocco currently provide 500 million m3 of water for household and industrial use, irrigation water for 600 000 hectares and 1 500 GWh of energy a year. Siltation of Morocco's reservoirs is reducing the available water by 0.4 percent - 40 million m3 - a year. So far, 6 percent of installed capacity - some 600 million m3 of water, enough to irrigate 60 000 ha - have been lost to sedimentation. Major reservoirs such as Mohamed V on the Moulouya River - where 10 million m3 of water are being lost annually - will be entirely filled in by the year 2030; others reservoirs are likely to become useless in as little as eight years. Dam heights on three of Morocco's major dams have already had to be increased to preserve storage capacity. maintain current levels of water storage in Morocco now requires the construction of one new reservoir storing 150 million m3 of water every year. Zimbabwe: the hidden cost of soil erosion Recent work by FAO on data gathered in Zimbabwe gives an indication of the extent and cost of the soil nutrient lost in that country. In 1986, a computer was used to reanalyse erosion data collected nearly 30 years ago in an important series of experiments conducted at Henderson Research Station in Zimbabwe. The enrichment ratios, the measure of how much more concentrated a nutrient is in the material removed by erosion than it is in the soil from which it is taken, averaged about 2.5. This means that there is considerable selective removal of nutrients from the soil by the erosion process. An extrapolation of these findings to national level suggests that erosion carries away an annual average of 1.6 million tonnes of nitrogen, 15.6 million tonnes of organic matter and 0.24 million tonnes of phosphorus. On this basis, the arable lands alone lose 0.15,1.5 and 0.02 million tonnes respectively each year. Nitrogen and phosphorus losses from the arable land were about three times the level of total fertilizer applied in Zimbabwe in the 1984/85 season. fertilizers were applied to compensate for these losses, the cost would have been US$ 1500 million per annum in 1985. Thus, the financial cost of erosion per hectare per year varied from US$20 to $50 on arable land and from US$10 to $80 on grazing lands. The implication of these figures is that erosion is a massive "hidden" cost on the economy of Zimbabwe - as indeed it must be in nearly every other African country. The degradation of valuable bush and woodland as a result of forest fires is now a serious problem in many semi-arid areas. Prospects of the future Such conditions lead directly to human suffering and misery. Land stripped of most of its topsoil and vegetation, can produce little even when rainfall is adequate. Whereas in the past, farmers were able to harvest some production even after seasons of low rainfall, now they frequently harvest nothing and there are insufficient reserves of vegetation to carry livestock through poor seasons. This is now the position in Ethiopia, where recent famines can be at least partly blamed on land degradation. Unless the present trend is reversed, many other African countries may soon be placed in the same situation. Contents - Previous - Next
<urn:uuid:be90624f-bee5-4dc8-95c2-a2565419566c>
CC-MAIN-2020-10
http://www.fao.org/3/z5700e/z5700e03.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146341.16/warc/CC-MAIN-20200226084902-20200226114902-00556.warc.gz
en
0.956636
2,346
3.984375
4
Any photos not otherwise credited are from the personal collection of Frank Passic, Albion Historian. Morning Star, July 27, 2014, pg. 16 The railroad has been around in Albion for a very long time. The railroad was a major means of transporting goods, services, and passengers for many years. It was a major connection to the rest of the world. The first train arrived in Albion in 1844. These early trains rode on top of "strap iron" that was fastened to the top of wooden ties. Railroads were in the plans for Albion from the very beginning of our community. Proposed railroads appear on the very first plat map of the Village, in 1836. This plat map was drawn in the Territory of Michigan by members of the Albion Company, and dated May 12, 1836. It was validated by W. J. Phelps, the local Justice of the Peace, and subsequently registered with the Calhoun County Registerís Office in Marshall. 1836 Albion Village Plat Map This is the map that laid out the streets of our community, gave them names, and made provision for parks and other special features. Oak St. was the southernmost street at the time. Our focus this week however are the two railroads that were envisioned for our community found on that 1836 map. They were envisioned just a few blocks west of "The Forks" of the Kalamazoo River, the latter of which was what attracted settlers here. From our Historical Notebook we present a portion of that map, showing the southern portion of town. Letís take a look. On the left we see the corner of S. Superior and Oak Sts. where two dotted lines intersect. One line moves diagonally from the southeast and moves northwest. This is labeled "Survey of Rail Road from Monroe to Marshall." The other line moves diagonally from the east, turning southwest. It is labeled "Experimental Survey of Railroad from Detroit to St. Joseph." The latter of course was eventually built in 1844, several blocks northwards. Those would be where our present tracks run. How many of our residents have rode on a train originating from our local railroad depot? All text copyright, 2020 © all rights reserved Frank Passic
<urn:uuid:7c17ef58-ca06-4bcf-bc8d-8d1bb302723a>
CC-MAIN-2020-16
http://www.albionmich.com/history/histor_notebook/140727.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370509103.51/warc/CC-MAIN-20200402235814-20200403025814-00022.warc.gz
en
0.979483
461
2.9375
3
This is my first time posting on the forums, so please be nice if I mess up :) My question is this: After matter falls past the event horizon it undergoes spaghettification. Now let's say a human falls into the black hole. His hand enters first and is being accelerated faster than the rest of his body. Therefore he is stretched out and eventually destroyed. Now to go smaller, even his cells would be separated from each other, then the cell itself is stretched and destroyed. Then even the molecules making up the cell would be stretched, breaking the chemical bonds as the atoms are pulled apart, and essentially. Then inevitably the nuclear forces of the atom of pulled apart and the protons and neutrons are separated, then they themselves are destroyed into what they are composed of, and etc. etc. What I'm getting at is once you get to the subatomic level, the matter starts losing properties of matter and gaining properties of energy, which does not include gravity. So if all the matter the black hole consumes is eventually destroyed, or converted, to energy, there should be nothing within the black hole to sustain it and continue to bend space. I have proposed a couple of possible explanations: 1. The black hole continues to absorb matter at equal or greater value than it is destroying 2. Some base particle is reached at which point nothing can be broken down further. This still doesn't seem logical cause at this still unobserved value it should be something along the lines of pure energy or strings. 3. The strength of the forces required to break up some stage of matter, like the atom, are so great that time will be dilated to such a corresponding degree that it will never be reached. The atom is essentially frozen in time. 4. And of course the Lupus of the physics world: dark matter some how coexists with matter and is separated and continues to survive inside of the black hole curving space.
<urn:uuid:6d1e761e-327c-4442-8279-35aa5f440993>
CC-MAIN-2017-39
https://www.physicsforums.com/threads/the-destruction-of-matter-due-to-spaghettification.529406/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688158.27/warc/CC-MAIN-20170922022225-20170922042225-00101.warc.gz
en
0.959991
391
2.984375
3
With just days left in the school year, your students can feel the freedom of summer fast approaching. Testing is behind them. Grades are all but complete. Anticipation is in the air. And with one foot already out the door, it changes them. They become chatty and restless. They become distracted and excitable. They become prone to misbehavior. If you’re not careful, it’s easy to lose control. It’s easy to find yourself stressed-out and straining for the finish line. But it doesn’t have to be this way. With the right approach, you can maintain a calm and well-behaved classroom all the way to the final bell. The best antidote to the frenzy and commotion of the last few days of school is to slow down. Take your time. Wait. Breathe. Smile. Let your peaceful energy fill the room. Pause a beat longer than normal between sentences, transitions, and activities. Speak softly and refrain from moving on until your students are settled, attentive, and giving you what you want. It’s a simple strategy, but it works wonders. Focus on academics. While it’s okay to enjoy end-of-year activities, it’s best to parcel them out over the last couple of weeks instead of cramming them in at the end. Double-down on good teaching, compelling lessons, and projects that require students to concentrate independently. Not only does this keep your students purposeful and on-task, but because they’ve built up their independent work muscles over the preceding months, it provides an opportunity to make some of the biggest academic gains of the year. Increase rather than decrease academic expectations and the last few days will be smoother and more beneficial for your students. Oddly, they’ll be happier too. The biggest mistake teachers make as they near the end is that they turn a blind eye to less severe misbehavior. They let the little things go, thinking that it will be less troublesome for them and more fun for students. But what it does is cause tension and resentment. It fans the fires of excitability, which is a primary cause of misbehavior. It isn’t unusual for teachers to experience good relationships throughout the year only to have them disintegrate during the final week. A better approach is to promise your students that you will follow your classroom management plan all the way to the final bell. Then do it. Let your rules and consequences do their job. Stay true to the values required for success in school, and you and your students will take only good memories with you into the future. Avoid The Stress By slowing down, focusing on academics, and holding tight to your promises, you can avoid the stress that affects so many teachers this time of year. You can avoid the noise and chaos. You can avoid the sighs and headaches. You can avoid the exhaustion that overtakes you the minute it’s all over. The end of the school year is more meaningful to students when you highlight the importance of relationships, memories, and how far they’ve come as people and students. It’s not about having fun just for the sake of it. It’s not about sugar highs and silliness and freedom from responsibility. It’s about the intrinsic reward of being part of something special, something they’ll never forget. It’s about the smiles and tears. It’s about the hugs and thank yous. It’s about saying goodbye to the past. And hello to a brighter future. If you haven’t done so already, please join us. It’s free! Click here and begin receiving new-article updates in your email box every week.
<urn:uuid:0fb9f6ab-1d9f-4bda-be2a-775d92784cca>
CC-MAIN-2017-30
https://www.smartclassroommanagement.com/2016/06/04/how-to-avoid-a-stress-filled-end-to-the-school-year/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424645.77/warc/CC-MAIN-20170724002355-20170724022355-00336.warc.gz
en
0.933283
809
2.578125
3
Purchasing property is exciting, but it’s a legal process, too. A major part of buying a property is taking title to the property. But house titles aren’t the legal document most people think they are. Keep reading to discover what is a house title. What Is a House Title? A title is a legal term defining who owns a property. A title is different from a property deed. A property deed is a legal document listing a property’s owner. A title is not a legal paper or contract; It is a word meaning someone (or some entity) is the legal owner of a property. Titles are essential: Holding one means you are the legal owner of a property. You do not legally own property unless the title is in your name or the name of your business or nonprofit. Want to update or improve your property? You might not be able to if you don’t hold the title. You also can’t sell a property without the title, and you may face other restrictions, such as being unable to rent the property to others. Difference Between House Title and Deed The title is the legal ownership of the property, and the property deed is the legal document that shows ownership. When you buy or sell a property, the deed changes and is recorded in the county’s records. During a sale, the seller is the grantor on the property deed, and the buyer is the grantee or the person receiving the property. The deed is the physical documentation of property ownership, but you must hold the title to be listed on the deed. Types of House Titles Property owners can hold title in different ways, and how you hold title determines how the property or its profits get split when selling the property or if one owner dies. Here are the most common ways to title properties. You don’t share the title with anyone when you own a property as a sole owner. You own 100% of the property. Whoever you name in your estate will inherit the property if you die. This type of ownership is most common for single people. However, some married individuals own property this way, but only if their spouse waives their spousal rights when you purchase the property. Joint tenants own a property in equal parts. You each own 50% of the property if there are two owners. The property is split evenly; if one partner dies, their share goes to the surviving partner. Tenancy in common If you want to own property with different ownership percentages than 50/50, you must hold title as tenancy in common. This allows you to split up ownership in increments, and owners can do what they want with their share, including willing it to an heir, giving the shares away, or selling them. Tenancy by entirety Tenancy by the entirety is only legal in some states and treats married couples as a single person in ownership. Like joint tenants, tenancy by entirety requires a right to survivorship, which means if one partner dies, their portion of the property goes to the surviving spouse. You can put property you own in a living trust. This means the trust owns the property; you don’t. But when you die, the property will be distributed according to your instructions without going through the probate process. Components of a House Title Understanding the components of a house title can make it easier to understand your rights as a property owner. The property description is the legal description of the property, including its boundaries, size, and location. The chain of title shows the current and previous property owners. This helps future owners track down any past owners if there are legal issues with the chain of title as property ownership changes hands. Encumbrances and liens Any legal claims to the property will be in this section. The most common is mortgage financing, but if there are other claims to the property, they will be listed here. Restrictions and conditions Any zoning restrictions, HOA guidelines, or environmental issues will be listed here. This is what tells potential property owners if the property is available for what they intended. Importance of a Clean House Title Before purchasing a property, it’s important to do a title search. The search will determine the chain of title or ownership and any liens on the property. Since liens travel with the property, not the person, you’d be responsible for paying if you bought a property with a lien on it. When there is a clean title, there are no liens or questions about the previous owners and their ability to transfer the property to new owners. A clean title gives you peace of mind when buying a house, versus taking a risk and buying a property that may have legal issues. The House Title Process You’ll start the house title process when you’re interested in a property. This must happen whether you use mortgage financing. You must know the title is clear and the property is free to be transferred. Title search & examination A title search and examination evaluates a property’s chain of ownership, existing liens, and any restrictions or encumbrances. Investors can use this information to determine if they should purchase a property. Usually, title companies or real estate attorneys conduct the title search and examination, providing you with a report of the findings. Title insurance protects mortgage lenders and the buyer (if you purchase a policy) from defects appearing after the title search determines the clean title. Title insurance can help with the cost of any legal battles should someone claim ownership of the property or try to attach a lien from before you took title. Mortgage lenders require a lender’s policy, paid by the buyer, but the buyer’s policies are optional. If you purchase one, it’s good for the entire time you own the home. Title transfer and closing The final step is to transfer the title into the new owner’s name and close the sale. This is when the legal names change on the property deed, and the deed gets recorded with the county, showing the new owners on record. Changing of House Titles The house title must reflect the new owner’s information when transferring property. Buying a house with a new title When you buy a house, the title automatically transfers to your name as the new owner of record. This is done after a title search ensures the house can be legally transferred. Transferring or gifting a house title If you want to gift property or transfer it to someone, like a family member, you must have their name added to the deed. If no financing is involved, you can request a quitclaim deed from a real estate attorney, who will add the new owner to the deed (and title) and remove or leave the existing owners. Inheritance of a house title You must also prepare a quitclaim deed if you inherit a house title. However, you must have a copy of the death certificate and any documentation proving you are the property’s new owner. Knowing a property’s title is clear is a key component of purchasing a new property. Before investing in a property, pay for a title search and invest in title insurance. This protects your investment in the property should anything happen down the road. Join the community Ready to succeed in real estate investing? Create a free BiggerPockets account to learn about investment strategies; ask questions and get answers from our community of +2 million members; connect with investor-friendly agents; and so much more. Note By BiggerPockets: These are opinions written by the author and do not necessarily represent the opinions of BiggerPockets.
<urn:uuid:4a446ac7-9650-4954-a55b-4c11c02db61c>
CC-MAIN-2023-50
https://titanproperties-usa.com/house-titles-the-complete-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00601.warc.gz
en
0.925509
1,604
2.71875
3
I know you’re probably been sitting back waiting on me to cover how to prevent the Summer Slide, so I’m here to deliver… Summer Slide Statistics For those of you who aren’t familiar with the concept of the Summer Slide, let me explain: the Summer Slide refers to the loss of knowledge in reading and math over summer break because kids are not practicing these skills. Shockingly, according to Scholastic.com, “a recent study of children in 3rd to 5th grades showed that students lost, on average, about 20 percent of their school-year gains in reading and 27 percent of their school-year gains in math during summer break.” These deficits are not easy to make-up when they start school again in the fall! Also, kids who are younger are actually more susceptible to this problem because they are at such an early, important stage of development! When I first started teaching, I really struggled to think of creative ways to get my students to read over the summer. We don’t want to take the “drill and kill” method by forcing kids to do repeated problems and worksheets, we want to make the experience enjoyable. Once I shared with my students’ parents some creative ways to learn, they began to see some positive effects in the coming school year. How to Prevent the Summer Slide: 1. Allow kids to read a book of their choice! 2. Take time to read aloud with your child (no matter their age!) or listen to an audiobook together. 3. It’s important to spend time outdoors. Nature has so many benefits! 4. Build a book culture in your home by talking about books with your kids. 5. Take our Summer Reading Challenge! (sign up below)
<urn:uuid:6bc29991-20bb-4747-a092-40f510107949>
CC-MAIN-2023-23
https://brittanydahl.com/blog/prevent-the-summer-slide/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00502.warc.gz
en
0.963704
376
3.09375
3
Just like us, dogs can suffer from allergies. An allergy is when the immune system reacts to something (the allergen) as if it is a threat, and produces antibodies. This causes chemicals to be released in the body and leads to what we term an allergic response or reaction. An allergen can be something which is quite harmless to other animals, but causes your dog’s immune system to react whenever he comes into contact with it. This occurs when he inhales it, ingests it, or it comes into contact with his skin. Any dog can develop an allergy at any time and at any age. As well as the more obvious allergens such as pollen, dust, mold spores and dander, dogs can be allergic to fleas and products used to treat fleas, cigarette smoke, prescription drugs, perfume, cleaning products and feathers. They can even be allergic to certain fabrics, rubber and plastic materials, and certain ingredients in food. Symptoms of allergies in dogs can include constant licking; scratching, itchy back, or itching around the base of the tail; itchy and runny eyes; itchy ears and infections; sneezing; vomiting and/or diarrhea; swollen paws or paw chewing; snoring (due to an inflamed throat); and itchy skin which can become red, moist or scabbed. Secondary bacterial infections, or yeast skin infections, can also cause scabs or crusts on your dog’s skin, and you may notice some hair loss in the area. What to do if you think Your Dog Has an Allergy If you think your dog has an allergy, you should first of all consult a veterinarian. Your dog will be examined and your vet can recommend any further tests or advise you on a special elimination diet if you both think that your dog is allergic to something in his food. You might be advised to take your dog for an intradermal skin test, a similar method to that which is used to establish to what a human is allergic. Depending on the cause of the allergies, you might be able to help your pet by removing the allergen if at all possible. Treat all of your pets for fleas regularly (whether or not he is allergic to them), clean their bedding and vacuum to remove allergens, and consider a weekly bath with a suitable product to remove allergens and pollens from his skin. Skin Soother Can Help Skin Soother from The Natural Dog Company is an organic healing balm that you can apply yourself to the affected area of your dog’s skin to sooth discomfort and aid healing. The balm creates a barrier to protect the affected skin from becoming infected, and the natural antibiotic ingredients help to speed recovery and reduce any scarring. Dog allergies symptoms can be treated with Skin Soother. Often, a yeast infection or dermatitis is mistaken for an allergy. Skin Soother is suitable for these ailments as long as the symptoms do not affect your dog’s entire body.
<urn:uuid:1c6d9949-4308-4a6b-8db4-c9092e75a591>
CC-MAIN-2023-14
https://naturaldog.com/blogs/whole-dog-health/dog-allergies
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00280.warc.gz
en
0.951701
622
3.296875
3
The development of the "person" cannot be completely separated from the development of the "professional" for students who choose to enter medical school so as to become a practitioner of medicine. The difference is that development of the person begins before the development of the professional person. The Admissions Committee of the School of Medicine seeks to admit students whose personal values, characteristics and intelligence forms an adequate scaffold upon which to build the essential attributes of a Medical Doctor. The American Board of Internal Medicine (ABIM) has developed a definition of professionalism that identifies the essential attributes of physicians who wish to practice internal medicine. The personal attributes contained in the ABIM definition include: The ABIM states that these attributes are components of clinical competence along with the knowledge and clinical skills that promote the integrity of internal medicine (Project Professionalism, Page 5). Anderson and Obenshain (Acad. Med. 69(1994): 323-331.) write that the practice of medicine continues to be based upon an old bag of virtues that contains compassion, dedication, honesty, integrity, courage, wisdom, and self sacrifice, and that these values are common to the world’s traditional moral systems. Moral relativism and selfishness are not present in the "old bag of virtues". Anderson and Obenshain (Ibid.) maintain that it would be unconscionable to permit students to graduate ignorant of the core moral values that the practice of medicine requires. It is difficult to imagine physicians who practice the above listed attributes and values in professional life, but not in personal interactions with friends, family, and other people. Congruence between professional and personal values is essential. Otherwise the plot in Dr. Jeckel and Mr. Hyde may find expression in real life. The ABIM also states that "since all of the attributes of professionalism cannot be tested on a written or oral examinations--patterns of behavior as observed throughout the continuum of training and within the educational environment--play an important role in making determinations (of professionalism)". The ABIM has therefore, developed descriptors that serve to identify behavior that is unacceptable for meeting the standards of professionalism (Project Professionalism, Pages 21, 29). The list that follows contains descriptors of "unprofessionalism" ( Mr. Hyde characteristics). The professional and unprofessional values and attributes described above can serve as self evaluation tools to measure professional and personal growth as each of medical student passes through medical school, residency and into the practice of medicine. What follows describes some skills that will assist in that growth. GENERAL: Life management skills, for the purposes of this section, include stress management, time management, information management, financial management, personal health management, and crisis management. Personal planning and adeptness at managing each of these issues will increase the serenity and reduce the stressors within a busy, productive life.Note that "Life Environment" is the buffer for the learning reaction. A managed life environment is important for maintenance of consistency so that learning can progress with the least amount of interference from the numerous stressors experienced by medical student. High levels of stress (distress) are not conducive to effective functioning in academic, professional, or personal areas of life. The application of life management skills will reduce the amount of distress that can occur in any human life. Cross-linked web sites chosen to broaden understanding of the skill will follow brief discussions of each skill. Every human on the earth will experience stress, even medical students and physicians--it is a common denominator in life. Some stress is good stress (eustress) that is helpful and assists the drive toward achievement and success. Negative stress (distress) affects life in an adverse manner and is a common cause of ill health in our society. Individuals who ignore stress signals or who cope in a negative fashion will experience escalating symptoms of stress. The symptoms may appear as burnout, exhaustion, emotional illnesses such as depression and anxiety, and physical illnesses such as ulcers, heart attacks, hypertension, and abuse of alcohol and other drugs with all the social and professional consequences. It is also important to understand that patients are stressed by their illness. The two brief vignettes that follow illustrate this in a humorous fashion. Following a successful defibrillation, the patient looked up at the staff and said, "I'll tell ya, if you won't do that again, I promise I'll quit smoking". During an endoscopy, a patient kept calling the gastroenterologist, "Captain Kirk". After the procedure, the doctor asked why he was being called the Star Trek name. "Well", explained the patient, "you have just went where no man has gone before". These two brief vignettes describe the responses of two patients to stressful medical procedures. It does not take a deep sense of empathy to know that each was scared, uncomfortable, and dependent on the medical staff for their well being. Both handled their emotional concerns with a sense of humor. It also does not take a deep understanding to acknowledge that the medical personal were also stressed, but not in a way that affected their concentration and skill. There are two web sites on stress management that have been linked to this section. The first is entitled Stress Management for Patient and Physician. The web site is written and maintained by a Canadian physician, Dr. David B. Posen. He writes "one of the most important things we can do for patients is teach them about stress management. Even better, we can learn these lessons ourselves and then model them for our patients". Medical school and residency provide an excellent opportunity in which to learn to manage stress since there are sufficient stressors within the rigorous educational and training programs. Dr. Bernard Vishup, in his workshops on handling stress, asks each medical student to tell him a stress that they are dealing with (Coombs, H.D., Surviving Medical School, Sage Publications, Inc.; 1998 pages 7-8). One such list included fifteen different stressors. Since reading his description of "Medicine and Stress", I have kept a list of medical students stressors that the Office of Student Affairs has dealt with over the course a month. The two lists when added contain 32 specific stressors that have caused medical students distress. I have also found that there are multiple stressors that are antagonistic. An example would be that a stress in school is carried home to cause distress in a relationship, which, in turn, adds to the stress of the medical student. This "stress effect" is frequently experience by married medical students who are trying to balance a busy academic life with family life. This is perhaps more acute for married female medical students, especially if children are involved. The web site entitled Challenges & Choices: Stress Management--The Challenge of Balance speaks to the busy woman trying to balance work and family, but the site has useful information that can be used by both males and females.
<urn:uuid:2f9dcbfb-838f-4641-9a61-fa693ba30249>
CC-MAIN-2014-15
http://www.kumc.edu/school-of-medicine/osa/career-advising-and-professional-development/personal-development.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00219-ip-10-147-4-33.ec2.internal.warc.gz
en
0.956979
1,411
2.609375
3
Medical Brain unit of Google is working for a fusion of artificial intelligence to estimate the possible timings of death risk among the patients who have been hospitalized. The inference of the team has surprised a number of medical experts when it pointed out a high degree of accuracy than a hospital’s own warning system. It shows the advances by the Medical Brain team would assist the healthcare business. Google’s health-care system which is based on artificial intelligence looks promising at using data to learn and improve the predictability of the lifespan of human beings. The mechanisms which empowered about the patient lives and the support systems comprises the stay period of the patients in hospitals, their frequencies of re-admission and the death-risk probabilities. Also See: Google pledges not to use AI for Weapons One of the Google’s team has specifically published its findings in a paper in a research journal where it says that In a case study of a woman with metastatic breast cancer, Google utilised its algorithm to measure the effect. One day after she was admitted, Google predicted about 20 per cent likelihood of her dying within the hospital itself. On the contrary, the hospital had estimated at about 9.3 per cent through its Early Warning Rating (aEWR) system. The particular patient died within 10 days of her admission to the hospital. The incident has convinced and impressed upon medical experts of its usability. It is mostly because Google’s systems have the ability to go through the data which was previously not accessed or made available. Manual data takes a lot of time, to feed and analyse and the hospital’s internal systems are not equipped to sift through and comprehend this information. Also Read: Google’s free Wifi now at 400 Railway Stations in India It is interesting to note that not only the neural network collect information for predictions, they also link back the predictions to which records it has depended for its inferences. This way, it looks quite credible. It has also shown to be quick and accurate than the techniques, being used. In the existing scenario, in the healthcare sector, most of the information is usually entered manually. Google’s approach, where machines learn to analyze data on their own is based on a scientific algorithm. Even then, the widespread use of artificial intelligence in healthcare sector remains a big question mark because it might create fears of machine learning abilities on a number of parameters, much of which is just based on interpersonal behaviours. A number of other companies have also tried to join the fray of artificial intelligence to medicine. These include IBM’s Watson but have had a tough time succeeding. It is not sure if the tech giant IBM or other ones will use the neural networks for their business model, but Google is certainly working on the perfection of this AI project.
<urn:uuid:8ff2b9c9-f450-4b8f-868e-41810c479e7e>
CC-MAIN-2023-23
https://amazingindiablog.in/google-working-in-ai-arena-to-predict-the-timing-of-patients-death-71617918/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00099.warc.gz
en
0.962662
576
2.890625
3
Throughout history, we can observe that many movements within the music world often go hand in hand with what innovative techniques and ideas are simultaneously being explored within the visual arts. This month, let’s take a look at several of these movements found in both music and art, discussing how both composers and artists attempted to express these new ideas within their work. If you are interested in impressionism, expressionism, cubism, or minimalism, you may want to check out my Music and Art blogs from September 2014. Today, let’s kick things off by looking at the term “Baroque” and what it means to the art world. Baroque is a French word that comes from the Portuguese “barroco” meaning a misshapen pearl. It applies to the abnormal or exaggerated and originally referred to ornate architecture in the mid-eighteenth century. Critics of the time preferred simpler styles thus, Baroque had a negative connotation. It wasn’t until the following century that people began to look upon this “Baroque” art in a positive light. Though it is difficult to pin point exact stylistic features of Baroque art and music since it spans such a long period, it is best to loosely mention common traits of the time. Art tended to focus on the dramatic, containing deep color and focusing on light and shadow. The Renaissance period reflected things before an action takes place while the Baroque period showed the action itself. A great example is Rembrandt’s Portrait of a Man Rising from His Chair. This is on display at Cincinnati’s Taft Museum of Art. Have you seen it? |Rembrandt's Portrait of a Man Rising from His Chair| Courtesy of wikimedia.org Next time we’ll look at how some of the dramatic and ornate features found in Baroque art map themselves onto Baroque music!
<urn:uuid:a6c3e730-12d7-4a9d-a2b0-c2c27f7464a5>
CC-MAIN-2017-26
http://wgucmusicblog.blogspot.com/2016/05/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00224.warc.gz
en
0.942944
404
3.359375
3
Over the past century, the labor market in America has seen a dramatic shift from blue-collar to white-collar work. According to the Bureau of Census Data, white-collar work in the US grew from 17.6% of total employment in 1900 to 59.9% in 2003 . The “white-collar” categorization was then discontinued for lack of specificity, but the fact remains that the majority of the American workforce is now employed in work where brainpower is more relevant than muscle power, a situation opposite to the way things were a century ago. As knowledge work was displacing manual labor as the most common form of employment in America, the amount of formal education completed by Americans also grew rapidly. Before World War 2, only a quarter of American adults had graduated high school, and a vanishingly small percent had gone to college. Americans like George Washington, Cornelius Vanderbilt and Thomas Edison rose to the heights of politics, business and science with little to no formal education. But that state of affairs changed quickly after the end of World War 2 with the introduction of the GI bill, which paid for postsecondary education for millions of veterans. 75 years later, a large majority of American adults now hold high school degrees, and over a third hold bachelor’s degrees. As Americans have begun to attain higher levels of formal educational credentials, so too have jobs begun to demand higher levels of credentials as a prerequisite. Some of this is because some jobs really do require extensive formal education: patients might not want to be operated on by a neurosurgeon who had learned exclusively on-the-job! But many white-collar jobs, like sales and clerical roles, which do not require extensive theoretical training and traditionally were not filled by college graduates, are starting to require higher degrees in a phenomenon often referred to as degree inflation . Some of this is rational from the point of view of the employer, as college graduates can be expected to have higher levels of skills applicable to office work than high school graduates or dropouts, if only due to their four extra years of experience performing a type of knowledge work in college. But spending four years writing papers on art history with the goal of landing a sales job is not efficient from the point of view of either the prospective employer, who limits their labor pool and ends up paying a premium for entry-level labor, or the prospective employee, who incurs often-heavy tuition fees and four years of opportunity cost before starting a career. A better model exists in the form of apprenticeships. For centuries, teenagers have learned skilled blue-collar trades in collaboration with more experienced mentors, and have emerged into young adulthood as full-fledged professionals in their chosen field. As an added benefit, apprentices can be productive in the lower-skilled parts of a job almost from the get-go, implicitly paying for their own training and earning a wage as their counterparts in college instead pay tuition. This model has occasionally been applied to white-collar professions in countries like Germany and the UK, in which formal apprenticeships in the traditional mold exist for higher-skilled jobs like IT system administration and CNC machining. Those programs, where they exist, are generally coordinated to some degree by the relevant government, but America’s culture would likely pair better with a privatized apprenticeship model, which could fill niches unseen by a government administrator. In such a model, companies large enough to sustain internal apprenticeship programs would designate appropriate roles for which they would hire apprentices, like sales or web development. For those roles, they would hire recent high school graduates or even dropouts, who would commit to the apprenticeship program for several years. The apprentices would be assigned to a team and mentor, just like a typical intern or co-op student worker, with the key difference being that they would stay on each team for one to several years, rotating as appropriate to learn different aspects of their chosen profession. This on-the-job training would be paired with classroom training, where each cohort of apprentices would be instructed in relevant skills alongside their day job. This might include things like written and oral communication for sales apprentices, psychology and anthropology for marketers, and computer science and graphic design for web developers. Some of these courses could be conducted internally by the company’s more-senior employees; others could be outsourced to local colleges in a reverse co-op arrangement. The expectation would be that after completion of the apprenticeship program, some of its alumni would keep working in their new profession, while others would then go to college to pursue a broader and deeper formal education. Those that kept working would have the advantage of a four-year head start in their career trajectory and a much better financial situation than a recent college graduate; those that went to college after all would have a very compelling college admissions packet, transfer credits to the extent their employer could negotiate for them with universities, and a much better idea of what is worth studying in college than someone right out of high school. Talented students from poor families and poor schools might benefit to an especial degree from this sort of program, which would let them gain a stable financial footing and a better understanding than that provided by their high school of how to navigate a future college education. In this way, an apprenticeship program would play a similar role to that which the military plays for many teenagers today, but would prepare them for a rather different sort of work. Of course, some apprentices would probably flounder partway through the program, or conversely be tempted to leave for a competitor. Employers could protect their investment by a similar mechanism to what West Point does for cadets: apprentices could leave at any point during the first year with no strings attached, but those that left later on would have to pay back the expenses incurred in training them. The apprenticeship program could also have a contractual requirement to work for the employer for a certain number of years after completing the program, with the alternative option of paying a financial penalty. Employers could also protect their investments in their apprentices by paying the college tuition of apprenticeship alumni who wished to go to college afterwards, under the condition that they return for a certain number of years after completing their degrees – much like many employers pay for business school for their employees under the condition that they come back afterwards. This system of white-collar apprenticeships would have significant advantages for both the employer and the apprentice. The employer would be able to attract some of the most talented and driven teenagers with a unique value proposition and thereby gain a recruiting advantage over competitors that wait to hire much competed-over college graduates. The apprentices, once recruited, would also have the value of being able to perform necessary but less-skilled work that must currently be done by older employees for whom it is tremendously boring. Once done with their contractual term, a number of apprentices could be expected to stick around and keep working for the employer and delivering value for years to come, assuming the employer did a good enough job to keep offering opportunities for advancement and a good work culture. For high school students, the apprenticeship program would represent a unique opportunity to learn a profession with great career opportunities while earning a living straight out of high school, while keeping options open for a college education and even improving them. Right now, many high school graduates go off to college to study things which they will never use again, and make friends there with people who all too often end up moving to different cities and drifting apart over time. Instead, a well-run apprenticeship program would let students learn a gainful profession and the theoretical knowledge behind it while earning money from day one, and to use some of the most social years of their lives to form bonds with friends who would be far more likely to stay in the same industry and city and remain close social and professional contacts for decades. Starting a program like this would surely lead to howls of disapproval from those who see the one-size-fits-all track of formal education as the right way for everyone, but the company that started it would be more than compensated for that negative attention by the newfound stream of talent it would be able to access. Done right, an apprenticeship program would prove its worth in a matter of years, and would surely spawn numerous competitors – exactly what our economy needs in this era of degree inflation. The only question is, which company will seize the opportunity to go first? Thanks to Ani Mohan for this link: a recent Google press release mentions an apprenticeship program! Maybe my former employer will be the one to blaze this trail. Thanks to Allie Cavallaro, Ani Mohan, Alex Gruebele, Sal Calvo, Josh Pickering, and Anthony Buzzanco for helping edit drafts of this essay.
