Dataset Viewer
Auto-converted to Parquet
text
stringlengths
25
13.4k
quality
float64
1
2.58
source
stringclasses
3 values
Out with the old batteries and in with the new lithium jelly batteries. Researchers at the University of Leeds have invented a jelly battery that is smaller, cheaper, lighter, safer and more powerful than current battery technology. The one thing holding 4G-enabled smartphones and tablets back is battery power. Devices like the HTC Thunderbolt and EVO 4G are power sucking hogs that can't even make it through an entire day with requiring a spare battery, an external battery charging pack or toting around a USB cable. These breakthrough lithium jelly batteries could change that. Lighter and more powerful than the rechargeable lithium batteries it's hoping to replace, the polymer gel batteries contain "about 70 percent liquid electrolyte" and can be molded into all sorts of strange shapes and sizes. Safety's important too and the jelly battery has that covered as well. "Safety is of paramount importance in lithium batteries. Conventional lithium batteries use electrolytes based on organic liquids; this is what you see burning in pictures of lithium batteries that catch fire. Replacing liquid electrolytes by a polymer or gel electrolyte should improve safety and lead to an all-solid-state cell," said Professor Peter Bruce from the University of St Andrews, who was not involved in the study. According to the Leeds researchers, such a battery would even be cheaper, about 10 to 20 percent cheaper than batteries in today's gadgets. What's not to love? With lithium jelly batteries, tomorrow's gadgets might only need one charge and truly last an entire day or even days. And because the batteries can be morphed into any shape and size, it wouldn't be difficult to imagine things like a tablet or smartphone that's not shaped like a rectangle.
1.463432
HuggingFaceFW/fineweb-edu
General Hospital. Adapted tango dancing improves mobility and balance in older adults and additional populations with balance impairments. It is composed of very simple step elements. Adapted tango involves movement initiation and cessation, multi-directional perturbations, varied speeds and rhythms. Focus on foot placement, whole body coordination, and attention to partner, path of movement, and aesthetics likely underlie adapted tango's demonstrated efficacy for improving mobility and balance. In this paper, we describe the methodology to disseminate the adapted tango teaching methods to dance instructor trainees and to implement the adapted tango by the trainees in the community for older adults and individuals with Parkinson's Disease (PD). Efficacy in improving mobility (measured with the Timed Up and Go, Tandem stance, Berg Balance Scale, Gait Speed and 30 sec chair stand), safety and fidelity of the program is maximized through targeted instructor and volunteer training and a structured detailed syllabus outlining class practices and progression. Behavior, Issue 94, Dance, tango, balance, pedagogy, dissemination, exercise, older adults, Parkinson's Disease, mobility impairments, falls Automated, Quantitative Cognitive/Behavioral Screening of Mice: For Genetics, Pharmacology, Animal Cognition and Undergraduate Instruction Institutions: Rutgers University, Koç University, New York University, Fairfield University. We describe a high-throughput, high-volume, fully automated, live-in 24/7 behavioral testing system for assessing the effects of genetic and pharmacological manipulations on basic mechanisms of cognition and learning in mice. A standard polypropylene mouse housing tub is connected through an acrylic tube to a standard commercial mouse test box. The test box has 3 hoppers, 2 of which are connected to pellet feeders. All are internally illuminable with an LED and monitored for head entries by infrared (IR) beams. Mice live in the environment, which eliminates handling during screening. They obtain their food during two or more daily feeding periods by performing in operant (instrumental) and Pavlovian (classical) protocols, for which we have written protocol-control software and quasi-real-time data analysis and graphing software. The data analysis and graphing routines are written in a MATLAB-based language created to simplify greatly the analysis of large time-stamped behavioral and physiological event records and to preserve a full data trail from raw data through all intermediate analyses to the published graphs and statistics within a single data structure. The data-analysis code harvests the data several times a day and subjects it to statistical and graphical analyses, which are automatically stored in the "cloud" and on in-lab computers. Thus, the progress of individual mice is visualized and quantified daily. The data-analysis code talks to the protocol-control code, permitting the automated advance from protocol to protocol of individual subjects. The behavioral protocols implemented are matching, autoshaping, timed hopper-switching, risk assessment in timed hopper-switching, impulsivity measurement, and the circadian anticipation of food availability. Open-source protocol-control and data-analysis code makes the addition of new protocols simple. Eight test environments fit in a 48 in x 24 in x 78 in cabinet; two such cabinets (16 environments) may be controlled by one computer. Behavior, Issue 84, genetics, cognitive mechanisms, behavioral screening, learning, memory, timing Viability Assays for Cells in Culture Institutions: Duquesne University. Manual cell counts on a microscope are a sensitive means of assessing cellular viability but are time-consuming and therefore expensive. Computerized viability assays are expensive in terms of equipment but can be faster and more objective than manual cell counts. The present report describes the use of three such viability assays. Two of these assays are infrared and one is luminescent. Both infrared assays rely on a 16 bit Odyssey Imager. One infrared assay uses the DRAQ5 stain for nuclei combined with the Sapphire stain for cytosol and is visualized in the 700 nm channel. The other infrared assay, an In-Cell Western, uses antibodies against cytoskeletal proteins (α-tubulin or microtubule associated protein 2) and labels them in the 800 nm channel. The third viability assay is a commonly used luminescent assay for ATP, but we use a quarter of the recommended volume to save on cost. These measurements are all linear and correlate with the number of cells plated, but vary in sensitivity. All three assays circumvent time-consuming microscopy and sample the entire well, thereby reducing sampling error. Finally, all of the assays can easily be completed within one day of the end of the experiment, allowing greater numbers of experiments to be performed within short timeframes. However, they all rely on the assumption that cell numbers remain in proportion to signal strength after treatments, an assumption that is sometimes not met, especially for cellular ATP. Furthermore, if cells increase or decrease in size after treatment, this might affect signal strength without affecting cell number. We conclude that all viability assays, including manual counts, suffer from a number of caveats, but that computerized viability assays are well worth the initial investment. Using all three assays together yields a comprehensive view of cellular structure and function. Cellular Biology, Issue 83, In-cell Western, DRAQ5, Sapphire, Cell Titer Glo, ATP, primary cortical neurons, toxicity, protection, N-acetyl cysteine, hormesis Lesion Explorer: A Video-guided, Standardized Protocol for Accurate and Reliable MRI-derived Volumetrics in Alzheimer's Disease and Normal Elderly Institutions: Sunnybrook Health Sciences Centre, University of Toronto. Obtaining in vivo human brain tissue volumetrics from MRI is often complicated by various technical and biological issues. These challenges are exacerbated when significant brain atrophy and age-related white matter changes (e.g. Leukoaraiosis) are present. Lesion Explorer (LE) is an accurate and reliable neuroimaging pipeline specifically developed to address such issues commonly observed on MRI of Alzheimer's disease and normal elderly. The pipeline is a complex set of semi-automatic procedures which has been previously validated in a series of internal and external reliability tests1,2 . However, LE's accuracy and reliability is highly dependent on properly trained manual operators to execute commands, identify distinct anatomical landmarks, and manually edit/verify various computer-generated segmentation outputs. LE can be divided into 3 main components, each requiring a set of commands and manual operations: 1) Brain-Sizer, 2) SABRE, and 3) Lesion-Seg. Brain-Sizer's manual operations involve editing of the automatic skull-stripped total intracranial vault (TIV) extraction mask, designation of ventricular cerebrospinal fluid (vCSF), and removal of subtentorial structures. The SABRE component requires checking of image alignment along the anterior and posterior commissure (ACPC) plane, and identification of several anatomical landmarks required for regional parcellation. Finally, the Lesion-Seg component involves manual checking of the automatic lesion segmentation of subcortical hyperintensities (SH) for false positive errors. While on-site training of the LE pipeline is preferable, readily available visual teaching tools with interactive training images are a viable alternative. Developed to ensure a high degree of accuracy and reliability, the following is a step-by-step, video-guided, standardized protocol for LE's manual procedures. Medicine, Issue 86, Brain, Vascular Diseases, Magnetic Resonance Imaging (MRI), Neuroimaging, Alzheimer Disease, Aging, Neuroanatomy, brain extraction, ventricles, white matter hyperintensities, cerebrovascular disease, Alzheimer disease Computerized Dynamic Posturography for Postural Control Assessment in Patients with Intermittent Claudication Institutions: University of Sydney, University of Hull, Hull and East Yorkshire Hospitals, Addenbrookes Hospital. Computerized dynamic posturography with the EquiTest is an objective technique for measuring postural strategies under challenging static and dynamic conditions. As part of a diagnostic assessment, the early detection of postural deficits is important so that appropriate and targeted interventions can be prescribed. The Sensory Organization Test (SOT) on the EquiTest determines an individual's use of the sensory systems (somatosensory, visual, and vestibular) that are responsible for postural control. Somatosensory and visual input are altered by the calibrated sway-referenced support surface and visual surround, which move in the anterior-posterior direction in response to the individual's postural sway. This creates a conflicting sensory experience. The Motor Control Test (MCT) challenges postural control by creating unexpected postural disturbances in the form of backwards and forwards translations. The translations are graded in magnitude and the time to recover from the perturbation is computed. Intermittent claudication, the most common symptom of peripheral arterial disease, is characterized by a cramping pain in the lower limbs and caused by muscle ischemia secondary to reduced blood flow to working muscles during physical exertion. Claudicants often display poor balance, making them susceptible to falls and activity avoidance. The Ankle Brachial Pressure Index (ABPI) is a noninvasive method for indicating the presence of peripheral arterial disease and intermittent claudication, a common symptom in the lower extremities. ABPI is measured as the highest systolic pressure from either the dorsalis pedis or posterior tibial artery divided by the highest brachial artery systolic pressure from either arm. This paper will focus on the use of computerized dynamic posturography in the assessment of balance in claudicants. Medicine, Issue 82, Posture, Computerized dynamic posturography, Ankle brachial
1.546926
openbmb/Ultra-FineWeb