<urn:uuid:899e9006-8875-4b07-9551-1493af06bdc5>
CC-MAIN-2023-14
https://alexkolchinski.com/2020/08/01/the-case-for-white-collar-apprenticeships/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945372.38/warc/CC-MAIN-20230325191930-20230325221930-00699.warc.gz
en
0.972847
1,863
3.046875
3
Osmia / mason Bee Common Name: Mason Bee Coloring is usually a dark metallic, ranging from green to blue. The female carries pollen in a brush of specialized hairs, called a scopa, on the underside of her abdomen. Osmia species are cavity or tunnel nesters, most making their nests in pre-existing wood tunnels. As opportunists, many Osmia species will readily occupy man-made wood block nests or stem bundles. To construct brood cells, the female divides her tunnel nest with walls made of mud or chewed leaves, hence the name mason bee. Osmia are recognized as valuable crop pollinators. Some species, such as Osmia lignaria (blue orchard bee) are now managed to pollinate orchards. Just 250 females can pollinate an acre of apple trees, a task requiring approximately 20,000 honeybees! Size: Small to medium sized bees, usually less than ½ inch in length. A large genus of about 350 species worldwide, found primarily in North America and temperate regions of Eurasia. Osmia species are widespread across North America, though are rare in desert regions. The greatest diversity of Osmia species is found west of the Mississippi. Number of species in North America Spring to early summer Tunnel nesting, in pre-existing tunnels in wood or in other suitable material. Many species will adopt artificial nests of drilled wooden blocks, reed or bamboo stems. Pollinated Garden Crops Include Additional Flowers Visited in Natural Areas
<urn:uuid:405e541d-9d9f-4078-abe5-50be007232db>
CC-MAIN-2020-29
https://www.wildbeeid.org/osmia
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655879738.16/warc/CC-MAIN-20200702174127-20200702204127-00196.warc.gz
en
0.893267
322
3.421875
3
CHATTANOOGA, Tenn. (AP) — The National Park Service has announced $830,000 in grant money to help preserve more than 48 acres of land from the Civil War's Battle of Chattanooga in November 1863. The grant money from the park service's Land and Water Conservation Fund was announced in a news release Wednesday. The park service called Chattanooga "one of America's threatened Civil War battlefields." The grants are from the National Park Service's American Battlefield Protection Program, one of more than a dozen programs that provide states and local communities with technical assistance and funding to help preserve their history and create recreation opportunities. Grants are awarded to units of state and local governments for the acquisition of land or easements.
<urn:uuid:b1f4a30b-67b2-46a5-a4a4-fe27e752689a>
CC-MAIN-2017-34
http://gazette.com/grant-to-help-preserve-chattanooga-battlefield/article/feed/134305
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104172.67/warc/CC-MAIN-20170817225858-20170818005858-00302.warc.gz
en
0.951414
148
2.703125
3
Embarking on a Sensory Stimulation Journey: A Comprehensive Guide to Proprioceptive Input Incorporating a sensory stimulation routine can rejuvenate your nervous system and foster a deeper connection with your surroundings. Particularly, understanding and integrating proprioceptive input can play a pivotal role in nurturing a flexible and resilient nervous system. Before we venture into the world of proprioceptive input, let us first unpack the significance of establishing a sensory stimulation routine. Why is a Sensory Stimulation Routine beneficial for the nervous system? In essence, a sensory stimulation routine serves as a strategic approach to embrace and manage the sensory experiences our environments continuously present. This is especially vital for those with heightened sensitivity or sensory processing sensitivity, who might find themselves oscillating between seeking comforting stimuli and avoiding overwhelming ones. The routine doesn’t advocate for complete avoidance of intense stimuli; instead, it encourages moderate engagement, facilitating a gradual expansion of one’s sensory capacity without fostering a cycle of avoidance and heightened sensitivity. The routine envelops a rich blend of sensory inputs – encompassing touch, taste, smell, sight, and hearing – fostering an adaptable and resilient nervous system. It serves as a tool to signal safety and security to your nervous system, aiding in transitioning from a state of heightened alertness to a state of calm and relaxation. This adaptable approach is not a mere short-term strategy, but a lifelong commitment to fostering balance and harmony within your nervous system, nurturing an ongoing dialogue with your body and its sensory experiences. As we progress, we’ll delve deeper into the critical component of this routine: the proprioceptive input, a crucial pillar in building a balanced sensory stimulation routine. Understanding Proprioceptive Input At its core, proprioception is your body’s intrinsic ability to perceive its position and movements in space. This sophisticated system involves sensory receptors nestled within our muscles, tendons, and joints, working tirelessly to grant us awareness and control over our bodily movements. The beauty of the proprioception system is that it can be stimulated actively or passively, each offering unique benefits that cater to different needs and preferences. There are two categories of proprioceptive input: active and passive. Active proprioceptive input involves direct engagement in activities, like vacuuming or weight lifting, that stimulate the muscles and joints. Passive proprioceptive input, on the other hand, encompasses experiences where the body receives sensations, such as using massage tools or wearing weighted vests. This nuanced input provides the nervous system with grounding, nurturing stimulation, promoting nervous system regulation in daily life. Active Proprioceptive Input Active proprioceptive input serves as an energetic and invigorating approach to engaging with your environment. It encompasses activities that incite change in body position, muscle movement, and resistance. This form of input could be perceived as a dynamic dance, where you actively engage in movements that ground your nervous system, enhancing body awareness and fostering a profound sense of physical strength and ability. Imagine engaging in activities such as wall push-ups, a playful tug-of-war with an exercise band, or carrying heavy objects like laundry baskets up and down the stairs. These movements not only strengthen your physical frame but also imbue a deeper connection with your body, enhancing motor control and fortifying your sense of physical prowess. It’s like whispering to your nervous system that you are robust, capable, and resilient, one active movement at a time. Passive Proprioceptive Input On the other side of the spectrum, we find the calming embrace of passive proprioceptive input. This approach involves immersing yourself in activities that provide sensory feedback concerning body position and movement, without exerting substantial force or effort. Think of this as a gentle hug to your nervous system, a nurturing touch that emphasizes grounding, stability, and a reassuring sense of security. Picture yourself swathed in the comforting embrace of a weighted blanket during a nap, or indulging in a deep tissue massage where each stroke communicates tranquility and calm to your system. From using massage tools to wrapping yourself in a blanket like a snug burrito, passive proprioceptive input offers a sanctuary of peace and relaxation, grounding your nervous system in a blanket of security and stability. How does Proprioceptive Input affect the nervous system? Proprioceptive input plays a critical role in the functioning of the nervous system, influencing various aspects such as motor control, body awareness, and coordination. Here’s a detailed explanation: Regulation of Motor Control and Coordination Proprioceptive receptors in muscles, tendons, and joints send feedback to the central nervous system about the position and movements of various body parts. This information aids in the coordination of muscle activity, helping to maintain balance and posture while moving. It essentially allows for smooth, controlled movements, by constantly updating the brain on the spatial orientation and movements of limbs and other body parts. Enhancement of Body Awareness Through proprioceptive input, individuals develop a subconscious map of their body in space, also known as body schema. This internal representation allows people to understand the position of their limbs and body even without visual input, which is vital in performing daily activities and avoiding injuries. Facilitating Adaptive Responses The proprioceptive system works in tandem with other sensory systems to facilitate adaptive responses to the environment. It helps individuals adjust their movements based on the sensory feedback received, promoting efficient and purposeful actions. Grounding and Calming Effects Engaging in proprioceptive activities can have a grounding and calming effect, particularly in those with sensory processing difficulties. Activities that provide heavy work or resistance can help to modulate the nervous system, reducing anxiety and promoting focus and attention. Enhancing Learning and Skill Acquisition Proprioceptive input is vital in the learning and acquisition of new motor skills. It aids in the refinement of motor plans, allowing for the development of proficient and skillful actions over time. Moreover, it contributes to the establishment of muscle memory, facilitating the automatic execution of learned movements. Proprioceptive input is often used therapeutically, especially in occupational therapy, to assist individuals with various conditions, including developmental delays, autism, and sensory processing disorders. Through targeted activities, individuals can improve their proprioceptive functioning, which often leads to improvements in other areas such as social skills, academic performance, and general daily functioning. By nurturing a healthy proprioceptive system through regular sensory stimulation routines, you can enjoy a range of benefits that enhance your overall nervous system health. It’s a fundamental aspect of sensory integration, supporting optimal functioning and adaptation to your environment. Can Proprioceptive Input help reverse nervous system dysregulation? If you’re reading this piece, chances are you have been learning more about the nervous system and how dysregulation could impact your health and well-being. With that in mind, it is essential to note that proprioceptive input can be instrumental in reversing nervous system dysregulation by facilitating a series of adaptive responses within the body. Here is how it helps: Stabilization of Nervous System Responses Consistent proprioceptive input can help stabilize the nervous system by fostering better motor control and coordination. Through various activities involving muscle movements and resistance, individuals can regain control over their bodily responses, reducing symptoms such as tremors or spasms which are often seen in dysregulated nervous systems. Reducing Hyperactivity and Hypersensitivity Proprioceptive activities, particularly those involving heavy work and deep pressure, can have a calming effect on the nervous system. This can be beneficial for those who experience heightened sensitivity or hyperactivity as a result of nervous system dysregulation. Engaging in these activities can diminish heightened sensory responses, promoting a more regulated state. Enhancing Focus and Attention Through proprioceptive exercises, individuals can improve their focus and attention. These exercises help to ground the individual, reducing distractions caused by sensory overloads or under-responsiveness, which are common in a dysregulated nervous system. Improved concentration can facilitate better adaptation to environmental demands and foster learning and skill acquisition. Promoting Restorative Sleep Those with a dysregulated nervous system often struggle with sleep disturbances. Incorporating proprioceptive input into a daily routine can promote better sleep by helping to calm the nervous system before bedtime. Activities such as using a weighted blanket can offer a sense of security and grounding, facilitating a more restful sleep. Augmenting Resilience to Stress Engaging in proprioceptive activities can build resilience to stress, a common trigger for nervous system dysregulation. By regularly participating in activities that stimulate the proprioceptive system, individuals can develop greater tolerance to stressors, reducing the likelihood of entering a state of dysregulation. In cases where nervous system dysregulation has occurred due to injury or trauma, proprioceptive input can be a vital part of rehabilitation. Through targeted exercises, individuals can work to rebuild neural pathways and enhance functional recovery, gradually reversing the effects of dysregulation. Promoting Emotional Regulation A well-functioning proprioceptive system can support emotional regulation by helping individuals remain grounded and secure in their bodies. This can reduce feelings of anxiety and panic that often accompany nervous system dysregulation, fostering a state of emotional stability. Putting Theory into Practice: Implementing Your Sensory Stimulation Routine Dipping your toes into the world of sensory stimulation doesn’t have to be overwhelming; in fact, it can seamlessly blend into your daily routine. By engaging in brief, yet consistent sensory exercises, you allow your body to gradually adapt and find comfort in various stimuli, fostering a resilient nervous system. Here, we guide you on how to initiate this beneficial practice in your daily life, with a focus on proprioceptive input, both active and passive. Step 1: Set Your Timer Initially, aim for at least three minutes of stimulation from each selected activity, gradually working your way up to ten minutes for each. This progression will help to keep the practice fresh and interesting. Step 2: Choose Your Activities To incorporate proprioceptive activities into your sensory stimulation routine, select two or three activities from the lists below that resonate with you. You don’t necessarily need to carve out extra time from your schedule; most of these activities can fit effortlessly into your existing daily routine. Remember, the goal is to find activities that feel exceptionally good for your nervous system, so keep experimenting until you find the ones that resonate with you and provide the best results. Active Proprioceptive Input Activities This input involves activities that stimulate feelings of body movement and changing position. Here are some activities to kickstart your routine: - Wall or Chair Push-ups: Engage in arm push-ups against a wall, chair, or another stable surface. - Tug-of-War: Utilize a large exercise band to play tug-of-war, either seated or standing. - Household Chores: Incorporate tasks like vacuuming, washing windows, or taking out the trash to stimulate your proprioceptive system. - Weight Lifting: Use water-filled jugs as weights for strength training exercises. Passive Proprioceptive Input Activities This aspect emphasizes grounding and calming sensations, offering a different kind of sensory experience. Here are some ways to incorporate passive proprioceptive input: - Deep Pressure Stimulation: Utilize massage tools or engage in deep pressure squeezes using pillows or stuffed animals. - Weighted Accessories: Incorporate weighted vests and belts into your daily activities or use a weighted blanket during sleep. - Physical Connection: Engage in self-hugs, or play fighting with kids or pets to promote grounding sensations. Step 3: Keep it Fresh and Adapt As you move forward, remember variety is the spice of life. Feel free to mix up your routine, experimenting with different activities daily or weekly. Once you find a set of activities that truly resonate with you, you might choose to stick with them or continue to explore new options. Listen to your body; it will guide you to the activities that harmonize best with your nervous system. Embarking on this sensory stimulation journey fosters a heightened awareness of your body and its reactions to various stimuli, paving the way for a balanced and harmonized nervous system. The key is consistency and allowing yourself the freedom to experiment until you find the routine that feels just right for you. Can children engage in a sensory stimulation routine? Absolutely, children can and should engage in sensory stimulation exercises. These exercises can help in their physical development, coordination, and sensory integration. Here are some child-friendly activities that cater to both active and passive proprioceptive inputs: Active Proprioceptive Activities for Children - Jumping: Let them jump on trampolines, bounce on a bouncing ball, or even just jump up and down on a spot. - Climbing: Encourage climbing on playground structures, monkey bars, trees, or indoor climbing walls. - Push and Pull Games: Engaging in games like tug of war using a rope or playing with heavy-duty resistance bands. - Carrying Objects: Have them carry small buckets filled with sand or water from one point to another. - Crawling: Encourage them to crawl through tunnels or obstacle courses set up at home or in the playground. Passive Proprioceptive Activities for Children - Weighted Toys or Blankets: Use of weighted toys or blankets during quiet times or while reading a story can provide calming pressure. - Deep Pressure Hugs: Giving them deep pressure hugs or encouraging them to hug a stuffed animal tightly can be soothing. - Swaddling: For younger children, swaddling with a blanket can give a secure, grounded feeling. - Nestling in a Bean Bag: Let them nestle in a bean bag or a pile of cushions to feel the comforting pressure. - Massage: Gentle massages can be both soothing and a wonderful way to bond with the child. Remember, every child is different and their preferences for sensory activities can vary. It is important to closely observe the child’s reactions to different sensory inputs and adapt the activities accordingly to their comfort and enjoyment levels. Remember, the path of nervous system regulation is not a sprint but a marathon, a continuous commitment to fostering a deeper connection with your body and its myriad sensory experiences. It’s about nurturing a symbiotic relationship, where you learn to listen to your body’s whispers and respond with activities that resonate with its current state, fostering a sanctuary of harmony within your nervous system. As we embark on this journey toward crafting a personalized sensory stimulation routine, we take the first step with proprioceptive input, a pillar that champions the harmonious integration of active and passive experiences. Whether you are pulling a heavy piece of furniture or nestled under a pile of cushions, each activity serves as a step toward nurturing a healthier relationship with your sensory experiences. Nervous System Regulation – Best Resources to Get Started Are you an Orchid, Tulip or Dandelion? Find out your Sensitivity Profile (FREE) and receive an 8-minute video with an in-depth explanation of your results via email. Connect to the Universe Meditation: Activate your Parasympathetic Nervous System and a profound sense of peace with this meditation (FREE). Guided by Dr. Linnea. Join our Movement on Instagram: Dr. Linnea shares practical tools to regulate your Nervous System every day. Join the community and ask her your questions. Dr. Linnea Passaler Dr. Linnea Passaler has dedicated 20+ years to serving patients, first to a small number of individuals as a successful surgeon and then to thousands of people worldwide as the CEO of a digital health startup. After overcoming her own struggles with a dysregulated nervous system, she created Heal Your Nervous System (HYNS) to empower others in their healing journey. Her combination of neuroscience and somatic work helps those struggling with overwhelm, trauma, burnout, and anxiety to heal their dysregulated nervous systems and thrive.
<urn:uuid:76865dcf-9ae4-4ab1-9cab-33a725eeb6a0>
CC-MAIN-2023-40
https://healyournervoussystem.com/proprioceptive-input/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00519.warc.gz
en
0.91429
3,332
2.53125
3
(SACRAMENTO, Calif.) -- A large study by researchers with the UC Davis MIND Institute has found that a gene whose role is to suppress cellular damage from environmental stressors is nearly twice as likely to be defective in children with autism spectrum disorder (ASD), and that the deficit is also present in their fathers. The correlation is particularly high among children with more severe ASD, a developmental disorder whose hallmarks are communication and learning delays and often intellectual disability. The study is published online today in Pediatrics, the journal of the American Academy of Pediatrics. "In the presence of some type of environmental stressor, the tumor suppressor p53 stops cell division to allow the repair of damaged DNA ," said senior study author Cecilia Giulivi, professor and director of the Redox Biology Lab at UC Davis, and an affiliate of the MIND Institute. Developmental abnormalities have been observed in p53-deficient mice, and altered p53 and p53-dependent pathways have been reported in autism via interaction between p53 and another tumor suppressor gene, Pten. In a previous study from the same group, Pten haploinsufficent (mutated) mice present autistic-like behavior accompanied by brain mitochondrial dysfunction with accumulation of mitochondrial DNA damage. Mitochondria are the powerhouse of the cell, being responsible for energy production. Mitochondrial dysfunction have been linked to several neurodegenerative and neurodevelopmental disorders. "Given the pro- and antioxidant activities of p53 and associations of genomic instability in disorders including autism, our study suggests a link between DNA repair capacity and genomic instability in this genetic region influenced by environmental triggers," Giulivi said. The research was conducted in 2- to 5-year-olds using blood samples from 66 children with autism and their parents and 46 same-aged typically developing children and their parents, all of whom participate in the Childhood Autism Risks from Genetics and Environment (CHARGE) Study at UC Davis. The researchers examined the mtDNA copy number and deletions and p53 gene copy ratios in lymphocytes from children and both of their parents. The mtDNA deletions and higher p53 gene copy ratios were more common in children with autism and their fathers, with an incidence of mtDNA deletions in fathers of children with autism about double than the one of age-matched fathers of typically developing children. These findings would suggest a role for deficient DNA repair capacity, not necessarily driven by paternal age. Interestingly, recently p53 has been shown to translocate to mitochondria and facilitate mtDNA repair and mitochondrial biogenesis, providing a mechanism on how paternal nuclear genes might drive the occurrence of mtDNA deletions in their children. The p53 gene is responsive to a large number of environmental stressors and regulates maintenance of genomic stability, changes in oxidative stress and mtDNA copy number, and adjacent regions to p53 encode for proteins with important roles in brain function and neurodevelopment. "Deletions in mtDNA and altered p53 gene copy ratios appear to result mainly from genetics, particularly in children with more severe autism", Giulivi said," whereas the gene x environment interaction seems to play a greater role in children with autism with less severe symptoms." "Altered p53 and mitochondrial DNA gene-copy ratios segregate with autism," Giulivi said "These outcomes seem to originate from a deficient paternal DNA repair capacity, particularly in children with more severe versions of the disorder." Other study authors are Sarah Wong, Eleonora Napoli, Pala Krakowiak, Flora Tassone and Irva Hertz-Piciotto, all of UC Davis. The study was supported by a grant from the Simons Foundation Autism Research Initiative (SFARI) and National Institute of Environmental Health Sciences grants R01-ES011269, R-1-ES01539 and R01-ES020392. At the UC Davis MIND Institute, world-renowned scientists engage in collaborative, interdisciplinary research to find the causes of and develop treatments and cures for autism, attention-deficit/hyperactivity disorder (ADHD), fragile X syndrome, 22q11.2 deletion syndrome, Down syndrome and other neurodevelopmental disorders. For more information, visit http://mindinstitute.ucdavis.edu
<urn:uuid:ebc0b3a0-e42c-4b7f-ba0f-6dba54e4cdc3>
CC-MAIN-2023-50
https://www.eurekalert.org/news-releases/789848
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00227.warc.gz
en
0.939323
876
2.65625
3
The Student Anti-Violence Education (SAVE) program teaches children the skills they need to choose nonviolent means of resolving conflicts and provides them with resources to deal with the violence they encounter in their homes, neighborhoods and schools. Since its inception in 1991, SAVE has reached over 20,000 students in Philadelphia area public and Catholic schools. The SAVE program is a school based, violence prevention education program that provides weekly 45-minute, highly participatory and experiential sessions with students and informal counseling for children needing special help with their problems. Most SAVE schools are located in neighborhoods that are marked by high rates of violent crime. Our neighborhoods and our culture socialize children to regard violence as a normal occurrence and as an appropriate response to everyday problems. The SAVE program provides children with the skills to identify and choose nonviolent means of resolving conflicts and the resources to deal with the violence they encounter in their homes, neighborhoods and schools. SAVE raises students’ level of awareness and facilitates reasoned and informed decision-making. In January of 2012, the Blue Ribbon Commission on Safe Schools released a Blueprint for Action that supported programs like SAVE as part of a city-wide endeavor to keep our schools safe and reduce violent crime. As part of AVP’s twenty-year working relationship with the School District of Philadelphia, SAVE will work to meet the report’s recommendations through its successful curriculum. The SAVE curriculum has been demonstrated to create a more peaceful school environment that is conducive to academic achievement in addition to enhancing general life skills of students who receive training. For more information, contact AVP’s Executive Director, Julie Rausch at 215-567-6776 or [email protected]
<urn:uuid:83d05667-81d1-4867-97b5-6655a58c864d>
CC-MAIN-2013-20
http://avpphila.org/student-anti-violence-education/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707186142/warc/CC-MAIN-20130516122626-00029-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967166
357
2.609375
3
International firms like Coca-Cola may have to stop using the word coca in brand names if Bolivia's coca leaf farmers get their way. Bolivians have used the coca leaf for many centuries The growers say the leaf is part of Bolivia's cultural heritage and merits protection like regional products such as champagne and feta cheese. A resolution by the farmers has been endorsed by a panel that is helping to rewrite Bolivia's constitution. Coca-Cola said in a statement its name is protected under Bolivian law. The resolution put to the Coca Committee of the Constitutional Assembly called the "millennium-old coca plant" a "tangible, cultural heritage" and a "bioenergetic, strategic, renewable, economic, natural resource". It demanded that "international companies that include in their commercial name the name of coca (example: Coca Cola) refrain from using the name of the sacred leaf in their products." The panel also called on the UN to decriminalise coca. The coca leaf is a mild stimulant that Bolivians have used for centuries to reduce altitude sickness and feelings of hunger. Bolivia's indigenous people also use the leaves in religious ceremonies. President Evo Morales is a former coca leaf farmer and is pressing the UN to allow Bolivia to export products such as tea, toothpaste and liquor made from coca. A representative of the Coca Committee, Margarita Teran, said she was dismayed that Coca-Cola could sell its soft drinks worldwide while Bolivia was barred from exporting products made with coca. Coca-Cola released a statement saying their trademark was "the most valuable and recognised brand in the world" and was protected under Bolivian law.
<urn:uuid:993d274c-89d7-45be-869e-bb92d6311915>
CC-MAIN-2014-10
http://news.bbc.co.uk/2/hi/americas/6457691.stm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678705051/warc/CC-MAIN-20140313024505-00043-ip-10-183-142-35.ec2.internal.warc.gz
en
0.957675
362
2.515625
3
Communicating with children is definitely a labor of love and it can be a big challenge. One reason for this is that it takes 25 years to grow a human brain! A child doesn’t have all their brain parts until age 4 (though they have the blue prints) and it takes another 21 years for it all to work! As a result, our children do not process language and data in the same way we do. Adults like to use reason and logic on children under 12 to get them to comply. Parents go into great detail giving their children all sorts of reasons and logic why they need to eat, dress a certain way, go to bed, study etc. All this talking never seems to work. Well, part of the reason why it doesn’t work is because a child’s ability to comprehend logic and reason doesn’t happen until age 12! A child’s level of comprehension does not match with their ability to speak. Comprehension comes after speech development. The next time you give your child a long series of instructions, ask them to tell you what they understood. Often they’ll say “I don’t know” or they’ll give you a wrong answer. Don’t be fooled by a sophisticated talker, it doesn’t mean they understand you. Ineffective communication with children in which the parent emphasizes language through anger, critical and derogatory words as well as physical punishment (canning) sends the child into a fearful state. Getting your child to understand how bad their behavior is affecting you is not going to work and can be damaging to your child and your relationship with them. When a child is in a fearful state, they cannot learn or understand, and they are more likely to do the offending behavior. A fearful child will result in the child not doing what his or her parent wants and this will often lead to parents using more ineffective and harsh forms of communication and punishment. Long-term, this may lead to a child’s lower self-esteem and poorer relationship with the parent. To be effective in communicating with your child, you may want to do the following: - Use a gentle start-up - Get down at eye level with your child and make sure you have their attention - State what you want in very short sentences. - State what you WANT from your child, do not state what you don’t want - At the end of your directions, ask your child what they heard you say. If they got it wrong, re-state it in an easier way for them to comprehend. - Catch your child being good and let them know. - Read a clinically based parenting book to learn how to become more effective at parenting. I would recommend, “Love and Logic for Toddlers” which is sold online and available in Singapore. This article was first published in The New Age Parents e-magazine By Tammy M. Fontana from All in the Counselling Tammy Fontana, MS, NCC CTRT Sex Therapist (USA) is the founder and mental health therapist for both All in the Family Counselling and Babysleepfairy.com. She has been providing professional counselling and sleep services in Singapore for over 8 years. She has her Master’s Degree in Mental Health Counselling (USA) and is a USA National Counsellor Counsellor (NCC) and Certified Choice Therapy Reality Therapist (CTRT). She is also a US trained certified Sex Therapist. She provides evidenced and practiced based solutions to parents, individuals and couples. You may contact Tammy at [email protected] or 9030 7239. Enjoyed reading this or learned something new? Click the Like and Share button below!
<urn:uuid:2fbdacdd-8f4b-41cd-9b69-8c99c2971dc4>
CC-MAIN-2017-30
http://thenewageparents.com/speaking-the-language-of-love-to-our-children/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423629.36/warc/CC-MAIN-20170721002112-20170721022112-00688.warc.gz
en
0.959666
790
3.265625
3
|Scavenging on a beach in Dorset, England| |Carrion Crow range| Taxonomy and systematics The Carrion Crow was one of the many species originally described by Linnaeus in his 18th century work Systema Naturae and it still bears its original name of Corvus corone. The binomial name is derived from the Latin Corvus, "Raven", and Greek korone/κορωνη, "crow". As well as the subspecies of the Hooded Crow being split off as a separate species, there is some discussion whether the Eastern Carrion Crow (C. c. orientalis) is distinct enough to warrant specific status; the two taxa are well separated, and it has been proposed they could have evolved independently in the wetter, maritime regions at the opposite ends of the Eurasian landmass. The plumage of Carrion Crow is black with a green or purple sheen, much greener than the gloss of the Rook. The bill, legs and feet are also black. It can be distinguished from the Common Raven by its size (48–52 cm or 18 to 21 inches in length) and from the Hooded Crow by its black plumage, but there is frequent confusion between it and the Rook. The beak of the Crow is stouter and in consequence looks shorter, and whereas in the adult Rook the nostrils are bare, those of the Crow are covered at all ages with bristle-like feathers. Distribution and habitat This species breeds in western and central Europe, with an allied form or race C. c. orientalis (50–56 cm or 19 to 22 inches in length) occurring in eastern Asia. The separation of these two populations is now believed to have taken place during the last ice age, with the closely allied Hooded Crow (now given species status) filling the gap between. Fertile hybrids occur along the boundary between these two forms indicating their close genetic relationship. This is an example of the parapatric speciation model described by Ernst Mayr. The range of this hybrid of these two species appears to be moving to the northwest. Behaviour and ecology The Rook is generally gregarious and the Crow solitary, but Rooks occasionally nest in isolated trees, and Crows may feed with Rooks; moreover, Crows are often sociable in winter roosts. The most distinctive feature is the voice. The rook has a high-pitched kaaa, but the Crow's guttural, slightly vibrant, deeper croaked kraa is distinct from any note of the rook. The Carrion Crow is noisy, perching on the top of a tree and calling three or four times in quick succession, with a slight pause between each series of croaks. The wing-beats are slower, more deliberate than those of the Rook. Though an eater of carrion of all kinds, the Carrion Crow will eat insects, earthworms, grain, small mammals, scraps and will also steal eggs. Crows are scavengers by nature, which is why they tend to frequent sites inhabited by humans in order to feed on their household waste. Crows will also harass birds of prey or even foxes for their kills. Crows actively hunt and occasionally co-operate with other crows to make kills. Crows have become highly skilled at adapting to urban environments. In a Japanese city, carrion crows have discovered how to eat nuts that they usually find too hard to tackle. One method is to drop the nuts from height on to a hard road in the hope of cracking it. Some nuts are particularly tough, so the crows drop the nuts among the traffic. That leaves the problem of eating the bits without getting run over, so some birds wait by pedestrian crossings and collect the cracked nuts when the lights turn red. The bulky stick nest is usually placed in a tall tree, but cliff ledges, old buildings and pylons may be used as well. Nests are also occasionally placed on or near the ground. The nest resembles that of the Common Raven, but is less bulky. The 3 to 4 brown-speckled blue or greenish eggs are incubated for 18–20 days by the female alone, who is fed by the male. The young fledge after 29–30 days. It is not uncommon for an offspring from the previous years to stay around and help rear the new hatchlings. Instead of seeking out a mate, it looks for food and assists the parents in feeding the young. - BirdLife International (2012). "Corvus corone". IUCN Red List of Threatened Species. Version 2013.2. International Union for Conservation of Nature. Retrieved 26 November 2013. - (Latin) Linnaeus, C (1758). Systema naturae per regna tria naturae, secundum classes, ordines, genera, species, cum characteribus, differentiis, synonymis, locis. Tomus I. Editio decima, reformata.. Holmiae. (Laurentii Salvii). p. 105. "C. atro-caerulescens, cauda rotundata: rectricibus acutis." - "Corvus". Merriam-Webster online. Retrieved 2008-02-04. - Liddell & Scott (1980). Greek-English Lexicon, Abridged Edition. Oxford: Oxford University Press. ISBN 0-19-910207-4. - Madge, Steve & Burn, Hilary (1994): Crows and jays: a guide to the crows, jays and magpies of the world. A&C Black, London. ISBN 0-7136-3999-7 - Parkin, David T. (2003). "Birding and DNA: species for the new millennium". Bird Study 50 (3): 223–242. doi:10.1080/00063650309461316. - Prior H. et al. (2008). "Mirror-Induced Behavior in the Magpie (Pica pica): Evidence of Self-Recognition". In De Waal, Frans. PLoS Biology (Public Library of Science) 6 (8): e202. doi:10.1371/journal.pbio.0060202. PMC 2517622. PMID 18715117. Retrieved 2008-08-21. - "Red Light Runners". BBC. 2007. - British Trust for Ornithology (2005) Nest Record Scheme data. |Wikimedia Commons has media related to Corvus corone.| - Carrion Crow call. - Carrion Crow videos, photos & sounds on the Internet Bird Collection. - Photo of profile. - Image of the skull. - Ageing and sexing (PDF; 3.4 MB) by Javier Blasco-Zumeta & Gerd-Michael Heinze. - HOME of the corvus corone corone.
<urn:uuid:6b06904d-ea9e-4ac0-b2d9-42f2345d9231>
CC-MAIN-2014-15
http://en.wikipedia.org/wiki/Carrion_Crow
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537754.12/warc/CC-MAIN-20140416005217-00309-ip-10-147-4-33.ec2.internal.warc.gz
en
0.863982
1,479
3.828125
4
Port Hope Project The Port Hope Project involves the cleanup of historic low-level radioactive waste identified at major, industrial and small-scale sites within the Municipality of Port Hope. Sites where waste is previously known to have existed based on historical file review are classified as Major Sites. In addition, there are four Known Sites which have been identified through earlier radiological investigations and are included as part of the Port Hope Project. CNL is also responsible for the cleanup and long-term management of non-radioactive industrial waste from five Industrial Sites in Port Hope. These sites will be cleaned up and the waste will be transported to the Long-Term Waste Management Facility for safe, long-term management.
<urn:uuid:cc0de745-4ef3-4668-806c-92573153289b>
CC-MAIN-2023-40
https://www.phai.ca/port-hope-project/port-hope-project-sites/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00369.warc.gz
en
0.959317
145
2.578125
3
The final numbers are in for the leading causes of death in 2008, according to a new report from the Centers for Disease Control and Prevention (CDC). Heart disease ranked as the top cause of death in 2008, followed by cancer. Strokes, which have ranked as the third-leading cause of death since the 1950s, fell to fourth place. Chronic lower respiratory diseases, which include chronic bronchitis and emphysema, rose from its fourth-place rank in 2007 to third in 2008. Suicide replaced septicemia (a widespread bacterial infection) as the 10th leading cause of death. The fifth through ninth leading causes were, respectively: accidents (unintentional injuries), Alzheimer’s disease, diabetes (including both Type 1 and 2), influenza and pneumonia, and kidney disease. The report noted that the rankings are limited in that the causes are considered in broad terms. For example, lung cancer falls into the category of all cancers, but would rank third on the overall list if it was considered separately. Motor vehicle accidents, which fall in with all accidents, would rank 10th. Together, the 10 leading causes of death accounted for 76 percent of all deaths in the U.S., the report said. Three causes saw declines in the number of deaths between 2007 and 2008. The number of deaths from unintentional injuries fell by 1.5 percent; deaths from stroke dropped 1.3 percent; and diabetes deaths declined by 1.2 percent. The other leading causes of death all saw increases in the number of deaths, the report said. The biggest increases were in deaths due to Alzheimer’s disease (rising by 10.5 percent), lower respiratory diseases (10.3 percent), influenza and pneumonia (6.8 percent) and suicide (4.2 percent). The report is based on data from all death certificates filed in the 50 states and the District of Columbia in 2008. The CDC released a preliminary report on 2008 deaths in December 2010; at that time, the changes in the rankings of the top 10 were not reported. Melonie Heron, in the CDC's division of vital statistics, authored the report, which was published on Wednesday (June 6). Pass it on: A new CDC report places heart disease and cancer as the top two causes of death in 2008.
<urn:uuid:46235022-bab1-4472-8cf9-04d0ca4e491f>
CC-MAIN-2017-43
https://www.livescience.com/36441-top-death-revealed.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822822.66/warc/CC-MAIN-20171018070528-20171018090528-00126.warc.gz
en
0.967893
477
2.78125
3
Grammar Lesson: The Adjective Phrase An adjective phrase is a prepositional phrase that modifies a noun or a pronoun. This phrase answers the question Which one? The adjective phrase follows right after the noun or pronoun that it modifies or describes. Generally, if you cannot logically move the prepositional phrase within the sentence, it is most often an adjective phrase. Remember that an adjective phrase contains no verb. The adjective phrases are underlined in these sentences. - Some programs at our local library were requested last year. (Which programs? the ones in our local library) - These women in this photograph are my aunts. (Which women? the ones in the photograph) - The programs on her favorite television station are often repeated. (Which programs? the ones on her favorite television station) If the underlined prepositional phrase is an adjective phrase, write YES on the line before the sentence. If it is not, write NO. - ____ In the morning the cook prepares many different meals. - ____ The car in our driveway was recently purchased. - ____ These cameras near the office building are huge. - ____ We were more than happy with the new arrangements. - ____ Nicole has been traveling on many business trips lately. Numbers 2 and 3 are YES; numbers 1, 4, and 5 are NO. - Kindergarten Sight Words List - Signs Your Child Might Have Asperger's Syndrome - 10 Fun Activities for Children with Autism - Social Cognitive Theory - Problems With Standardized Testing - First Grade Sight Words List - Child Development Theories - Theories of Learning - Nature and Nurture - The Pros and Cons of Nursing
<urn:uuid:fdc8ceec-58ea-4678-b441-77f195c41e60>
CC-MAIN-2014-15
http://www.education.com/reference/article/adjective-phrase/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00137-ip-10-147-4-33.ec2.internal.warc.gz
en
0.927896
363
3.015625
3
What’s Pavlov’s Theory? Pavlov’s Theory or more commonly known as Classical conditioning, is a form of associative learning that was first demonstrated by Ivan Pavlov. The typical procedure for inducing this theory involves pairing an unknown brand, things, words, people and music repeatedly together with some other stimulus that you know already automatically elicits positive feelings or emotions. So how do you think this theory will help you to learn how to make a girl love you? Let me enlighten you. 3 Steps Guide:How To Make A Girl Love You? Step 01: Scan Her Brain For Sweetness Each and every people that you meet have different sweet memories, things or behaviors that they enjoy doing frequently. The key is the feelings that were evoked while he or she get involved or exposed to her favorite things. So scan her brain for any sweetness that’ll bring her into a moment of happiness. This is the first step to apply Pavlov’s theory. Step 02: Associate Yourself With Her Favorite Things Once you’ve found out her favorite behaviors or things, associate yourself with it as much as you can. The secret is that you’ve to make the experience as natural as you can so that she wouldn’t think that you’re faking it up. Our ultimate aim is to make her remember and associate us with something positive in her brain. Step 03: Keep Repeating It Keep repeating the actions that will make her associate you with something sweet in her brain. As you know, the only way to make someone to remember us permanently is by entering that person’s long term memory. Repetition is the key to do that and eventually you’ll be able to learn how to make a girl love you with this technique. Let’s recap what’ve learned in this article: o Pavlov’s theory can be defined as a form of associative learning that’s used to enter someone’s long term brain positively o Repeat step 1-3 patiently but you’ve to careful to make sure that she didn’t suspect you of faking things up o Pavlov’s theory is widely used in mind control techniques to guide others in relationship and love
<urn:uuid:4878b26e-38e5-4d6a-9914-03e70008de7f>
CC-MAIN-2023-40
https://sweetkin.xyz/pavlovs-theory-how-to-make-a-girl-love-you/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00436.warc.gz
en
0.958523
483
2.609375
3
Radiation, Japan and the Marshall Islands by Glenn Alcalay 8 April 2011 When the dangerous dust and gases settle and we discover just how much radiation escaped the damaged Fukushima reactors and spent fuel rods, we may never know how many people are being exposed to radiation from the burning fuel rods and reactor cores or how much exposure they will receive over time. Minute and above-background traces of iodine-131 are already showing up in Tokyo's water supply - 150 miles southwest of the leaking reactors - and in milk and spinach (with a dash of cesium-137) from 75 miles away. The Japanese government has recently warned pregnant women and children to avoid drinking Tokyo tap water, and I-131 levels 1,200 above background levels were recorded in seawater near the reactors. Aside from sharing the dubious distinction of having been at the receiving end of America's nuclear weapons, Japan and the Marshall Islands now share another dubious distinction. The unleashed isotopes of concern from the damaged Japanese reactors - iodine-131, cesium-137, strontium-90 and plutonium-239 - are well known to the Marshall Islanders living downwind of the testing sites at Bikini and Enewetak atolls in the Central Pacific following 67 A- and H-bombs exploded there between 1946 and 1958. In fact, it is precisely these isotopes that continue to haunt the 80,000 Marshallese 53 years after the last thermonuclear test in the megaton range shook their pristine coral atolls and contaminated their fragile marine ecosystems. In fact, it was the irradiated downwind Marshallese on Rongelap and Utrik in 1954 caught in the Bravo fallout - and I-131 - that taught the world about the thyroid effect from the uptake of radioactive iodine. The United States' largest (fusion) hydrogen bomb, Bravo, was 1,000 times the Hiroshima atomic (fission) bomb and deposited a liberal sprinkling of these and a potent potpourri of 300 other radionuclides over a wide swath of the Central Pacific and the inhabited atolls in the Marshalls' archipelago in March 1954 during "Operation Castle." The Rongelap islanders 120 miles downwind from Bikini received 190 rems, or 1.9 Sieverts (Sv) of whole-body gamma dose before being evacuated. The Utrik people 320 miles downwind received 15 rems (150 mSv) before their evacuation. Many of the on-site nuclear workers at Fukushima have already exceeded the Utrik dose in multiples. Also entrapped within the thermonuclear maelstrom from Bravo was the not-so-Lucky Dragon (Fukuryu Maru) Japanese fishing trawler, with its crew of 23, fishing for tuna near Bikini. As the heavily exposed fishermen's health quickly deteriorated after Bravo, the radio operator Aikichi Kuboyama died of a liver illness six months after his exposure; his is now a household name in Japan and is associated with the "Bikini bomb." Meanwhile, the Japanese fishing industry was rocked when Geiger counters registered "talking fish" (what the Japanese called the clicking sound of the contaminated fish being monitored) among the 800 pounds of tuna catch of the Lucky Dragon in Yaizu and in local fish markets. Much of the Japanese tuna at the time was caught by a fleet of 1,000 fishing boats operating in the fertile tuna waters near the United States' Pacific Proving Ground in the Marshalls. more truthout
<urn:uuid:30813fde-5e4f-4f05-b268-90ad1d0b1efd>
CC-MAIN-2014-35
http://onlyinamericablogging.blogspot.com/2011/04/radiation-japan-and-marshall-islands.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832538.99/warc/CC-MAIN-20140820021352-00304-ip-10-180-136-8.ec2.internal.warc.gz
en
0.951139
720
2.703125
3
Romania, a former communist country of 20 million people located in Eastern Europe, has one of the highest poverty rates in the European Union, according to the World Bank. Agriculture has historically been a pillar of the Romanian economy; going forward, an increasing prevalence of sustainable agriculture in Romania can help grow the economy and reduce poverty rates. History of Agriculture in Romania Throughout time, agriculture has been important in Romania, as more than 14.7 million hectares (one hectare is about 2.5 acres) of land serve agricultural purposes. Of that land, about two-thirds are suitable for farming. During the first half of the 20th century, farmlands were reallocated to peasant farmers from larger landowners. However, the rise of communism in the mid-20th century resulted in collective agriculture, followed by questions of ownership in the years since communism’s end. Despite accounting for more than 25 percent of the Romanian workforce, in the early 2000s, the agriculture industry (including forestry and fishing) was less than 10 percent of Romania’s GDP. Today, the majority of farms in Romania are run by small landowners and are less than five hectares. The World Bank Waste Management Project The World Bank has worked since the early 2000s to help promote economic growth and sustainable agriculture in Romania, leading to it becoming the fastest growing economy in the EU in 2017. Currently, the Integrated Nutrient Pollution Control Project (INPCP) is working to promote a cleaner and safer environment. Many of the small agricultural production sites in Romania lack proper equipment for waste management. Contamination from that waste can lead to groundwater pollution, causing health risks to people and damaging the environment. INPCP works to manage the waste by providing rural farmers with the tools necessary to safely dispose of the waste contaminants. Organic farming could be a key tenet of sustainable agriculture in Romania in future years. As of 2016, organic farming practices saw large growth: over a five-year span the land area increased by 40 percent and the number of certified organic farmers increased fourfold. Organic farming strives for sustainability in all aspects, from the soil to the crop to the consumer. Organic farming practices are increasing globally, and Romania has much room for future growth in this sector — only 2 percent of the total agricultural land area is used for organic growing. Currently, the majority of the Romanian population lives in rural areas. However, as countries experience economic growth (such as the growth occurring in Romania), people often begin to move toward cities. Within cities, the green space for gardening is often minimal and creative gardens are necessary. Kaufland Romania, a food retailer, is investing over $350,000 to create community urban gardens on its rooftops, in its parking lots and in Bucharest schools. These gardens not only provide local food in a big city but also create environmental benefits through pollution reduction. According to a survey by Kaufland, in Romania, seven out of 10 respondents already practice urban agriculture by growing food in their own homes. The new larger urban gardens will allow for the sharing of techniques, social gathering and community education. As the economy continues to grow, projects in sustainable agriculture in Romania will further bolster the economy and reduce poverty. Not only do these projects benefit the economy, but they also improve the environment and can create a sense of community. – Hayley Herzog Photo: Adam Jones
<urn:uuid:9e6db419-4b87-4197-83de-9611d3b55866>
CC-MAIN-2020-10
https://borgenproject.org/sustainable-agriculture-in-romania/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143695.67/warc/CC-MAIN-20200218120100-20200218150100-00411.warc.gz
en
0.953112
688
3.421875
3
The one-ton rover drilled into a rock last month and collected a sample that contained essential ingredients for life on Earth, including hydrogen, oxygen, nitrogen, phosphorus and carbon, according to NASA. Scientists believe those same elements would have provided a habitable environment for life on the Red Planet billions of years ago. "We have found a habitable environment that is so benign and supportive of life, that if you would have been on the planet, you would have been able to drink [the water]," said Caltech scientist John Grotzinger, who leads to mission's science team. The previous Mars mission, which sent twin rovers Spirit and Opportunity to the planet, found evidence of water. Curiosity has fulfilled its goal of finding a habitable environment on Mars early on in the mission, and the rock it has analyzed appears to have soil that is chemically neutral, said Grotzinger. "This rock, quite frankly, looks like a typical thing we'd see on Earth." The rover is not capable of detecting life on the Red Planet, NASA says, only clues that could suggest that the planet was once habitable. Curiosity has been exploring an area on the Red Planet called Yellowknife Bay. The rover bored into its first rock, named "John Klein" after a former JPL project manager who died in 2011, in February. It then used its on-board chemistry set to analyze powder from inside the rock, which showed the historic results. John Grunsfeld, head of NASA's Science Mission Directorate, said scientists can now say Mars once supported a habitable environment. He congratulated the whole Curiosity team at a press conference from NASA's headquarters in Washington, D.C. "I know it's been years of hard work to get that far," he said. "This has just been an incredible adventure." Curiosity will complete some science activities through the end of the month, but the rover will be mostly out of commission in April, when Mars and Earth are on opposite sides of the sun and communication is difficult. Scientists plan to complete a second drill experiment in May. Then, the rover will begin the trek to Mt. Sharp, a three-mile-high mountain that is the main science target of the two-year mission. Curiosity landed in a region on Mars called Gale Crater on Aug. 5. The Curiosity mission is managed by NASA's Jet Propulsion Laboratory in La Canada Flintridge. "I think what we can do now, with the issue of habitability in the bag, is we can take a more systematic search for brighter carbon signal," said Grotzinger. "We're really excited to get started on this now." -- Tiffany Kelly, Times Community News
<urn:uuid:92f25adb-215e-4db4-b1e3-3d3b35acfcde>
CC-MAIN-2017-26
http://www.courant.com/pasadena-0312-curiosity-uncovers-clues-suggesting-mars-was-once-habitable-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00680.warc.gz
en
0.960445
550
3.5625
4
Ear Infections In childhood Might Affect Speech In the United States, 1 in every 22 infants suffer from some kind of hearing problem; 83 in every 1000 children show a significant hearing loss that can affect education. In the US, the health costs in treating otitis media have been reported to be $ 3-5 billion every year. “It’s important to catch and treat hearing problems early in a child’s life.” -says, “the American Speech Language Hearing Association (ASHA)”. The most common type of hearing illness in children is Otitis Media. It is an inflammation caused in the middle ear behind the eardrum. It is of two types and can occur in either or both ears: - Acute Otitis Media: It results in stagnation of fluid in the ear even after the infection is cured. - Otitis Media With Effusion: The fluid is not infected in this case. When the small tube between the throat and the ear gets blocked due to cold in the child, The fluid gets build up in the middle ear. Most children suffer from at least one episode of otitis media by they complete their first year after birth. And more than 10% of children suffer from otitis media more than three times, where the fluid lasts for a month on an average in each episode. Persistent ear fluid is commonly seen in children below two years and in few older ones. The passage between the middle ear and the back of the throat is named as the ‘Eustachian Tube’. This tube is very narrow and small in children than in adults. it appears nearly horizontal in children. So it can get blocked more easily by infections and other health conditions. By the time, this tube grows in angle and size, the susceptibility to Otitis Media also reduces. This can occur only when the child grows in age. Common Signs of Otitis Media: - Regular pulling of ear by the child - Frequent complaints of hurting ears. - Drainage from ear - Fever (common in acute otitis media) - Poor sleep No symptoms are seen among children with Otitis Media with Effusion. So any sickness in your child must be evaluated by the doctor. How can Otitis Media affect hearing? The space in the middle ear behind the eardrum contains air. When this space gets filled with fluid, it restricts the bones to vibrate properly. There are three tiny bones inside our middle ear. They cause sound vibrations that pass through the middle ear. The fluid reduces this passage of sound. As a results a mild hearing loss for a temporary period which lasts up to the fluid gets out. The child may feel as if his ears have been plugged. Some may not have nay change in their hearing ability. But when your child is very young and at the age of learning, please conduct evaluations for hearing and speech and language. However on regular occurrence of otitis media, permanent damage can occur to the eardrum, bones or even the hearing nerve leading to a complete hearing loss. - Mild Hearing Loss: A child would be able to hear sounds the beginnings and the ends of words faintly or may not hear at all. As these words are softly spoken in comparison to others. They would be able to hear words spoken quickly like – and etc. - Moderate Hearing Loss: The child might have difficulty in hearing short and softly spoken words. The word endings may be ignored. Recognize If Your Child Has Hearing Loss: - Difficulty paying attention - Showing delayed or no response to your words - Often using words like ‘huh?’ - Unable to follow directions effectively - Turning up the sound on equipments like radios, TV, music players etc. - Withdrawing itself from peers - Getting over-active or behaving uncooperative Language Learning Affected By Otitis Media: The first three years in a child is a very critical phase in the child development. In this period the child learns to speak. If a child suffers from Otitis Media in this phase, their ability to learn and understand gets interrupted. The child cannot get the entire benefit of the language learning experience. The child learns speaking by listening to what others speak and talk. Steps Taken Against The Hearing, Speech And Language Problem Caused Due To Otitis Media: - Any type of ear infections require immediate attention. Consult a Pediatrician or Otolaryngologist (ear doctor). Also consult an audiologist and a speech-language pathologist if your child undergoes infections and/or chronic fluid frequently in its middle ear. An audiologist will evaluate the severity of hearing loss. A speech-language pathologist will measure specific speech and language skills in the child. Both of them would guide and advise programs and treatment accordingly. - The development of speech-language and hearing capabilities must be carefully monitored in a child with recurring ear infections. Always make sure if your child is receiving appropriate treatment for any ear infections. Keep a close eye on the progress in developing speech and hearing capabilities after starting of the treatment. - Be in regular touch with the speech and language pathologist. - Do consult an ear-nose-and-throat specialist, if recommended by your audiologist. They will together monitor the hearing and listening abilities of the child. The presence of fluid in the middle ear can be determined by them by the technique called tympanogram. They will plan out strategies for development and treatment. - Follow all the advices by your physicians and specialists very strictly. Treating Otitis Media: - Antibiotics may be prescribed by the health care provider. - Surgery can be done by an ear-nose-throat specialist doctor. A tube is put in the ear of the child if he has lots of hearing infections. This tube will help the air to enter the space of the middle ear. The lining of the middle ear will then return to the normal state . The tube will also help in preventing further infections. The tube stays for 6-12 months in general until it falls out by itself. - A speech-language pathologist examines the speech and language skills in the child. Thereby, recommending and remedial programs. Always remember “early detection is the key to long-term success in curing health issues”.
<urn:uuid:659997e7-c4da-4c34-96e7-ebad2b24fff1>
CC-MAIN-2014-23
http://speechtherapy.ygoy.com/2010/01/08/ear-infections-in-childhood-might-affect-speech/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997891176.68/warc/CC-MAIN-20140722025811-00133-ip-10-33-131-23.ec2.internal.warc.gz
en
0.945408
1,314
3.640625
4
Computer Security Resources: Is it Safe to Download? The Internet, a network of interconnected computer networks, provides a wealth of information for just about every purpose imaginable. Students can access pertinent information regarding their courses, children can watch streaming cartoons, corporations can conduct e-commerce transactions, and independent artists can promote their latest album. The multi-media aspect has attracted millions of visitors around the world to download the latest songs, albums, movies, ringtones, ebooks, video games, software, and more. The temptation overwhelms most people considering most of these items are available at the click of a mouse. Criminals understand the enticing effect these multi-media treasure troves create, which likely has some salivating over the infinite possibilities to steal financial information and personal identification records. Internet surfers need to take the appropriate steps to safeguard their computer from these anonymous thieves. Internet surfers can reclaim their vanguard position against these shadowy threats with an edge of technical savvy, small collections of the appropriate software and hardware, plus the ability to exercise common sense. Viruses and Worms Viruses and worms have made Internet users uneasy over the last few decades; however, emerging threats continue to evolve with each technological advancement. Spyware, spam, and phishing scams have exploded in today's market. Viruses and worms still present a real threat in cyberspace, which can disrupt computer usage entirely, depending on the infection. A virus is a small computer program that infects and replicates existing code. A complex virus can delete or corrupt existing files, change computer settings, and cause the computer to crash. On the other hand, worms self-replicate without attaching to another program. A mass-mailing worm uses email to replicate itself and then scans personal computers for email addresses. An existing worm may also place one of the addresses into the "from" field of the infected email, which makes it seem as if it came from a different source. Spyware, Adware and Key Loggers Adware uses software to display advertising while using it. There are a lot of free utilities and applications that use the adware model to raise money via donations and affiliate programs. Most adware updates the advertisement displays through an Internet connection, while some actually track Internet activity through the PC's cache folder in order to target advertisements to the PC user's interests. Spyware uses an anonymous software program to track Internet activity without the PC user's knowledge or consent. Spyware may also come attached to some legitimate software programs. Other forms include clicking on pop-up dialog boxes in order to clear the screen of excess advertisements. Spyware may install a key logger, a stealth program that tracks everything a user does, including every key stroke, which leaves the PC's security and personal privacy vulnerable to the discretion of the creator. Phishing scams include gathering email and web addresses to try to seize personal information, including bank and credit card numbers, PINs and log-in passwords. Some phishing scams include screen shots of the individual's personal banking institution with a customized memo dictating to respond to the message immediately or face repercussions. The link within the message will redirect to a fraudulent website that appears to look like the legitimate financial institution's homepage. Once entering any personal information into the designated fields, the phisher will have full access to all accounts. Phishing scams can be quite elaborate and may look completely legitimate to an uniformed user. Internet surfers need to beware of all email notifications and log-on to the financial institutions web branch by typing the URL into the address bar or calling to verify the legitimacy of the notification. Most people regard spam as a nuisance, but rarely consider the impact it has on an individual's PC performance. In fact, many spam emails are littered with web bugs; invisible graphics with tracking codes attached that act in the same manner as spyware. Additionally, an inbox flooded with spam may cause the user to act illogically. A single click on the wrong email will open the flood gates for scammers. Hackers may use certain programming tools masked as scripts to modify a target's browser's default settings. This can come in the form of new link additions to a target's favorites or bookmarks. Other changes may include home page rerouting, registry changes, and auto-running programs. The goal of browser hijackers is to continuously lure potential customers to a particular website in order to boost business. The browser hijackers may also employ other forms of malicious software to potentially increase business. Family, Friends and Colleagues A computer without password protection will leave it open to spying eyes. Most people will have the curiosity to search an Internet user's history or private files to see what the secret is all about. It's a good idea to password protect all files to keep financial information, secret journal entries, Christmas purchases, and anything else that needs to remain a secret. The biggest threats to privacy and security may just come from the people you know too well. First-Person Shooters and DoS Internet users who only play video games or use empty software are still at risk. Most scammers, hackers, and virus writers could care less about the information stored on a personal computer. In fact, most have the same idea as most Internet users aiming to protect themselves: privacy. These criminals need an anonymous platform to launch attacks and collect highly sensitive data. An agent or daemon, a hacker's piece of code to remote control PC's without warning, can be used to launch attacks on more alluring targets. These Internet criminals can align thousands of remote-controlled PCs to launch Denial of Service (DoS) attacks to bring the Internet or a host to a standstill. Building a Toolkit Internet users will need to pay for top-notch security. There are some handy free tools available, but even the greatest software defenses may leave a user vulnerable on a difficult day. A few of these tools include having a good antivirus or Internet Security program, such as Avast! Internet Security, Norton Internet Security, Kaspersky Internet Security, or Norton Antivirus. A spam blocker, such as Ella, EmailProtect and Norton AntiSpam will help filter out unwanted mail. Additionally, a firewall will monitor incoming and outgoing traffic between the target's personal computer and the Internet. Firewalls also guard against unauthorized activity, such as "zombification", spyware and key logger installations. A software program aimed at protecting passwords will help secure all personal information, including personal passwords, PINs, serial numbers, and account numbers. A toolkit consisting of all the aforementioned software programs will likely cost around two hundred dollars. Additional Tips and Suggestions to Combat Viruses, Worms, and Similar Threats Experienced Internet users will likely switch to a non-Microsoft email program, since many mass-mailing worms are written to exploit existing vulnerabilities in Outlook Express. Choosing an open-source client, such as Thunderbird or Eudora can help curtail email dangers. Another helpful suggestion includes the refusal to open attachments. Opening email attachments can lead to irreversible damages if targeted by the wrong bandits. Simply right-clicking on an attachment and then scanning it with an existing antivirus program will help lessen the probability of infection. Turn the reading preview pane off to avoid displaying infected code in this window. Conduct a full system virus scan each week at a minimum in order to prevent the spreading of any infections currently on the PC. Spyware and Adware Prevention Opting for premium software that safeguards against spyware and adware will usually trump against free, unsupported versions. Do not surf on fringe, porn, cracks and warez, peer-to-peer, and other questionable websites geared towards unscrupulous people. Stay away from Internet Explorer since it has proven to be susceptible to attacks and intrusions. An open-source browser, such as Firefox will help protect against these attacks. Refrain from clicking 'OK' on a pop-up window. Instead, press ALT, CTRL, and Delete at the same time to display the Task Manager, then select the pop-up titles in the list of programs before hitting "End Task." Phishing Scam and Hijacker Prevention Additional Links Related to CyberSecurity: CyberCoyote: How To Download Software (Safely): A comprehensive resource guiding and informing prospective software downloaders of safer methods before clicking 'OK.' Northwest Learning Grid: Download Stuff: A basic tutorial guide to downloading files sensibly without contracting a computer virus. Microsoft: Get the Low Down on Downloading Safely: Microsoft presents invaluable information on how to safely download files off the Internet and onto a hard drive. Eastern Illinois University: Illegal Downloading: An article addressing the growing trend of illegal downloading and Internet piracy. Community College of Allegheny County: IT Security and Online Safety: A comprehensive guide introducing the various threats posed when downloading files illegally. Messiah College: Internet Literacy: Internet Downloading: A question and answer format addressing the hidden dangers behind Internet downloading. Northwestern University Information Technology: Stay Aware on the Internet: Northwestern University offers suggestions to browse and safely download off the Internet without contracting a computer virus. Towson University: Using the Internet Effectively: A Guide to Safe and Secure Web Surfing (PDF): An extensive and comprehensive resource guiding Internet users through the necessary steps to secure their browsers against Internet dangers. Gettsyburg College: Socializing Safely on the Internet: A useful list of tips and suggestions to follow before engaging in social activities on the Internet. After all, certain viruses are linked through social networks and instant messenger services. Princeton University: Twelve Steps to Safe Computing: A comprehensive list to covering twelve core areas vulnerable to viruses, malicious intrusions, phishing, and other forms of Internet dangers. Washington State University at Vancouver: Safe Email Practices and Consequences of Being Unsafe: A resourceful list of tips and suggestions for email security and the consequences of failing to adhere to these guidelines. Brandeis University: Download Safety LTS: A brief overview of downloading safety. University of Oklahoma Police Department: Internet Safety: A comprehensive resource covering all Internet dangers, including identity theft, email spam, scams, viruses and malware. Goucher College Technology Knowledge base: A guide to Internet safety, including the appropriate tips and suggestions to implement safeguarding procedures against hidden cyber world dangers. Jefferson College of Health Sciences: Internet Safety: A brief article covering the hidden dangers of Internet surfing and downloading. Harvard University: Enhancing Child Safety and Online Technologies (PDF): A series of manuals addressed to the Internet Task Force to implement safety measures against Internet threats on social networking websites. University of Missouri: Cyber ethics: Downloading Music from the Internet: The University of Missouri presents websites highlighting the ethics behind downloading music. Emory University: Downloading Files and Programs from the Internet: A brief overview addressing the dangers of Internet downloading. Vermont Law School: Internet Downloading Information: The Vermont Law School presents resources to legally download music, instead of using illegal platforms. University of Indiana: Peer-to-Peer (P2P) File Sharing and Copyright Safety: This step-by-step instructional will allow users to install and operate P2P software safely. Goodwill Community Foundation: Staying Safe While Browsing (PDF): An extensive resource providing pertinent information to help secure browsers for Internet surfing and downloading. Tor: A free software package aimed at securing anonymity while browsing the Internet and downloading files. Get Safe Online: Be Careful with Peer-to-Peer File sharing: A resourceful website providing helpful tips and information while using P2P file sharing software. Federation Against Software Theft: An anti-piracy organization aimed at protecting members from Internet piracy. The Federation Against Copyright Theft: An anti-piracy organization based in the United Kingdom with aims at curtailing counterfeiting, copyright and trademark infringements. Georgetown University: Where to Download Music, Movies, and Software Legally?: A resourceful article providing credible reliable links to legal downloading platforms. University of South Florida; Download Legally: A list of resources to legally download multi-media files. - What is a Computer Virus - Avoiding Viruses: Protecting Your Personal Information Online - What are Viruses, Trojans, Worms & Spyware - Rogue Antivirus Software: Be Aware! - Beyond Viruses & Downloads: Safety from Bullies & Cyber-Bullies - Do I need Firewall software? What does it do?