I've been of two minds with regards to the usefulness of the word technology. One of those two minds has been more or less persuaded that the term is of limited value and, worse still, that it is positively detrimental to our understanding of the reality it ostensibly labels. The most thorough case for this position is laid out in a 2010 article by the historian of technology Leo Marx, "Technology: The Emergence of a Hazardous Concept." Marx worried that the term technology was "peculiarly susceptible to reification." The problem with reified phenomenon is that it acquires "a 'phantom-objectivity,' an autonomy that seems so strictly rational and all-embracing as to conceal every trace of its fundamental nature: the relation between people." This false aura of autonomy leads in turn to "hackneyed vignettes of technologically activated social change—pithy accounts of 'the direction technology is taking us' or 'changing our lives.'" According to Marx, such accounts are not only misleading, they are also irresponsible. By investing "technology" with causal power, they distract us from "the human (especially socioeconomic and political) relations responsible for precipitating this social upheaval." It is these relations, after all, that "largely determine who uses [technologies] and for what purposes." And, it is the human use of technology that makes all the difference, because, as Marx puts it, "Technology, as such, makes nothing happen." As you might imagine, I find that Marx' point compliments a critique of what I've called Borg Complex rhetoric. It's easier to refuse responsibility for technological change when we can attribute it to some fuzzy, incohate idea of technology, or worse, what technology wants. That latter phrase is the title of a book by Kevin Kelly, and it may be the best example on offer of the problem Marx was combatting in his article. But … I don't necessarily find that term altogether useless or hazardous. For instance, some time ago I wrote the following: "Speaking of online and offline and also the Internet or technology – definitions can be elusive. A lot of time and effort has been and continues to be spent trying to delineate the precise referent for these terms. But what if we took a lesson from Wittgenstein? Crudely speaking, Wittgenstein came to believe that meaning was a function of use (in many, but not all cases). Instead of trying to fix an external referent for these terms and then call out those who do not use the term as we have decided it must be used or not used, perhaps we should, as Wittgenstein put it, 'look and see' the diversity of uses to which the words are meaningfully put in ordinary conversation. I understand the impulse to demystify terms, such as technology, whose elasticity allows for a great deal of confusion and obfuscation. But perhaps we ought also to allow that even when these terms are being used without analytic precision, they are still conveying sense." As you know from previous posts, I've been working through Langdon Winner's Autonomous Technology (1977). It was with a modicum of smug satisfaction, because I'm not above such things, that I read the following in Winner's Introduction: "There is, of course, nothing unusual in the discovery that an important term is ambiguous or imprecise or that it covers a wide diversity of situation. Wittgenstein's discussion of 'language games' and 'family resemblances' in Philosophical Investigations illustrates how frequently this occurs in ordinary language. For many of our most important concepts, it is futile to look for a common element in the phenomena to which the concept refers. 'Look and see and whether there is anything common to all.–For if you look at them you will not see something that is common to all, but similarities, relationships, and a whole series of them at that.'" Writing in the late '70s, Winner claimed, "Technology is a word whose time has come." After a period of relative neglect or disinterest, "Social scientists, politicians, bureaucrats, corporate managers, radical students, as well as natural scientists and engineers, are now united in the conclusion that something we call 'technology' lies at the core of what is most troublesome in the condition of our world." To illustrate, Winner cites Allen Ginsburg — "Ourselves caught in the giant machine are conditioned to its terms, only holy vision or technological catastrophe or revolution break 'the mind-forg'd manacles.'" — and the Black Panthers: "The spirit of the people is greater than the man's technology." For starters, this is a good reminder to us that we are not the first generation to wrestle with the place of technology in our personal lives and in society at large. Winner was writing almost forty years ago, after all. And Winner rightly points out that his generation was not the first to worry about such matters either: "We are now faced with an odd situation in which one observer after another 'discovers' technology and announces it to the world as something new. The fact is, of course, that there is nothing novel about technics, technological change, or advanced technological societies." While he thinks that technology is a word "whose time has come," he is not unaware of the sorts of criticisms articulated by Leo Marx. These criticisms had then been made of the manner in which Jacques Ellul defined technology, or, more precisely, la technique: "the totality of methods rationally arrived at and having absolute efficiency (for a given stage of development) in every field of human activity." Against Ellul's critics, Winner writes, "While Ellul's addition of 'absolute efficiency' may cause us difficulties, his notion of technique as the totality of rational methods closely corresponds to the term technology as now used in everyday English. Ellul's la technique and our technology both point to a vast, diverse, ubiquitous totality that stands at the center of modern culture." It is at this point that Winner references Wittgenstein in the paragraph cited above. He then acknowledges that the way in which technology tends to be used leads to the conclusion that "technology is everything and everything is technology." In other words, it "threatens to mean nothing." But Winner sees in this situation something of interest, and here is where I'm particularly inclined to agree with him against critics like Leo Marx. Rather than seek to impose a fixed definition or banish the term altogether, we should see in this situation "an interesting sign." It should lead us to ask, "What does the chaotic use of the term technology indicate to us?" Here is how Winner answers that question: "[…] the confusion surrounding the concept 'technology' is an indication of a kind of lag in public language, that is, a failure of both ordinary speech and social scientific discourse to keep pace with the reality that needs to be discussed."There may be a better way, but "at present our concepts fail us." Winner follows with a brief discussion of the unthinking polarity into which discussions of technology consequently fall: "discussion of the political implications of advanced technology have a tendency to slide into a polarity of good versus evil." We might add that this is not only a problem with discussion of the political implications of advanced technology, it is also a problem with discussions of the personal implications of advanced technology. Winner adds that there "is no middle ground to discuss such things," we encounter either "total affirmation" or "total denial." In Winner's experience, ambiguity and nuance are hard to come by and any criticism, that is anything short of total embrace, meets with predictable responses: "You're just using technology as a whipping boy," or "You just want to stop progress and send us back to the Middle Ages with peasants dancing on the green." While it may not be as difficult to find more nuanced positions today, in part because of the sheer quantity of easily accessible commentary, it still seems generally true that most popular discussions of technology tend to fall into either the "love it" or "hate it" category. In the end, it may be that Winner and Marx are not so far apart after all. While Winner is more tolerant of the use of technology and finds that, in fact, its use tells us something important about the not un-reasonable anxieties of modern society, he also concludes that we need a better vocabulary with which to discuss all that gets lumped under the idea of technology. I'm reminded of Alan Jacobs' oft-repeated invocation of Bernard Williams's adage, "We suffer from a poverty of concepts." Indeed, indeed. It is this poverty of concepts that, in part, explains the ease with which discussions of technology become mired in volatile love it or hate it exchanges. A poverty of concepts short circuits more reasonable discussion. Debate quickly morphs into acrimony because in the absence of categories that might give reason a modest grip on the realities under consideration the competing positions resolve into seemingly subjective expressions of personal preference and, thus, criticism becomes offensive. So where does this leave us? For my part, I'm not quite prepared to abandon the word technology. If nothing else it serves as a potentially useful Socratic point of entry: "So, what exactly do you mean by technology?" It does, to be sure, possess a hazardous tendency. But let's be honest, what alternatives do we have left to us? Are we to name every leaf because speaking of leaves obscures the multiplicity and complexity of the phenomena? That said, we cannot make do with technology alone. We should seek to remedy that poverty of our concepts. Much depends on it. Of course, the same conditions that led to the emergence of the more recent expansive and sometimes hazardous use of the word technology are those that make it so difficult to arrive at a richer more
1.54895
openbmb/Ultra-FineWeb
This case study investigation reflects on the use of metaphors to teach postgraduate education students the importance of personal bias and subjectivity to their research, and advocates the use of critical reflexivity to deal with it. Students are reluctant to be critically reflective as they can feel threatened by the reflective process, feel they can sit apart or outside their research, write without bias and/or feel critical reflection may damage their research findings. It explores the effectiveness of an approach to overcome this reluctance by applying a metaphor. In a Zambian research class, students introduced a metaphor for personal bias by likening it to an encounter with a hidden hippopotamus. These are difficult to tame, hard to deal with, and can remain hidden for a long time. They appear unexpectedly, cannot be ignored, and awareness the main defence. Subsequent dissertations showed an improved early adoption of critical reflexivity. This metaphor was then used as a key discussion point on a postdoctoral education programme in the UK and investigated formally using focus groups. Students reported a greater understanding of personal bias, recognised the importance of being critically reflexive, and felt the metaphor was instrumental in their understanding of the need to advise of their position in the research. Underpinning this approach is the assertion that metaphors can help explain personal traits that are difficult for individuals to describe (Hoggan, 2016). The use of a personal values framework; morality, competency, personal and social behaviour, provided a supportive writing framework resulting in an increase in critical reflexivity early in the students research. |Number of pages||15| |Early online date||31 Jan 2017| |Publication status||Published - 1 Jun 2017| - critical reflexivity - personal bias
2.201514
openbmb/Ultra-FineWeb