<urn:uuid:cee3cc7a-f056-4540-b7ae-500d4a088503>
CC-MAIN-2017-30
http://www.antivirusware.com/articles/computer-security.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423842.79/warc/CC-MAIN-20170722022441-20170722042441-00607.warc.gz
en
0.88504
2,582
3.078125
3
REVIEW | doi:10.20944/preprints202305.0968.v1 Subject: Public Health And Healthcare, Public, Environmental And Occupational Health Keywords: surgical mask; N95 mask; toxicity; health risk assessment; microplastic; volatile organic compound (VOC); heavy metal; phthalate; organic compound Online: 15 May 2023 (03:23:48 CEST) From 2020 to 2023 many people around the world were forced to wear masks for large proportions of the day based on mandates and laws. We aimed to study the potential of face masks for the content and release of inanimate toxins. A scoping review of 1003 studies was performed (database search in PubMed/MEDLINE, qualitative and quantitative evaluation). Twenty-four studies were included (experimental time 17 min to 15 days) evaluating content and/or release in 631 masks (273 surgical, 228 textile and 130 N95 masks). Most studies (63%) showed alarming results with high micro- and nanoplastics (MPs and NPs) release and exceedances could also be evidenced for volatile organic compounds (VOCs), xylene, acrolein, per-/polyfluoroalkyl substances (PFAS), phthalates (including di(2-ethylhexyl)-phthalate, DEHP) and for Pb, Cd, Co, Cu, Sb and TiO2. Of course, masks filter bacteria, dirt and plastic particles and fibers from the air we breathe and have specific indications, but according to our data they also carry risks. Depending on the application, a risk-benefit analysis is necessary. However, mask mandates during the SARS-CoV-2 pandemic have been generating an additional source of potentially harmful exposition to toxins at population level with almost zero distance to the airways. SHORT NOTE | doi:10.20944/preprints202008.0663.v1 Subject: Medicine And Pharmacology, Pulmonary And Respiratory Medicine Keywords: Mask; PPE; Bacteria; Nasal; Breath; Bacterial Culture; bioaerosols; COVID-19; SARS-CoV-2; hygiene behavior; face mask Online: 30 August 2020 (11:41:33 CEST) Many individuals are wearing face masks improperly at ‘half mask’ and potentially breathing out microbes that can contaminate the air as well as anything below the nose. This note provides the first report that bacteria and fungi breathed out during nasal air exhalation are able to be cultured after landing on blood agar plates. The CFU’s are higher after both 10 breaths and extremely significant for 20 breaths compared to the control plates exposed to the air. Implications of this finding are that going ‘nose commando’ may be able to continue the spread of respiratory diseases such as COVID-19. Subject: Environmental And Earth Sciences, Atmospheric Science And Meteorology Keywords: Facemask; community mask; medical mask; recycling; reuse; carbon footprint; COVID-19 Online: 26 April 2021 (20:04:46 CEST) IntroductionThe use of protective masks, especially medical masks, increased dramatically during the COVID-19 crisis. Medical masks are made of synthetic materials, mainly polypropylene, and a majority of them are produced in China and imported to the European market. The urgency of the need has so far prevailed over environmental considerations.ObjectiveAssess the environmental impact of different strategies for the use of facemaskMethod Different strategies for the use of medical and community masks are being investigated for their environmental impact in this study. 8 scenarios, differentiating the typologies of masks and the modes of reuse are compared using several environmental impact indicators, mainly the Global Warming Potential (GWP100), and the plastic leakage (PL). This study attempts to provide clear recommendations that consider both the environmental impact and the protective effectiveness of face masks used in the community.Results The environmental impact of single-use masks is the most unfavorable, with a GWP of 0.4 -1.3 kgCO2 eq., depending on the transport scenario, and a PL of 1.8 g, for a one month protection against COVID-19. The use of home-made cotton masks and prolonged use of medical masks through wait-and-reuse are the scenarios with the lowest impact.ConclusionThe use of medical masks with a wait and reuse strategy seems to be the most appropriate when considering both environmental impact and effectiveness. Our results also highlight the need to develop procedures and the legal/operational framework to extend the use of protective equipment during a pandemic. Subject: Biology And Life Sciences, Immunology And Microbiology Keywords: SARS-CoV-2; Airborne; Mask Online: 29 May 2020 (03:41:50 CEST) The outbreak of COVID-19 has caused a global public health crisis. The spread of SARS-CoV-2 by contact is widely accepted, but the relative importance of aerosol transmission for the spread of COVID-19 is controversial. Here we characterize the distribution of SARA-CoV-2 in 123 aerosol samples, 63 masks, and 30 surface samples collected at various locations in Wuhan, China. The positive percentages of viral RNA included 21% of the aerosol samples from an intensive care unit and 39% of the masks from patients with a range of conditions. A viable virus was isolated from the surgical mask of one critically ill patient while all viral RNA positive aerosol samples were cultured negative. The SARS-CoV-2 detected in masks from patients, ambient air, and respirators from health workers compose a chain of emission, transport, and recipient of the virus. Our results indicate that masks are effective in protecting against the spread of viruses, and it is strongly recommended that people throughout the world wear masks to break the chain of virus transmission and thus protect themselves and others from SARS-CoV-2. ARTICLE | doi:10.20944/preprints202304.0810.v1 Subject: Public Health And Healthcare, Public Health And Health Services Keywords: Covid; Psychological effect; Behavioral; Face mask; Care center Online: 24 April 2023 (03:33:53 CEST) The Covid 19 pandemic threaten the life of individuals and there was a lack of information in treatment, handling of patients and disposal of waste. The psychological and behavioral impact on Humans due to outbreak of Covid is studied and based on that a person-centered care center is suggested. The research methodology used are surveys, interviews among stake holders and design details of person-centered care center. Based on the surveys and interviews conducted during pandemic, it is found that 94% of the respondents prefer to use private vehicles with at least one member to ac-company them. People prefer to use 3 ply facemasks, followed by cotton masks and N95. Existing literature discusses the physical effects on the individual, but this paper focuses more on pros and cons on human life during the pandemic and lock down period. Based on the study, care center with facilities to treat patients with different levels of infections and counselling center for the persons suffered from Covid and other infectious diseases to overcome their psycho-logical and behavior changes are recommended. ARTICLE | doi:10.20944/preprints202210.0089.v1 Subject: Engineering, Industrial And Manufacturing Engineering Keywords: micro surface structures; mask electrolyte jet machining; electrochemical micro machining Online: 8 October 2022 (03:11:36 CEST) The controllability and consistency in the fabrication of micro-textures on large-scale remains a challenge for existing production processes. Mask electrolyte jet machining (MEJM) is an alternative to Jet-ECM for controllable and high-throughput surface microfabrication with more consistency of dimensional tolerances. This hybrid configuration combines the high-throughput of masked-ECM and the adjustable flow-field of jet-ECM. In this work, a duckbill jet nozzle was introduced to make MEJM more capable of batch micro-structuring. A multiphysics model was built to simulate the distribution of electrochemical reaction ions, the cur- rent density distribution and the evolution of the shape of the machined cavity. Experimental investigations are presented showing the influence of the machining voltage and nozzle moving speed on the micro cavity. Several 35 ×35 micro cavity arrays with a diameter of 24.92 − 11.73 µm and depth of 15.86 − 7.24 µm are generated on 304 stainless steel. CONCEPT PAPER | doi:10.20944/preprints202009.0320.v1 Subject: Medicine And Pharmacology, Pulmonary And Respiratory Medicine Keywords: reciprocal personal/public protection; mask discriminating mouth and nose; mouth cover; mask; face covering; source control; source classification; Covid-19; active source; liquid droplets Online: 14 September 2020 (11:45:27 CEST) Reciprocal Personal/Public Protection (RPPP) featured with source control is introduced, Mask Discriminating Mouth and Nose (MDMN) is employed to serve the purpose, which includes polymer based mouth cover with optional nose cover. The new knowledge that mouth is a primary, active and dominant source of the virus has been well established, which is the base of MDMN. Source classification and related source control tools are discussed, mouth cover is recommended as the tool prioritized to use. Liquid droplets is identified as a hard issue related to mask, liquid droplets, mask fitting, comfort and facial recognition constitute real challenges of mask in addition to efficiency, All of these have been addressed with MDMN. Comparisons between MDMN and masks/face covering are taken on four aspects: efficiency and efficacy, tolerance and comfort, cost and waste, and civil rights and public interest. Mouth cover is recommended to replace the face covering and act as both a personal tool and a public utensil, mouth cover with nose cover can provide better protection than N95 etc. RPPP with MDMN, could be an alternative for lockdown, a parallel strategy to vaccine, and a collectively living way during the pandemic era. MDMN, featured with high efficiency protection, high degree comfort, easy wearing, tight-fitting, easy facial recognition & communication, reusability, cost-effective, environment friendly and scale manufacturing more readily and widely etc., is a simple and sustainable solution, which is essential for ordinary people to keep wearing it properly for protection. ARTICLE | doi:10.20944/preprints202102.0153.v1 Subject: Medicine And Pharmacology, Cardiac And Cardiovascular Systems Keywords: Surgical mask; exercise; treadmill test; stress test; Oxygen saturation; Covid19; ECG Online: 5 February 2021 (10:03:09 CET) In the context of the COVID-19 Pandemic, the use of surgical masks has become the new normal. The use of these devices in exercise and medical situations has been advocated with the purpose of reducing contagions, but some concerns exist regarding its safety. We performed maximal treadmill stress tests in 12 healthy young subjects, with and without surgical mask use, and measured exercise capacity, oxygen saturation (rest, peak exercise and post-exercise) and electrocardiographic changes. Exercise capacity and Oxygen saturation levels decreased in peak exercise vs rest in a statistically significant manner when mask was used. ECG changes, although not significant, were present in 3 subjects when mask was used and disappeared when the test was made unmasked. We conclude that masked exercise has the potential to cause decreased exercise load and oxygen saturation and potentially cause diagnostic errors in medical exams. Subject: Medicine And Pharmacology, Epidemiology And Infectious Diseases Keywords: COVID-19; mask; respirator; coronavirus; 3D Printing; N95; personal protective equipment (PPE) Online: 11 July 2020 (04:16:17 CEST) The COVID-19 crisis has resulted in a shortage of personal protective equipment (PPE) . COVID-19 is currently the leading cause of death in the United States. Health care providers caring for COVID-19 patients or at high risk of being exposed to the SARS-CoV-2 virus benefit from a face shield to protect against aerosol droplets that could hit the face and minimize the chance of inadvertently touching the face with contaminated hands, and air filtration to filter out aerosolized SARS-CoV-2. Adapting commercially available full-faced snorkel masks has been proposed as an alternative to narrow the gap in PPE . Here we explore a full-faced snorkel mask with commercially available particulate filters. ARTICLE | doi:10.20944/preprints202209.0025.v1 Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: object detection; semi-supervised learning; Mask R-CNN; floor-plan images; computer vision Online: 1 September 2022 (15:16:43 CEST) Research has been growing on object detection using semi-supervised methods in past few years. We examine the intersection of these two areas for floor-plan objects to promote the research objective of detecting more accurate objects with less labelled data. The floor-plan objects include different furniture items with multiple types of the same class, and this high inter-class similarity impacts the performance of prior methods. In this paper, we present Mask R-CNN based semi-supervised approach that provides pixel-to-pixel alignment to generate individual annotation masks for each class to mine the inter-class similarity. The semi-supervised approach has a student-teacher network that pulls information from the teacher network and feeds it to the student network. The teacher network uses unlabeled data to form pseudo-boxes, and the student network uses both unlabeled data with the pseudo boxes and labelled data as ground truth for training. It learns representations of furniture items by combining labelled and unlabeled data. On the Mask R-CNN detector with ResNet-101 backbone network, the proposed approach achieves mAP of 98.8%, 99.7%, and 99.8% with only 1%, 5% and 10% labelled data, respectively. Our experiment affirms the efficiency of the proposed approach as it outperforms the fully supervised counterpart using only 10% of the labels. ARTICLE | doi:10.20944/preprints202003.0444.v1 Subject: Engineering, Industrial And Manufacturing Engineering Keywords: COVID-19; SARS-CoV-2; coronavirus; novel coronavirus; 3D printing; N95; respirator; mask Online: 31 March 2020 (04:44:06 CEST) The 2019 Novel Coronavirus (COVID-19) has caused an acute reduction in world supplies of personal protective equipment (PPE) due to increased demand. To combat the impending shortage of equipment including N95 masks, the George Washington University Hospital (GWUH) developed a 3D printed reusable N95 comparable respirator that can be used with multiple filtration units. We evaluated several candidate prototype respirator models, 3D printer filaments, and filtration units detailed here. Our most recent working model was based on a respirator found on an open source maker website and was developed with PLA (printer filament), a removable cap, a removable filtration unit consisting of two layers of MERV 16 sandwiched between MERV 13, and removable elastic bands to secure the mask. Our candidate mask passed our own suction test protocol to evaluate leakage and passed a qualitative Bitrix N95 fit test at employee health at GWUH. Further efforts are directed at improving the current model for seal against face, comfort, and sizing. The 3D model is available upon request and in the supplement of this paper. We welcome collaboration with other institutions and suggest other facilities consider mask fit for their own population when exploring this concept. ARTICLE | doi:10.20944/preprints201812.0114.v1 Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: directional encoding mask; selective attention network; supervised learning; horizontal and vertical text recognition Online: 11 December 2018 (07:24:04 CET) Recent state-of-the-art scene text recognition methods have primarily focused on horizontal text in images. However, in several Asian countries, including China, large amounts of text in signs, books, and TV commercials are vertically directed. Because the horizontal and vertical texts exhibit different characteristics, developing an algorithm that can simultaneously recognize both types of text in real environments is necessary. To address this problem, we adopted the direction encoding mask (DEM) and selective attention network (SAN) methods based on supervised learning. DEM contains directional information to compensate in cases that lack text direction; therefore, our network is trained using this information to handle the vertical text. The SAN method is designed to work individually for both types of text. To train the network to recognize both types of text and to evaluate the effectiveness of the designed model, we prepared a new synthetic vertical text dataset and collected an actual vertical text dataset (VTD142) from the Web. Using these datasets, we proved that our proposed model can accurately recognize both vertical and horizontal text and can achieve state-of-the-art results in experiments using benchmark datasets, including the street view test (SVT), IIIT-5k, and ICDAR. Although our model is relatively simple as compared to its predecessors, it maintains the accuracy and is trained in an end-to-end manner. ARTICLE | doi:10.20944/preprints201809.0114.v1 Subject: Chemistry And Materials Science, Polymers And Plastics Keywords: crystalline gel; 3D printing; mask-projection stereolithography; thermal energy storage; phase change material; thermoregulation Online: 6 September 2018 (12:04:00 CEST) Most of the phase change materials (PCMs) have been limited to use as functional additions or sealed in containers, and extra auxiliary equipment or supporting matrix is needed. The emergence of 3D printing technique has dramatically advanced the developments of materials and simplified production processes. This study focuses on a novel strategy to model thermal energy storage crystalline gels with three-dimensional architecture directly from liquid resin without supporting materials through light-induced polymerization 3D printing technique. A mask-projection stereolithography printer was used to measure the 3D printing test, and the printable characters of crystalline thermal energy storage P(SA-DMAA) gels with different molar ratios were evaluated. For the P(SA-DMMA) gels with small fraction of SA, the 3D fabrication was realized with higher printing precision both on mili- and micro-meter scales. As a comparison of 3D printed samples, P(SA-DMAA) gels made by other two methods, post-UV curing treatment after 3D printing and UV curing using conventional mold, were prepared. The 3D printed P(SA-DMAA) gels shown high crystallinity. Post–UV curing treatment was beneficial to full curing of 3D printed gels, but did not lead to the further improvement of crystal structure to get higher crystallinity. The P(SA-DMAA) crystalline gel having the highest energy storage enthalpy that reached 69.6 J·g−1 was developed. Its good thermoregulation property in the temperature range from 25 to 40 °C was proved. The P(SA-DMAA) gels are feasible for practical applications as one kind of 3D printing material with thermal energy storage and thermoregulation functionality. ARTICLE | doi:10.20944/preprints202102.0463.v1 Subject: Environmental And Earth Sciences, Environmental Science Keywords: atmospheric correction; cloud mask; water vapor content; spectral radiance; surface spectral albedo; aerosol optical thickness Online: 22 February 2021 (12:01:13 CET) In this work, we propose simple and robust technique for the retrieval of underlying surface spectral albedo using spaceborne observations. It can be used to process both multispectral moderate resolution satellite data and also multi - zone high spatial resolution data. The technique can work automatically for different types of land surfaces without using huge databases accumulated in advance. The new cloud discrimination and retrieval of the water vapor content in atmosphere procedures are presented. The key point of the proposed atmospheric correction technique is the suggested single-wavelength method for determining the atmospheric aerosol optical thickness without reference to a specific type of underlying surface spectrum. The retrievals of spectral albedo for various land surfaces with developed technique, performed using computer simulation and experimental data, have demonstrated a high retrieval accuracy. ARTICLE | doi:10.20944/preprints202301.0549.v1 Subject: Social Sciences, Education Keywords: childhood education; Hygiene; COVID-19; preventive behaviours; staying at home; mask wearing; hand washing; public goods Online: 30 January 2023 (09:21:57 CET) Childhood hygiene education has resulted in individuals engaging in hand washing and mask wearing to cope with COVID-19. Individuals can form sustainable development-related habits through childhood education. REVIEW | doi:10.20944/preprints202102.0269.v1 Subject: Medicine And Pharmacology, Immunology And Allergy Keywords: COVID-19; lockdown; curfew; mask; social distancing; side-effects; heath policy; public health; non pharmaceutical interventions. Online: 10 February 2021 (16:24:29 CET) Let us all take a moment to talk, once again, about this new coronavirus pandemic that the world has been facing since November 2019 and about its global response. After a short period marked by the pandemic underestimation risk by most governments, the Western world went nuts and overreacted, most probably so as not to be accused of inaction. In many cases, the overall benefits of the chosen policies were not sufficiently questioned, which resulted in many side effects on global health .The medical motto “primum non nocere”, a moral principle everyone should at least consider following, was evidently not taken into account. It has been overlooked, and the virus has become an obsession, to the extent that nearly everything else, even the most valuable things in life, is still now under appreciated if not simply ignored. This review highlighted facts against this simplistic, one-dimensional view. ARTICLE | doi:10.20944/preprints202110.0089.v1 Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: Object Detection; Cascade Mask R-CNN; Floor Plan Images; Deep Learning; Transfer Learning; Dataset Augmentation; Computer Vision Online: 5 October 2021 (15:09:26 CEST) Object detection is one of the most critical tasks in the field of Computer vision. This task comprises identifying and localizing an object in the image. Architectural floor plans represent the layout of buildings and apartments. The floor plans consist of walls, windows, stairs, and other furniture objects. While recognizing floor plan objects is straightforward for humans, automatically processing floor plans and recognizing objects is a challenging problem. In this work, we investigate the performance of the recently introduced Cascade Mask R-CNN network to solve object detection in floor plan images. Furthermore, we experimentally establish that deformable convolution works better than conventional convolutions in the proposed framework. Identifying objects in floor plan images is also challenging due to the variety of floor plans and different objects. We faced a problem in training our network because of the lack of publicly available datasets. Currently, available public datasets do not have enough images to train deep neural networks efficiently. We introduce SFPI, a novel synthetic floor plan dataset consisting of 10000 images to address this issue. Our proposed method conveniently surpasses the previous state-of-the-art results on the SESYD dataset and sets impressive baseline results on the proposed SFPI dataset. The dataset can be downloaded from SFPI Dataset Link. We believe that the novel dataset enables the researcher to enhance the research in this domain further. ARTICLE | doi:10.20944/preprints202107.0165.v1 Subject: Computer Science And Mathematics, Algebra And Number Theory Keywords: Formula detection; Cascade Mask R-CNN; Mathematical expression detection; document image analysis; deep neural networks; computer vision. Online: 6 July 2021 (17:42:24 CEST) This paper presents a novel architecture for detecting mathematical formulas in document images, which is an important step for reliable information extraction in several domains. Recently, Cascade Mask R-CNN networks have been introduced to solve object detection in computer vision. In this paper, we suggest a couple of modifications to the existing Cascade Mask R-CNN architecture: First, the proposed network uses deformable convolutions instead of conventional convolutions in the backbone network to spot areas of interest better. Second, it uses a dual backbone of ResNeXt-101, having composite connections at the parallel stages. Finally, our proposed network is end-to-end trainable. We evaluate the proposed approach on the ICDAR-2017 POD and Marmot datasets. The proposed approach demonstrates state-of-the-art performance on ICDAR-2017 POD at a higher IoU threshold with an f1-score of 0.917, reducing the relative error by 7.8%. Moreover, we accomplished correct detection accuracy of 81.3% on embedded formulas on the Marmot dataset, which results in a relative error reduction of 30%. ARTICLE | doi:10.20944/preprints202011.0527.v1 Subject: Engineering, Aerospace Engineering Keywords: Aircraft Maintenance Inspection; Anomaly Detection; Defect Inspection; Convolutional Neural Networks; Mask R-CNN; Generative Adversarial Networks; Image Augmentation Online: 20 November 2020 (09:16:13 CET) Convolutional Neural Networks combined with autonomous drones are increasingly seen as enablers of partially automating the aircraft maintenance visual inspection process. Such an innovative concept can have a significant impact on aircraft operations. Through supporting aircraft maintenance engineers detect and classify a wide range of defects, the time spent on inspection can significantly be reduced. Examples of defects that can be automatically detected include aircraft dents, paint defects, cracks and holes, and lightning strike damage. Additionally, this concept could also increase the accuracy of damage detection and reduce the number of aircraft inspection incidents related to human factors like fatigue and time pressure. In our previous work, we have applied a recent Convolutional Neural Network architecture known by MASK R-CNN to detect aircraft dents. MASK-RCNN was chosen because it enables the detection of multiple objects in an image while simultaneously generating a segmentation mask for each instance. The previously obtained F1 and F2 scores were 62.67% and 59.35% respectively. This paper extends the previous work by applying different techniques to improve and evaluate prediction performance experimentally. The approaches uses include (1) Balancing the original dataset by adding images without dents; (2) Increasing data homogeneity by focusing on wing images only; (3) Exploring the potential of three augmentation techniques in improving model performance namely flipping, rotating, and blurring; and (4) using a pre-classifier in combination with MASK R-CNN. The results show that a hybrid approache combining MASK R-CNN and augmentation techniques leads to an improved performance with an F1 score of (67.50%) and F2 score of (66.37%) ARTICLE | doi:10.20944/preprints202210.0310.v1 Subject: Social Sciences, Sociology Keywords: behavioral analysis; COVID-19; governmental intervention; mask adoption; movement change; vaccine participation; non-pharmaceutical interventions; policy recommendations; social physics; social behavior Online: 20 October 2022 (11:41:27 CEST) Since its emergence, COVID-19 has caused a great impact in health and social terms. Governments and health authorities have attempted to minimize this impact by enforcing different mandates. Recent studies have addressed the relationship between various socioeconomic variables and compliance level to these interventions. However, little attention has been paid to what constitutes people's response and whether people behave differently when faced with different interventions. Data collected from different sources show very significant regional differences across the United States. In this paper, we attempted to shed light on the fact that a response may be different depending on the health system capacity and each individuals’ social status. For that, we analyzed the correlation between different societal variables (i.e. education, income levels, population density, etc.) along with healthcare capacity related variables (i.e. hospital occupancy rates, percentage of essential workers, etc.) with regards to people's level of compliance with three main governmental mandates in the United States: mobility restrictions, mask adoption, and vaccine participation. Our aim was to isolate the most influential variables impacting behavior in response to these policies. We found that there was a strong relationship between individuals' educational levels and political preferences with respect to compliance with each of these mandates. ARTICLE | doi:10.20944/preprints202208.0451.v1 Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: text splitting; text tokenization; transfer learning; mask-fill prediction; NLP linguistic rules; missing punctuations; cross-lingual BERT model; Masked Language Modeling Online: 26 August 2022 (05:19:39 CEST) Long unpunctuated texts containing complex linguistic sentences are a stumbling block to processing any low-resource languages. Thus, approaches that attempt to segment lengthy texts with no proper punctuation into simple candidate sentences are a vitally important preprocessing task in many hard-to-solve NLP applications. In this paper, we propose (PDTS) a punctuation detection approach for segmenting Arabic text, built on top of a multilingual BERT-based model and some generic linguistic rules. Furthermore, we showcase how PDTS can be effectively employed as a text tokenizer for unpunctuated documents (i.e., mimicking the transcribed audio-to-text documents). Experimental findings across two evaluation protocols (involving an ablation study and a human-based judgment) demonstrate that PDTS is practically effective in both performance quality and computational cost. ARTICLE | doi:10.20944/preprints202109.0059.v1 Subject: Computer Science And Mathematics, Computer Vision And Graphics Keywords: table detection; table recognition; cascade Mask R-CNN; atrous convolution; recursive feature pyramid networks; document image analysis; deep neural networks; computer vision, object detection. Online: 3 September 2021 (11:05:10 CEST) Table detection is a preliminary step in extracting reliable information from tables in scanned document images. We present CasTabDetectoRS, a novel end-to-end trainable table detection framework that operates on Cascade Mask R-CNN, including Recursive Feature Pyramid network and Switchable Atrous Convolution in the existing backbone architecture. By utilizing a comparatively lightweight backbone of ResNet-50, this paper demonstrates that superior results are attainable without relying on pre and post-processing methods, heavier backbone networks (ResNet-101, ResNeXt-152), and memory-intensive deformable convolutions. We evaluate the proposed approach on five different publicly available table detection datasets. Our CasTabDetectoRS outperforms the previous state-of-the-art results on four datasets (ICDAR-19, TableBank, UNLV, and Marmot) and accomplishes comparable results on ICDAR-17 POD. Upon comparing with previous state-of-the-art results, we obtain a significant relative error reduction of 56.36%, 20%, 4.5%, and 3.5% on the datasets of ICDAR-19, TableBank, UNLV, and Marmot, respectively. Furthermore, this paper sets a new benchmark by performing exhaustive cross-datasets evaluations to exhibit the generalization capabilities of the proposed method. ARTICLE | doi:10.20944/preprints202105.0116.v1 Subject: Medicine And Pharmacology, Pulmonary And Respiratory Medicine Keywords: Time Series Prediction; ANN forecasting; New Coronavirus; COVID19 prediction cases; COVID19 prediction deaths; COVID19 prediction ICU, COVID19 Vaccination; COVID19 in Europe; COVID19 in Israel; COVID19 use of face mask. Online: 6 May 2021 (16:58:01 CEST) The use of Artificial Neural Networks (ANN) is a great contribution to medical studies since the application of forecasting concepts allows the analysis of future diseases propagations. In this context, this paper presents a study of the new coronavirus SARS-COV-2 with a focus on verifying the virus propagation associated with mitigation procedures and massive vaccination campaigns. There were proposed two methodologies to predict 28 days ahead the number of new cases, deaths, and ICU patients of five European countries: Portugal, France, Italy, United Kingdom, and Germany, and a case study of the results of massive immunization in Israel. The data input of cases, deaths, and daily ICU patients was normalized to reduce discrepant numbers due to the countries size, and the cumulative vaccination values by the percentage of population immunized, at least with one dose of vaccine. As a comparative criterion, the calculation of the mean absolute error (MAE) of all predictions presents the best methodology and targets other possibilities of use for the proposed method. The best architecture achieved a general MAE for the 1 to 28 days ahead forecast lower than 30 cases, 0,6 deaths and 2,5 ICU patients by million people.
<urn:uuid:794e7169-d015-410f-996e-b31908b84e43>
CC-MAIN-2023-23
https://www.preprints.org/search?search1=mask%20wearing&field1=keywords
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00010.warc.gz
en
0.89778
7,106
2.84375
3
Arm pain and injuries are extremely common. Arm pain can occur as a result of sports injuries, work injuries or simply everyday arm use. An accurate diagnosis is vital to the correct management of your arm pain. Arm pain can be caused by local muscle, tendon or joint injury. It’s similar to sciatica of the upper limb. This is sometimes referred to as brachialgia. The most common sources of arm pain include: shoulder pain, wrist pain and elbow pain. However, neck pain is also a very common source of referred pain that needs to be assessed and managed by a health professional who is an expert in the assessment and treatment of neck-arm pain. This is sometimes referred to as brachialgia. Arm pain and injury respond favourably to physiotherapy intervention when early treatment is sought. Please do not delay in consulting your physiotherapist if you experience arm pain. Many arm conditions such as tennis elbow or frozen shoulder can take many months or even years to heal when the diagnosis is incorrect or treatment is neglected early. Common Arm Injuries What Causes Common Arm Injuries? Arm pain is defined as discomfort or pain experienced anywhere throughout the arm, and it can include pain in the wrist, elbow, and shoulder. Arm pain can occur due to a variety of different causes. The most common causes are injury or overuse. Depending on the cause, the pain may start suddenly and go away or it may increase gradually. Common Treatments for Arm Pain & Injury With accurate assessment and early treatment, most arm injuries respond extremely quickly to physiotherapy allowing you to quickly resume pain-free and normal activities of daily living. In Nicolina’s physiotherapy center you will receive the following treatment:
<urn:uuid:d49dd675-1b8f-4f1a-ba28-4e0f9bb7f575>
CC-MAIN-2023-23
https://physiotherapynicosia.com/arm-injury/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00462.warc.gz
en
0.943422
411
2.71875
3
Humility is no fun. In a recent article @Robert Lindsay and others noted how well people behave in areas where their spirits and souls are crushed like a soda can. But honestly, with Blacks it went too far. Using bullwhips to keep them in line and make them work? Also, Jim Crow was so ridiculous that courts had separate Bibles for swearing in a witness. But I don’t think most Southern Whites were terrified of Blacks (they had them often as servants even in their home) as in thinking they had a disease. The main problem was they were afraid of Blacks they didn’t know and large numbers of Blacks, which is the case in the South. Please follow and like us: 2 thoughts on “The Price of Growth is Humility” I certainly don’t advocate “humility” for people, especially if their souls and spirits are crushed like a soda can. You’re right, Jim Crow was ridiculous but also reprehensible. I didn’t come of age under Jim Crow. It was being dismantled when I was a little kid, and our parents and other elders didn’t have anything good to say about it – in fact, they didn’t really talk that much about what they’d gone through. I remember them wanting us to look forward and take advantage of the opportunities they never had! The White view of Blacks changed since then. At the height of US slavery, I doubt Whites feared Blacks much at all. Ethnic Whites also get some benefit from being humbled. They are often closer to their family and typically less naive than non-ethnic Whites. My favorite Blacks are old Southern women. They were not slaves but had to watch their p’s and q’s when they were young. The strongest White on Black oppression was in the Caribbean. A Southern Black’s lineage could go back to early America. their lives were well regarded for the most part. In the Caribbean they could and would order a new batch of slaves after the others were worked to death. So Black Caribbeans are basically the last order.
<urn:uuid:5d941f5e-af62-4c91-aae4-c7b6153f0fa6>
CC-MAIN-2023-23
https://beyondhighbrow.com/2019/10/30/the-price-of-growth-is-humility/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00473.warc.gz
en
0.991772
442
2.625
3
The 50,000 objects in the textile collections fall into two main categories: raw fibers, yarns, and fabrics, and machines, tools, and other textile technology. Shawls, coverlets, samplers, laces, linens, synthetics, and other fabrics are part of the first group, along with the 400 quilts in the National Quilt Collection. Some of the Museum's most popular artifacts, such as the Star-Spangled Banner and the gowns of the first ladies, have an obvious textile connection. The machinery and tools include spinning wheels, sewing machines, thimbles, needlework tools, looms, and an invention that changed the course of American agriculture and society. A model of Eli Whitney's cotton gin, made by the inventor in the early 1800s, shows the workings of a machine that helped make cotton plantations profitable in the South and encouraged the spread of slavery. "Textiles - Overview" showing 1 items. - Carpet Patent Model - Patent No. 1,028, issued December 10, 1838 - John Humphries of New York, New York - Humphries’s innovation was the addition of a supplementary layer to the bottom of a carpet to provide an extra cushion and to strengthen the overall structure. The added stuffer weft is a stout, loosely twisted cord, woven into the underside of the carpet and interlaced with the ground warp. These samples of carpeting are important because they are the earliest known examples of patented carpeting in the United States. - Whether this patent was utilized is unknown but there is evidence of Humphries being involved in the manufacture of carpeting. The Journal of the Franklin Institute lists premiums awarded at their eighth exhibition in 1833. John Humphries was presented a premium for four pieces of Brussels carpeting. The judges noted that “these goods are of excellent quality and style, and satisfactory assurances have been received that they are exclusively of American workmanship throughout all the processes from the raw material to the finished product of the loom.” - Currently not on view - model constructed - before 1838-12-10 - patent date - Humphries, John - ID Number - catalog number - patent number - accession number - Data Source - National Museum of American History, Kenneth E. Behring Center
<urn:uuid:36e80c23-c3e0-44c4-b20a-94206d54fc49>
CC-MAIN-2014-15
http://americanhistory.si.edu/collections/subjects/textiles?edan_start=0&edan_fq=object_type%3A%22Carpets%22&edan_fq=topic%3A%22Inventions%22
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521512.15/warc/CC-MAIN-20140416005201-00437-ip-10-147-4-33.ec2.internal.warc.gz
en
0.941831
482
2.96875
3
Canada is located at the north end of the American region. Its area ranges from the Atlantic Ocean towards the east, the Pacific Ocean to the western side, and to the north to the Arctic Ocean. It takes up almost half the North American territory since it is the 2nd biggest nation after Russia. It borders in America towards the south, and to the northwest with its federal government state Alaska. It is said that the territory was initially ruled by the Inuits. At an archaeological level, there exists proof that the very first natives who first came to Canada, did so through traversing a land bridge which had formed between Asia and Alaska over the last Ice Age around 40,000 years back (More on: eTA Canada ). History shows that the first European contact the country had has been done because of the pursuit created by the Italian John Cabot, who had been cruising after the instructions of King Henry VII of England. In 1497, Cabot ran into the eastern Canadian shoreline and also claimed it for the King. This trip, in conjunction with the subsequent one in 1498, gave England the justification to locate a large number of the eastern part of ??North America; in fact, they consequently claimed Newfoundland, Cape Breton and neighboring areas in line with the exploits of Cabot. In 1534, the French explorer, Jacques Cartier, was designated by King Francisco to have a trip trying to find the Northwest Passage. The idea of ??the king was to uncover wealth such as all those they had seen in Inca and Aztec place, in other words, they were dedicated to looking for gold more than anything else, but Cartier just uncovered “stones and a few awful and sharp rocks” based on what he told in the diary. Cartier continued exploring and arrived on the Gaspé Peninsula (Quebec), whose land he claimed for France. French people enjoyed their luxurious monopoly for several decades, however in 1670 British came out with the goal of forging a monopoly of the fur industry, that led to a legal discussion among those who had on their part the negotiations on territory ownership. However, the balance leaned towardsBritain and also France ceded Canada to the English Crown through theTreaty of Paris in 1763. Then, the federal government passed the Constitutional Law of 1791 that split the region directly into two British colonies called Upper Canada (presently the southern area of Ontario) and Lower Canada (presently southern Quebec). Lower Canada retained French civil laws, but both provinces were ruled by the British penal code. Each and every colony had its assigned ruler and was able to choose its cabinet or executive authorities. Troubles elevated since the federal government and its council were English but led a mostly French assembly, which generated political pressure and also rebellions. The ideas of unification soon appeared nonetheless it wasn’t until 1840 that they were raised as regulation. Both colonies quickly joined in the state of Canada, governed by the completely new Parliament of Canada as the only legislative body. Last but not least, it acquired its self-government in 1867 as well as its autonomy in 1931, continuing to be a Commonwealth empire. And, Newfoundland, which was until then a domain of the United Kingdom, joined up with Canada in 1949. More information: eta canada
<urn:uuid:498173b7-4dd0-41ae-9079-ba122d9a675a>
CC-MAIN-2020-16
http://johndobson.org/canada-its-amazing-location-and-noteworthy-history/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521876.48/warc/CC-MAIN-20200404103932-20200404133932-00527.warc.gz
en
0.98456
673
3.34375
3
‘So, I guess this means I can’t drink water anymore.’ Grade 5 student after looking at a ‘fake’ webpage on the dangers of Dihydrogen Monoxide (H20). A couple of weeks ago, Grade Five teachers asked me to discuss with students how to know if a website is credible with reliable information or is it a website that should not be trusted. We discussed questions that students should be asking when looking at websites: We wanted to stress that just because it is online, does not mean it is true, real or credible. In order to demonstrate this to students, we looked at a fictitious or fake website called ‘Dihydrogen Monoxide – DHMO Homepage’. There are several fabricated websites created by educators to help students see how easy it can be to be fooled. After looking at the www.dhmo.com website, the alarm bells began to ring as students read how ‘dangerous’ Dihydrogen Monoxide is to humans. Students were asked to look at the questions (see image above) and at a certain time, we asked students to cross-reference to verify their findings. Once we tried to verify the Dihydrogen Monoxide website, many students still had difficulty grasping the idea that the information on the original website was false and that Dihydrogen Monoxide was just water… H2O. Things to do at home: - Teach your child to verify sources - Model how to question motivations - Help your child to think critically when researching Below are to articles that go a bit more in depth about this subject: Most Students Don’t Know When News Is Fake, Stanford Study Finds Students Have ‘Dismaying’ Inability To Tell Fake News From Real, Study Finds Source of Website Questions
<urn:uuid:cafb26c6-67e0-4a87-ad3f-3720fb4b0d57>
CC-MAIN-2020-05
https://portfolioforclaire.com/2017/02/04/fake-news/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00294.warc.gz
en
0.951898
385
3.578125
4
Winner, 2008 National Jewish Book Awards, American Jewish Studies category How have Jews reshaped their identities as Jews in the face of the radical newness called America? Julian Levinson explores the ways in which exposure to American literary culture—in particular the visionary tradition identified with Ralph Waldo Emerson and Walt Whitman—led American Jewish writers to a new understanding of themselves as Jews. Discussing the lives and work of writers such as Emma Lazarus, Mary Antin, Ludwig Lewisohn, Waldo Frank, Anzia Yezierska, I. J. Schwartz, Alfred Kazin, and Irving Howe, Levinson concludes that their interaction with American culture led them to improvise new and meaningful ways of being Jewish. In contrast to the often expressed view that the diaspora experience leads to assimilation, Exiles on Main Street traces an arc of return to Jewish identification and describes a vital and creative Jewish American literary culture.
<urn:uuid:90e58929-8ae0-4c02-9372-44c1cc477129>
CC-MAIN-2017-39
http://www.iupress.indiana.edu/product_info.php?products_id=68322
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687582.7/warc/CC-MAIN-20170920232245-20170921012245-00319.warc.gz
en
0.929762
186
2.96875
3
Multicellular animals possess two to three different types of muscle tissues. Striated muscles have considerable ultrastructural similarity and contain a core set of proteins including the muscle myosin heavy chain (Mhc) protein. The ATPase activity of this myosin motor protein largely dictates muscle performance at the molecular level. Two different solutions to adjusting myosin properties to different muscle subtypes have been identified so far: Vertebrates and nematodes contain many independent differentially expressed Mhc genes while arthropods have single Mhc genes with clusters of mutually exclusive spliced exons (MXEs). The availability of hundreds of metazoan genomes now allowed us to study whether the ancient bilateria already contained MXEs, how MXE complexity subsequently evolved, and whether additional scenarios to control contractile properties in different muscles could be proposed, By reconstructing the Mhc genes from 116 metazoans we showed that all intron positions within the motor domain coding regions are conserved in all bilateria analysed. The last common ancestor of the bilateria already contained a cluster of MXEs coding for part of the loop-2 actin-binding sequence. Subsequently the protostomes and later the arthropods gained many further clusters while MXEs got completely lost independently in several branches (vertebrates and nematodes) and species (for example the annelid Helobdella robusta and the salmon louse Lepeophtheirus salmonis). Several bilateria have been found to encode multiple Mhc genes that might all or in part contain clusters of MXEs. Notable examples are a cluster of six tandemly arrayed Mhc genes, of which two contain MXEs, in the owl limpet Lottia gigantea and four Mhc genes with three encoding MXEs in the predatory mite Metaseiulus occidentalis. Our analysis showed that similar solutions to provide different myosin isoforms (multiple genes or clusters of MXEs or both) have independently been developed several times within bilaterian evolution. Citation: Kollmar M, Hatje K (2014) Shared Gene Structures and Clusters of Mutually Exclusive Spliced Exons within the Metazoan Muscle Myosin Heavy Chain Genes. PLoS ONE 9(2): e88111. https://doi.org/10.1371/journal.pone.0088111 Editor: Gerhard Wiche, University of Vienna, Max F. Perutz Laboratories, Austria Received: November 2, 2013; Accepted: January 7, 2014; Published: February 3, 2014 Copyright: © 2014 Kollmar, Hatje. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Funding: This research was supported by DFG grant KO2251/6-1. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Competing interests: The authors have declared that no competing interests exist. Alternative splicing of mutually exclusive exons (MXEs) is an important mechanism to increase the protein diversity in eukaryotes . MXEs are neighboring exons that are spliced in a mutually exclusive manner into the mature transcript. In addition to identical reading frames and splice site patterns, these exons in almost all cases have similar lengths and show sequence similarity . In vertebrates, MXEs have only been found in pairs. In contrast, larger clusters have been found in many insect genes – with even more than 50 MXEs per cluster in Drosophila Dscam genes . In addition, genes can contain several clusters of MXEs giving rise to remarkable numbers of potential transcripts , . As implied by the characteristics of MXEs, the resulting protein structures are identical except for the small regions, in which the different MXEs are incorporated to fine-tune protein function. The Drosophila melanogaster muscle myosin heavy chain (Mhc) gene is a well-analysed example for a gene with multiple clusters of MXEs –. Four of its five clusters of MXEs encode parts of the myosin motor domain. Through specific combinations of MXEs the mechanochemical properties of the Mhc's are changed and adjusted to the needs of the different muscle types in a spatiotemporal manner. This is in contrast to other organisms of the metazoan lineage, which have a family of muscle myosin heavy chain genes with each gene coding for a protein specialized for a functional niche –. The muscle myosin heavy chain genes of 22 arthropod species ranging from waterflea to wasp and Drosophila have been annotated . The analysis of the gene structures allowed the reconstruction of an ancient arthropod muscle myosin heavy chain gene and showed that during evolution of the arthropods introns have mainly been lost in these genes although intron gain might have happened in a few cases. Compared to the well-studied gene of Drosophila melanogaster other arthropod genes might contain up to four additional alternatively spliced exons encoding part of the motor domain. This considerably extends the possibilities of other arthropod species to fine-tune myosin and thus muscle characteristics. Based on recently finished genome assemblies of many arthropods and other metazoan species we have analysed the evolution of the Mhc gene across metazoans with a focus on those encoding clusters of MXEs. 116 species have been analysed, the respective Mhc genes identified and reconstructed and the mutually exclusive splicing pattern elucidated, if such splice variants existed. Examples of Lepidoptera, Diptera, and Hymenoptera Mhc genes have already been analysed and described in detail elsewhere and we will therefore focus on recently sequenced species and new clusters of MXEs. Results and Discussion Assembly of sequences and tree generation The muscle myosin heavy chain genes belong to the class-II myosins. At the sequence level, muscle myosin subtypes can only be distinguished from the non-muscle myosin isoforms if homologs from closely related species are available. To ensure that we did not miss duplicates or divergent homologs, we first identified and assembled all class-II myosins in the analysed metazoans and then verified muscle and non-muscle subtypes by phylogenetic grouping with known examples obtained from . The muscle myosins were collected and a comparative phylogenetic analysis was performed using the Neighbour-Joining (NJ), Maximum-Likelihood (ML), Bayesian and split network approaches (Figure 1, Figure S1). As outgroup we choose the non-muscle myosins from four Schizosaccharomyces species. The topologies of the trees are similar and in accordance with recent species phylogenies, grouping for example nematode sequences closest to arthropod sequences and Platyhelminths within the Lophotrochozoa. These trees were therefore used as basis for the analysis of MXE cluster gain and loss events along the metazoan history. The network presents alternative splits in the evolution of the muscle myosin heavy chain (Mhc) proteins. The Schizosaccharomyces non-muscle Mhc proteins have been used as outgroup. The phylogenetic trees based on the same data using three different methods are shown in Figure S1. Clusters of MXEs within the muscle myosin genes were predicted with WebScipio , which determines MXEs based on reading frame conservation, sequence similarity, and lengths constraints. Mutually exclusive inclusion of these exons in transcripts could be shown for many genes based on EST/cDNA data available at GenBank. EST/cDNA data was also used to confirm many of the differentially included C-terminal exons. The gene structures of the Mhc genes were compared at the base-pair level to reveal intron positions and clusters of MXEs conserved between branches (Figure 2A). It has already been pointed out in a previous comparison of the gene structures of 25 arthropod Mhc genes that in general introns had been lost during evolution and not gained . Within the motor domain coding region, all intron positions were found to be conserved in at least two of the sequences, while there were still many unique intron positions in the coiled-coil tail region. The motor domain coding region of the proposed ancient arthropod Mhc gene was predicted to resemble the Daphnia Mhc1 gene . Proposed common exons of the coiled-coil tail coding region of the ancient Mhc gene would have been two to three times longer than common exons coding for the motor domain . Our analysis here shows that all intron positions within the motor domain coding regions of the analysed Mhc genes are conserved across the bilateria and must have therefore been present in the ancient bilaterian Mhc gene (Figure 2A). The only exception is the intron following MXE cluster-6, which is shifted by 1 bp in arthropods. The other positions that do not seem to be shared in the scheme are located after loop-1 and within loop-2 where the protein sequence alignment is ambiguous. The gene structure alignment also shows that most of the intron positions within the coiled-coil tail region are conserved between at least two of the sequences shown (almost all positions are conserved across all 116 species of this analysis; data not shown) implicating that these were all present in the ancient bilaterian muscle Mhc gene (Figure 2A). This strongly supports our previous notion that the ancient Mhc gene was intron-rich and that most of its introns got lost during subsequent evolution. A) The gene structure alignment was generated with Genepainter by mapping intron positions obtained from the gene structure reconstructions onto the protein multiple sequence alignment. Genepainter requires intron positions not only conserved at the amino-acid level but also at the nucleotide level (codons might be split differently). Hyphens “-” represent coding regions and vertical bars “|” denote intron positions. Common intron positions in the gene structure alignment are conserved down to the nucleotide level. Conserved clusters of MXEs are colour coded and numbered from N- to C-terminus (see legend). The same colour coding and numbering scheme will be used throughout this analysis for all MXEs. Some branch names are given for better orientation. B) The structure of the motor domain of the non-muscle class-II myosin of Dictyostelium discoideum has been used to highlight the regions encoded by alternatively spliced exons. For colouring the regions encoded by MXEs the same colours have been used as for the gene structures in A). The clusters of MXEs not described so far code for the light-green (cluster-3) and the dark-brown (cluster-4) part of the structure. Location of the MXEs within the myosin motor domain The locations and potential mechanochemical functions of the alternatively spliced exons in the motor domain of Drosophila melanogaster Mhc1 and those of newly predicted exons in Daphnia pulex Mhc1 have already been described in detail elsewhere (, , Figure 2B). Briefly, the MXEs of cluster-1 encode the transition of the N-terminal SH3-like domain to the myosin motor domain, have been shown to be highly conserved between arthropods , and influence the maximum power generation . Except for Daphnia, cluster-2 (coding for the P-loop, the subsequent α-helix and loop-1) has been described as alternatively spliced exon in the scallops Argopecten irradians and Placopecten magellanicus although genomic sequence data is only available for the coiled-coil tail region of Argopecten. Argopecten and Placopecten have also been shown to contain two MXEs within cluster-3, which comprises the exon following cluster-2 (coding for the region from the end of loop-1 until the end of switch-1). By alternative encoding of clusters-2 and -3 the entire region from the P-loop over loop-1 to switch-1 can be adjusted (Figure 2B). However, the main differences between the scallop MXEs are in the loop-1 coding region that has been shown to effect ADP release kinetics –. Longer loop-1 regions lead to higher ADP release rates and an increase in actin sliding velocity. The annelids contain an annelid-specific new cluster of MXEs: cluster-4 (Figure 2B), which encodes a central part of the upper 50 kDa domain. To our knowledge, mutants within the cluster-4 region have not been studied so far. The region encoded by cluster-5 MXEs seems to affect muscle fiber kinetics . The region of the motor domain encoded by cluster-6 MXEs has not been investigated so far and therefore functional consequences of differences in the two variants cannot be drawn. Loop-4 has been postulated to be important for the proper localization of class-I myosins containing elongated loops that might sterically interact with actin-binding proteins . However, the loop-4 sequences of the Daphnia DapMhc1 and Capitella CptMhc1 cluster-6 variants are almost identical implying that the MXEs modulate a different property of the motor domain. The MXEs of cluster-7 encode the relay-helix and relay-loop, which transform the movement of switch-2 into the rotation of the converter and the lever arm , . The region encoded by cluster-8 MXEs comprises the C-terminal part of loop-2 and the beginning of the subsequent α-helix (Figure 2B). Studies of the Dictyostelium discoideum class-2 myosin with its loop-2 replaced by the analogous loop from four other myosins with different enzymatic activities showed that loop-2 is involved in the weak and the strong binding interactions with actin . It also plays an important role in the rate-limiting step of Pi release , . The MXE cluster-9 that was unique to Daphnia so far has been identified in many other lophotrochozoan and arthropod Mhc genes here. The region encoded by cluster-9 has, to our knowledge, not been investigated so far. The converter domain region encoded by MXE cluster-10 has been shown to influence the base ATPase activity and actin sliding velocity . Cluster-11 locates to a hinge region in the coiled-coil tail and has been proposed to influence sarcomere lengths by forming a stable or less stable coiled-coil region . The two MXEs are highly conserved between the protostomes with exon type A (5′ exon of the cluster) and type B correlating with fast and slow muscle physiological properties, respectively. MXE in Mnemiopsis leidyi Mhc genes (ctenophore) Ctenophores are thought to form a sister-group to the bilateria, either separate to the cnidarians or together with the cnidarians forming a coelenterate clade . A recent analysis of the cydippid ctenophore Pleurobrachia pileus revealed three paralogous class-II myosin genes of which one grouped to the non-muscle genes and the other two grouped as cluster of gene duplicates to the muscle myosin genes . The draft genome of Mnemiopsis leidyi, the only ctenophore sequenced so far, also contains three Mhc genes with two grouping to the muscle Mhc genes (Figure 1 and Figure 3). The Mhc1 gene corresponds to the Pleurobrachia “PpiMHCIIb1” gene and the Mhc2 gene is the ortholog of “PpiMHCIIb2”, which is only present as short C-terminal fragment in the available EST data. Localization studies suggest that “PpiMHCIIb2” has strictly non-muscular expression . This is very difficult to interpret, as this would be the only Mhc gene of the striated muscle Mhc gene branch not being present in muscle structures. Because the “PpiMHCIIb2” gene fragment only covers some part of the coiled-coil tail domain it is not known whether this gene also contains a cluster of MXEs coding for part of the motor domain like the orthologous Mhc2 gene from Mnemiopsis (Figure 3). The MXEs code for the region starting within the α-helix after the P-loop, covering loop-1 and switch-1, and ending with the loop succeeding the following β-strand. The main differences between the translations of the two MXEs are in loop-1, which is nine residues longer in the 3′ exon, and the short loop after the β-strand. As indicated above, loop-1 is influencing access to the nucleotide-binding site with longer loops leading to lower ADP affinities. Thus, the two Mhc2 isoforms are predicted to show remarkably different ADP release rates while the remaining mechanochemical properties like actin-binding or the potential size of the power stroke are unaffected. Exons and introns are represented as dark- and light-grey bars, respectively, MXEs are shown in colour. The opacity of the colour of the 3′ of the alternative exons corresponds to the alignment score of the alternative exon to the original one (5′ exon). A legend is given explaining the colour coding of features within the gene structure schemes. On the right side, the structural region covered by the MXEs is shown mapped onto the crystal structure of the motor domain of the Dictyostelium discoideum non-muscle myosin protein . MXEs in lophotrochozoan Mhc genes The Platyhelminthes Hymenolepsis, Echinococcus, Taenia, Schmidtea, Clonorchis, and Schistosoma contain two MXEs in cluster-8 of their Mhc genes (Figure 4A, Figure S2). Across the species, these two exons are highly conserved implying that the last common ancestor of the Platyhelminthes already had this cluster of MXEs. The exons of cluster-8 encode different versions of loop-2 , which comprises an important part of the actin-binding site, and the Platyhelminthes can thus express muscle myosins with modulated actin-binding properties. So far, only muscle myosins of the cestode parasite Taenia solium have been investigated biochemically , . Taenia exists in two developmental stages, cysticerci (larvae) and tapeworms (adults). Myosins were extracted from both stages and their ATPase activity determined in the presence of actin showing a higher activity in the tapeworm sample . These experimental results can now be interpreted in terms of the sequence data. The sequence data suggest.two myosin isoforms with different loop-2 regions and thus different actin-activated ATPase activity. In addition, the experimental data indicates that the inclusion of the MXEs into the final transcript is developmentally regulated in Platyhelmintes. Proposed additional smaller isoforms in the experimental study are most probably artefacts from proteolysis. The transcript sequence determined from a muscle myosin from adult Schistosoma mansoni is identical to the sequence derived from genomic DNA as reported here. Mutually exclusive exon A (5′ exon of the cluster) is included in this sequence implying that exon B is the version spliced into the larval Mhc transcript. The sequence similarity of the MXEs of the Platyhelminthes Mhc genes (Figure 4B) suggests that the MXE-splicing in Schistosoma can be transferred to Taenia and accounts for all Platyhelmintes. The Platyhelmintes Mhc isoforms including exon B (3′ exon of the cluster) would thus be the isoforms with the lower ATPase activity. The freshwater planarian Schmidtea mediterranea (Scm) is different to the other Platyhelminthes as its genome contains three different muscle Mhc genes, of which two contain MXE cluster-8 (Figure 4A). The three genes are not ordered in tandem in the genome, but ScmMhcA and ScmMhcC are closely related (Figure 1) and therefore most probably the result of a recent gene duplication. A) The freshwater planarian Schmidtea mediterranea contains three Mhc genes. In all gene structure schemes exons and introns are represented as dark- and light-grey bars, MXEs are shown in colour. The opacity of the colour of the 3′ of the alternative exons corresponds to the alignment score of the alternative exon to the original one (5′ exon). B) Sequence alignment of the myosin proteins of the analysed Platyhelminthes around the loop-2 region. The part of loop-2, which is encoded by MXEs, is indicated. The sequences of the 5′ exons are very similar across the Platyhelminthes, as are the 3′ exons, implying that the ancestor of the Platyhelminthes already contained this cluster of MXEs. Two annelids have been sequenced so far, the freshwater leech Helobdella robusta and the marine polychaete Capitella teleta . Helobdella contains two muscle myosin heavy chain genes, which both do not contain any clusters of MXEs (Figure 5A). They are not organized in tandem but are most probably the result of a species-specific or leech branch-specific gene duplication after the ancient gene lost the MXE clusters. In contrast, the Capitella Mhc gene contains seven clusters of MXEs and three differentially included C-terminal exons (evidence by EST data; Figure 5A) providing the potential for many alternatively spliced transcripts. The MXEs are distributed in clusters-3, -4, -5, -6, -8, -9, and -11. So far, the Capitella MXE cluster-9 is the only cluster-9 with more than two MXEs. The cluster-9 exons encode a β-strand of the central β-sheet of the motor domain (Figure 5B). In addition, the Capitella Mhc contains a so far unique cluster, cluster-4, which is part of the upper 50 kD domain. A) The annelid Helobdella robusta contains two Mhc genes without any clusters of MXEs, while the annelid Capitella teleta contains one Mhc gene with many clusters of MXEs and three differentially included exons at the C-terminus. B) The structural regions covered by MXEs present in lophotrochozoans are shown mapped onto the crystal structure of the motor domain of the Dictyostelium discoideum non-muscle myosin protein . C) Examples of representative mollusc Mhc genes showing the divergence in MXE clusters in the respective subphyla. D) Gene structures of the muscle Mhc genes in the owl limpet Lottia gigantea. The scheme at the bottom shows the genomic region of the cluster of Mhc genes including the Mhc8 gene that encodes only part of the coiled-coil tail region. Reading direction is designated by arrows. Colours of exons in the Mhc gene cluster represent exons coding for a similar part of the protein. In all gene structure schemes exons and introns are represented as dark- and light-grey bars, MXEs are shown in colour. The opacity of the colour of the 3′ of the alternative exons corresponds to the alignment score of the alternative exon to the original one (5′ exon). The vertical red line in the genomic region scheme at the bottom represents a region of unknown sequence (“N”s). The complete list of lophotrochozoan Mhc genes is shown in Figure S2. The sequenced molluscs show a broad variety of Mhc genes from single genes in the California sea hare Aplysia californica (Figure 5C) to clusters of Mhc genes in the owl limpet Lottia gigantea (Figure 5D). The Pacific oyster Crassostrea gigas (Bivalvia clade) contains two Mhc genes with different sets of clusters of MXEs. The Mhc1 gene contains clusters-5 and -11, and the Mhc2 gene includes clusters-2, -3, and -11, of which the cluster-11 is the only cluster-11 so far with more than two MXEs. The ancestral bivalvian Mhc gene must have had the combination of the clusters of the two Mhc genes, and different MXEs had subsequently been lost in the duplicated Mhc genes. The catch and striated adductor muscle Mhc isoforms of the bay scallop Argopecten irradians and the sea scallop Placopecten magellanicus have been sequenced , . These transcripts contain the MXE cluster combinations 2a, 3b, 11b (isoform A, catch muscle) and 2b, 3a, 11a (isoform B, striated muscle), which can also be generated by alternative splicing of the Crassostrea CagMhc2 gene (Figure 5C). For Crassostrea a cDNA library generated from mixed adult tissues is available. Several clones code for the MXE combination 2b, 3b, while only a single clone is available for the 2b, 3a combination and none for the combination 2a, 3b. However, most cDNA clones cover the Mhc1 gene, which therefore seems to be the ubiquitously expressed isoform in Crassostrea. The gastropods Aplysia and Biomphalaria glabrata (a neotropical snail) contain single Mhc genes with MXEs in clusters-2, -3, -8, and -11, and clusters-2, -3, and -8, respectively (Figure 4). Lottia (gastropod) contains an extended array of seven Mhc genes arranged in tandem, of which Mhc8 only codes for the coiled-coil tail region of a myosin (Figure 5D). Expression of Mhc8 is supported by many EST clones and the gene starts exactly at the same position where the alternatively spliced scallop Mhc isoform catchin begins . However, the catchin isoforms contain a long unique N-terminal exon, that is present in Aplysia Mhc1, Biomphalaria Mhc1, Crassostrea Mhc2, and Lottia Mhc6 but not present in Lottia Mhc8 (Figure S3). Similar to catchin, a so-called myosin rod protein has been identified in Drosophila melanogaster as result from an alternative transcript of the myosin coiled-coil tail region . This myosin rod protein is about 260 residues longer than catchin and formed by an alternative start site to the first exon following the myosin motor and light-chain binding domains (exon 12 in D.melanogaster). In contrast to the catchin proteins the N-termini of the myosin rod proteins are not even conserved between the Drosophila species and their closest relatives, the mosquitoes, or within other closely related species. For example, in the beetles Tribolium castaneum and Dendroctonus ponderosae the 5′ extensions to exon 17 and exon 18, respectively, which would correspond to the D.melanogaster myosin rod protein, would be 16 and 101 residues. As long as mRNA or other experimental data is missing for any myosin rod protein homolog to the D.melanogaster protein, these isoforms cannot reliably be predicted. The Lottia Mhc1 gene is encoded in the opposite direction to the other genes of the cluster. The Mhc6 gene includes MXEs in clusters-2, -3, -5, and -8, and contains three differentially included C-terminal exons (evidence by EST data). The Mhc5 gene contains two MXEs in cluster-3, and the remaining Mhc genes do not have any clusters of MXEs. This is in agreement with our phylogenetic analysis (Figure 1) that shows that the Mhc6 gene is the most ancient gene of the cluster followed by the Mhc5 and Mhc4 genes. Every duplicated gene in the tandem array of Mhc genes lost clusters of MXEs (from Mhc6 to Mhc5 and Mhc4) and introns (from Mhc6 to Mhc5, from Mhc4 to Mhc3, and from Mhc2 to Mhc1). Five muscle tissues of mollusc from a different sub-branch, the squid Doryteuthis pealeii (Cephalopda clade) have been studied . Although the ultrastructure and contractile properties of these tissues are significantly different, they all contain the same three myosin isoforms. These isoforms differ in the C-terminus and by the region covered by MXE cluster-3. Because both cluster-3 isoforms are present in the muscle tissues it has been argued that differences in ultrastructure and not myosin ATPase activity are crucial for tuning contractile speed in Doryteuthis . However, different average ATPase activities could also be achieved by differences in the relative levels of the isoforms, which could control contractile properties in different muscles. Apart from tuning myosins by alternative splicing or gene duplications there might therefore be additional mechanisms triggering muscle ultrastructure and performance. MXEs in Chelicerata (Arachnida) and Chilopoda Mhc genes The centipede Strigamia maritima is the only Chilopoda sequenced so far and its Mhc gene contains all arthropod MXE clusters except clusters-2, -6, and -11. The sequenced Chelicerata include the red spider mite Tetranychus urticae, the deer tick Ixodes scapularis, the predatory mite Metaseiulus occidentalis, the common house spider Parasteatoda tepidariorum, and the scorpion Centruroides sculpturatus (Figure 6, Figure S2). The Chelicerata Mhc genes are characterised by many but small clusters of two to three MXEs. The Tetranychus Mhc gene contains two MXEs in each of the clusters-5, -7, -9, -10, and -11. The Ixodes Mhc gene in addition contains clusters-1 and -2. Metaseiulus contains four Mhc genes (Mhc1, Mhc3, Mhc4, and Mhc5), of which three include clusters of MXEs (Figure 6). The Mhc3, Mhc4, and Mhc5 genes are organized in tandem and most probably appeared by recent gene duplications. Mhc4 and Mhc5 contain clusters-10 and -11, while Mhc3 only contains cluster-10. Parasteatoda and Centruroides each contain two Mhc genes together forming two distinct subclasses (Figure 1). Although the Mhc genes of Parasteatoda and Centruroides are closely related they encode different types of clusters. The Parasteatoda Mhc1 contains two MXEs in clusters-5, -7, -9, and -11, while the Centruroides Mhc1 contains three MXEs in cluster-5 and two MXEs in clusters-7, -9, and -10 (Figure 6). EST data from tarantula skeletal muscle tissue have been obtained but the assembled EST contigs were too fragmented to reveal the total number of Mhc genes although alternative transcripts were detected. Metaseiulus occidentalis contains four Mhc genes of which the ones with MXE clusters are arranged as tandem array of gene duplicates (Mhc3, Mhc4 and Mhc5). Parasteatoda tepidariorum and Centruroides sculpturatus both contain two Mhc genes. The complete list of Chelicerata Mhc genes is shown in Figure S2. Exons and introns are represented as dark- and light-grey bars, MXEs are shown in colour. The opacity of the colour of the 3′ of the alternative exons corresponds to the alignment score of the alternative exon to the original one (5′ exon). MXEs in crustacean Mhc genes Crustacea are a sister group to Hexapoda (Figure 1). The Daphnia pulex (branchiopoda branch) Mhc gene contains MXE clusters-1 and -2, and clusters-5 to -11, and has been described in detail elsewhere (Figure S2). The other crustacean species analysed is the salmon louse Lepeophtheirus salmonis (copepod branch) that contains 17 muscle myosin heavy chain genes without any clusters of MXEs (Figure S2). These myosins split into two major groups of seven (Mhc10 - Mhc16) and nine isoforms (Mhc1 - Mhc9), and a more distant homolog (Mhc17, Figure 1). Recently, the draft genome of another copepod, the calanoid Eurytemora affinis, became available, which contains a similar amount of muscle myosin heavy chain genes without MXEs (data not shown). This implies that the last common ancestor of the copepods must have developed an MXE-less muscle myosin heavy chain gene followed by extensive gene duplications. Multiple Mhc genes have experimentally been found in shrimps – and gammarid amphipods and some could be obtained in full-length (Figure 1). These group closer to the Lepeophtheirus Mhc genes than to the Daphnia Mhc1 implying that encoding of multiple, but not alternatively spliced Mhc genes is a common characteristic of many crustaceans. MXEs in insect Mhc genes Within the Insecta, genome assemblies are only available for species of Pterygota, which branches into Palaeoptera and Neoptera (Figure 7 and Figure S2). The insects lost MXE cluster-9 compared to Crustacea. MXE cluster-2 is currently restricted to the Palaeoptera (Figure 7) implying that it had been lost in the ancestor of the Neoptera. In the Neoptera branch, genome assemblies are now available for species of the geni Paraneoptera, Amphiesmenoptera (Lepidoptera and Trichoptera), Coleoptera, Diptera, Hymenoptera, and Strepsiptera that all contain MXE clusters-1, -5, -7, -10, and -11. Between clusters-7 and -10 there are five exons in the ancient insect gene, of which the middle exon is often mutually exclusive spliced (cluster-8). In Diptera, all five exons are fused to a single exon. In Hymneoptera, the last four exons are fused, and in Strepsiptera the first two and the last three are fused (Figure S2). Therefore, cluster-8 is missing in these genes. The Paraneoptera and Amphiesmenoptera have the five exons including MXE cluster-8, while either or both of the neighbouring exons of MXE cluster-8 are fused in the various Coleoptera. Based on the molecular phylogeny of the species (Figure 1) this implies that this full set of MXEs (clusters-1, -5, -7, -8, -10, and -11) must have been present in the last common ancestor of the Neoptera and independently been lost in Hymenoptera, Diptera, and Strepsiptera in the course of exon fusion events. Extensive exon fusions have already been reported for arthropod Mhc genes . The Neoptera have two MXEs in clusters-1 and -11, and, in general, three or four MXEs in cluster-5, three to six MXEs in cluster-7, and three to five MXEs in cluster-10. Exceptions are the mountain pine beetle Dendroctonus ponderosae and the glassy-winged sharpshooter Homalodisca vitripennis Mhc genes that show the highest complexity having seven and nine MXEs in cluster-7, respectively, and the human body louse Pediculus humanus corporis Mhc gene that has the lowest complexity with only two MXEs in cluster-5 and missing cluster-10 (Figure 7). The examples have been chosen because of the unusual combinations of clusters of MXEs or because of unusual high or low numbers of MXEs within clusters. The complete list of arthropod Mhc genes is shown in Figure S2. Exons and introns are represented as dark- and light-grey bars, MXEs are shown in colour. The opacity of the colour of the 3′ of the alternative exons corresponds to the alignment score of the alternative exon to the original one (5′ exon). MXEs in deuterostomian Mhc genes Three genomes are available from Echinodermata, which are all from sea urchins, and the genome of the acorn worm Saccoglossus kowalevskii that belongs to the Hemichordata (Figure 1 and Figure S2). These species each contain two MXEs within cluster-8. Both versions in Strongylocentrotus purpuratus and Saccoglossuus kowalevskii are supported by EST data. Evolution of the metazoan MXE containing Mhc genes Previously, it has been thought that there are mainly two possibilities for a species to provide different muscle myosin heavy chain genes for the different muscle types: the species could either express a set of separate Mhc genes or have a single gene but generate different Mhc transcripts by alternative splicing of mutually exclusive exons. Sets of Mhc genes have been found in the nematode Caenorhabditis elegans, the tunicate Ciona intestinalis, and vertebrates , , and single genes with complex patterns of clusters of MXEs covering half of the motor domain have been identified in arthropods . Here, we could show that sets of Mhc genes are not restricted to nematodes and chordates and that Mhc genes with MXEs are not only found in arthropods. Instead, large sets of Mhc genes are found for example in crustaceans and molluscs, and MXEs have been predicted in all bilateria except chordates, and even in a sequenced ctenophore (Figure 8). Also, there are species that contain several Mhc genes like Crassostrea gigas, Helobdella robusta, Lottia gigantea and Lepeophtheirus salmonis. In addition, several or all of these duplicated Mhc genes can include clusters of MXEs, and the set of MXE clusters can either be identical or different in the duplicated genes. The only Ctenophora sequenced, Mnemiopsis leidyi, contains a cluster of MXEs that does not correspond to any other known cluster and has therefore been named cluster-0. The tree is shown as schematic tree representing known phylogenetic relationships to which MXE cluster loss and gain events were plotted. MXE clusters were regarded as gained in the last common ancestor of the branch, which contains species encoding these clusters. According to this scheme, five clusters have evolved in the last common ancestor of the Protostomia, and a set of three clusters later at the onset of the arthropods. There are many branches and species that completely lost all clusters of MXEs in their Mhc genes. Coloured boxes represent MXE cluster gain events (tree view, left side) and their presence within a certain branch (table, right side). Crossed boxes denote MXE cluster loss events. MXEs in light-colour symbolize clusters of MXEs that were supposed to be present but could not be approved because of genome assembly gaps (Figure S2). To trace the evolution of MXE clusters within the bilateria we regarded every cluster of MXEs present in two species as also present in the last common ancestor of these species. This excludes the possibility that the respective cluster of MXEs could have also appeared independently in several branches. However, as all clusters except cluster-4 are present in many species from different branches a common origin is far more likely than an independent invention. Most bilateria have cluster-8 of MXEs, which therefore most probably first appeared in the last common muscle Mhc gene of the bilateria (Figure 8). At the onset of the Protostomia, five further clusters of MXEs, clusters-2, -5, -6, -9, and -11, have been introduced, that have subsequently been lost in the Platyhelminthes. Many analyses have shown that the phylum Platyhelminthes groups close to the Annelida and the Mollusca within the Lophotrochozoa , although is seems unreasonable that the ancient Platyhelminthes immediately lost the five clusters of MXEs, which were just shortly derived before. However, it must have been a strong selective advantage for the ancient protostome to have many of the exons coding for the motor domain duplicated forming an extensive set of MXEs. Similarly to the Platyhelminthes, the nematodes lost all clusters of MXEs and instead developed sets of different Mhc genes. The ancestor of the arthropods duplicated further exons resulting in three further clusters of MXEs (Figure 8). During the subsequent evolution of the arthropods, several of the MXEs got lost independently in many sub-branches. Only the water flea Daphnia pulex has retained the full set of MXE clusters. Based on the data presented here it seems that all clusters of MXEs evolved early in metazoan evolution, namely in the ancestor of the protostomes, the ancestor of the arthropods, and the last common ancestor of the annelids and molluscs. The subsequent evolution in all bilateria is characterised by branch-specific MXE cluster loss events, which happened through loss of alternative exons or by fusion of previously alternative exons with neighbouring constitutive exons. While the emergence of clusters of MXEs can be traced back to the early bilateria, the expansion of already existing clusters has been shown to be, at least in part, specific to recent branches and extant species . The number of clusters together with the number of MXEs within clusters and, in many species, different Mhc genes allow for a wealth of expressed myosin proteins adapted to all kinds of muscle tissues. It is well known from Drosophila that not all possible combinations of MXEs are realized and this might also be true for the other bilateria but it seems likely that many combinations are in fact expressed although not experimentally confirmed yet. However, because most studies have focused on major muscle tissues so far, improved experimental tissue separation techniques together with single-cell sequencing are expected to reveal the entire complexity of myosin transcripts in animals. Materials and Methods Identification and annotation of the myosin heavy chain genes The myosin heavy chain gene data from the 22 arthropods available in 2007 were obtained from . The sequences were updated based on newer genome assemblies if necessary. The other myosin genes have essentially been obtained as described in . Shortly, myosin genes have been identified in TBLASTN searches starting with the protein sequence of the Drosophila melanogaster muscle myosin heavy chain. The respective genomic regions were submitted to AUGUSTUS to obtain gene predictions. However, feature sets are only available for a few arthropod species. Therefore, all hits were subsequently manually analysed at the genomic DNA level. When necessary, gene predictions were corrected by comparison with the other myosins as included in the multiple sequence alignment. Where possible, EST data have been analysed to help in the annotation process. In the last years, genome sequencing efforts have been extended from sequencing species from new branches to sequencing closely related organisms. Here, these species include for example seven ant species, 23 Drosophila species, and eleven species of the Anopheles genus. Protein sequences from these closely related species have been obtained by using the cross-species functionality of WebScipio , . Nevertheless, also for all these genomes TBLASTN searches have been performed. With this strategy, we sought to ensure that we would not miss more divergent myosin homologs, which might have been derived by species-specific inventions or duplications. Gene duplicates have previously been identified in Aedes aegypti and Culex pipiens , and were identified here in for example Metaseiulus occidentalis, Helobdella robusta, and Lottia gigantea. The annotated protein sequences were subsequently used to detect mutually exclusive spliced exons by using an algorithm implemented in WebScipio . Default options were used for the specificity of the prediction (length difference = 20 aa, minimal score = 15%). Because muscle myosin genes contain short exons, especially one spanning loop-2 and being mutually exclusive spliced in known examples , the search space was increased to smaller exons (minimal exon length = 10 aa). The search was restricted to internal and surrounding MXEs. Tandem arrangement of gene duplicates was determined by gene locations on contigs and reconstructed using a plugin implemented in WebScipio . All sequence related data (protein names, corresponding species, sequences, and gene structure reconstructions) and references to genome sequencing centres are available at CyMoBase (http://www.cymobase.org, ). A list of the analysed species, their abbreviations as used in the alignments and trees, as well as detailed information and acknowledgments of the respective sequencing centres are also available as Table S1. WebScipio , was used for reconstruction and visualization of the gene structure (i.e. the exon/intron pattern including clusters of MXEs) of each sequence. Generating the multiple sequence alignment The muscle myosin heavy chain sequences were added to the structure-guided multiple sequence alignment obtained from . In detail, we first aligned every newly predicted sequence to its supposed closest relative using ClustalW and added it then to the multiple sequence alignment. During the subsequent sequence validation process, we manually adjusted the obtained alignment by removing wrongly predicted sequence regions and filling gaps. Still, in those sequences derived from low-coverage genomes many gaps remained. To maintain the integrity of exons preceded or followed by gaps, gaps reflecting missing parts of the genomes were added to the multiple sequence alignment. The sequence alignment is available from CyMoBase or Dataset S1. Computing and visualising phylogenetic trees As outgroup, non-muscle class II myosin sequences from Schizosaccharomyces octosporus, Schizosaccharomyces cryophilus, Schizosaccharomyces pombe, and Schizosaccharomyces japonicus were added to the multiple sequence alignment. The phylogenetic trees were generated using four different methods: Neighbour Joining, Maximum likelihood, Bayesian inference and split networks. 1. ClustalW v.2.0.10 was used to calculate unrooted trees with the Neighbour Joining method. For each dataset, bootstrapping with 1,000 replicates was performed. 2. Maximum likelihood (ML) analysis with estimated proportion of invariable sites and bootstrapping (1,000 replicates) were performed using RAxML . First, ProtTest v.3.2 was used to determine the most appropriate of the available 120 amino acid substitution models . Within ProtTest, the tree topology was calculated with the BioNJ algorithm and both the branch lengths and the model of protein evolution were optimized simultaneously. The Akaike Information Criterion with a modification to control for small sample size (AICc, with alignment length representing sample size) identified the RtREV model with gamma model of rate heterogeneity and empirical base frequencies to be the best model available in RAxML. 