The Scoop on Migratory Arthritis Migratory arthritis is a particular form of arthritis. Arthritis is a disease that affects thousands of people who suffer from pain and swelling in their joints and have to deal with stiffness of movement. This is usually the result of inflammation in the joints. Arthritis is classified by doctors into over100 different categories depending on the body area that is affected. Besides the arthritis directly associated with inflammation in the joints, there are forms of arthritis caused by diseases in other body organs and problems of other tissues. Arthritis can affect people of all ages, even children. Migratory arthritis is the problem in which there is initial swelling which increases rapidly in one or two joints and subsides over the next few days. As the symptoms subside in the original affected areas, the same pattern appears in another joint, usually in an asymmetric location. This movement of the pain and swelling from joint to joint is the reason for the name of the problem. The pattern of asymmetrical movement of joint pain associated with migratory arthritis is associated with some specific conditions and diseases. Among the possible causes listed by medical professionals are: systemic lupus erythematosus It is helpful to understand what happens when a person suffers from arthritis. The joint inflammation leads to pain, swelling and loss of motion and this is visible in the redness apparent in the affected area. There is usually inflammation in the body when it is affected by an injury or infected by a harmful agent such as a bacteria or a virus. The body's reaction is communicated to the natural immune system which functions as the defense mechanism of the body. Cells move to help the affected area to deal with the threat to the body - by removing infected or damaged cells and by helping repair affected tissues. Once the problem is dealt with a normal healthy is restored the inflammation reduces. In the case of arthritis, the inflammation does not reduce as it should in normal conditions. The continuing inflammation prolongs the problem and continues to damage more tissues and therefore the cyclical pattern of pain continues. This perpetuating pattern of pain and damage ends up affecting the bones and neighboring tissues leading to the stiffness of the joint and the difficulty in movement. This kind of breakdown of the immune system which hampers the proper functioning of the body is called an autoimmune disease. Given that migratory arthritis is usually triggered by other health problems, it is important to have it properly diagnosed. You can list the sequence of your pain to your doctor and add details about other health issues to help with proper diagnosis. You can confer with your doctor to decide whether it will be helpful to see a rheumatologist. Self-aware patients, alert to their body's patterns will help in a quick diagnosis of migratory arthritis. The good news for patients is there are ways to manage the pain and to be proactive in dealing with disease. Arthritis patients today are normally treated with aspirin and other nonsteroidal anti-inflammatory drugs or NSAIDs such as ibuprofen, naproxen and dicolfenac. These help with the migratory variety of the disease also because they are effective analgesics and anti-inflammatory drugs. In the specific case of migratory arthritis, treatment for the root cause such as rheumatic fever or Lyme disease also helps in countering the effects of the arthritic pain. Many people who suffer from chronic arthritis also seek alternative medical therapies to cope with the pain. Naturopaths, much like doctors, recommend a combination of exercise and good diet to support the medicines. Among supplements recommended by those practicing alternative medicine are Omega 3 oils, Glocosamine and Chondroitin. It will be useful for those feeling the signs arthritis to analyze the patterns of their pain and to have a detailed consultation with their doctor to ensure an accurate diagnosis and to initiate an effective treatment.
2.381832
HuggingFaceFW/fineweb-edu
a process of collecting, analyzing, and interpreting non-numerical data, such as Transcript: Education The Male Bias of Tuberculosis In India: A Qualitative and Quantitative Analysis of the Problem Age 1. Stigmatization of TB in Women 2. Active Case-Finding 3. Scheduled Tribe Membership 4. High Gender Ratio Case Studies 5. Mortality Statistics 1. Solid Fuel Hypothesis Thank You! Female Era of Neglect and Complacency Methods Gaps in Knowledge About TB Applying the Scientific Method 1990 Interest Reignites 2. Tobacco Use Rejected Factors 1947 Future Research Total Age > 35 Desire for Discretion 2006 Cultural First TB Drugs Developed Results Scheduled Tribe Membership Biological Logistical and Linear Regression Categorically Sorted Dependent Variables Methodological Narrative Methodological Modern Era 1970 Male Male Bias of TB Biological Narrative Discretion 1989 Cultural Narrative Malnutrition Total Age > 35 Desire for Discretion Transcript: THE RELATIONSHIP BETWEEN ORGANIZATIONAL CHARACTERISTICS AND INTRINSIC JOB SATISFACTION AMONG SELECTED GOVERNMENT EMPLOYEES OF CITY OF CABUYAO, LAGUNA THEORETICAL FRAMEWORK Relationship of organi-zational characteristics and job satisfaction among selected government employees of City of Cabuyao, Laguna. TWO FACTOR THEORY This research aims to determine the relationship of organizational characteristics and intrinsic job satisfaction among selected government employees of City of Cabuyao, Laguna. Specifically, the study will answer the following questions: Herzberg used the term 'hygiene' to describe factors that cause dissatisfaction in the workplace, are extrinsic (or independent of the work itself), and are linked to things such as compensation, job security, organizational politics, working conditions, quality of leadership, and relationships between supervisors, subordinates, and peers. Organizational characteristic of Cabuyao City Hall intrems of: • Leadership • Performance Appraisal • Facilities Intrinsic job satisfaction • Achievement • Work itself • Personal Growth The researchers will use the descriptive method to determine the relationship of Organizational Characteristics and Intrinsic Job Satisfaction among selected Government employees of the selected departments of the city government office. It is a type of method involving the description, interpretation, recording and analysis of data in order to test the hypothesis of the study. The variables that the researchers will measure are Leadership, Performance Appraisal, Facilities and Organizational Characteristics and their Intrinsic Job Satisfaction. 3. To measure the relationship between organizational Characteristics and Intrinsic Job Satisfaction Multiple regression will use. To help minimize miscalculations due to human error, all computations went through software called SPSS (Statistical Package for Social Sciences). The following are the statistical treatments to be applied in the study: SStot = SSbg + SSwg With regards to the level of Intrinsic Job Satisfaction in terms of achievement, work itself and personal growth the MANOVA will use. The formula is: First, the total sum-of-squares is partitioned into the sum-of-squares between groups (SSbg) and the sum-of-squares within groups (SSwg): DATA ANALYSIS PLAN Alvarez, Joebert Jerry C. Manguerra, Kahreen Ann J. Nanola, Jestrel Joy P. INPUT The Future Government Employees. This study will make them to be aware to the factors that can affect to their intrinsic job satisfaction that will enable them to be more productive and effective employees. 2. With regards to the level of Intrinsic Job Satisfaction in terms of achievement, work itself and personal growth the MANOVA will use. THANK YOU! The Future Researcher. The ideas presented may be used as a reference data in conducting new researches. The Field of Industrial/Organizational Psychology. The researchers believe that the study may contribute to the said field of psychology in terms of functioning issues such as the job performance and work motivation of the government employees. In addition, this may help improve the effectiveness of both individuals and organizations. STATEMENT OF THE PROBLEM RESEARCH PARADIGM SIGNIFICANCE OF THE STUDY The motivators or satisfiers. These are linked to employee motivation and arise from intrinsic, or dependent, conditions of the job itself. Factors for satisfaction include responsibility, job satisfaction, recognition, achievement, opportunities for growth, and advancement. Corporate Leaders. The results and ideas that can be shown in this study may be used as a guide on how the leaders/superiors could motivate their employees. RESPONDENTS OF THE STUDY The Government employees. The Government Employees will benefit from this study not only at Cabuyao, Laguna but to the whole world of politics. It will help them to know the relationship of the organizational characteristics to their intrinsic job satisfaction. 3. Is there a significant relationship between organizational characteristic and intrinsic job satisfaction the selected government employees of City of Cabuyao, Laguna? Cabuyao City Hall 1. To identify the Organizational characteristics of Cabuyao City Hall the five-point likert Scale and simple mean will use. RESEARCH LOCALE * Self-made questionnaires * Collecting data * Statistical treatment * Correlational analysis HYPOTHESIS FEEDBACK RESEARCH DESIGN OUTPUT The study will be conducted at the city government office city of Cabuyao, Laguna. It has twenty four departments, but the researcher will select only three departments namely Office of the Mayor, Sangguniang Panglunsod and City Social Welfare Development Office. SStot = SSbg + SSwg PROCESS Null Hypothesis. There is no significant relationship between organizational characteristic and intrinsic job satisfaction among selected government employees of City of Cabuyao, Laguna in terms of Leadership, Performance Appraisal, and Facilities.. Transcript: "ACQUIRING SELECTED JOURNALISM SKILLS AS PERCEIVED BY SELECTED AB JOURNALISM STUDENTS" ANALYTICAL FRAMEWORK Analytical Paradigm Television – Professors Mediated Fashion - teaching strategies Media Content/Messages - Journalistic skills that are being taught Influence on the Audience - the skills learned by the students 100 students randomly selected as the respondents 25 students – first year 25 students – second year 25 students – third year 25 students – fourth year DATA GATHERING PROCEDURE Statement of the Problem P= [F/X] x 100 The data will be accumulated; the researchers will tally the respondents according to their age, sex and year level. It will be presented through tables and will be interpreted. Their response to the questions will be then added. Using the formula for finding the mean, the researchers will compute the scores of the respondents. suggests that television (and other media) plays an extremely important role in how people view their world modern Culture most people get much of their information in a mediated fashion rather than through direct experience 1. What is the socio-demographic profile of the respondents? a. Age b. Gender c. Year Level d. Number of Major Subjects SOURCES OF DATA This study is a descriptive content analysis on the Journalism skills development of the journalism students of Bicol University. 2. What are the activities provided by the Journalism Professors to develop the Journalistic skills of the respondents? a. Writing Articles b. Beat Assignments c. Covering Press Conferences d. Conducting Interviews e. Production of Newsletter, Magazines and Documentary Films An Undergraduate Thesis Presented to The Faculty of the College of Arts and Letters BICOL UNIVERSITY THANK YOU VERY MUCH! TREATEMENT OF DATA Questionnaires 4. What are the implications of these Journalistic skills to the respondents as they practice on the field of Journalism in the future? "Culture Analysis Theory" METHODOLOGY Frequency Distribution. This will be used in counting the responses. Percentage. This will be used in the computation of the percentage to the frequency count using this formula: where: P = percentage F = no. of response X = total no. of respondents STATISCAL TREATMENT OF DATA Jefferson G. Geva Christine D. Latona Ma. Abbygale V. Ombao Jeuela Joey L. Quiñones In Partial Fulfillment of the Requirements for the Degree Bachelor of Arts in Journalism 3. What are the Journalistic skills that are developed by the respondents? a. Critical Thinking b. Quick Time Composition Capability c. Deadline Beating Capability d. Following Ethical Procedures e. Computer Literate in Lay-out and Design Transcript: Thesis Presentation THE TELEVISION PRIMETIME SHOWS OF ABS-CBN, GMA AND TV5: A STUDY OF THE DIFFERENCE ON PROGRAMMING By: Rhoel Carreno Donitha Rose Encabo Jienah Guibao Felvie Oracion Rationale Theoretical Background Agenda Setting Theory by Maxwell McCombs and Donald Shaw Theoretical Conceptual Framework Problem Statement This study aims to find out the programming of television primetime show of the three national television networks such as ABS-CBN, GMA and TV5. More specifically, this seeks to answer the ff: 1. The profile of the shows of the three national television networks in terms of time Slots and program title,program genre, program audience and program ratings. 2. The Programming strategies of television primetime shows of the three national TV network based on the study of head-to-head, counter, strip, checkerboard and block. 3. The Television Programming Policies; general audience (GA), parental guidance (PG). 4. To reveal the program strategies and policies being used by ABS-CBN, GMA, and TV 5, including the Title, Time Slots, Genre, Target Audience, and Ratings of each primetime show. Therefore, the researchers conclude that the theory of Maxwell McCombs and Donald Shaw "The Agenda-Setting Theory" which stated that through their day-by-day selection and display of the news, editors and news