3. Posterior probabilities were generated using MrBayes v.3.2.1 . Using the mixed amino-acid option, two independent runs with 4,000,000 generations, four chains, and a random starting tree were performed. MrBayes used the WAG model for all protein alignments. Trees were sampled every 1.000th generation and the first 25% of the trees were discarded as “burn-in” before generating a consensus tree. 4. An unrooted phylogenetic split network was generated with SplitsTree v.4.13.1 . The NeighborNet method as implemented in SplitsTree was used to identify alternative splits. Phylogenetic trees and networks were visualized with FigTree v.1.3.1 , iTOL v.2.2.2 and SplitsTree, respectively, and are available as Figure S1. Phylogenetic trees. This file contains the phylogenetic trees. The coloured, circular tree was generated with RAxML and the linear trees were generated with ClustalW, RAxML and MrBayes. Bootstrap support values and posterior probabilities are reported in absolute values (ClustalW) and relative values (RAxML and MrBayes). Mhc gene structure schemes. This file displays the gene structures including clusters of predicted MXEs for all sequences analysed. Exons and introns are scaled in cases, in which the combined intronic regions are longer than the exons, such that both exons and introns represent half of the total width of the scheme. Two neighboring exons in Lasioglossum albipes and Mayetiola destructor are identical (red color) but these exons do not belong to the known clusters of MXEs. Either, these exons are derived from sequencing or assembly problems, or represent recent species-specific generations of new clusters of MXEs. Detailed gene structure schemes of the lophotrochozoan Mhc genes. This file displays the gene structures including clusters of predicted MXEs and the alternative N-terminal exons leading to the Mhc genes for Crassostrea, Aplysia, Biomphalaria, and Lottia. Exons and introns are scaled, such that both exons and introns represent half of the total width of the scheme. Alternative gene start sites (methionines) and stop codons are indicated. Species names and abbreviations, and references to genome data. The authors would like to thank Björn Hammesfahr for his support with CyMoBase, and Christian Griesinger for his continuous generous general support. Analyzed the data: MK KH. Wrote the paper: MK KH. Designed the study: MK. Assembled and annotated all sequences: MK. - 1. Pohl M, Bortfeldt RH, Grützmann K, Schuster S (2013) Alternative splicing of mutually exclusive exons–a review. BioSystems 114: 31–38 - 2. Hatje K, Kollmar M (2013) Expansion of the mutually exclusive spliced exome in Drosophila. Nat Commun 4: 2460 - 3. Graveley BR (2005) Mutually Exclusive Splicing of the Insect Dscam Pre-mRNA Directed by Competing Intronic RNA Secondary Structures. Cell 123: 65–73 - 4. Odronitz F, Kollmar M (2008) Comparative genomic analysis of the arthropod muscle myosin heavy chain genes allows ancestral gene reconstruction and reveals a new type of “partially” processed pseudogene. BMC Mol Biol 9: 21 - 5. Pillmann H, Hatje K, Odronitz F, Hammesfahr B, Kollmar M (2011) Predicting mutually exclusive spliced exons based on exon length, splice site and reading frame conservation, and exon sequence homology. BMC Bioinformatics 12: 270 - 6. Swank DM, Kronert WA, Bernstein SI, Maughan DW (2004) Alternative N-terminal regions of Drosophila myosin heavy chain tune muscle kinetics for optimal power output. Biophys J 87: 1805–1814 - 7. Miller BM, Bloemink MJ, Nyitrai M, Bernstein SI, Geeves MA (2007) A variable domain near the ATP-binding site in Drosophila muscle myosin is part of the communication pathway between the nucleotide and actin-binding sites. J Mol Biol 368: 1051–1066 - 8. Bloemink MJ, Dambacher CM, Knowles AF, Melkani GC, Geeves MA, et al. (2009) Alternative exon 9-encoded relay domains affect more than one communication pathway in the Drosophila myosin head. J Mol Biol 389: 707–721 - 9. Kronert WA, Melkani GC, Melkani A, Bernstein SI (2012) Alternative relay and converter domains tune native muscle myosin isoform function in Drosophila. J Mol Biol 416: 543–557 - 10. Eddinger TJ, Meer DP (2007) Myosin II isoforms in smooth muscle: heterogeneity and function. Am J Physiol, Cell Physiol 293: C493–508 - 11. England J, Loughna S (2013) Heavy and light roles: myosin in the morphogenesis of the heart. Cell Mol Life Sci 70: 1221–1239 - 12. Smerdu V, Cvetko E (2013) Myosin heavy chain-2b transcripts and isoform are expressed in human laryngeal muscles. Cells Tissues Organs (Print) 198: 75–86 - 13. Odronitz F, Kollmar M (2007) Drawing the tree of eukaryotic life based on the analysis of 2,269 manually annotated myosins from 328 species. Genome Biol 8: R196 - 14. Bernstein SI, Milligan RA (1997) Fine tuning a molecular motor: the location of alternative domains in the Drosophila myosin head. J Mol Biol 271: 1–6 - 15. Nyitray L, Jancsó A, Ochiai Y, Gráf L, Szent-Györgyi AG (1994) Scallop striated and smooth muscle myosin heavy-chain isoforms are produced by alternative RNA splicing from a single gene. Proc Natl Acad Sci USA 91: 12686–12690. - 16. Perreault-Micale CL, Kalabokis VN, Nyitray L, Szent-Györgyi AG (1996) Sequence variations in the surface loop near the nucleotide binding site modulate the ATP turnover rates of molluscan myosins. J Muscle Res Cell Motil 17: 543–553. - 17. Murphy CT, Spudich JA (1998) Dictyostelium myosin 25-50K loop substitutions specifically affect ADP release rates. Biochemistry 37: 6738–6744 - 18. Kurzawa-Goertz SE, Perreault-Micale CL, Trybus KM, Szent-Györgyi AG, Geeves MA (1998) Loop I can modulate ADP affinity, ATPase activity, and motility of different scallop myosins. Transient kinetic analysis of S1 isoforms. Biochemistry 37: 7517–7525 - 19. Decarreau JA, Chrin LR, Berger CL (2011) Loop 1 dynamics in smooth muscle myosin: isoform specific differences modulate ADP release. J Muscle Res Cell Motil 32: 49–61 - 20. Swank DM, Braddock J, Brown W, Lesage H, Bernstein SI, et al. (2006) An alternative domain near the ATP binding pocket of Drosophila myosin affects muscle fiber kinetics. Biophys J 90: 2427–2435 - 21. Kollmar M, Dürrwang U, Kliche W, Manstein DJ, Kull FJ (2002) Crystal structure of the motor domain of a class-I myosin. EMBO J 21: 2517–2525 - 22. Fischer S, Windshügel B, Horak D, Holmes KC, Smith JC (2005) Structural mechanism of the recovery stroke in the myosin molecular motor. Proc Natl Acad Sci USA 102: 6873–6878 - 23. Uyeda TQ, Ruppel KM, Spudich JA (1994) Enzymatic activities correlate with chimaeric substitutions at the actin-binding face of myosin. Nature 368: 567–569 - 24. Furch M, Geeves MA, Manstein DJ (1998) Modulation of actin affinity and actomyosin adenosine triphosphatase by charge changes in the myosin motor domain. Biochemistry 37: 6317–6326 - 25. Joel PB, Trybus KM, Sweeney HL (2001) Two conserved lysines at the 50/20-kDa junction of myosin are necessary for triggering actin activation. J Biol Chem 276: 2998–3003 - 26. Suggs JA, Cammarato A, Kronert WA, Nikkhoy M, Dambacher CM, et al. (2007) Alternative S2 hinge regions of the myosin rod differentially affect muscle function, myofibril dimensions and myosin tail length. J Mol Biol 367: 1312–1329 - 27. Philippe H, Derelle R, Lopez P, Pick K, Borchiellini C, et al. (2009) Phylogenomics revives traditional views on deep animal relationships. Curr Biol 19: 706–712 - 28. Dayraud C, Alié A, Jager M, Chang P, Le Guyader H, et al. (2012) Independent specialisation of myosin II paralogues in muscle vs. non-muscle functions during early animal evolution: a ctenophore perspective. BMC Evol Biol 12: 107 - 29. Gonzalez-Malerva L, Cruz-Rivera M, Reynoso-Ducoing O, Retamal C, Flisser A, et al. (2004) Muscular myosin isoforms of Taenia solium (Cestoda). Cell Biol Int 28: 885–894 - 30. Cruz-Rivera M, Reyes-Torres A, Reynoso-Ducoing O, Flisser A, Ambrosio JR (2006) Comparison of biochemical and immunochemical properties of myosin II in taeniid parasites. Cell Biol Int 30: 598–602 - 31. Weston D, Schmitz J, Kemp WM, Kunz W (1993) Cloning and sequencing of a complete myosin heavy chain cDNA from Schistosoma mansoni. Mol Biochem Parasitol 58: 161–164. - 32. Simakov O, Marletaz F, Cho S-J, Edsinger-Gonzales E, Havlak P, et al. (2013) Insights into bilaterian evolution from three spiralian genomes. Nature 493: 526–531 - 33. Yamada A, Yoshio M, Oiwa K, Nyitray L (2000) Catchin, a novel protein in molluscan catch muscles, is produced by alternative splicing from the myosin heavy chain gene. J Mol Biol 295: 169–178 - 34. Standiford DM, Davis MB, Miedema K, Franzini-Armstrong C, Emerson CP Jr (1997) Myosin rod protein: a novel thick filament component of Drosophila muscle. J Mol Biol 265: 40–55 - 35. Shaffer JF, Kier WM (2012) Muscular tissues of the squid Doryteuthis pealeii express identical myosin heavy chain isoforms: an alternative mechanism for tuning contractile speed. J Exp Biol 215: 239–246 - 36. Zhu J, Sun Y, Zhao F-Q, Yu J, Craig R, et al. (2009) Analysis of tarantula skeletal muscle protein sequences and identification of transcriptional isoforms. BMC Genomics 10: 117 - 37. Koyama H, Akolkar DB, Shiokai T, Nakaya M, Piyapattanakorn S, et al. (2012) The occurrence of two types of fast skeletal myosin heavy chains from abdominal muscle of kuruma shrimp Marsupenaeus japonicus and their different tissue distribution. J Exp Biol 215: 14–21 - 38. Koyama H, Akolkar DB, Piyapattanakorn S, Watabe S (2012) Cloning, expression, and localization of two types of fast skeletal myosin heavy chain genes from black tiger and Pacific white shrimps. J Exp Zool A Ecol Genet Physiol 317: 608–621 - 39. Koyama H, Piyapattanakorn S, Watabe S (2013) Cloning of skeletal myosin heavy chain gene family from adult pleopod muscle and whole larvae of shrimps. J Exp Zool A Ecol Genet Physiol 319: 268–276 - 40. Whiteley NM, Magnay JL, McCleary SJ, Nia SK, El Haj AJ, et al. (2010) Characterisation of myosin heavy chain gene variants in the fast and slow muscle fibres of gammarid amphipods. Comp Biochem Physiol, Part A Mol Integr Physiol 157: 116–122 - 41. Berg JS, Powell BC, Cheney RE (2001) A millennial myosin census. Mol Biol Cell 12: 780 – 794. - 42. Paps J, Baguñà J, Riutort M (2009) Bilaterian phylogeny: a broad sampling of 13 nuclear genes provides a new Lophotrochozoa phylogeny and supports a paraphyletic basal acoelomorpha. Mol Biol Evol 26: 2397–2406 - 43. Riutort M, Álvarez-Presas M, Lázaro E, Solà E, Paps J (2012) Evolutionary history of the Tricladida and the Platyhelminthes: an up-to-date phylogenetic and systematic account. Int J Dev Biol 56: 5–17 - 44. Stanke M, Morgenstern B (2005) AUGUSTUS: a web server for gene prediction in eukaryotes that allows user-defined constraints. Nucleic Acids Res 33: W465–467 - 45. Odronitz F, Pillmann H, Keller O, Waack S, Kollmar M (2008) WebScipio: an online tool for the determination of gene structures using protein sequences. BMC Genomics 9: 422 - 46. Hatje K, Keller O, Hammesfahr B, Pillmann H, Waack S, et al. (2011) Cross-species protein sequence and gene structure prediction with fine-tuned Webscipio 2.0 and Scipio. BMC Res Notes 4: 265 - 47. Hatje K, Kollmar M (2011) Predicting Tandemly Arrayed Gene Duplicates with WebScipio. In: Friedberg F, editor. Gene Duplication. InTech. Available: http://www.intechopen.com/books/gene-duplication/predicting-tandemly-arrayed-gene-duplicates-with-webscipio. Accessed 22 May 2012. - 48. Odronitz F, Kollmar M (2006) Pfarao: a web application for protein family analysis customized for cytoskeletal and motor proteins (CyMoBase). BMC Genomics 7: 300 - 49. Thompson JD, Gibson TJ, Higgins DG (2002) Multiple sequence alignment using ClustalW and ClustalX. Curr Protoc Bioinformatics Chapter 2: Unit 2 3. - 50. Stamatakis A, Hoover P, Rougemont J (2008) A rapid bootstrap algorithm for the RAxML Web servers. Syst Biol 57: 758–771 - 51. Darriba D, Taboada GL, Doallo R, Posada D (2011) ProtTest 3: fast selection of best-fit models of protein evolution. Bioinformatics 27: 1164–1165 - 52. Dimmic MW, Rest JS, Mindell DP, Goldstein RA (2002) rtREV: an amino acid substitution matrix for inference of retrovirus and reverse transcriptase phylogeny. J Mol Evol 55: 65–73 - 53. Ronquist F, Huelsenbeck JP (2003) MrBayes 3: Bayesian phylogenetic inference under mixed models. Bioinformatics 19: 1572–1574. - 54. Whelan S, Goldman N (2001) A general empirical model of protein evolution derived from multiple protein families using a maximum-likelihood approach. Mol Biol Evol 18: 691–699. - 55. Huson DH, Bryant D (2006) Application of phylogenetic networks in evolutionary studies. Mol Biol Evol 23: 254–267 - 56. Rambaut A, Drummond A (n.d.) FigTree v1.3.1. Available: http://tree.bio.ed.ac.uk/software/figtree/. - 57. Letunic I, Bork P (2011) Interactive Tree Of Life v2: online annotation and display of phylogenetic trees made easy. Nucleic Acids Res 39: W475–478 - 58. Hammesfahr B, Odronitz F, Mühlhausen S, Waack S, Kollmar M (2013) GenePainter: a fast tool for aligning gene structures of eukaryotic protein families, visualizing the alignments and mapping gene structures onto protein structures. BMC Bioinformatics 14: 77 - 59. Kliche W, Fujita-Becker S, Kollmar M, Manstein DJ, Kull FJ (2001) Structure of a genetically engineered molecular motor. EMBO J 20: 40–46
<urn:uuid:ce3c8802-2139-4b19-88e5-4dde0ab47928>
CC-MAIN-2020-16
https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0088111
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494349.3/warc/CC-MAIN-20200329140021-20200329170021-00285.warc.gz
en
0.890047
14,418
2.796875
3
An invasive plant can be defined as any plant that grows where you don’t want it and in a way that is difficult to control. Also, invasive plants are not always ugly specimens. They can spread very well through many traits. They grow quickly, reproduce quickly, adapt to a wide range of environmental conditions, and can even change their growth habits to better suit new locations. Express.co.uk spoke to simplyswider.com creator Viktor Holas to identify some invasive garden plants. Many garden centers and nurseries continue to sell select invasive plants, but experts say invasive plants can cause “severe damage” and should be “avoided.” I warned you. The first plant Viktor listed is Japanese knotweed, commonly known to do a lot of damage when lurking in a garden. Perhaps one of Britain’s worst invasive plants, the Japanese knotweed forms dense colonies almost everywhere: roadsides and railways, riverbanks, wastelands, building sites and around new developments. Read more: 5 ‘must-have’ and ‘indestructible’ winter plants for ‘intense color’ There are two characteristics that make plants invasive. First, invasive plants spread quickly and easily from one place to another. The seeds may be carried by wind or running water, and may be eaten by birds and scattered in droppings or on animal fur. Parts of the plant itself, often roots, can be spread out during the construction of roads and bridges, dug up plants from gardens and dumped in the countryside, attached to boats and transported, or lightened roadsides and developments after construction. It can be planted or planted to For some reason, invasive plants are often spread as a result of people’s actions, usually unintentional. Second, invasive plants can suffocate native plants in their natural habitats, take over habitats, steal nutrients, dry out soils, block waterways, and displace wild plants in their wild habitats. It also often has the secondary effect of suffocating native plants and causing food loss for the insects that eat them.
<urn:uuid:bd18ec76-bcef-4ce9-ab1f-f144e86d9a1e>
CC-MAIN-2023-40
https://piacerevan.com/how-to-prevent-serious-damage-to-your-garden-three-plants-gardener-urges-to-avoid/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00823.warc.gz
en
0.950015
438
3.421875
3
How Do You Make Crystal Methamphetamine? - 1 Anhydrous ammonia has a low boiling point. - 2 Anhydrous ammonia is characterized by a certain odor, which you can sense in concentrations of at least 5 ppm (parts per million). - 3 Thieves try to steal this chemical from the large tanks on farms or co-ops by way of a hose similar to that of car wash’s vacuum although smaller in diameter. Methamphetamine makers do not always make use of anhydrous ammonia to make the drug, but it may be used to make what many meth users take as the purest form of the drug. Meth makers make use of anhydrous ammonia instead of red phosphorus in order to get meth from ephedrine through the chemical reaction of mixing it with lithium. The latter is often taken from battery innards. In many meth recipes, anhydrous meth is included as in the popular Nazi and shake and bake methods. - In order to fully understand how hazardous anhydrous ammonia could be, the National Ag Safety Database reveals that it is a hydroscopic compound in that it looks for water from a nearby source, which includes your body. - Your eyes, skin, and lungs are put at risk as they contain the most moisture in your body. - When anhydrous ammonia has dissolved into your body tissue, caustic burns may come as a result. - The majority of anhydrous ammonia-related deaths are due to severe damage to the lungs and throat or from getting a direct blast on one’s face. - When copious amounts of anhydrous ammonia are inhaled, your throat can swell shut and you could suffocate. - Being exposed to liquid or vapor may cause you to be blind. Anhydrous ammonia has a low boiling point. The chemical can freeze if it comes in contact with room temperature. With this, Anhydrous Ammonia may cause burns that can be more serious than the burns you get from dry ice. In normal air pressure and temperature, anhydrous ammonia appears as a colorless glass, but it can also be transported and used under pressure in a liquid state. All of the equipment that is used to transfer and apply the liquid form of anhydrous ammonia needs to be designed for high-pressure use in order to avoid breaks or ruptures. Anhydrous ammonia is characterized by a certain odor, which you can sense in concentrations of at least 5 ppm (parts per million). When anhydrous ammonia is placed in fertilizer, it can have a concentration of around 1 million ppm. A short exposure to anhydrous ammonia concentrations ranging from 2,500-6,500 ppm, therefore, may lead to death. When anhydrous ammonia is opted for fertilizing crops, it may be deadly when inhaled for a long time. Moreover, a lot of injuries occur when thieves inhale or get blasted in their face when trying to steal from pressurized tanks that cause their throats to swell then close. Getting exposed to the liquid or vapors of anhydrous ammonia may lead to severe burns as well as blindness. Thieves try to steal this chemical from the large tanks on farms or co-ops by way of a hose similar to that of car wash’s vacuum although smaller in diameter. Anhydrous ammonia can be stored in pressurized vessels like fire extinguishers and propane tanks for some time. However, it can also be placed in small quantities in a thermos or cooler with the shake and bake method of making meth. Its corrosive properties may lead to the fittings on the vessels to turn blue due to being corroded. Thus, you should never opt for a propane tank with fittings that have already turned blue as it could already be weakened and an explosion is likely to occur. It would be best to visit the nearest rehab centers to protect your health.
<urn:uuid:a820444f-b43f-40c2-bdcb-9445ac0b9cd7>
CC-MAIN-2017-43
https://www.rehabnear.me/make-crystal-methamphetamine/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822992.27/warc/CC-MAIN-20171018142658-20171018162658-00008.warc.gz
en
0.954291
803
3.28125
3
To copy data (usually an entire file) from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service or bulletin board service (BBS) to one’s own computer. Downloading can also refer to copying a file from a network file server to a computer on the network. In addition, the term is used to describe the process of loading a font into a laser printer. The font is first copied from a disk to the printer’s local memory. A font that has been downloaded like this is called a soft font to distinguish it from the hard fontsthat are permanently in the printer’s memory. The opposite of download is upload, which means to copy a file from your own computer to another computer.
<urn:uuid:48bab521-62be-4ef5-bf4c-f3871ca3e2fa>
CC-MAIN-2023-50
https://www.webopedia.com/definitions/download/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00725.warc.gz
en
0.959189
164
3.296875
3
“Rain Rain Go Away” is an English nursery rhyme that probably dates back to the 17th century. It is a very popular rhyme as it is very easy to remember by children of any age. The first version of the song was mentioned by writer and historian James Howell and it also contained only two verses: Raine raine goe to Spain: Faire weather come againe The song was also covered or mentioned by many other popular artists like Foo Fighters or Nine Inch Nails, and it was also the theme of the Australian children’s TV show “Round me Twist”. “Rain Rain Go Away” Lyrics Today the most common lyrics of the nursery rhyme are: Rain, rain, go away Come again another day In the 19th century, there is evidence that another verse was added to the nursery rhyme as well: Little Arthur wants to play.
<urn:uuid:3aa75df8-b994-4774-985a-078d0da235d9>
CC-MAIN-2017-47
http://allnurseryrhymes.com/rain-rain-go-away/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808260.61/warc/CC-MAIN-20171124161303-20171124181303-00076.warc.gz
en
0.981116
197
2.53125
3
These last few months we have been focusing on place value. Place value is such an important beginning for any primary student in mathematics. We have started the unit with basic counting. Now this may seem too basic and you may think, “what kid doesn’t know how to count by grade two?” This may seem an obvious skill to many but it is something that many (not some) still struggle with. Counting goes beyond being ale to tag each object and say its corresponding number. By grade two students should be seeing groups of objects, especially twos, fives and tens, and be able to count by them efficiently and effectively. Students are still grasping with recognizing fives and tens as they count often still counting by ones till they get to five and then putting that aside. Students should start to see 5′s as 2+3 or 4+1 or even better 10′s as 9+1. 5+5, 2+8, 4+6, 7+3, without having to count. To help with this we have been collecting and organizing objects in our classroom. Students have been counting bins, pencils, books, etc. in order to tell me how many is in each basic. We then moved to figure out how many bundles of tens there was in each basket and if there was any patterns we noticed in the numbers. Students soon realized that the number (or numbers) to the left became the amount of groups of tens. I told them that this was because that is called the tens column in the place value system and really it is saying 1 group of 10 or 1 x 10. We are now trying to see how many groups of fives and tens there are in the bins. Now again, I thought to myself this should be an easier concept. Obviously if they see the fives then they will see how many tens. I also thought that since we worked on doubling so much in patterning that they would see that there was two fives in one ten. However, I was wrong again. Like many students, we are struggling to see how one group of objects can be called a 1 group but still be 5 or 10 things. Another mistake that my students are making is assuming that the ones place value tells us how many tens we have. They assume that if the left column told us the tens then the right must tell us the ones. We are currently working on this concept by looking at numbers and asking how many tens and how many fives? The follow up questions are simple: What patterns do you notice? Why does this occur? My hope is that students will see that there are two fives for every ten and if the leftovers (after making a group of ten) is greater then five it is just one more group. Example: 76: The number 76 has 7 groups of tens because there is 7 tens in 70 (10+10+10+10+10+10+10=70). We also have 15 fives because there are two fives in one ten and we have 7 tens so you double it; however, we also have 6 leftover which can make another group of five; making the total 15 fives, with one leftover. To help out at home, keep practising the subutizing plates (dot plates) or counting objects in the house and looking for patterns. So we started Genius Hour! Now you might be asking what is genius hour. Genius hour is a time set aside so that my kids can pursue their own interests in learning. It allows the students to learn, research, and develop what they what to do. Now you might be thinking, you let your kids have free rain? Well in a way, yes I did, however, their was one criteria, it had to benefit the classroom. I was really hesitant of letting go control to my grade two classroom. This was not because of letting chaos happen or student discovery but more that I didn’t know if my students need more guidance I organizing their thinking and work. I started the process with watching two videos on creativity and what is an idea. We then made a proposal that they had to share with their parents. The reason chose to have them make. A proposal was that I wanted my students to have a plan in order to succeed or feel like they accomplished something. My students then had to share this proposal with their parents. This was an interesting concept for many of my students. We had to have a discussion about what a proposal was and why it needed to happen. However, it did fit nicely into our covey habits and once explained with those my students had no trouble in identifying what they wanted to do. The ideas have been flowing. Some of my kids want to get better in soccer, mathematics, and art. They have planned to research and make videos, or have an art portfolio. I don’t know if I introduced this right but I. Am hoping that the kids will take off with it and I am really looking forward to what they have planned. We plan to do genius hour once a week. Anyone else doing this? Any helpful tips out there for grade two? Love to hear what other stories. I was recently meeting with one of my student’s parents, who also happens to be fantastic teacher in our school. She mentioned something to me and it became a big “aha” to me. She said,”you know many of us parents, really don’t know how to help our students at home. We were never taught to think or explain. When we went to school we learned facts and then retold those facts. As a parent I just want to know that what I do at home is okay.” To me this meant that, “I want to be validated as a parent, that I matter!” This really struck me because I always thought that I really tried to communicate this to my parents. To me parents are just as much an integral part of student success and I never wanted them to feel let out. This got me thinking even more about what else I could do in the classroom besides tell parents they are valued. 1) This year for my math homework I have tried to explain the rationale of why I chose those particular problems. The hope is that it will help parents feel more comfortable with the concepts and what I am look for in an answer. Almost sending the co-constructed materials without the rubric. 2) Interview form to the parents: at the beginning if the school year I sent home with the students a interview form asking them to tell me about their student. What do they do well, what are their next steps, what expectations do they have for me? This (at least to me) allowed my parents a voice into the classroom. 3) Open door policy: I have an open door policy. This means that at anytime my parents, other teachers, or anyone really can come into the classroom. I really try to make my classroom as transparent as possible. If I want my parents involved in my teaching and ‘buy in’ then they need to see it in action. 4) Tons of communication: I know that as teachers we lead very busy lives. We also, though some may not think it, have a life outside of the classroom but I have found that the more communication you have the happier parents are. This year I have implemented a class site, for messages, calendar, home works and assignments, a wiki site to host videos, work samples and allow parents to comment and class blogging. I know that there are ways to make this easier but I have found a really positive response to this. I know that these may not be anything new or revolutionary but thought I would share them and possibly make you think about what you do to make your parents feel a part of the learning. We had a lot of fun this week with some great hands on learning. Sorry no pics my hands were full of crisco… Confused, let me tell you about it. Part of the grade two science unit is learning about how animals change in order to survive. It doesn’t go into too great of detail as in grade four but the students learn that their are adaptations that animals need in order to live. We talk about how some of those adaptations are physical and some are behavioral. To help with this we did two experiments with the kids this week. The first is call MACKI Hunters: For this game the students became hunters of macaroni, which I had about hundred or so in different colours. I threw these MACKIES onto the field and told them that in order to survive they had to get at least ten in two minutes. Of course they all survived. We talked about why that would be and what could possibly make it harder. The next time, I split the groups up into the three colours (red, blue, green) and then told them to get ten. This ended up having some of the students not surviving. The last time I did it I had three of the students become hunters of the children. All of the students only had to get five but they couldn’t get touched and had to make it back to me in order to be safe. This ended in only three of the students surviving. We had some great discussions about how animals survive and what animals need in order to survive. The next experiment was understanding physical adaptations. For this experiment you need Crisco, gloves, ice and two buckets of water. You first put the ice in the water and put the crisco in one glove. Side Note: I do find it easier to put the Crisco in a ziplock bag and then another ziplock bag over top of this. This way the child’s hand just goes inside of the clean bag. However, the kids have fun getting messy. Next the students have one hand in the ice water and one hand in the crisco bag/glove and that is in the ice water. Students soon discover how cold one hand is versus the other. They start to make the connection between how polar bears have blubber to keep them warm just like the Crisco does to their hands. As you can tell I couldn’t take any pictures as my hands where also covered in Crisco; however, it was a lot of fun and worth the experience.
<urn:uuid:ab3f3b76-5f71-49c3-ab9a-52c4842da04d>
CC-MAIN-2017-34
https://mrsoclassroom.wordpress.com/2013/09/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105304.35/warc/CC-MAIN-20170819051034-20170819071034-00262.warc.gz
en
0.984396
2,128
3.9375
4
Software engineering is a complex field that requires both theoretical and practical knowledge. As a software engineering student, you may find yourself struggling with assignments that require you to apply concepts you’ve learned in class. Fortunately, there are many tools and resources available that can help you complete your assignments and understand the subject matter better. In this blog post, we’ll discuss some of the top tools and resources for Software Engineering Assignment Help that can make your life easier as a student. Whether you need help with coding, debugging, or understanding complex concepts, these resources can help you ace your assignments and get the grades you deserve. Stack Overflow is a popular Q&A website for programmers that contains a wealth of knowledge on various programming languages and frameworks. It’s a great resource for software engineering students who are stuck on a particular problem or need help understanding a concept. Simply type in your question and browse through the answers provided by other users. If you can’t find an answer to your question, you can ask it yourself and wait for other users to provide helpful responses. GitHub is a web-based platform that allows software developers to collaborate on projects, share code, and track changes. It’s a valuable tool for software engineering students who need to work on group projects or assignments. You can use GitHub to store your code, share it with others, and track changes made by your team members. It also allows you to view the code written by other developers and learn from their programming techniques. Eclipse is an integrated development environment (IDE) that supports multiple programming languages, including Java, C++, and Python. It provides a user-friendly interface for writing, debugging, and testing code. Eclipse also has a number of plugins that can enhance its functionality and make your coding experience more efficient. It’s a great tool for software engineering students who are just starting out and need a reliable IDE to work with. Udacity is an online education platform that offers courses on various topics, including software engineering. Their courses are designed to be self-paced and provide hands-on experience with real-world projects. Udacity’s software engineering courses cover topics such as web development, data science, and machine learning. They also offer a nanodegree program in software engineering that provides a comprehensive education in the field. Coursera is an online education platform that partners with top universities and organizations to offer courses and degrees in various subjects, including software engineering. Their software engineering courses cover topics such as programming fundamentals, software design, and algorithms. Coursera also offers a specialization in software engineering that includes courses on software architecture, testing, and debugging. Hacker Rank is a coding platform that provides coding challenges and competitions for developers. It’s a great resource for software engineering students who want to practice their coding skills and compete with other developers. Hacker Rank’s challenges cover various programming languages.
<urn:uuid:49f38570-025d-45cd-9329-db86db20851d>
CC-MAIN-2023-23
https://www.blindertech.com/the-top-tools-and-resources-for-software-engineering-assignment-help/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00475.warc.gz
en
0.933533
790
2.5625
3
The Pneuminous calendar is a simple ontological twist involving the reaccretion of the year. It follows the old year to some extent but re divides the year into 16 ‘teeth’, each 22 days in length. Each day in turn is named by connecting lines in a pseudo-kabbalistic structure. Various holidays pepper the year, these are lined up with the various solstices and equinoxes more accurately than the other calendar. It’s year structure begins in what would conventionally be called 1947. This would be year 1. Which makes the current year 70. The ‘Teeth’ are: Current Documents are thus. 2.3 contains details of attributions (pneuma accreted to the structure). People are welcome to contribute to aspects of the calendar.
<urn:uuid:962645b2-8b7d-44e2-b276-8253da9c9576>
CC-MAIN-2017-43
https://centreforexperimentalontology.wordpress.com/portfolio/mwaaek-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820930.11/warc/CC-MAIN-20171017072323-20171017092323-00295.warc.gz
en
0.848679
175
2.84375
3
By NewsGram Staff Writer The American Psychiatric Association (APA) has officially deemed taking selfies as a “mental disorder”. The APA made this classification during its annual board of directors meeting in Chicago recently. Giving the name “selfitis” to the disorder, the APA defined the disorder as a type of an obsessive compulsive disorder to take one’s own pictures and post them on social media. They also stated that this condition is a mechanism used by people to make up for their low self esteem and increase intimacy with other people. According to the APA, there are three levels of selfitis, - Borderline Selfitis: Taking selfies at least three times a day, but not posting them on the social media. - Acute Selfitis: Taking selfies at least three times a day, and sharing them all on social media. - Chronic Selfitis: It is defined as an uncontrollable urge to take one’s own pictures round the clock and posting them on social media platforms more than six times a day. Recently, the term “Selfitis” also made it into the Oxford Dictionary of English according to a website. Makati City, a city in Philippines was named the “selfie capital of the world” by Time magazine recently. This news of selfies being looked at as a mental disorder, might make things dismal for this Filipino city.
<urn:uuid:e41a6d0f-2a18-4c72-81b9-b9790b218d9c>
CC-MAIN-2017-43
https://www.newsgram.com/selfitis-an-obsessive-compulsive-disorder-of-taking-too-many-selfies/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825473.61/warc/CC-MAIN-20171022222745-20171023002745-00846.warc.gz
en
0.958002
294
2.796875
3
How To Tell If Your Child Is Lying Like most parents, Alissa Marcus, a Cherry Hill, NJ mom of three, has eyes in the back of her head. She says she can tell when her kids are lying, although the clues each child provides differ. When her 5th grader can’t look her in the eye, that’s the telltale sign that he’s fibbing. Her 3rd grader becomes emphatic in her denials when she tries not to admit a wrong. Her kindergartner starts to laugh when he fibs. If you haven’t figured out your children’s telltale signs yet, psychologist Melissa Brand of Equilibria Psychological and Consultation Services in Philadelphia offers these hints: - Poor eye contact. Kids also become defensive and angry because they feel “caught.” - Trouble staying still. They may literally squirm with the discomfort of lying to you, or they avoid your questions and stall for time. - Defensive reactions. Be suspicious if your child “doth protest too much.” - Changing the story. Do you detect inconsistencies in your child’s story? If so, and if your child was with a caregiver, teacher or another adult, get the grownup’s version of what happened. - Long pauses. Hesitation before speaking may be your child’s wheels turning while he fabricates an alibi. - Facial expressions. Watch for a brief expression of guilt, fear or even a smile or smirk. Other signs, according to Julius Mullen, EdD, clinical director of Children and Families First., include: - Scratching or touching his nose. - Emphasizing and extending words. - Leaning forward and hand gesturing. - Repeating the question as part of the response. Why Do Kids Lie? The reasons kids lie depend on their age, says Dr. Mullen. Kids younger than age 7 tend to lie to be nice or to protect themselves from parental disappointment. Teens, on the other hand, lie for many reasons — peer acceptance, attention-seeking, avoiding consequences, so that they don’t harm someone, or even to gain power or for revenge. - Give your kids the message that they can come to you with anything. - Be an open listener. Try to keep your own reactions in check until you’ve heard the full story. - Reward the truth. When children confess, don’t immediately move to punishment. Acknowledge how much you appreciate that they told you the truth, then decide together upon an appropriate consequence. - Avoid being too harsh or too rigid, and have a few important rules that you enforce consistently. Terri Akman is a local freelance writer.
<urn:uuid:8c375133-6639-4495-93c2-8f65f26aba16>
CC-MAIN-2014-10
http://www.metrokids.com/MetroKids/July-2011/Kids-Often-Signal-When-Theyre-Lying/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010832640/warc/CC-MAIN-20140305091352-00082-ip-10-183-142-35.ec2.internal.warc.gz
en
0.921358
587
2.984375
3
Responses of non-Japanese Americans The reactions of non-Japanese friends, neighbors and classmates were mixed. Some turned their heads and refused to recognize their former friends. Others believed the government propaganda and became outright hostile. Still others helped their Japanese American neighbors by storing belongings and driving them to the places where they were to be picked up. Perhaps only a handful of people understood the true implications of the course of events.
<urn:uuid:6b9d79cc-6322-436c-b75f-498dc5e4e88e>
CC-MAIN-2020-05
http://ddr.densho.org/browse/topics/53/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251799918.97/warc/CC-MAIN-20200129133601-20200129163601-00396.warc.gz
en
0.98992
85
2.59375
3
Are you looking for low-prep decodable sentence activities for your Kindergarten phonics lessons? These decodable sentence writing cards can be used in a variety of ways to develop blending & segmenting of ck words, ll words, ss words, ff words and zz words. They will also develop phonics fluency and decodable sentence writing skills. 88 decodable sentence cards are included in two formats: The decodable sentences are formed with ck ll ss ff zz words as well as some common high-frequency words with tricky spellings (heart words). These sentence cards will help students decode consonant digraph words in context and spell consonant digraph words in context. For more phonics resources, check out the Phonics categories
<urn:uuid:3240c500-3041-4197-9c33-a26d81c4dc87>
CC-MAIN-2023-40
https://mrslearningbee.com/products/qu-ng-x-decodable-sentences-read-match-write
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00222.warc.gz
en
0.948064
161
3.65625
4
Guitar warm-up refers to the practice of preparing your fingers, hands, and arms for playing the guitar. It’s essential for guitarists of all skill levels to warm up before playing to prevent injuries and enhance performance. The warm-up routine typically consists of a series of exercises designed to loosen up the muscles and increase flexibility, speed, and accuracy. Today we will learn 5 Guitar Warm Up Exercises. The purpose of a guitar warm-up is to: - Increase circulation: Warming up increases blood flow to the muscles, which helps to reduce the risk of injury and improve performance. - Loosen up the muscles: Playing the guitar requires a lot of finger and hand movements that can be repetitive and taxing on the muscles. A good warm-up helps to loosen up the muscles and prevent cramping. - Improve technique: A warm-up routine can help to improve your technique by focusing on specific areas that need improvement, such as finger strength and speed. - Enhance focus: Warming up can help to clear your mind and prepare you mentally for playing the guitar. It can also help you to focus on the music and the nuances of your playing. There are various types of guitar warm-up exercises that you can do to prepare yourself for playing. These include finger stretches, chromatic exercises, scales, arpeggios, and chord progressions. It’s important to start with gentle exercises and gradually increase the intensity and complexity of the exercises as you warm up. Here are 5 Guitar Warm Up Exercises: Here listen to the first lick: Exercise in half speed: Here is the tab: Here is second warm up exercise in original speed: Listen Lick 3 in original Speed: You may also like:
<urn:uuid:cb6dfb4b-63ad-460f-922c-e16ad85e80e5>
CC-MAIN-2023-40
https://guitars-lesson.com/5-guitar-warm-up-exercises-with-tabs/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00025.warc.gz
en
0.930198
422
3.171875
3
This is the second form of interpretation which is as close to roving as possible but attempts to bring different elements of places under discussion to one location. As a communication form, interpretive techniques are used to present information to an audience in a way that provokes them to think. Much of the interpretation delivery will be aural here. However, as in the case of a presentation, in the exhibits with props, actual elements of what is being discussed will be presented as props. The exhibits themselves will help the audience understand what is being presented in a much more interactive way. It is also observed that real live exhibits based on context can be brought in. For instance, in the case of trip to somewhere where there are flowers, the flowers themselves could be displayed as plants etc. Once again, in the media to be used, pictures could be used in the exhibits as they will help reach out to audience better. Different learners would be present in the audience, some might be aural learners and hence an oral speech would help, but some might be visual learners and incorporating pictures would be assistive here. Models of things that are part of the discussion could be presented. This will enable users to be able to touch the model or interact with it. This is especially helpful in the case of kinesthetic learners. Kinesthetic learners like to learn things by touching it or working a model etc. Therefore, this form of a prop in an exhibit will help connect with them better. A Guided tour interpretation technique happens where there is a guide allotted for tourists. The guide takes the people to different tourist locations based on a plan. The guide shows them the tourist location and describes it to them. In a guided tour, the tourists would be new to the area. They would want someone to present information to them so that they hire a guide. For example, a person who is interested in architecture and historic buildings when visiting France for the first time will need the services of a tour guide to show him the important spots.