1.904166
openbmb/Ultra-FineWeb
ing functional goals can be achieved by selecting various size and shape features for the self-fixating tip, such as relatively reduced overall dimensions (length or diameter) of the tip; and size, shape, and number of lateral extensions. Further, this self-fixating tip system reduces trauma based on the ability to avoid tissue passages next to critical structure; and reduced trauma due to the ability to eliminate the need for local stab (external) incisions otherwise required for needle entry and exit sites. While the design is a significant improvement over previous sling and fixation configurations, the positional attachment of the device to the corresponding tissue is limited to the self-fixating tip. SUMMARY OF THE INVENTION The present patent application describes pelvic implant and delivery systems and methods for treating pelvic conditions such as incontinence (various forms such as fecal incontinence, stress urinary incontinence, urge incontinence, mixed incontinence, etc.), vaginal prolapse (including various forms such as enterocele, cystocele, rectocele, vault prolapse, etc.), among others. Embodiments of the implants can include one or more extension support portions, and one or more anchors generally attached to or integrated with the extension portion. The extension portion is generally constructed of a mesh material. The one or more anchors can be provided proximate the ends of the mesh extension portion to increase fixation until tissue in-growth occurs. The anchors can be fixating tips placed at and securable within internal tissue of the pelvic region to further assist in supporting the implant device. The anchors can be configured of various sizes and shapes. The anchors of the implant can be adapted to engage a distal end of an insertion tool to allow the insertion tool to place the anchors at a desired tissue location by pushing the anchor into the fibrous tissue. The insertion or introducer delivery tool can include a thin elongate needle that attaches to a handle at a proximal end of the needle, with a distal end of the needle adapted to engage the anchors. The needle can be generally straight to facilitate deployment of the implant. In one embodiment, the delivery tool can include a sheath adapted to extend along and at least partially surround or shroud the needle. The sheath can include an elongate portion and a hood. The elongate portion includes a lumen or channel therethrough to slidably receive at least a portion of the needle. The hood can further include distinct flaring portions (e.g., generally arcuate or contoured) configured to create a spatial opening between the flaring portions. A region of the flaring portions defines inner-facing or interior pleat openings or channels adapted to receive and retain respective ends of the anchor tines. In one embodiment, the invention contemplates a method of treating urinary incontinence in male and female patients (e.g., SUI) in a minimally invasive manner including injecting a local anesthetic; creating one medial (e.g., transvaginal) incision under the mid-urethra; inserting a urinary incontinence sling through the one transvaginal incision, anchoring the urinary incontinence sling, and closing the incision. Another aspect of the invention includes a combination (e.g., kit, system, etc.) of a sling implant, as described herein, including one or more anchors. The kit also includes one or more insertion tools or systems useful in securely deploying, positioning and anchoring the sling. BRIEF DESCRIPTION OF THE DRAWINGS Other features and advantages of the present invention will be seen as the following description of particular embodiments progresses in conjunction with the drawings. FIG. 1 is a side schematic view of a sling implant and delivery system in accordance with an embodiment of the present invention. FIG. 2 is a partial view of a sheath hood, needle, anchor and sling implant of the system in accordance with an embodiment of the present invention. FIG. 3 is a top schematic view of a mesh sling implant in accordance with an embodiment of the present invention. FIG. 4 is a side view of an anchor device in accordance with an embodiment of the present invention. FIG. 5 is a side view of an anchor device in accordance with an embodiment of the present invention. FIG. 6 is a partial schematic view of an anchor seated or docked with the hood of a delivery tool sheath in accordance with an embodiment of the present invention. FIG. 7 is a partial schematic view of an anchor seated or docked with the hood of a delivery tool sheath, and a needle engaged with the anchor, in accordance with an embodiment of the present invention. FIG. 8 is a partial schematic view of an anchor unseated or undocked with the hood of a delivery tool sheath, and a needle engaged with the anchor, in accordance with an embodiment of the present invention. DETAILED DESCRIPTION OF THE INVENTION The following description is meant to be illustrative and not limiting. Other embodiments of this invention will be apparent to those of ordinary skill in the art in view of this description and corresponding figures. The present invention is directed to surgical instruments, assemblies, and implantable articles for treating pelvic floor disorders such as fecal or urinary incontinence, including SUI, prolapse, etc. According to various embodiments, a surgical sling implant can be used to treat a pelvic condition, including the specific examples of implanting a support implant to treat a condition such as vaginal vault prolapse or incontinence (male or female). An implant can be positioned in a male or a female to treat disorders such as urge incontinence, mixed incontinence, overflow incontinence, functional incontinence, fecal incontinence, or for female conditions including prolapse (e.g., vaginal or uterine), enteroceles (e.g., of the uterus), rectoceles, cystocele, and anatomic hypermobility. The sling implant or system may include portions or sections that are synthetic or constructed of biological material (e.g., porcine, cadaveric, etc.). Extension support portions may be constructed of a synthetic mesh such as a polypropylene, or other compatible materials. Examples of implant products that may be useful according to the present description, include those sold commercially by American Medical Systems, Inc., of Minnetonka Minn., under the trade name MiniArc® for treating urinary incontinence. PCT Patent Publication Nos. 2008/057261 and 2007/097994 disclose various pelvic implant structures, procedures, systems and methods or techniques capable of use with the present invention and are, therefore, incorporated fully herein by reference. In one embodiment of the present invention, as shown in FIGS. 1-8, an incontinence sling system 10 can be installed to help maintain continence by supporting the urethra during times of increased abdominal pressure. Delivery devices and tools are used to deploy, position and anchor a sling implant 12. The sling 12 can be implanted through a single incision in the vaginal wall for females, or perineal floor for males, and attached to (e.g., anchored to) the obturator internus muscle on either side of the urethra. Only requiring one incision in the vaginal wall (for females) or perineum (for males) eliminates additional incisions such as external incisions used in some methods of implanting urethral slings. The sling 12 and its methods of implantation are, therefore, a reduced or "minimally" invasive treatment option for patients suffering from urinary incontinence. In alternate embodiments, sling 12 may be anchored at other locations besides the obturator internus muscle, such as, for example, the obturator membrane or the obturator externus muscle. One method may be to implant the sling 12 having end tips at opposing extension portions, without penetrating the obturator membrane. Referring generally to FIGS. 1-5, the sling implant 12 can include an extension portion 14 and one or more end anchors 16. Further, a delivery tool can be included with the system 10 for engaging, positioning, anchoring and disengaging the sling 12 or anchors 16 during use. The sling extension portion 14 can be constructed of a polypropylene mesh material, or other materials known for use with incontinence sling devices. The mesh sling 12 may be woven, knitted, sprayed, or punched from a blank. In one aspect of the invention, mesh sling 12 may include one or more woven, knitted, or inter-linked filaments or fibers that form multiple fiber junctions. The fiber junctions may be formed via weaving, knitting, braiding, or through other techniques, including combinations thereof. In addition, the size of the resultant openings or pores of the mesh may be sufficient to allow tissue in-growth and fixation within surrounding tissue. Further, the sling 12 can include one or more band or tracking portions. The band portion, for example, can be a plasma-treated print area of the sling mesh 12 or a separately coupled or integrated band. The band portion facilitates tracking of components of the system 10 during the surgical implant procedure. The extension support portion 14 generally extends between and is coupled or otherwise integrated with two end anchor tips 16. The anchors 16 can include a first anchoring tine or barb 22, a second anchoring tine or barb 24, an intermediate portion 26, and a coupling portion 28, as shown in FIGS. 4-5. Further, the anchoring tines 22, 24 can include respective distal ends 30, 32. While exemplary embodiments of the anchors 16 are depicted in FIGS
1.644953
openbmb/Ultra-FineWeb
At 39km above planet earth, would you have made Felix Baumgartner's step off the platform? It was very dangerous, no doubt. But is this the reason why you wouldn't have? People engage in many dangerous things. And I am not talking about skydiving. I mean the ordinary, every day kind of danger. Surely, some dangers can hardly be avoided, say road traffic (which is the leading cause of death for people in my age group). For others there is no obvious non-dangerous equivalent. But what if there was an activity with no practical value, which could easily be carried out without danger, but which nonetheless millions of people worldwide engage in? Listening to too loud music is such an activity. Is this an exaggeration? Surely, if loud music was really dangerous, people would avoid it. Make no mistake, the scientific consensus clearly lays out the danger. Round about half the people exposed to music professionally show some hearing loss. Researchers have found worrying hearing impairments in classical musicians, rock/pop musicians, and music bar tenders. And the danger is not limited to professionals. The majority of rock concert attendees experience temporary auditory problems such as tinnitus or being hard of hearing. You are actually a daredevil when you listen to too loud music. But this behaviour is not limited to your typical daredevil characters à la Felix Baumgartner. People flock to very loud concerts. Even toddlers prefer fast and loud music over slow and quiet music. Perhaps the clearest example for loudness's paradoxical appeal is the band Sun 0))). Their music is without discernible rhythm, harmony or melody. Pure loudness. And still, they are successful. Hear for yourself: The Sun 0))) concert is a good example of the mysterious attraction of too loud music but it may also offer clues for understanding why people subject themselves to it. Actually, not just this band's concerts are too loud. Most concerts are. And