<urn:uuid:9ccaf9a0-fc90-41ac-8c2e-e95ae9f87289>
CC-MAIN-2020-16
https://www.assignmentpass.info/mei-guo-chuan-mei-xue-lun-wen-dai-xie-xun-zhan/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496901.28/warc/CC-MAIN-20200330085157-20200330115157-00216.warc.gz
en
0.906219
407
3.984375
4
Drought and flooding rain, which in turn caused devastating crop losses, were the catalyst for Dalby cotton grain grower Adam McVeigh investigating the viability of a farming program focused on double cropping under overhead irrigation. Keenly aware of nature’s volatility the 2015 Nuffield Australia Scholar developed a resilient double cropping program with the goal of achieving a sustainable rotation, which was not only financially safe, but also profitable. The Grains Research and Development Corporation (GRDC) sponsored Mr McVeigh’s research into the program, which is based around centre pivot irrigation. Mr McVeigh said fluctuation in rainfall, along with increasing environmental demand and legislative changes has driven massive innovation and advancements in Australian irrigation practices over the past 20 years. “As a consequence, there has been a significant increase in the area irrigated with centre pivot and lateral move systems, with the two leading factors driving the adoption of these systems being labour and water savings,” he said. “Farm businesses often have a low risk capacity for a number of reasons, but primarily due to high debt levels, which is common for farmers who are just starting out or recovering from a natural disaster. “So one of my objectives was to provide information that will assist farmers with a low risk capacity to plan a high yield, double cropping rotation for their centre pivot irrigation. “I believe consecutively producing two crops on the same land, within the same growing year can increase cash flow, and I have found that it is actually common practice in many parts of the world.” The grain grower from Queensland’s western downs said one of the advantages of this practice is the spread of income across the year. If one crop fails due to a natural disaster, there will still be income from the other crop. Also the delay after crop destruction to planting the next crop is reduced, thereby bringing the next harvest or income around faster, which Mr McVeigh said can be crucial during times where growers are recovering from natural disasters. Mr McVeigh’s research took him around the world, including Brazil, China and the USA and said his time in Brazil and the USA in particular highlighted the importance of a good integrated pest and weed management plan in order to prevent the build-up of resistance. “Getting crop nutrition right is also paramount with double cropping. The increased cropping intensity can result in the progressive depletion of soil nutrients, so one option is to include a legume crop in the rotation to fix nitrogen into the soil and therefore reduce the synthetic nitrogen requirement for the following crop,” he said. “My travels also opened my eyes to the potential to further develop the high moisture corn market in Australia, as this would open up opportunities for double cropping of two consecutive summer crops.” He also found one issue common around the world – the cost of electricity. “In Brazil, farmers only irrigate for 20 hrs/day due to the prohibitive cost of electricity during the four hours of highest energy demand by the large cities. At these times, the cost of electricity is so great that it becomes uneconomical to use for agriculture. “On Australian irrigated cotton farms, the electricity cost per hectare has increased by 90% on the ten-year average and pumping water accounts for roughly half to three-quarters of all on-farm direct energy consumption. With this in mind, any improvement in irrigation energy efficiency will significantly reduce the total farm energy bill.” The grower, who has a background in both dryland and irrigated farming, is an advocate of continued research and investment into alternative energy solutions for agricultural activities, such as irrigation pumping. In the meantime, he says irrigators and industry need to lobby government for policies that generate more cost effective electricity.
<urn:uuid:eb12db8f-858d-4917-8230-72043d1697f2>
CC-MAIN-2017-30
http://www.theland.com.au/story/4313491/nuffield-scholar-aims-to-turn-water-into-cash-flow/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425766.58/warc/CC-MAIN-20170726042247-20170726062247-00008.warc.gz
en
0.961733
789
2.640625
3
You must have heard of the term urine routine test before. You must know someone who has gotten it done as well if at all, you have not gotten it done yourself. One of the common routine examinations, a urine routine test is a combination of several tests conducted on the urine sample of a patient provided by him or her. It is one of the most common tests, required for medical purposes, that a person must get done in their lives. In a urine routine examination, the professionals conduct a physical, chemical, as well as microscopic examination of the urine sample provided by the person. This test is conducted to find out about any infections or diseases that the patient or person might be going through. Why is a urine routine examination conducted? Even though physicians and specialists can determine the condition of a patient mostly by looking at them or reading their symptoms, causing them pain and discomfort, sometimes, some infections or diseases might not show any clear symptoms, to begin with. Many a time, a patient looking fit is struggling with some disease that cannot be determined by their outer physical appearance. Many infections do not cause pain and discomfort in the beginning either but with time the severity of the infection grows, and it becomes dangerous. Sometimes, the pain caused by the increased severity of infections and diseases can be unbearable, and the infection or the disease is life-threatening. A urine routine test is conducted to detect or trace any unwanted substances, cells, or bacteria that may be present in the sample, indicating different disorders or infections. The purpose of a urine routine examination is to diagnose diseases and screen issues related to health. What kind of disorders or diseases can be determined or diagnosed through a urine routine test? There is not one disease or disorder that urine tests are aimed at. They are performed with various intentions. Sometimes, the doctors, depending on case-to-case basis, keeping the symptoms of the person in mind, recommend a urine examination to rule out one or more diseases they might have in mind, whereas, some other times, the doctors suggest a urine test to find out what the problem is. A urine routine examination can be recommended for diagnosing several diseases. Sometimes, doctors suggest a urine test for determining your susceptibility and chances of catching a disease. Some of them are: Though pregnancy is not a disease or disorder, doctors recommend a urine test to find out if a woman is pregnant. This test is conducted because pregnant women release urine that only pregnant women can have. Anyone else who does not have a life growing inside them cannot produce such urine samples, therefore, doctors recommend a urine test for women who could be pregnant. There are other ways of finding out if pregnancy is positive as well, but a urine routine test is preferred because the procedure is completely non-invasive, not at all painful, and accurate. Diabetes can be inherited and is linked to your genetics. Diabetes is already common in people now and the number of its patients are only growing. Since diabetes cannot be cured, doctors advise taking all possible measures to avoid it. As a result, if diabetes runs in your family, doctors advise getting a urine routine examination to keep it in check. - Kidney diseases- Kidney diseases are directly linked to urine health. A urine test is always required to rule out kidney problems in a patient to avoid problems like kidney failure in the future. - Kidney stones- A lot of people wonder how a urine routine examination diagnosis kidney stones since urine cannot contain kidney stones itself. Well, kidney stones diagnosis requires a urine test because, through the sample, the level of minerals in your urine from the kidney stones can be determined. These levels of minerals help rule out the possibility of kidney stones. Kidney stones can be very painful and if left untreated, they can become very serious. Sometimes, even life-threatening. As a result, you should never ignore the doctor’s advice, when it comes to kidney stones. - UTI or Urinary Tract Infections- UTIs can be very painful and uncomfortable for a person. Women are more prone to UTIs because of dirty and unhygienic public toilets as well as sexual intercourse. UTIs require antibiotic tablets if diagnosed early and IVs if diagnosed after it becomes severe. UTIs can also be recurring. A urine routine examination is compulsory to diagnose UTI. Its symptoms include pain and burning sensation while urinating, frequent urges to urinate, the abnormal color of urine, etc. Preparing for the test A urine routine examination usually does not require any special preparation, but some things should be taken care of, such as: - Collect the sample first thing in the morning- it is recommended that you should collect the sample the very first time you urinate in the morning after waking up. This is to avoid any influence on the sample of the food or liquid consumed later in the day. - Communicate with your doctor about medications, if any- if you are on certain medications, let your doctor know in advance. They will advise you to stop the medication temporarily if required or postpone the examination or take required precautions. This is because some medicines can alter the test results. Usually, the results are delivered within 24 to 36 hours. Once you get your test results, consult your doctor and they will explain the situation to you and suggest medications or treatments as required. Urine routine examinations are critical in diagnosing some conditions or diseases. If your doctor has recommended one, do not postpone it or ignore his advice.
<urn:uuid:b00202b8-b3d7-4ffd-ae29-6e0d4e9d5d15>
CC-MAIN-2023-23
https://littlehealthcare.com/know-more-about-urine-routine-examination-preparation-test-results-and-more/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00598.warc.gz
en
0.948719
1,141
3.0625
3
It takes patience to grow grapevine trees. You're basically taking a grapevine, which wants to grow outward, and forcing it to grow up in a tree-like appearance. It takes attention and careful pruning to create the desired shape. Eventually, grapevine trees can reach 12 to 46 inches tall. Just like with regular grapes, there are many varieties available to plant. Take a cutting from another grapevine or purchase a small plant at a nursery. Soak the grapevine in water overnight before putting it in the ground. Choose a planting location for the grapevine. They prefer to grow in full sun with rich soil, but can also do well in containers. Add peat moss to the soil in a 1 to 1 ratio if it has a lot of clay in it. This will help improve drainage. Dig a hole two feet deep. Make it wide enough for the grapevine roots to spread out. You can cut down the roots slightly if needed, as long as you don't cut off too much. Put a small mound of dirt at the base of the hole. Spread the roots out gently by hand. Cover with soil and tamp down lightly to remove air pockets. Water thoroughly until the soil is moist several inches down. Put a stake in the ground next to the grapevine. Tie the plant to it as it grows to create a straight trunk. Move the tie as the vine gets taller if necessary. Water grapevine trees frequently in their first year of growth. Keep the soil moist at all times, using your finger to judge the moisture level. Cut off lower shoots or leaves that ruin the appearance of a tree. You only want foliage and grapes to grow on the top of the vine, to create the tree. Allow the plant to continue growing upward. It takes several years to achieve a grapevine tree. Replace the ties as needed and cut off lower growth to make the bottom of the stem resemble a tree trunk.
<urn:uuid:73e509b0-442c-49ba-a897-c708dee03909>
CC-MAIN-2014-15
http://www.gardenguides.com/96201-grow-grapevine-trees.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00495-ip-10-147-4-33.ec2.internal.warc.gz
en
0.945869
398
3.421875
3
The Red-crowned Crane (Grus japonensis), also known as the Japanese Crane or Manchurian Crane, is a species of bird found in Asia. In the spring and summer it is commonly found in Siberia and occasionally in northeastern Mongolia. In the fall, it migrates in flocks to Korea, Japan, China, Taiwan, and other countries in East Asia to spend the winter. All Red-crowned Cranes migrate except for a flock that live in HokkaidÅ. Its habitats are marshes, riverbanks, rice fields, and other wet areas. It is the second rarest crane in the world with an estimated population of 1500 individuals in the wild, with nearly 1000 in China. Nearly all of the Chinese population lives in the Yancheng Coastal Wetlands. The adult stands about 55 inches high. It is snow white with a patch of red skin on its head. This patch becomes bright red when the bird becomes angry or excited. It is the heaviest species of crane, weighing 17 to 22 pounds, and rarely as much as 33 pounds. The diet of this bird consists of small amphibians, aquatic invertebrates, insects, and plants that grow in marsh and swamps. The female lays two eggs, with only one surviving. In China, the Red-crowned Crane is often featured in myths and legends. In Taoism, the Red-crowned Crane is a symbol of longevity and immortality. In art and literature, immortals are often depicted riding on cranes. A mortal who attains immortality is similarly carried off by a crane. Reflecting this association, Red-crowned Cranes are called xian he, or fairy crane. The Red-crowned Crane is also a symbol of nobility. Depictions of the crane have been found in Shang Dynasty tombs and Zhou Dynasty ceremonial bronzeware. Because of its importance in Chinese culture, the Red-crowned Crane was selected by the National Forestry Bureau of the People’s Republic of China as its only candidate for the national animal of China. But this decision was deterred because the Red-crowned Crane’s Latin name shows this species as the “Japanese Crane”.
<urn:uuid:bf89d74b-2fa1-462d-990a-2d3cd8eda445>
CC-MAIN-2013-48
http://www.redorbit.com/education/reference_library/science_1/aves_birds/2575454/redcrowned_crane/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345768787/warc/CC-MAIN-20131218054928-00077-ip-10-33-133-15.ec2.internal.warc.gz
en
0.955945
461
3.5625
4
Children of all ages receive specialized care from our pediatric occupational therapists. The team helps patients with fine and gross motor skills, self-help activities, feeding, socializing and playing for optimal performance in activities of daily living. Whether the child is delayed in development, clumsy, hyperactive or has handwriting difficulties, an occupational therapy evaluation can pinpoint specific problems and develop an individualized treatment approach. Using purposeful activity, occupational therapists strive to help each child reach his or her full potential. Pediatric Oral Motor Therapy Feeding problems can severely impede the growth and development of infants and small children. At Texas Health Arlington Memorial Hospital, occupational therapists evaluate and treat patients with oral motor dysfunction from birth to three years of age. Children with conditions including prematurity, failure to thrive, sensory defensiveness, developmental delay, Down Syndrome and cerebral palsy often require oral motor intervention. Difficulties with sucking, swallowing, chewing, breastfeeding, cup drinking and transition to eating solid foods can often be corrected with early treatment. Does Your Child Need Sensory Integration therapy? All of the information we receive about the world comes to us through our sensory system. Because many sensory processes take place within the nervous system at an unconscious level, we are not usually aware of them. For some children, sensory integration does not develop as efficiently as it should. When the process of sensory integration is disordered, a number of problems in learning, development or behavior may become evident. In therapy, a child is guided through activities that challenge his or her ability to respond appropriately to sensory input by making a successful, organized response. Therapy can involve activities that provide vestibular, proprioceptive and tactile stimulation and are designed to meet a child's specific needs for development. The activities are also designed to gradually increase the demands upon a child to make an organized, more appropriate response. Emphasis is placed on the automatic sensory processes in the course of a goal-directed activity, rather than instructing or drilling the child on how to respond. Does your child: - Respond negatively to unexpected or loud noises? - Have poor endurance or tire easily? - Seem to have weak muscles or low muscle tone? - Get easily frustrated? - Have difficulty tolerating changes in routine? - Seem sensitive to certain fabrics and other textures such as walking on grass? - Seek all kinds of movement that interfere with daily routine? - Have poor organizational skills? - Have difficulty calming down or sleeping? - Have difficulty coloring, cutting or handwriting? - Have difficulty learning new tasks? - Seem clumsy or have poor balance? If you answered yes to two or more of these questions, talk to your physician to see if occupational therapy may be beneficial.
<urn:uuid:0d38d66f-20f4-4916-b853-019ea04bf0b6>
CC-MAIN-2014-10
http://www.texashealth.org/AMHpediatricrehab
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999668190/warc/CC-MAIN-20140305060748-00059-ip-10-183-142-35.ec2.internal.warc.gz
en
0.944146
561
2.703125
3
My children love to read and be read to. Most of the time they read just for pleasure, but periodically we like to include what they are reading into our homeschool curriculum, especially if it is a classic or historical novel. The pdf study guides from Progeny Press have been a fantastic resource in doing just that. Recently members of the Schoolhouse Review Crew were able to review one of the following study guides: Lower Elementary (K-3) Minstrel in the Tower – An adventure based in medieval times by Gloria Skurzynski. The Drinking Gourd – This book, by F. N. Monjo talks about the underground railroad. Upper Elementary (gr. 4-6) Mr. Popper’s Penguins – This humorous Newberry Honor book by Richard and Florence Atwater describes how one family survives when sent twelve arctic penguins. The Sword in the Tree – By Clyde Robert Bulla, this novel takes place during the time of King Arthur and is about an eleven year old boy on a quest to restore his heritage. Middle School (gr. 6-8) Give Me Liberty – This novel by L. M. Elliott tells about an apprenticed boy during the American Revolution. Indian in the Cupboard – This first book in a popular series by Lynne Reid Banks tells the story about a boy who is given a small plastic Indian that comes to life. High School (gr 9-12) The Scarlet Pimpernel – A classic novel by Emma Orczy set during the French Revolution. Great Expectations – Another great classic written by Charles Dickens about the tragedies and triumphs of a boy named Pip growing into adulthood. Each pdf study guide includes background information, vocabulary questions, reading comprehension questions, a “Dig Deeper” section that brings a Biblical perspective into what is happening in the novel, and information to help with further study. Each download also comes with an answer key. Social Media Links Twitter: twitter.com/progenypress @progenypress Hashtags: #hsreviews #classicliterature #criticalanalysis #literaturestudies A big thank you to Tim Tinkel of Families Again for writing this introductory post.
<urn:uuid:edd69067-963d-4177-b326-0bd02a95ac51>
CC-MAIN-2017-43
http://schoolhousereviewcrew.com/literature-study-guides-from-a-christian-perspective-progeny-press-review/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825812.89/warc/CC-MAIN-20171023073607-20171023093607-00820.warc.gz
en
0.919928
463
3.15625
3
Cellular Clock theory Late Adulthood: Theories of Aging There are two broad categories that describe the theories of aging: programmed theories and cellular theories. For this assignment, please describe the inherent differences and similarities between the theoretical principles of programmed and cellular theories, and explain how the concepts in each of the categories below help to clarify the physical and cognitive changes experienced by older adults: · Cellular Clock theory · Hormonal Stress theory · Immunological theory Cellular Damage Theories: · Wear-and-tear theory · Free-radical theory · Cross-linking theory Taken together, describe how these theories of aging help us to gain a deeper understanding of the late adulthood stage of development. Your assignment should be three- to- four pages in length (excluding title and reference pages), and should include a minimum of three references.
<urn:uuid:7355c1a4-54b0-4a96-a66e-c1ca92f75c14>
CC-MAIN-2023-14
http://hawkessays.com/cellular-clock-theory/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00688.warc.gz
en
0.873933
184
2.734375
3
Test: The Loan Quiz Description: What do you know about Loans? Find out! Keywords: loans, mortgages, payday loans, student loans Microcredit is a financial innovation that is generally considered to have originated with the __________ Punjab National Bank Chapter 12 bankruptcy in the USA refers to: rehabilitation for family farmers and fishermen rehabilitation with a payment plan for individuals with a regular source of income basic liquidation for individuals and businesses In the USA, A loan is considered part of the gross income of the borrower. The most widely known credit score in the USA is: This type of loan is used for the purchase of housing A credit card acts as an ____________ for a consumer. Line of Credit Student Loans outstanding in the USA total over ____ in debt. A secured loan is a loan in which the borrower pledges some asset as collateral for the loan. Payday loans have a ______ default rate When a debtor has not met his or her legal obligations according to the debt contract, this is referred to as an
<urn:uuid:c594aeb1-97f0-44dd-b635-1ed17b55bb88>
CC-MAIN-2020-05
http://sometests.com/tests/Education/The-Loan-Quiz.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594333.5/warc/CC-MAIN-20200119064802-20200119092802-00456.warc.gz
en
0.925281
227
2.8125
3
Many children in developing countries die from acute diarrhoea. Although it is usually caused by infectious viruses or bacteria, the exact organism is rarely known, as it is impractical to test for the organism. Treating the diarrhoea is thus standard therapy, with the recommended policy of using oral rehydration therapy and dietary supplements. Because the gut can be damaged by the infection, many doctors recommend a period of fasting followed by gradual reintroduction of food, although the evidence for when exactly a “normal” diet should be reintroduced is lacking. The authors here looked at children who received ‘early’ refeeding (within 12 hours of the start of rehydration) or ‘late’ refeeding (after 12 hours from the start of rehydration). The authors identified 12 trials that met their inclusion criteria, with a total of 1283 children under 5 years; of these, 1226 were used in the analysis (724 given early refeeding; 502 given late refeeding). There was no significant difference between the two refeeding groups in the number of participants who needed unscheduled intravenous fluids (813 participants, 6 trials), who experienced episodes of vomiting (466 participants, 5 trials), and who developed persistent diarrhoea i.e. greater than 14 days in duration (522 participants, 4 trials). The mean length of hospital stay was also similar (246 participants, 2 trials).There is therefore no evidence to suggest that early refeeding increases the risk of complications after acute diarrhoea such as the need for IV fluids, or increases the risk of developing persistent diarrhoea. Further studies are needed to fully examine other parameters such as duration of diarrhoea, and effect on weight gain. There was no evidence that early refeeding increases the risk of unscheduled intravenous fluid use, episodes of vomiting, and development of persistent diarrhoea. No conclusion could be made regarding the duration of diarrhoea. Acute diarrhoea is one of the principal causes of morbidity and mortality among children in low-income countries. The cornerstone of treatment is oral rehydration therapy and dietary management. However, there is a lack of data and studies on both the timing and type of feeding that should be adopted during the course of the illness. To compare the efficacy and safety of early and late reintroduction of feeding in children with acute diarrhoea. In May 2011, we searched the Cochrane Infectious Diseases Group Specialized Register, CENTRAL (The Cochrane Library 2011, Issue 1), MEDLINE, EMBASE, LILACS, and mRCT. We also contacted researchers and organizations, and searched reference lists. Randomized controlled trials of early versus late refeeding among children less than 10 years old with acute diarrhoea. Early refeeding was defined as within 12 hours of start of rehydration and late refeeding was defined as more than 12 hours after start of rehydration. Two authors independently assessed the search results and the risk of bias, and extracted data. We present risk ratios for dichotomous outcomes and mean differences for continuous outcomes. We combined the results of the trials using meta-analysis when heterogeneity was not substantial. Twelve trials involving 1283 participants wereincluded; 1226 participants were used in the analysis (724 in the early refeeding group and 502 in the late refeeding group). Nine trials described their allocation sequence, but only two used concealed allocation. One trial reported single-blinding but did not clearly identify the person who was blinded. Early refeeding meant intake during or immediately after start of rehydration, while late refeeding meant intake only 20 hours to 48 hours after start of rehydration. Significant heterogeneity was noted in the data for the duration of diarrhoea. There was no significant difference between the two refeeding groups in the number of participants who needed unscheduled intravenous fluids (six trials with 813 participants), who experienced episodes of vomiting (five trials with 466 participants), and who developed persistent diarrhoea (four trials with 522 participants). The mean length of hospital stay was also similar (two trials with 246 participants).
<urn:uuid:c8a12857-1673-421f-b2b6-e7574c6b37f4>
CC-MAIN-2017-47
http://www.cochrane.org/CD007296/INFECTN_reintroducing-a-normal-diet-following-acute-diarrhoea
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806736.55/warc/CC-MAIN-20171123050243-20171123070243-00309.warc.gz
en
0.951962
865
3.4375
3
Children’s librarians often tell me that no child with a disability has ever visited their library. I usually respond that either they do not recognize people with disabilities or they make them feel so unwelcome that they never return. “According to the U.S. Department of Education Web site Ed Data Express, 12.8 percent of the nation’s K—12 students had disabilities in 2008-09.” This statistic implies that one out of eight school children have a disability. So it seems unlikely that even the smallest library has not been visited by a child with a disability. Although we are all familiar with the wheelchair logo used to represent disabilities, very few children with disabilities arrive at the library in a wheelchair. In fact many disabilities are what I call “invisible.” There is no evidence to an unknowing observer that the person has a disability. How would you know that a child entering your library has dyslexia, is on the autism spectrum or has a hearing impairment? For the past two years I have been teaching an ALSC online course, Children with Disabilities in the Library. Using an approach described in the book, Teaching About Disabilities Through Children’s Literature (Mary Anne Prater and Tina Taylor Dyches, Libraries Unlimited, 2008), course participants read four juvenile novels that contain characters with disabilities. Then we explore ways to design library services if the character in the book were a patron in the library. The books that will be assigned in the course beginning January 16, 2012 are: 1. Joey Pigza Swallowed the Key. Joey has attention deficit. 2. Deaf Child Crossing. Megan has a hearing impairment. 3. Reaching for Sun. Josie has cerebral palsy. 4. Rules. David has autism and Jason cannot speak and uses a wheelchair. I find that this approach to learning about disabilities works well since appropriate services often need to be designed with an individual in mind. In fact, accommodations that would help one child might be an impediment for another. For example, an audio track added to a tutorial for a student who is blind would not be accessible for a student who is deaf. Addressing the individual needs of these fictional characters creates a strategy for designing services for actual library users. There are many excellent children’s books with characters who have disabilities. Exploring them can provide new insight into how to offer the best possible service for all children who visit our libraries. Our guest blogger is Kate Todd. Kate was a children’s librarian at The New York Public Library for over 25 years. She also worked as an adjunct instructor and emerging technologies librarian at Manhattanville College. She has taught several online courses and webinars for ALA. Her areas of interest include library services to people with disabilities, readability/leveling strategies, educational gaming, online instruction and iPad apps for kids. You can contact Kate at [email protected]. Her online course, Children with Disabilities in the Library begins January 16, 2012. If you’d like to write a guest post for the ALSC Blog, please contact Mary Voors, ALSC Blog manager, at [email protected].
<urn:uuid:20174e09-b678-4a71-b3e7-2e6530c800dc>
CC-MAIN-2017-47
http://www.alsc.ala.org/blog/2011/12/learning-about-disabilities/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806715.73/warc/CC-MAIN-20171123012207-20171123032207-00194.warc.gz
en
0.963172
662
3.609375
4
The beauty of marble was admired in Greece and Rome, and later – in Italy and France. It is really a very beautiful stone, especially if the surface is polished brilliantly. In Greek “marmaros” means “shining stone”, or “glittering stone”. Nowadays marble is mined in many countries, but the most famous is still Italian and white Carrara marble, the most valuable for sculptors. Parian marble from Greece is equally famous, traditionally it is yellow. Marble is also mined in Natal, Karelia, the USA and North Africa, the Far East, Armenia and Georgia, Ukraine and the Urals. Marble and its features Marble is formed from dolomite or limestone formations. The structure of this rock may include other minerals, such as quartz. Note that the marble has medium strength, and if the structure of the mineral is impure, it responds to low temperatures badly as well. The stone with a fine-grained structure is the most durable. Marble is easily worked, in particular – polished. Moisture absorption coefficient is about 0.15 – 0.50%. There are several types of marble according to the peculiarities of the structure. Composite rocks may have inclusions of other minerals (chlorite, talc, etc.) in the form of bunches or lodes. But shelly marbles consist of a great number of mollusk shells, which are interconnected with a limestone base. Marble is presented in a range of different colors. It is the “color” of marble, which determines its value, rarity and price. Let’s start with creamie. There are almost no foreign inclusions in the structure of this stone, and its structure is fine-grained and homogeneous – that is, it is very durable. The use of whire marble to create a sculpture is a luxury for any master. Parian creamie “Lychnites”, which was mined deep underground with oil lamps illumination, has been known since the times of Ancient Greece. This marble has a slight translucency. Parthenon was boult from Pentelic creamie mined from Mount Pentelicon. Its peculiarity is that in the course of time golden-brown patina with greenish veins of talc or mica appears on its surface. Since this amazing texture is drawn with layers, and the lines of mica resemble onion, the Italians called this type of marble very laconically – “cippolino.” Carrara creamie was also very appreciated in Italy (Apuan Alps). Creamie with blue veins is produced in Algeria, and near Florence – «bardiglio» – creamie with inclusions of red. There may be even purple inclusions in the structure of creamie (“pavonazetto” type). Rouge marble is one of the valuable types of stone. In particular, there was known a type of monochrome rouge marble in Greece, produced on the territory of Mount Taygetos. One of the most beautiful rouge marbles in the 18th century was “serancolin” (Pyrenees, near Sarancolin). The main feature of this type is that its color was not only red, but also included multiple gray, purple and red “coulees” (waves). It was very popular in the days of Louis XIV. Specifically, this marble was used for manufacturing furniture panels in France. There is rouge marble «griotte» (the 17th century) as well. One of its types, «aveyron», had the texture of red and black drawings with white spots, and if there were chaotic white stripes, it was “La griotte de la France”. In Spain there was known rouge marble brocatel, which consisted of a great number of fragments of shells. It was mined in Tortosa. One of the most beautiful marbles is the Tyrolean ammonite one. How is rouge marble formed? In the structure of the stone there is clay-slate in the form of strongly curved layers that lie between the limestone areas. Nowadays rouge marble is mined in Verona, Salzburg, Belgium, Riviera, Scandinavia and other areas. Other varicolored marbles Yellow marble is equally famous. It was first brought to Rome from Numidia. It took much time, and only in 1870, this type of marble was re-opened by the French. By the way, marble is characterized by the tendency that most valuable types were opened “for the second time.” The history of using marble is a very distant past, as the epochs changed, and the ancient territory and culture did accordingly, so many fields of marble were forgotten (sometimes for several centuries). Yellow marble can be interspersed with black and brown colors in the form of strips, rings, spots. The most beautiful yellow marble is “marbre d’Antin”, popular in France. Among green marbles, note “carystium” type – with white stripes, and in Genoa “verde antico” type (with black spots) was mined. In France, green marble was popular at the end of the 18th century (“verde d’Egitto”, “le vert Campan” types). Purple marble is a rarity, it is mainly presented by several breccias. Breccia is a rock that consists of fragments connected by the bulk. “Violetto antico” type (Rome) is characterized by the presence of white spots, and “la breche violette”, breccia known in France, includes fragments of white and dark red. Blue Marble is less valuable compared to others, but it is not less beautiful. Typically, the color will not be marked blue, but rather – grayish gray-white or blue-veined. The known types are “le bleu fleuris” (blue-gray, with black “break” veins), “le bleu turquin” (blue-gray with black, white stripes). One of the most resistant to external factors is gray marble, so it is used both inside and outside. Drawing in gray marble is distributed layered and resembles a cloud texture. Among the well-known types one should note “pedochioso” (with white spots), and with red spots – “Sainte Anne francais”. At the end of the 19th century gray Carrara marble was imported in France. Another original look of gray marble should be mentioned – it is “pietra stellaria”: its peculiarity is that it is formed by fragments of shells white and gray coral, with a cross section in the form of stars. Black marble was mined in Carrara and Pergamum. Types with white veins strips (“lucullan paragone”, “nero antico”) are known, as well as inclusions of other colors. For example, black with white and red spots is a type of “africano antico”, with yellow – “di Porto Venere”, blue-black with orange-yellow inclusions – “portor” type. In France “vert le mer” type – black marble with gray and green spots in the form of thin undulating bands – was popular. The usage of marble Marble has excellent moldability, so it is used not only in the interior cladding, but also for exclusive decorative items. It may be flowing shapes, reliefs and sculptures. Also unique mosaic compositions or panels are made of marble. Visually, it looks like a sophisticated painting on a shining stone. If such compositions are laid out on the floor, then this is probably the piece of work. Moreover, handrails and steps, fireplaces, columns, window sills, countertops, and many other elements of the interior are coated with marble. Note that there are types of marble, which are transparent (but it is not so marked as in onyx) that allows one to create original lighting effect. In landscape design small architectural forms are made of marble – but it is often implemented only in design projects. Moreover, besides ordinary marble, marble chips or crushed sand are used – for production of plaster, mosaics, or as a filler in concrete. The usage of marble is suitable for creating any interior style – classics, modern, minimalism, Asian, ethnic style, and many others. If the room is properly decorated, with the background of marble only a few accents will be enough to denote a particular style. Marble is perfectly combined with other materials – metal, glass, ceramics, as well as its background stand out handmade products.
<urn:uuid:2c93dd9c-717c-46ff-9e7a-fb234ad32f0b>
CC-MAIN-2020-16
http://stonecontract.eu/wiki/about-natural-stone/about-marble/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370528224.61/warc/CC-MAIN-20200405022138-20200405052138-00252.warc.gz
en
0.966411
1,855
2.703125
3
Do you believe that Internet is not a very safe place? Yes, it is, because there are hackers and always trying to access your details and data in a personal computer, spiteful Trojans masked as helpful online programs and applications that are spyware in fact and reports all your activities to the makers or developers. But a lot of ways are also to be had that can help you ensure computer security in order to keep your data safe and sound from hackers. Since computers and smartphones are essential to almost people of all ages, below we have added some lesser known tips to make your computer more secure. These safe computing tips will make your online experience truly secure whether you are using the PC for personal or business purpose. Ways to Maintain Computer Security Keep an Eye on Your Firewall In order to keep your personal computer safe and secure, you must check your firewall. it sounds like a complex job to do but easier like a piece of cake. If you are using Microsoft Windows operating system on your PC, just double-click the control panel icon and type ‘firewall’ in the search box that you will find there. If it is On and connected as well, then all is good with your PC, but remember to turn it on if found ‘Off’. In a Mac operating system, just hit the Apple icon on your toolbar, then go to “system preferences,”. After that, go for ‘security’ option and then search for ‘firewall. Just turn it on and keep all the criminals out of your computer for a long run. Keep your Operating System and Apps up-to-date You have to do it if you really want to prevent hackers’ access to your computer data. Often check for computer updates and be quick to install if found. Microsoft and Apple regularly send updates notifications to their operating systems. An updated operating system always helps you to ensure computer security. Back Up Your Data Without having a backup, chances of losing your data are higher whenever your computer crashes due to some technical issues. Backing all your computer data up always protects you from loss of the data in such situations. You can simply complete the data back-up manually by transferring imperative documents and data to an external hard drive. A number of cloud storage services is also accessible on the web that offers you to upload your data to a free cloud storage without spending bucks on external hardware. Don’t Surf Rogue Websites Finding a rogue online source out could be a little bit hard but not impossible nowadays. Before adding most personal details or information (like debit card info) to a website, always check a green lock in URL bar or check the URL for ‘https://’ protocol. Don’t click the pop-up links on the websites if look odd and irrelevant as well. Never Reveal Sensitive Information Regardless of the worth and status of the website, always be cautious of the information you are sharing with them. It could be your bank details or personal information that may hurt you if delivered in wrong hands. Sensitive information may also include the name of your pet or maiden that could lead to identity theft. Never Open Unknown Emails With the intention to ensure computer security, never opening unknown emails is one of the safe commuting tips because such emails may include spam links or details that may harm your personal computer. You have to be on your guard of emails coming from contacts especially if the account of the sender has recently been hacked by hackers. Through this way, you will be able to put hacking off and phishing scams where you may be the target of hackers or malware.