so are night clubs. This is not the place to go to for a quiet night out. This is where you want energy, fun and excitement. It turns out that this is exactly what loud music is associated with. An Australian research team led by Roger Dean showed that the perceived arousal of music – whether a classical piece or Sun 0))) like noise – followed its loudness profile. Sweet melody or not, when people go out they want energetic music. And this music happens to be loud. Beyond going out – why listen to too loud music when sitting still? However, such an explanation can only be part of the answer. We have all seen the person on the bus with his headphones in or were annoyed by the colleague on the next desk with his music choice permeating the office through his headphones. These people are not out dancing. They look pretty low energy, if anything. And still they put their hearing at risk. Neil Todd and Frederick Cody from the University of Manchester may offer a solution to the puzzle. They found that loud tones not only activate our sense of hearing but also our sense of balance. This happens because the nice distinction between these two modalities does not work for a structure in the ear called the saccule. It responds to head movements as well as rather low sounds. Through this structure muscles automatically react, explaining why deaf people's muscles can nonetheless react to loud clicks whereas vestibularly impaired people's can't. Todd and Cody found the saccule to start reacting around the so called 'rock'n'roll'-threshold of 105 dB. Is it just a coincidence that the beat of club music is typically in the tonal range and at the loudness level of the saccule? Could it be that the enjoyment of too loud music works through the same mechanism as the pleasure derived from baby swings, roller coasters and head banging? If so, the fun of skydiving and too loud music listening may have more in common than generally thought. The greatest mystery surrounding too loud music, though, are not people seeking it in quiet environments such as the bus or the office. The strangest thing is the appeal of too loud environments even when one plugs the ears. It has become more and more common to go to rock concerts with ear plugs. The obvious question is why people don't just refrain from going to rock concerts all together and wait until concert organisers realise that they overdid it with the decibel levels. Seeking intimacy through loudness The final piece of the puzzle could be an idea exemplified in research done by Russo and colleagues from Ryerson University. They found that ordinary people could successfully distinguish piano, cello and trombone tones which they never heard but instead only felt on their backs. Even deaf people were able to do this. This research suggests that, yet again, the involvement of a second modality explains too loud music seeking. Hearing and vision are often grouped together because they reveal distant information. Smell, taste and touch, on the other hand, are intimate sensations only available when directly interacting with an object or person. If someone sees or hears your fiancé(e) you may not mind. But imagine if someone tried to touch or even taste him/her? There is something intimate about touch and perhaps we seek this intimacy when trying to immerse ourselves in music. Incidentally, this is also what was advertised as the novelty of Felix Baumgartner's jump. For the first time someone can say what it felt like to break the sound barrier. Previously, people only knew what it sounded and looked like. Somehow, this was not enough. We are curious about what he will report because we attach so much importance to the immediacy of touch. For 'touching' music, we need loud music as our skin is a poor substitute for the sensitive ears. Through the sense of touch music can cease to be felt at a distance and, instead, become a much more personal full body experience. Has the mystery been solved? It seems as if modern psychology offers a range of explanations for why a perfectly avoidable but harmful activity is pursued by millions of people. Loud music offers a level of energy, fun and intimacy which soft music just can't match. If you listen to too loud music, you have more in common with daredevils like Baumgartner than you thought. Dean, R.T., Bailes, F., & Schubert, E. (2011). Acoustic intensity causes perceived changes in arousal levels in music: an experimental investigation. PloS one, 6 (4) PMID: 21533095 Lamont, A. (2003). Toddlers' musical preferences: musical preference and musical memory in the early years. Annals of the New York Academy of Sciences, 999, 518-9 PMID: _PHONE_ Russo, F.A., Ammirante, P., & Fels, D.I. (2012). Vibrotactile discrimination of musical timbre. Journal of experimental psychology. Human perception and performance, 38 (4), 822-6 PMID: 22708743 Todd, N.P. McAngus, & Cody, F.W. (2000). Vestibular responses to loud dance music: A physiological basis of the 'rock and roll threshold'? Journal of the Acoustical Society of America, 107 (1), 496-500 DOI: 10.1121/1.428317 Zhao, F., Manchaiah, VK., French, D., & Price, S.M. (2010). Music exposure and hearing disorders: an overview. International journal of audiology, 49 (1), 54-64 PMID: 20001447 1) Photograph by: Felix Baumgartner, Twitter via the Vancouver Sun 2) The Vestibular System by Thomas Haslwanter via Wikimedia If you liked this post you may also like: If you were not entirely indifferent to this post, please leave a comment.
1.593504
HuggingFaceFW/fineweb-edu
geo-political enemy. Sino-Russian rift China and Russia enmity goes back to the Chinese Eastern Railway(CER) conflict took place in 1929 between Soviet Union and China, which was the bloodies conflict of its time. Joseph Stalin played a significant role to neutralize Chinese efforts to recapture the Railway. In order to attain its goals China used both conventional and asymmetric approaches to eliminate Soviet Union control over the Railway. Obtaining green signals from Japan, Stalin forcefully trespassed the region and pushed back Chinese armed forces, which was connoted as a sign of aggression, and ended up with border dispute. Throughout, the history both countries unsuccessfully endeavored to find a peaceful and acceptable solution to the border conflict. Consequently, in 2003 Russia and China signed an agreement to resolve the border dispute. In 2005, Moscow and Beijing finalized the border issue, nevertheless, Chinese leadership still claims that Vladivostok Russia's Fareast city is part of Chinese territory, besides Beijing asserts that Russia has annexed 350.000 square mile of Chinese territory. Taking into account the above said facts, Sino-Russian partnership will break up some times in the future (2050-2060) and will change to armed conflict. Furthermore, Russia is not a solemn geopolitical adversary of the United States as China is. After the collapse of Soviet Union, both Russia and America were on the right path to normalize their relationship. Throughout, the different administrations no matter democrats or republicans leadership, Moscow and Washington achieved a lot to be aligned. For goodwill they even signed a new start to reduces their nuclear warheads and stop arm race. Due to the US eastward expansionism, Russia was driven into the arms of Beijing to establish partnership and cooperation. Is Beijing or Moscow a national security threat? The National Counterintelligence and Security Director Bill Evanina in his Fax News interview shed light on that no country poses a broader more severe threat to America than China. He added that Beijing's malign influence campaign against America would be one of the bigger challenge for Biden administration. He asserted from a threat perspective, Russia is a significant adversary particularly with regard to cyber intrusions, malign influence, and sowing discord in American democracy, but China poses a broader, more severe intelligence collection to the United States. According to Evanina, China continually engaged in highly sophisticated malign influence campaign against America, because America is a democracy, and democracy is bad for China. Evanina clarifies that challenge for Biden administration will be to understand the scope and scale of Chinese threats in the American landscape, domestically, and what is the best course to defeat that. He added that part of China's malign influence has focused on politicians and elected officials, leveraging them to be engaged in promoting Beijing's scenario. Evanina signalizes that data theft by Beijing poses severe threat to the nationalized Americans. China can exploit the data for variety of nefarious purposes, and already has a significant record of exploitation of DNA for social control and surveillance of their Uyghur population at home. Evanina warned that China's collection of U.S. Genomic data is helping to fuel their precision medicine and artificial intelligence industries, which poses a long-term threat to the US biotech industry and medicine around the world at large. China continues to exploit American government and industry supply chain he said, Beijing uses American trusted suppliers and vendors against the US itself. He explained that supply chain attacks are insidious at most, because they violate the basic trust between a supplier and a consumer. Therefore, he said that it is a complicated set for the Biden administration to deal with. A chance of reconsidering foreign policy objectives Observing that Russia is not a significant threat to America at most, on the other, China poses, the most severe threat to the United States, so the Biden administration can give it a try to revise policies on Russia, and find out divergences and get them solved. In accordance with the US newly adopted maritime strategy, the American forces and vigilance instruments cannot be present everywhere and every time, therefore it stressed on to build and convene partnership and alliance with other countries. Unlike former strategies, the current strategy is more in favor of working together with allies. If Biden's administration tries to build trust amongst its allies, he needs to listen to his allies around the globe especially his European ones and give preference to their concerns. In European perspective, Russia is an inevitable potency in term of economic cooperation, counter insurgency, counter terrorism, and cyber security. Therefore, it is advisable that the policy towards Moscow requires to be given the kiss of life to crumble Sino-Russian partnership, and get it aligned with Washington. Most importantly, Russia is part of Europe; hence, a European orientated solution should be conveyed to motivate Russia to work together with European Union and America. Continue Reading Americas1 hour ago Two Ways that Trump Spread Covid-19 in U.S. 1. Encouraging infected workers to continue working even if it infects others: On 12 May 2020, two hundred and twenty... Finance3 hours ago M&A valuations boom in the second half of 2020, despite COVID-19 impacts on the economy M&A valuations are soaring, with rich valuations and intense competition for many digital or technology-based assets driving global deals activity,... Middle East5 hours ago When is usury usury? Turkish fatwa casts doubt on Erdogan's religious soft power drive Turkey's state-controlled top religious authority has conditionally endorsed usury in a ruling that is likely to fuel debate about concepts... Energy News7 hours ago Solar power charges pandemic recovery for indigenous farmers in Viet Nam Overcoming adversity has long been the stock in trade of Do Thi Phuong, a 42-year-old mother of two living in... Tech News9 hours ago 'Reset Earth': Animation film & mobile game bring Gen Z into protecting ozone layer 'Reset Earth' is an innovative educational platform for adolescents about the fundamental role of the ozone layer in protecting the... Defense11 hours ago Israel continues its air strikes against Syria after Biden's inauguration: What's next? A family of four, including two children, died as a result of an alleged Israeli air strike on Hama in... Reports11 hours ago Digitalizing the Maritime Sector Set To Boost the Competitiveness of Global Trade A new report launched today by the World Bank and the International Association of Ports and Harbors (IAPH) shows that...
1.337457
Zyphra/Zyda-2
The goal of this course is to help students continue developing their ability to hold a conversation and to develop an ability to comprehend, take guided notes from, and discuss simple academic lectures and topics. 140 Reading and Vocabulary The purpose of this course is to help students begin to develop academic reading skills, to continue to learning general vocabulary, and to begin to learn academic vocabulary. 140 Written Communication The purpose of this course is to help students develop intermediate grammar skills and develop the skills to write short compositions.
2.573162
HuggingFaceFW/fineweb-edu
depression worse. When the alcoholic feels depressed, he/she separates from other people, becomes irritable and angry with others, and often complains that nobody cares or understands what he/ she is going through. Phase 7: Behavioural Loss of Control. During this phase the alcoholic becomes unable to control or regulate personal behaviour and a daily schedule. There is still a heavy denial and no full awareness of being out of control. His/ her life becomes chaotic and many problems are created in all areas of life and recovery, The most common symptoms are: 24. Irregular attendance at AA and Treatment meetings. The alcoholic stops attending AA regularly and begins to miss scheduled appointments for counselling or treatment. He/she finds excuses to justify this and doesn't recognize the importance of AA or treatment. He/ she develops the attitude that "AA and counselling aren't making me feel better, so why should I make it a priority?" "Other things are more important." 25. Development of an "I don't care" attitude. The alcoholic tries to act as if he/ she doesn't care about the problems that are occurring. This is to hide the feelings of helplessness and a growing lack of self respect and self confidence. 26. Open Rejection of Help. The alcoholic cuts self off from people who can help. He/ she does this by having fits of anger that drive others away, by criticizing and putting others down, or by quietly withdrawing from others. 27. Dissatisfaction with life. Things seem so bad that the alcoholic begins to think that he/she might as well drink because things couldn't get worse. Life seems to have become unmanageable since drinking stopped. 28. Feelings of powerlessness and helplessness. The alcoholic develops difficulty in "getting started", has trouble thinking clearly, concentrating, thinking abstractly, and feels that he/she can't do anything and begins to believe there is no way out. Phase 8: Recognition of Loss of control. The alcoholic's denial breaks and suddenly he/ she recognizes how severe the problems are, how unmanageable life has become, and how little power and control he/she has to solve any of the problems. This awareness is extremely painful and frightening. By this time he/ she has become so isolated that there is no one to turn to for help. The most common symptoms are: 29. Self Pity. The alcoholic begins to feel sorry for self and often uses self pity to get attention at AA or from family members. 30. Thoughts of social drinking. The alcoholic realizes that drinking or using drugs would help him/her to feel better and begins to hope he/ she can drink normally again and be able to control it. Sometimes these thoughts are so strong that they can't be stopped or put out of mind. There is a feeling that drinking is the only alternative to going crazy or committing suicide. Drinking actually looks like the sane and rational alternative. 31. Conscious Lying. The alcoholic begins to recognize the lying, the denial and the excuses but is unable to interrupt them. 32. Complete loss of self confidence. The alcoholic feels trapped and overwhelmed by the inability to think clearly and take action. This feeling of powerlessness causes the belief that he/ she is useless and incompetent. As a result there is the belief that life is unmanageable. Phase 9: Option reduction. During this phase the alcoholic feels trapped by the pain and inability to manage his/her life. There seem to be only 3 ways out, insanity, suicide or drug use. He/ she no longer believes that anyone or anything can help them. The most common symptoms are : 33. Unreasonable Resentment. The alcoholic feels angry because of the inability to behave the way he/she wants to. Sometimes the anger is with the world in general, sometimes with a particular person, and sometimes with self. 34. Discontinuance of all treatment and AA. The alcoholic stops attending all AA meetings. Those taking Anabuse will forget to take it or deliberately avoid taking it regularly. When a helping person is part of treatment, tension and conflict develop and become so severe that the relationship usually ends. The alcoholic drops out of counselling even though he/she needs help and knows it. 35. Overwhelming Loneliness, Frustration, Anger and Tension. The alcoholic feels completely overwhelmed. He /she believes there is no way out except drinking, suicide or insanity. There are intense fears of insanity and feelings of helplessness and desperation. Phase 10: Acute Relapse Episode. During this phase the alcoholic becomes totally unable to function normally. He/she may use alcohol or drugs or may become disabled with other conditions that make it impossible to function. The most common symptoms are: 36. Loss of behaviour control. The alcoholic experiences more and more difficulty in controlling thoughts, emotions, judgements, and behaviours. This progressive and disabling loss of control begins to cause serious problems in all areas of life. It begins to affect health and well being. No matter how hard he/she tries to regain control it is impossible to do. 37. Acute Relapse Episode. The alcoholic experiences periods of time when he/ she is totally unable to function normally. These periods become more frequent, last longer, and begin to produce more serious life problems. The relapse cycle is ended with a serious crisis which causes the person to become totally unable to function for a period of time due to one or more of the following: A. Degeneration of all life areas. The alcoholic may become unable to contribute to the work, social, family, and intimate areas of life. As a result, all life areas suffer due to neglect. B. Alcohol or drug Use. The alcoholic may begin to use alcohol or other drugs as a means to escape the pain and desperation. There may be an attempt to control drinking by limiting the amount or attempting one short term binge. The ability to control drinking is soon lost. This sometimes happens very quickly. Sometimes it occurs after a period of controlled drinking. The alcoholic returns to out-of –control drinking with symptoms experienced during the last period of alcoholic drinking. C. Emotional Collapse. The alcoholic may become emotionally unable to function, may overreact, or become emotionally numb, or cry, or fly into a rage for no reason at all. D. Physical Exhaustion. It may become impossible for the alcoholic to continue to function due to physical exhaustion. E. Stress Related Illnesses. The alcoholic may become physically sick due to the severe stress that has been occurring over a long period of time. F. Psychiatric Illness. The alcoholic may develop a severe psychiatric illness such as psychosis, severe anxiety, or severe depression. The psychiatric illness may be so severe that it forces the alcoholic into treatment. G. Suicide. The alcoholic may become suicidal and may attempt or actually commit suicide. H. Accident Proneness. The alcoholic may become careless and unable to take normal precautions in acts of living resulting in a sequence of accidents. These accidents may take the form of car accidents, falls, burns etc. Often the accidents are life threatening or cause serious injury. I. Disruption of Social Structure. The alcoholic may be unable to maintain involvement in normal life activities and may become socially unable to function. Constructing a Personalized Warning Sign List 1. Check three to five warning signs from the list above that you find most interesting for you. 2. In your own words, rewrite the summary title of the warning sign that you have checked. The summary title is the word or short phrase at the beginning of each warning sign. 3. Write a brief paragraph that describes in your own words each of the warning signs that you have selected. 4. Read your warning signs (as you have written them) to an addictions counsellor, your A.A. sponsor, or a friend, and ask for feedback. Rewrite the warning signs if they are unable to understand clearly what you mean. 5. Review the list every morning and every evening to remind yourself to look for the presence of these warning signs. 6. Discuss the list with your friends and family and ask them to tell you if they see any of the warning signs appearing in your life. 7. If you notice a warning sign, evaluate your need to get help.