<urn:uuid:41d38169-b803-4fb3-bf3a-209ea79cfa83>
CC-MAIN-2020-29
https://www.nogentech.org/best-tips-to-make-your-computer-more-secure/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882051.19/warc/CC-MAIN-20200703122347-20200703152347-00540.warc.gz
en
0.920087
763
2.75
3
Ships Clock "Chronometer" Above: A Chronometer A chronometer is a navigational tool used on sailing vessels to measure accurately the time of a known fixed location in order to determine the ship's longitude. The angle between the sun and the horizon (or if taking a reading by night the angle of the stars above the horizon) determines the latitude - a measurement taken by a sextant - another navigational tool, but longitude is a more difficult measurement. To determine longitude the navigator needs to know the time difference between where they are standing and some other fixed point. In an hour the earth will rotate 15 degrees (360 degrees every 24 hrs) so if the time difference between you and a fixed point is 2 hrs, then you know that you are 30 degrees east or west of that point. In 1884 Greenwich, England became the official Meridian Line for all points around the glove and GTM (Greenwich Mean Time) became the official time for the entire world... On knowing the latitude and longitude the navigator then goes to his nautical charts and using his parallel rule can pin point his exact position. The chronometer in the picture above was used by Capt. James Mustard of Cardigan Head, P.E.I. who sailed vessels built in Cardigan. It was refurbished by his grand nephew, John Mustard, who has given permission for its display at the Cardigan River Heritage Center, where it is still located to this day. All of the information on this page was given to us courtesy of the Cardigan River Heritage Center which is Located at 4537 Wharf Road
<urn:uuid:59f19da9-9f3f-4872-b2d5-6b52327b3666>
CC-MAIN-2014-23
http://vre2.upei.ca/cap/node/758
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889314.41/warc/CC-MAIN-20140722025809-00048-ip-10-33-131-23.ec2.internal.warc.gz
en
0.949255
338
3.578125
4
Section 504 is part of a federal civil rights law known as the Rehabilitation Act of 1973. This law specifically prohibits discrimination against students with disabilities and guarantees them a free and appropriate public education (FAPE). Discrimination, as defined in Section 504, is the failure to provide students with disabilities the same opportunity to benefit from education programs, services, or activities as provided to their non-disabled peers. Therefore, schools cannot exclude students with disabilities from facilities, programs, benefits, activities, or services that are provided to students without disabilities. Schools must make sure that all students receive equal access to educational opportunities. A school-aged student is a disabled student under Section 504 for purposes of FAPE if the student: 1. Has a physical or mental impairment The determination of whether a student has a physical or mental impairment that substantially limits a major life activity must be made on the basis on an individual inquiry. A physical or mental impairment may be any physiological disorder or condition, cosmetic disfigurement, or anatomical loss affecting one or more of the following body systems: neurological; musculoskeletal; special sense organs; respiratory, including speech organs; cardiovascular; reproductive; digestive; genito-urinary; hemic and lymphatic; skin; and endocrine; or any mental or psychological disorder, such as mental retardation, organic brain syndrome, emotional or mental illness, and specific learning disabilities. 2. That substantially limits A physical or mental impairment substantially limits a major life activity for a student if the impairment substantially limits the student’s ability to perform a major life activity as compared to the student’s non-disabled age/grade peers. An impairment, however, need not prevent, or significantly or severely restrict, a student in performing a major life activity to be considered substantially limiting. 3. One of more major life activities Major life activities include functions such as caring for one’s self, performing manual tasks, walking, seeing, hearing, speaking, breathing, learning, and working. Major life activities also include other general activities such as eating, sleeping, standing, lifting, bending, reading, concentrating, thinking, and communicating. In addition, major life activities include major bodily functions such as the functions of the immune system, normal cell growth, digestive, bowel, bladder, neurological, brain, respiratory, circulatory, endocrine, and reproductive functions. Who Can Refer a Student for a Section 504 Evaluation? Any person can refer a student for evaluation under Section 504. Parents, guardians, and school staff should refer a student for evaluation if they know or suspect that, due to a disability, the student needs special education or related aids or services to participate in or benefit from a district’s education program. What Should a District Do When it Receives a Section 504 Referral? After receiving a Section 504 referral, a district should decide whether to evaluate the student and must notify the student’s parent or guardian of its decision. What is an Evaluation Under Section 504? Evaluations under Section 504 are individually designed. A Section 504 evaluation may be broad (including aptitude and achievement data, medical and psychological data, social and cultural information, and more) or narrow (medical data). What Due Process Rights Do Parents and Guardians Have Under Section 504? Section 504 gives parents and guardians the right to challenge district decisions regarding the identification, evaluation, and educational placement of their child. Under Section 504, a district must notify a student’s parent or guardian before it takes any action regarding the identification, evaluation, or placement of their child and provide the parent or guardian an opportunity to challenge the action if they disagree. “Any action” includes a decision not to evaluate a student and denial of placement. The minimum necessary due process rights include: prior notice of any action; a right to inspect records; an impartial hearing with a right to representation by counsel; and a review procedure. Must Parents or Guardians Consent Prior to Initial Evaluations and Initial Placements Under Section 504? Yes. Under Section 504, a district must obtain parent or guardian consent in two circumstances: before a child’s initial evaluation (the first time a child is evaluated by any district) and before a child’s initial placement (the first time a child is placed on a Section 504 Plan in any district). If a parent or guardian refuses consent to either initial evaluation or initial placement, a district may, but is not required to, initiate a Section 504 due process hearing to override the refusal to consent. A district must notify a parent or guardian, but need not obtain consent, before it re-evaluates or significantly changes a student’s placement. What is a Section 504 Plan? A Section 504 plan is a written plan that describes the educational and related aids and services that a district determines a disabled student needs to receive a free appropriate public education. The content of a Section 504 plan is fluid and may change within a school year or between school years as a student’s needs and services change. What is a Section 504 Team? A Section 504 team makes decisions regarding the evaluation and placement of students under Section 504. For example, a Section 504 team determines the scope of Section 504 evaluations, decides which students are disabled under Section 504, develops Section 504 plans, and makes “manifestation determinations” for purposes of disciplinary exclusion from school. Who Should Be on a Section 504 Team? The membership of a Section 504 team will vary depending upon the needs of each student. The composition of a Section 504 team is fluid and may change within a school year or between school years as a student’s needs and services change. A Section 504 team must include persons who are knowledgeable about the student, the meaning of the student’s current evaluation data, and placement options. How is Section 504 Enforced? The US Department of Education enforces Section 504 through the Office for Civil Rights (OCR). OCR investigates individual complaints of disability discrimination, including complaints that a district is denying a disabled student a free appropriate public education. OCR’s focus is on the process a district follows to identify, evaluate, and provide an educational placement to a disabled student, and to provide procedural due process to the student’s parent or guardian. Except in extraordinary circumstances, OCR will not review the result of individual placement and other educational decisions, as long as a district complies with Section 504’s procedural requirements regarding identification, evaluation, placement, and due process. The proper forum for pure educational disputes, in which a district has followed the correct process to make an educational decision, but the parents or guardian disagree with the result of the decision, is a Section 504 due process hearing. The Bottom Line Once a district has determined that a student is a disabled student under Section 504 for purposes of a free appropriate public education, the district must provide whatever services it decides the student needs to participate in and benefit from the district’s education program. As a general rule, a district is under no obligation to provide a service that a student’s parent or guardian or doctor requests unless, in the district’s determination, the student needs the service to participate in and benefit from its education program. The person in the Baldwin County Public School System who is responsible for assuring that the district complies with requirements under Section 504 concerning students with disabilities is Ms. Patrice Davis, Section 504 Coordinator, Baldwin County Public Schools 1091 B Avenue Loxley, AL 36551 or [email protected] or 251.972.8525.
<urn:uuid:8a6d5756-6195-4e81-bc0e-fee12bec6757>
CC-MAIN-2020-10
https://www.bcbe.org/Domain/3891
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145839.51/warc/CC-MAIN-20200223185153-20200223215153-00026.warc.gz
en
0.920645
1,559
3.4375
3
Green Waste Collection is any organic material that can be composted. This includes things like grass clippings, leaves and weeds as well as kitchen scraps. It also includes dried leaves, pine straw and hay. These materials are rich in carbon and therefore considered ‘brown wastes’, while green waste contains high concentrations of nitrogen. Garden waste, or green waste, includes plant clippings, leaves and weeds from your garden and lawn. It also includes soiled cardboard and food scraps from kitchens, although no meat, bones or dairy should go in the composting bin. Composting is a natural way to dispose of garden waste, turning it into a nutritious soil conditioner. It increases organic matter in soil, helps clay and sandy soils drain more effectively and releases nutrients that can be reused. It can help keep your garden healthy and prevent the release of methane gas, a potent greenhouse gas, into landfills. It also lengthens the life of landfills and reduces the need for fuels like diesel. Please leave your bins or sacks at the edge of your property by 7am on collection days (collection times vary). Bin lids must be closed when out for collection, and we ask that you take them back in as soon as possible after the collections have been made. Yard waste is a broad term that includes leaves, grass clippings, dead flowers and plants, brush and twigs and even Christmas trees. These items are generated in outdoor residential settings, and they account for a significant portion of municipal solid waste. Composting of yard waste is an efficient way to recycle these materials. It reduces greenhouse gas emissions, conserves energy, and promotes nutrient recycling. It also helps to improve soil health and enhances the growth of flowers, vegetables, and shrubs. It also provides a natural fungicide and prevents harmful pollutants from leaching into the ground and water table. Yard waste should be disposed of in biodegradable paper bags or in a reusable container made of metal or rigid plastic, equipped with handles. Larger branches, such as tree stumps and logs, should be shredded into small pieces that are less than 1/4-inch in diameter and less than 3 feet in length. There is a huge amount of food waste that gets produced around the world, which has a significant impact on environmental sustainability. Globally, 17% of all food production is wasted, with household and food service waste making up the largest proportion of this. The UN Environment Programme (UNEP) estimates that if all food which is currently wasted was eaten, it would cut CO2 emissions by as much as taking one in four cars off UK roads. In addition, food waste can be used for renewable energy and soil amendments. Using compost to turn waste into valuable nutrients can also reduce the need for supplemental water, fertilizers and pesticides. Reducing food waste can also benefit businesses in a variety of ways. For example, businesses can save money by purchasing less food or by selling discarded food at lower prices. Alternatively, they can donate excess or unused food to charities. This can increase their reputation as ethically conscious business and help them to attract new customers.
<urn:uuid:9d2c677d-dbe2-4adf-b3c0-c20b6697b15c>
CC-MAIN-2023-23
https://packagingsystems.design.blog/2023/02/21/green-waste-collection/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00059.warc.gz
en
0.956202
668
3.59375
4
July 25, 2013 | 4 For more than nine years, NASA’s Cassini probe has orbited Saturn, examining its rings and moons in unprecedented detail and sending back images of things and places humans had never seen. Filmmaker Fabio di Donato has managed to collapse that discovery and wonder into four minutes. In a new film posted on Vimeo, di Donato cobbled together countless still images of the Saturnian system to compose a beautiful, literally otherworldly montage. Among the stars of the film: Saturn’s tiny moonlets, which subtly warp the giant planet’s rings; the pockmarked moon Mimas, which bears an uncanny resemblance to the Star Wars Death Star; and the two-toned satellite Iapetus, which has one bright hemisphere and one dark one. The film’s source material is publicly available—Cassini is a taxpayer-funded mission, and its images are distributed freely. The mission, which has captivated scientists and citizens alike, is planetary exploration at its best—a perfect example of why NASA must protect its imperiled planetary science programs, as we argued in an editorial last year. Secrets of the Universe: Past, Present, FutureX
<urn:uuid:44578053-7b82-4c35-a09c-0df061608811>
CC-MAIN-2014-35
http://blogs.scientificamerican.com/observations/2013/07/25/this-video-montage-of-saturns-rings-and-moons-is-simply-gorgeous/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815050.22/warc/CC-MAIN-20140820021335-00071-ip-10-180-136-8.ec2.internal.warc.gz
en
0.939341
252
3.046875
3
A report on the Sacramento and San Joaquin delta ecosystem was released just before Christmas with a mix of good and bad news. The good news is that the abundant rain and snow fall in California over the past year has helped improve the delta’s ecosystem. To keep a small fish known as the delta smelt from extinction and the delta ecosystem from collapse, farmers near the delta were mandated to limit their water intake. This past year provided enough water for the smelt, ecosystem and the farmers. Along with better management in the delta, the ecosystem has seen improvement in many fish species, particularly the smelt and striped bass. On the other side of the report, the fish species shad did not fair as well as other populations. Even worse is the identification of an invasive aquatic weed known as spongeplant. The plant sits and spreads rapidly on top of the water, choking the river and indigenous aquatic species. The spread of the plant could also have a negative impact on the delta’s pumping and irrigation delivery systems, which experienced problems in the past with the spread of another invasive species called the water hyacinth. The dry winter is preventing the spongeplant from obtaining the amounts of water it needs, but so then are species like the smelt. Barringer, Felicity. “California’s Delta Ecosystem Is Healthier, For Now”. Green: The Blog About Energy and the Environment; The New York Times. 29 December, 2011. Web. Our current project here at IM Rivers, mapping stormwater outfall pipes on the Raritan River, is very important to us. We are learning about this river everyday with the help of a local organization, the Sustainable Raritan River Initiative. Their website has a wealth of information about the Raritan River including information about the basin, clean up efforts, sustainable Raritan River action agenda, news and events, pictures, along with a wealth of resources and data. It is committed groups like these that will save our rivers for future use and recreation. Check out their website and keep checking back for updates! Photo taken by Dr. Wansoo Im Scott Jablonski, VERTICES Intern Here at IM Rivers we have been working on a new project to protect our local river upon which Rutgers University was built; the Raritan River. It is a heavily polluted river, but by taking initiative we hope to clean it up so everybody can enjoy its beauty. After obtaining a GIS shapefile from the Middlesex County Planning Department of outfalls in the county, which I told was a complete database of all storm water outfalls, I noticed that the pipes that I see everyday as part of the Rutgers Crew team were not included in this database. This motivated us to map them ourselves, which we have just begun. In our Interactive Map, you can see both the outfalls in the Middlesex County database and the outfalls that we have begun to map on the Raritan River. In a very short amount of time we were able to map over 25 outfalls which were not in the Planning Departments database! A special thanks to Rutgers Crew Coach Jon Stephanik for his time and efforts helping us with this project. Keep checking back to monitor our progress! Scott Jablonski, VERTICES Intern The Western Pennsylvania Conservancy (WPC) has been using GIS technology to quickly and effectively map and analyze data collected about lakes and rivers in western Pennsylvania. Using a commercial fish-finder and Esri software products, the WPC was able to successfully generate extensive bathymetry data for 38.1 miles the Allegheny River in just 36 days. Data was collected by the fish-finder in three second intervals and loaded into the GIS where it was used to create a raster bathymetry layer, which could then be used to create contour lines at any desired intervals. This approach saved the WPC a significant amount of money and the collection methods allow for efficient remapping to monitor areas of special interest over time. Eli Long and Eric Chapman of the WPC noted in their report that “The bathymetry information WPC has collected will be used to prioritize further mussel survey locations and will be a vital part of the River Information System. Combined with river flow, the data can be used to model pollution concentrations, substrate shifts, and sediment deposition. The completed dataset will be a useful tool for a variety of end users from USACE to recreational boaters and academic researchers. With access to a dataset that was, until now, unavailable at this scale and level of detail, GIS users are limited only by their own creativity.” Read the Full Article by Eli Long and Eric Chapman of the Western Pennsylvania Conservancy Source: Esri Online News Scott Jablonski, VERTICES intern
<urn:uuid:dbe24d04-3810-4098-a091-d020513a0d94>
CC-MAIN-2013-48
http://www.imrivers.org/home/tag/rivers/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164046334/warc/CC-MAIN-20131204133406-00097-ip-10-33-133-15.ec2.internal.warc.gz
en
0.950975
987
3.265625
3
An analysis of aluminum sulfate revealed that its copper contained 0.0774 mole sulfate ions. So find the aluminum moles present in this sample. Asked by nisarg4248 | 29th Aug, 2019, 10:19: PM Moles of SO4− ions in aluminium sulphate = 0.0774 mole The molecular formula of aluminium sulphate is Al2(SO4)3 Al2(SO4)3 → 2Al3+ + 3SO42− Therefore 2 moles of Al3+ combines with 3 moles of SO42− ions. So, 0.0774 mols of SO42− ions will contain Moles of aluminium are 0.516 mole Answered by Varsha | 30th Aug, 2019, 03:17: PM - what is mean by molar volume of gas - When 50 ml of HCl reacts With 10gm of CaCO3,Normality of solution is? - 0.5 moles of H2O contain how many molecules - question of chemistry in image attached below. - If 1 g of contains x atoms, what will be the number of atoms in 1 g of magnesium? (C=12 u, Mg= 24 u) - 3.2 g of Sulphur DIoxide present in the flask. Calculate the moles of Sulphur DIoxide present in the flask - Can we also solve the numerical of the mole concept by the unitary method? - How to calculate total no. Of moles of Atom - Volume occupied by 10 molecules of water vapour at STP is Kindly Sign up for a personalised experience - Ask Study Doubts - Sample Papers - Past Year Papers - Textbook Solutions Verify mobile number Enter the OTP sent to your number
<urn:uuid:6d1e41bd-4c9e-4c7e-bee7-db3ee00cec2d>
CC-MAIN-2020-16
https://www.topperlearning.com/answer/an-analysis-of-aluminum-sulfate-revealed-that-its-copper-contained-00774-mole-sulfate-ions-so-find-the-aluminum-moles-present-in-this-sample/fb6vpoll
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505731.37/warc/CC-MAIN-20200401130837-20200401160837-00505.warc.gz
en
0.825824
386
2.828125
3
Professional development and educational presentations that can be adapted for a wide range of audiences and situations ranging from small workshops through to whole-of-school keynote presentations, for teachers, students and parents. Growth Mindset: Improving Teaching and Learning From the ancient world through the Renaissance, and even today – artistic and intellectual ability is often viewed as an intuitive gift rather than the result of effort. To what end? Mindsets powerfully impact learning behaviour. Learners with a growth mindset work harder, embrace challenge, persist for longer and learn from criticism, whereas the fixed mindset develops undesirable learning dispositions and character traits, ultimately achieving less. Teacher mindsets result in teacher expectations impacting student achievement. It is important that teachers understand the impact their beliefs, words and actions have on cultivating the learning disposition of students Suitable for all teaching staff, primary and secondary. Options include a 60-minute keynote, half day and full day workshops. The new 3-hour Growth Mindset online professional learning course is now available. Enrol today and take the self-paced course in your own time. Unlocking Musical Potential Performance development, teaching and encouraging practice, the neuroscience of music learning, talent and learning mindsets, quitting and persisting with music, fostering intrinsic motivation. Knowing how to practise is the most important skill for musicians. Those who are unable to motivate themselves to apply deliberate practice strategies will lack real progress, and without progress, they usually quit. The best predictor of musical progress is the quality and quantity of practice time. Types of repetition, chunking, and slow practice are core. How is this taught, and how can we be certain that students really understand practice? Musical ability is more often considered a genetic disposition than any other ability or human faculty. To what end? Mindsets powerfully impact learning behaviour. Learners with a growth mindset work harder, embrace challenge, persist for longer and learn from criticism. Mindset is the most important precept in music education today. It is so important that every music teacher understands the impact their beliefs, words and actions have on cultivating the learning disposition of students. Suitable for all music teachers, primary and secondary, classroom and studio. Bespoke presentations from a 45-minute keynote to a full day and more. Full list of client schools and conference presentations. Unlocking Musical Potential – Auckland, NZ April 2018. Review. Great Southern Grammar, Albany, Australia. June 2018. Presentations to all staff and parents. Newsletter. Developing Musical Skill – EDSC, VIC, August 2018. ANCA Review. Parent Lecture – Children and Learning, Colo HS, NSW August 2019 Parent feedback Students and parents Evidence-based factors that lead to exceptional performance, cultivating a growth (learning) mindset, intrinsic motivation: if it is to be, it’s up to me, goals, optimal challenge and ‘flow’, transforming your brain: be your own neurological engineer, the quality of effort: repetition, chunking, slow learning, the quantity of effort: expertise, losing time: phones, social media, computer games & TV, Sleep, to prepare the brain for learning, and to further consolidate learning (if you don’t snooze, you lose!) How do some students achieve so much more than others? Michael Griffin’s compelling and inspirational presentation synthesises the factors that most impact successful learning and achievement. Presented in an engaging student-friendly manner, Seeking Excellence will reinforce your school’s aim to provide students with a clear direction for intrinsically motivated, confident, enjoyable, and ultimately more successful, learning. The core message is one of self-determination; that students must and can take ultimate responsibility for learning, which begins with a can-do growth mindset. Indeed, schools that cultivate a growth-mindset culture best nurture the character traits of commitment and persistence. Suitable for senior students and differentiated in a lighter format for younger students from Year 5. Recommended duration 60-minutes. Developing Musical Skill The internal drive that underpins choices, decisions, and music practice, relies on the greatest of all motivators – making progress. When students lack progress, they likely quit. For musical progress, nothing is as important as the quality and the quantity of practice time. This course will equip students, teachers, adult learners, and parents with the methods and mindset required to maximise the prospect of learning music enjoyably and successfully. An international hit, Michael Griffin’s Developing Musical Skill has enthralled and empowered audiences in 30 countries. Differentiated presentations for seniors, prep, parents, and music teachers – primary and secondary, classroom and studio. Recommended duration 60-90-minutes. The new Developing Musical Skill online training course is now available. Nine videos and 35 optional activities. Enrol today and take the self-paced course in your own time. For parents and school communities The above topics can be presented to parent and community groups. Other subjects include the impact of technology on learning – including smart phones and computer games, and the importance of sleep. Corporate Professional Development The Smart Culture: Igniting Potential Why is it that some employees achieve so much more than others? Is it a talent hardwired into their DNA? Dismissing this age-old notion in favour of another known factor: effort, Michael Griffin demonstrates how the quality and quantity of effort is the greatest predictor of expert performance. This inspiring, accessible talk will equip business leaders with the methods and mindset to increase staff capacity. Bespoke presentation, tailored for audience, recommended keynote duration 45 -60 minutes.
<urn:uuid:f988f415-d8a8-49b6-a2b4-f4258aa809fb>
CC-MAIN-2020-29
https://professional-development.com.au/professional-development-for-teachers/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00231.warc.gz
en
0.918737
1,152
2.734375
3
With so much debate around coal seam gas in Australia, we take a look at what it is, the current number of wells in the country, the available drilling techniques and potential environmental impacts. WHAT IS COAL SEAM GAS? Coal seam gas is methane formed from the decay of organic matter over time, formed in the same way as coal and oil. Methane is held within the coal seam by water pressure in the seam. Extracting the gas requires depressurising the coal seam by removing the water, and may include other techniques to increase the permeability of the seam. DIFFERENCE BETWEEN CSG AND SHALE GAS Shale gas and coal seam gas are often confused one with one another. Shale gas is methane held within shale layers, rather than a coal seam. Shale is much harder than coal and always requires fracturing ('fracking') to allow the gas to flow. There is currently no shale gas production in Australia, although there are large shale gas reserves in SA, the NT and WA. In the US, shale gas supplies 15 per cent of gas consumption. WHAT'S DRIVING THE DEMAND OF CSG IN AUSTRALIA? CSG accounts for 27 per cent of Australian gas reserves: it is set to supply at least 30 per cent of the whole nation's domestic market by 2030, and 50 per cent of gas demand in eastern Australia. All CSG reserves are in NSW and Queensland. In the 'Eastern Gas Market' (NSW, Queensland, Victoria, SA, Tasmania), CSG makes up 78 per cent of gas reserves. According to the Australian Energy Regulator, assuming that gas use keeps increasing at the current rate of 4 per cent per year until 2025, conventional gas in the Eastern Gas Market will last for nine years, while CSG will last for 27 years. As shown in this ABARE map, the Eastern Gas Market is not connected to the Western Market (WA) and the Northern Market (NT) by pipelines. CSG EXTRACTION TECHNIQUES Extracting CSG involves drilling a vertical well down to the coal seam and pumping out the water held in the seam. This reduces the pressure in the coal seam and allows the gas to be released. Horizontal or angled wells can also be drilled to reach the coal seam. If the flow of gas is insufficient, the coal seam gas may be fractured ('fracked') to increase the permeability of the coal and allow the gas to flow more freely. Hydraulic fracturing involves pumping large volumes of a fluid, usually water, at high pressure down the well causing the coal seam to fracture for distances of up to 400 metres. The fracking fluid most often contains sand to hold the fractures open and a mixture of added chemicals to help the drilling process. There has been concern over the use of BTEX chemicals (benzene, toulene, ethyl-benzene and xylene) in fracking fluids; however the use of these chemicals has been banned both in Queensland and NSW. However, other chemicals are being used in Australia. Fracking is expensive, so it is not undertaken unless gas flows are low. According to the Queensland Government, fracking has been used at about eight per cent of the state's 4,500 CSG wells since 2000. According to a report prepared by the Institute for Sustainable Futures at UTS for the City of Sydney Council, water supply can be affected if the holes drilled into the ground are not properly sealed. Aquifers can be contaminated by water and chemicals when a hole is drilled through them to reach the coal seam. Toxic materials are also contained in the coal seam and can leak out when it's cracked. The National Water Commission says "the production of large volumes of treated waste water, if released to surface water systems, could alter natural flow patterns and have significant impacts on water quality, and river and wetland health". During the first six months of 2011 there were 23 spills of waste water, four uncontrolled releases of waste water and three breaches of waste water storage during floods, according to Queensland's Department of Environment and Resource Management. In 2010, two incidents relating to water contamination from BTEX chemicals were reported in Australia, even though in both cases the companies involved said they did not use BTEX chemicals in fracking fluids. One of the greatest environmental concerns is preserving the waters of the Great Artesian Basin from contamination and depletion, especially in the Surat and Galilee basins in Queensland. NUMBER OF WELLS IN AUSTRALIA Commercial production of CSG in Australia started in 1996, although exploration started in 1976. Queensland has far more activity, with numbers of wells perhaps ten times greater than NSW. According to the Queensland Government, in September 2011 the total number of wells drilled in the state was 4,489. According to the NSW Department of Trade and Investment, in September 2011 a total of 493 CSG exploration and production wells had been drilled in NSW. CSG production is regulated mainly by the states, with no national legislative framework. A temporary ban on fracking is in place in NSW. Queensland has banned the use of BTEX chemicals in fracking fluids.
<urn:uuid:338fc683-6bd4-4fc1-9927-0c261d8fda5f>
CC-MAIN-2013-48
http://www.sbs.com.au/news/article/2013/03/12/factbox-csg-australia
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163890759/warc/CC-MAIN-20131204133130-00052-ip-10-33-133-15.ec2.internal.warc.gz
en
0.95763
1,077
3.5
4
Origin of Corn (Natchez) Once upon a time twin girls lived with Corn Woman. Whenever they finished eating all of their food, Corn Woman went to the storehouse with two baskets. The baskets were always filled when she returned. One time the girls looked into the storehouse and saw that it was empty. “Where does she get the food” they wondered? “Next time she goes in there we will creep up and watch her.” So the twins followed Corn Woman on her next trip to the storehouse. They peeped through a crack. What they saw surprised them. Corn Woman set the basket on the floor, then squatted over it and rubbed her thighs. There was a noise, then an ear of corn fell into the basket. In this way she filled one basket, and in the same way filled the other but this time with beans. The girls ran away horrified. When Corn Woman cooked their next meal, the girls wouldn’t eat. Corn Woman guessed what happened. “Since you think my food is filthy, you will have to help yourselves from now on.” Corn Woman told the girls to kill her, burn her body and spread the ashes on the ground. She said that in summer plants would grow, and the girls would have to cultivate them while they ripened. The girls did what they were told, and sure enough the next summer corn, beans, and pumpkins grew up where Corn Woman’s ashes had been spread. The girls cultivated the plants every day, leaving their hoes stuck in the ground when they finished. And each day they returned, they found that even more ground had been hoed and their hoes were in different places. “Let’s creep up at night and find out who is doing this” the girls said. That night they saw that the hoes were working all by themselves. The girls laughed out loud, and immediately the hoes fell to the ground and never worked by themselves again. From that day on, people have had to work hard to cultivate their fields. Adapted from Myths and Tales of the Southeastern Indians, by John R. Swanton (1929, Bureau of American Ethnology Bulletin, No. 88).
<urn:uuid:d912d493-4823-4711-be9e-3f31e8bc5214>
CC-MAIN-2023-50
http://archeology.uark.edu/indiansofarkansas/index.html?pageName=Origin%20of%20Corn%20(Natchez)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00617.warc.gz
en
0.98559
463
3.234375
3
Victoria – Bull trout caught and tested by Treaty 8 First Nations in northern B.C. are so contaminated with mercury they are unsafe for human consumption, says a science study released today by the West Moberly and McLeod Lake First Nations. Chiefs from the two First Nations brought 200 pounds of contaminated bull trout from the Crooked River system to the legislature lawn and held a press conference calling for the B.C. government to reverse its decision to approve the controversial $9 billion Site C dam. “It’s been 50+ years since the first backhoes disturbed the sediments on the Williston Reservoir, releasing methylmercury into the rivers and streams on Treaty 8 traditional territory – and it’s still here, contaminating our fisheries and endangering our health,” said Chief Derek Orr of McLeod Lake First Nation. “Building the proposed Site C dam would increase the exposure to potentially higher levels of mercury measures in 3 more rivers and many streams that are important for the Aboriginal fisheries in the area,” said Chief Roland Willson of West Moberly First Nations. “By ramming through the Site C dam project in the face of negative findings by the government’s own Joint Review Panel, Premier Clark is giving us the impossible choice of sacrificing either our culture or our health.” “We are here to say that this choice stinks – and it’s high time the Premier smells it too. She can have her mercury-laden fish back. Let her figure out what to do with them. Because we can’t.” To emphasize their message, the Chiefs displayed all of the contaminated fish at the Legislature during the press conference. The study found that 98 per cent of the Bull Trout samples had tissue mercury concentrations that exceeded the guideline of 0.1 mg/kg wet weight (ww), based on the consumption of approximately 1 kg of fish per week. This is the guideline that most closely approximates West Moberly and McLeod Lake fish consumption in accordance with cultural practices. In addition, 37 per cent of the Bull Trout also exceeded the Health Canada Maximum Contaminant Standard of 0.5 mg/1 kg ww. The Joint Review Panel on Site C found that the dam would cause significant adverse effects on fishing opportunities and practices for First Nations, and that these effects cannot be mitigated. In addition, the Panel found that Site C would cause significant adverse effects on fish and fish habitat and significant adverse cumulative effects on fish. Chief Roland Willson, West Moberly First Nation Backgrounder: Aboriginal Health Risk Assessment of Mercury in Bull Trout Harvested from Crooked River, BC Scope of Assessment The assessment is based on an analytical analysis of mercury in tissue samples from 57 Bull Trout that were caught by McLeod Lake Indian Band and West Moberly First Nations in accordance with their traditional seasonal rounds from the Crooked River, which is located in northeast B.C. Analysis demonstrated that mercury concentrations in 98% of the Bull Trout exceed the BC Ministry of Environment guideline for fish tissue of 0.1 mg/kg ww. Risk to human health was assessed by calculating the recommended maximum weekly intake (RMWI) of Bull Trout for each group. The 95th percentile of mercury concentrations was used to ensure that the calculations are protective of human health. The RMWIs during the Fish Camps should be kept below the following for each group: 0.292 kg fish/week for the General Population; 0.025 kg fish/week for Toddlers; 0.046 kg fish/week for Youth under 12 years of age; and, 0.106 kg fish/week for women of childbearing age or those who are pregnant. During the remainder of the year, the RMWI of Bull Trout is as follows: 0.058 kg/week for the General Population; 0.005 kg/week fresh fish or for Toddlers; 0.009 kg fish/week for Youth; and, 0.021 kg fish/week for women. Note that the consumption of dried fish should be kept lower since drying removes moisture without removing mercury. How did the mercury get into the fish? The Crooked River system is connected to the Williston Reservoir, where a mercury fish advisory is in place. Methylmercury was initially released from the flooding of 1,700 km2 of land to create the Williston Reservoir as a result of B.C. constructing of the W.A.C. Bennett dam. Bull Trout originally migrated annually from the Parsnip, Finlay and Peace Rivers into smaller watercourses such as the Crooked River. Since the construction of W.A.C. Bennett dam, Bull Trout migrate from the Williston Reservoir into the Crooked River, where they are caught during Fish Camps within the Crooked River system. Impacts on aboriginal health and cultural practices In the spring each year, West Moberly sets up Fish Camps to harvest fish and engage in cultural practices. Members from as far away as Vancouver travel to attend the Fish Camps. During a Fish Camp, an adult typically consumes 4 kgs of fresh fish per 3 days of Fish Camp. Fish are also consumed off-site by being distributed to other community members. A quantity of fish is also frozen or dried for later consumption. Site C Concerns The construction of the proposed Site C dam has the potential to increase exposure rates of Aboriginal peoples to higher levels of mercury in the lower Peace, Halfway, and Moberly rivers as well as many tributaries, all of which are culturally significant to the mode of life of the First Nations. Site C, if constructed, would thereby make it impossible for McLeod Lake Indian Band and West Moberly First Nations to safely and meaningfully exercise their cultural practices regarding traditional foods and medicines.
<urn:uuid:151eb848-e94a-41be-8fc7-764a265d8b01>
CC-MAIN-2023-40
https://mb.nationtalk.ca/story/the-daily-tuesday-may-12-2015
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00357.warc.gz
en
0.948078
1,225
2.71875
3
The purpose of this course is to help you support children and young people who may be experiencing anxiety. Anxiety is a feeling of worry, fear and unease. Everyone will feel anxious or stressed at some point in their life; these are natural emotional responses to some situations. Written in partnership with the School and Public Health Nurses Association, the purpose of this course is to help you support children and young people who may be experiencing anxiety The course covers important aspects of anxiety such as: - the types of anxiety and common causes - symptoms which a young person may experience both physically and psychologically - the typical signs of anxiety to look out for in a child or young person - the common triggers for anxiety - panic attacks and the typical symptoms people may experience and exercises on how to reduce them - why someone may be suffering from anxiety and suggested self-help methods - other support methods you can offer someone suffering from anxiety - further support on anxiety (e.g. services and helplines available) What are my buying options? Buy as a standalone course This course costs £10.50 excl. VAT and you can buy online today. Buy as part of a training package This course can be combined with the Self-Harm and Low Mood and Depression courses, and bought as part of the Health Awareness package either online for £30.00 or as an addition to any of our complete safeguarding and duty of care packages. Training the way you want it Can’t find what you need? You can either pick the courses you need from our extensive range and create your own Our content experts ensure your courses are kept up-to-date. We constantly monitor changes to statutory guidance, legislation and inspection requirements, as soon as changes are confirmed, we update your course content at the earliest opportunity. EduCare’s online learning management system is incredibly easy to use with training courses that can be accessed at any time and from any computer with internet access. With EduCare you can: - Fulfil your legal duty of care in the key areas the law and inspection requires - Provide robust evidence of staff training - Access powerful management reports so you know who has completed the training - Allow ALL staff to complete essentialduty of care training - Access additional resources to extend subject knowledge - Keep up-to-date with legislation changes - Download personalised certificates - Train anytime, anywhere - 24/7 - Provide training certified for CPD In association with Key features and benefits Price £10.50 excl. VAT Max. Duration 1 hour Target Audience All - Level 2 course (as graded against the nationally accepted levels, equivalent to GCSE grades A*-C) - One module with a multiple-choice questionnaire - One CPD credit - Optional narration of the course module and questionnaire for accessibility - Personalised downloadable certificate - 70% pass mark - Printable module for future reference Accredited / endorsed by What customers say EduCare provides a clear and simple mechanism to train staff in a variety of crucial and mandatory areas. Staff numbers continue to grow and time to deliver training face-to-face is becoming ever scarcer due to increased legislation. Phil Wise, Reading Blue Coat School
<urn:uuid:03c4f6ba-4901-4915-ab7f-433d87c06589>
CC-MAIN-2020-10
https://www.educare.co.uk/courses/understanding-anxiety
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141653.66/warc/CC-MAIN-20200217030027-20200217060027-00103.warc.gz
en
0.931004
684
2.640625
3