1.385621
openbmb/Ultra-FineWeb
A-level Computing/AQA/Python From Wikibooks, open books for an open world Jump to: navigation, search Python3-powered hello-world.svg Python is a free multiplatform programming language. Its original purpose and strengths were as a scripting language to automate the administration of Unix systems. Both the core language and the standard library have since been extended for many other purposes, including web, database, interactive and graphical applications. Why Python?[edit] The reference implementation of Python, CPython, runs almost everywhere, and is well supported for Linux, Unix, Mac OS X and Windows. Many free text editors offer syntax highlighting, code completion, class navigation, debugger integration and other tools. Therefore students can pursue their interest easily at home, work or at computer clubs. The main implementations (CPython, Jython and IronPython) are open source and free-of-charge. CPython is included as standard in most Linux distributions. As of 2012, Python is one of the two main languages that Google offers, alongside Java, for its customer APIs. Though not as popular in industry as Java and VB, it has been adopted in various fields of employment. Python is interpreted, so trial-and-error experimentation and debugging can be fast. The standard runtime also includes an interactive console with access to the executing program image. Python has a wide range of data types, both built-in and in its standard library, though there can be some quirks and inconsistencies among them. For example, some types are mutable and others are immutable. Python's significant whitespace makes incorrect nesting of block structured statements easy to spot. Why not Python?[edit] CPython's virtual machine is a bytecode interpreter and execution of Python can be much slower than say, execution of Java on its HotSpot virtual machine with just-in-time compilation. Python's significant whitespace can make it easy to break a working method with the space bar or tab key. Python uses variables without declaring datatypes, this can be confusing when trying to teach them. When using classes, python doesn't use the keywords public and private to specify access to attributes and methods. They are possible, but may confuse students. 2.7 or 3.x?[edit] When you read about python you will probably learn that there are two different versions out there. AQA allows you to use either but which one is most suitable for you? A quick summary: 2.7 is stable, end-of-life, no further updates, but solid and widely deployed, with a vast array of libraries and learning resources. 3.x is the future - handles multi-lingual text correctly, many improvements, but some libraries not yet converted. Some tutorials written for python 2.7 won't work in python 3.x as there are small changes in the language such as the print statement in Python 2.x being replaced with the print function in Python 3.x: print "hello world" _TAG_ 2.7 print("hello world") _TAG_ 3.x You can install both and they'll play nicely together, but when choosing what language to pick you might be wise to check out the resources that you have available to your students. Getting Started[edit] You can get a portable version of python that can be run directly from a USB, available in 2.7 and 3.x versions. If you want to use Microsoft Visual Studio you can get IronPython which is free and integrates python 2.7. Python comes pre installed on the Raspberry Pi with development tools and lots of supporting learning resources. Although some users encourage learners to use Python's built-in list as an array, the standard library includes the array module which some teachers may prefer. See, for example, Check which array the examiners prefer. Object Orientation[edit] Since Python doesn't have the concept of explicit declarations, or PRIVATE and PUBLIC keywords, the syntax for defining classes differs quite a lot from the generally accepted AQA syntax, e.g., the VB.NET class Class MediaFile Sub PlayFile End Sub Function GetTitle As String Return Title End Function Function GetDuration As Single Return Duration End Function Dim Title As String Dim Duration As Single is a reasonable match to the June 2010 COMP3 question: MediaFile = Class Procedure PlayFile Function GetTitle Function GetDuration Title : String Duration : Real The Python version looks something like this: class MediaFile def __init__(self): self.Title = "" self.Duration = 0.0 def PlayFile: def GetTitle(self): return self.Title def GetDuration(self): return self.Duration Python can be used to build anything from websites to games using pygame (v2.7). Blender has a python scripting engine (3.x) meaning that it is possible to create projects involving 3D animation. Python's origins as a scripting language mean that it can be used to glue together Unix programs to make an application. Open source library code can be imported, as teaching examples or to extend the practical project, from PyPI _URL_ with package management tools built into Python. To ease the generation of some documentation, students may be introduced to the docstring, a form of embedded documentation supported by Python source code. A number of tools are available for generating readable documents from source code containing docstrings, including pydoc (in the standard library), Epydoc, doxygen and Sphinx. For website creation, Python is one of the alternative 'P's in LAMP. (Like Perl and PHP, Python integrates well with Linux, Unix, Apache HTTP Server and MySQL.) Online resources[edit] If you're already proficient in another programming language, the official tutorial will get you up to speed at speed. Even if you're not a programmer, this fast-paced, no-frills introduction will get you programming in Python quickly, with a reasonable degree of mental pain! Other Python books at Wikibooks are listed under Python programming language. Useful printed books are as follows: Title ISBN Suitable for Python Programming for the Absolute Beginner (3.1) 978-_PHONE_ Applications and Games More Python Programming for the Absolute Beginner (2.7) 978-_PHONE_ Applications and Games Dive Into Python (2.7) 978-_PHONE_ available for free online Python for Software Design: How to Think Like a Computer Scientist (2.7) 978-_PHONE_ available for free online Algorithms and CS thinking Invent Your Own Computer Games with Python (3.2) 978-_PHONE_ available for free online
2.101772
Zyphra/Zyda-2
Children in Scotland acts upon the belief that children and young people are important and valuable in the here and now (not just for their potential contributions as adults). Accordingly, we take a rights-based approach to children's policy. The UK ratified the United Nations Convention on the Rights of the Child (UNCRC) years ago. The Scottish Government and Scottish Parliament also have made clear their agreement with the UNCRC and their intention to fully abide by it. However, the support for the UNCRC in principle is not always matched in practice by public agencies and institutions across Scotland. Much has been accomplished, but more remains to be done. To read the UN Convention of the Rights of the Child in it's entirety (54 Articles), click here. There is also a useful guide to the UNCRC available from UNICEF at: _URL_ We find that three UNCRC Articles are most often cited in child policy work in Scotland. They are: Article 2: all UNCRC rights apply to all children without discrimination Article 3: the best interests of children must be a primary consideration Article 12: children's views must be taken into account in decision-making After years of advocacy by Children in Scotland and allied organisations, a law was passed to create a Scottish Commisioner for Children and Young People. It is the role of the Commisioner to pay close attention to the actual implementation of the UNCRC across Scotland. In April 2004, Kathleen Marshall was appointed as the first Commisioner. In 2009 Tam Baillie became the second Commissioner. More information about Scotland's Commissioner for Children and Young People can be found at: In 2008 the four Children's Commisioners within the UK issued a joint report to the United Nations on the record of goverment in meeting its UNCRC obligations. This report can be found at: group of young people chatting (image) for this section: Director of Policy, Research and Programmes 0131 _PHONE_ Click here to send an email
1.799792
HuggingFaceFW/fineweb-edu
ital wheat gluten" or "gluten flour"), for those who wish to make their own gluten from scratch. It is important to distinguish the two; vital wheat gluten is the product used for making seitan, but it can be mislabeled as gluten flour. Properly-labeled gluten flour has more gluten than normal flour, but not enough for seitan. Properly-labeled vital wheat gluten typically contains 75% or more protein. The distinction is important, as gluten flour will produce a consistency more similar to dumplings than to seitan. Wheat gluten is also used by bakers to increase the chewiness of breads. The block form of seitan is often flavored with shiitake or portobello mushrooms, fresh coriander or onion, or barbecue sauce, or packed in a vegetable-based broth. In strip form, it can be packed to be eaten right out of the package as a high-protein snack. Shaped seitan products, in the form of "ribs" and patties, are frequently flavored with barbecue, teriyaki, or other savory sauces. Additional uses of wheat gluten include the partial use in products such as Morningstar Farms, LightLife, Gardein, and, most famously, Tofurkey, which is known for its mock-turkey Thanksgiving meal. Wheat gluten is also used by The African Hebrew Israelites of Jerusalem, a vegan African American religious sect that operates a chain of restaurants called Soul Vegetarian, to produce a vegetarian sandwich called the Garvey Burger. In North America, there are also several brand-name meat alternatives, such as Protein Chef, which are used in the restaurant and food service markets. Animal feed[edit] Wheat gluten is also used both as a protein source and binding ingredient in pet foods. Wheat gluten from China adulterated by melamine was blamed as the cause of the 2007 pet food recalls.[8] See also[edit] 1. ^ Pauldragron, January 2007 2. ^ Vegetarian's Paradise 2, 144 W 4th St., New York, NY 10014, _URL_ Accessed 2007-08-16 3. ^ Harmony Chinese Vegetarian Restaurant, 135 N. 9th Street, Philadelphia, PA 19107, _URL_ Accessed 2007-08-16 4. ^ Oxford English Dictionary. seitan, n. DRAFT ENTRY Dec. 2004. Online edition. Retrieved 2008-02-19. 5. ^ William Shurtleff & Akiko Aoyagi History of Erewhon -Natural Foods Pioneer In The United States (_PHONE_): Extensively Annotated Bibliography and Sourcebook Soyinfo Center. 2011 6. ^ Jacobs, Barbara; Jacobs, Leonard (1987). Cooking with Seitan: Delicious Natural Foods from Whole Grains. New York, NY: Japan Publications. ISBN 9780870406379. 7. ^ Bates, Dorothy; Wingate, Colby (1993). Cooking with Gluten and Seitan. Summertown, Tennessee: The Book Publishing Company. ISBN _PHONE_. 8. ^ US Food and Drug Administration, Import Alert IA9926, "Detention without physical examination of wheat gluten due to the presence of melamine" External links[edit]
1.291755
Zyphra/Zyda-2
Motorists & Parking Alternative Fuels Program Reducing emissions through increasing our use of alternative fuels and retrofitting vehicles is crucial to improving New York City's air quality. The mission of the Alternative Fuels Program is to promote understanding and increased usage of alternative fuels and alternative fuel vehicles within New York City. The Program has two goals: - To make the air cleaner and safer for New Yorkers so that we can breathe easily and without worry - To promote the use of alternative fuels and alternative fuel vehicles in New York City by both the private businesses and government agencies New York's Emissions Reduction GoalsOne of the most dangerous pollutants is particulate matter (PM) - commonly known as soot. Its small size lets it drift deeper into the lungs, where it can cause inflammation and other damage. According to the U.S. EPA, up to 15,000 premature deaths a year are caused by exceeding the emissions standard of PM 2.5. A paper by the Environmental Defense Fund "All Choked Up" shows that New Yorkers living within two to six blocks of a busy road are likely to be at higher risk for conditions including cancer, heart disease, impaired childhood lung development, asthma attacks, and lung disease in adults. The City's Department of Health and Mental Hygiene estimates that a 10% decrease of current PM levels in New York City would result in hundreds fewer deaths annually.Our goal is to reduce PM 2.5 emissions across the City by 9% by 2015 and 39% per square mile by 2030. To accomplish this, the Alternative Fuels Program is working to replace New York City's public fleets with alternative fuel vehicles in order to promote and expand usage of alternative fuels which are much less polluting to the air and more friendly to the environment. The Program works closely with all levels of government agencies that operate fleets in New York City, as well as utilities (KeySpan and Con Edison) and some private sector fleets.DOT will lead the way by greening our operations and offering incentives to private fleet owners and vehicle operators to do the same. We will also partner with City Hall, the MTA and the Port Authority to promote hybrid and other clean-energy vehicles. Alternative Fuels Program DOT is expanding the use of biodiesel, compressed natural gas and hybrid electric technology throughout our fleet. Nearly 700 of our 3,000 vehicles use this technology already.We are using cleaner burning fuel and filtering the exhaust from our Staten Island ferry fleet. In 2005 in the first project of its kind in the US, one of our ferries (Alice Austen) was outfitted with a Selective Catalytic Reduction system and a Diesel Oxidation Catalyst, achieving a 70% overall nitrogen oxide (NOx) reduction (17 tons a year). The success of that trial has led us to begin outfitting the entire fleet with clean technology. Two of our larger ferries have received mechanical upgrades, and because they are larger than the Austen we have reduced NOx output by over 120 tons a year. The remainder of the fleet will be completed in 2008.DOT's fleet vehicles, heavy equipment, and over 2000 power tools refueling at the Harper Street Yard in Brooklyn fill their tanks with B5 (95% diesel and 5% soy-based vegetable oil. B5 is currently being introduced at the department's other refueling stations as well. We are also already testing the cold-weather performance of B20, an even cleaner burning fuel. The Staten Island ferry fleet burns between 60,000 and 70,000 gallons of fuel every week. We are currently testing the use of B5 fuel in the John F. Kennedy and finalizing a contract to provide B5 for the entire fleet. All of our new construction equipment is delivered with the latest emission reduction technology. And over the next two years DOT's older heavy equipment will be outfitted with technology that can reduce emissions up to 85% when combined with ultra-low sulfur fuel. We also intend to introduce hydrogen fuel for our light duty fleet and gas to liquid in refuse trucks in late 2008. Other Measures to Reduce Tailpipe Emissions In 2005, vehicles traveled 18.6 billion miles through the five boroughs, approximately 48 million miles per day. Each year, these trips generate about 11% of our local PM 2.5 emissions as well as 52% of NOx and 32% of VOC (volatile organic compounds) emissions, both of which contribute to PM 2.5 levels. There are four main ways to reduce transportation-related emissions: decrease the amount of time vehicles spend stuck in congestion and idling; use less and cleaner fuels; and filter exhaust before it is released into the air. DOT's alternative fuels program is just one part of the overall picture of reducing emissions from the transportation sector. We are partnering with the MTA to create select bus service corridors, making mass transit faster and more accessible for hundreds of thousands of New Yorkers who currently live far from existing subway lines. We are also building out the City's 1800-mile bicycle master plan to foster bike commuting. Encouraging the Private Sector DOT and NYSERDA award grants to private industry to help in the procurement of alternative fuel vehicles. DOT with NYSERDA offers funding incentives to private fleets to retrofit their diesel trucks with exhaust filtering technology in order to reduce exhaust produced as trucks idle. We are currently working with Manhattan Beer, UPS, FedEx, and Coca-Cola. DOT will soon launch a separate grant program to retrofit truck fleets based at the Hunts Point Market in the Bronx. Nearly 15,000 trucks pass through Hunts Point daily. Finally, the New York City Taxi and Limousine Commission (TLC) has committed to requiring that, beginning October 1, 2008, all taxicabs coming into service (with the exception of accessible taxicabs) must be capable of achieving a city mileage rating of 25 miles per gallon (mpg). As of October 2009, all new taxicab vehicles must have a minimum city driving rating of 30 mpg. More Information on Alternative Fuels For more information on the types of alternative fuels, the environmental damage caused by vehicle emissions, and links to other helpful information sources, read more about alternative fuels (in pdf format). Reducing Emissions From Non-Road Equipment (Local Law 77) Local Law 77, which was signed into law in 2003, requires the use of ultra-low sulfur diesel and "best available technology" for reducing emissions from non-road equipment used on City construction projects. Read the Verified Technologies List of diesel retrofit technologies that have been approved by the U.S. Environmental Protection Agency for use in engine retrofit programs. Read a summary of verified diesel emission control strategies by the California Air Resources Board.
1.413019
HuggingFaceFW/fineweb-edu
on their own, without mom and dad standing close by encouraging and cheering them as they step closer and closer. Be their guide. Give them responsibilities that will allow them to grow and develop their financial muscles. Ideally, when your children reach the proper age and when they are ready, mom and dad can step aside and watch their child walk, run, and talk all at the same time, financially speaking. Let's start walking. Comments-icon Post a Comment No Comments Yet Follow us on:
1.164044
Zyphra/Zyda-2
Jan 18, 2017 06:45 AM EST Quantum Computing Made Available Worldwide By D-Wave Canadian Company [Video] Quantum computing is making waves because of D-Wave. This small Canadian company has launched an open-source quantum software that makes quantum computing available for regular people. The field of quantum computing is supported by Amazon CEO Jeff Bezos, CIA, and NASA. This field has only been known to computer programmers and developers who studied advanced math or quantum physics. D-Wave has developed qbsolve that will permit program developers and coders to program D-Wave's quantum machines even without the expertise to do quantum programming, according to Wall Street Pit. How Quantum Computers Work Quantum computers are mega-powerful computers that process and store data through quantum mechanics. Unlike traditional computers that store data in 'bits' represented by either '1' or '0,' quantum computers store data in 'qubits' or quantum bits. This qubits are more complex version of 'bits' because they spin in two directions simultaneously. Quantum Computing Enhances Medical Science The field of medicine has been revolutionized with the completion of the Human Genome Project in 2003. This has enabled the treatment of each patient in a more personalized manner through better targeted cancer therapies, according to a post by Forbes. This new discoveries are considered as major advances. However, it also showed limitations. It revealed the small knowledge of current science regarding how proteins are coded. A great example is on the discovery that the cure of diseases involved working with complete genomes rather than isolated markers in people's chromosomes. The problem is that traditional computers do not have the maximum power to do these tasks. The good news lie with the possibility of quantum computers of resolving the issue. Harvard scientists discovered that quantum computers allow protein mapping like that of genes. D-Wave, in collaboration with DNA-SEQ, has allowed the use of its quantum computers in the exploration of the analysis of genomes for better therapies. Join the Conversation
2.396743
openbmb/Ultra-FineWeb
The Australian Government Interoperability Framework addresses the information, business process and technical dimensions of interoperability. It sets the principles, standards and methodologies that support the delivery of integrated and seamless services. Interoperability describes the ability to work together to deliver services in a seamless, uniform and efficient manner across multiple organisations and information technology systems. Promoting interoperability between agencies is a key focus to achieving whole-of-government collaboration. Interoperability improves government's ability to design policies and services to the needs of clients and to derive efficiencies as a result of streamlined interactions both within and across agencies. To be interoperable, agencies need to actively engage in a process of ensuring that their systems, information and business planning activities are managed to maximise opportunities for exchange with and reuse by others. To achieve this, agencies need to grapple with diverse issues including: - legal and commercial agreements; - policy and business requirements; - process alignment; - data discovery; - messaging; and - channel management. These issues are typically grouped into three major layers – business, information and technical. - The business layer comprises legal, commercial, business and political concerns. The Business Process Interoperability Framework operates in this layer. - The information layer comprises information and process elements that convey business meaning. The Information Interoperability Framework operates in this layer. - The technical layer comprises technology standards such as transport protocols, messaging protocols, security standards, registry and discovery standards, XML (Extensible Markup Language) syntax libraries and service and process description languages. Refer to AGIMO's interoperability frameworks for further information.
1.824818
openbmb/Ultra-FineWeb
"There is growing awareness that prenatal adversity may increase the risk of autism spectrum disorder (ASD)." "These findings indicate that HDP [hypertensive disorders of pregnancy] exposure may increase the risk of ASD in the offspring." So said the findings reported by Eileen Curran and colleagues whose results have previously appeared on this blog with hypertension in mind (see here). I'm not altogether sure if this latest publication from this group represents 'new data' or is the same as/similar to that previously published. It doesn't really matter to be honest given that the latest publication also includes a research addition insofar as the examination of "cytokine expression in the serum of women with pre-eclampsia, which is the most common HDP, and whether exposure of foetal neurons to this serum could change patterns of neuronal growth." Drawing on data from some 13,000 children whose details were included in the Millennium Cohort Study (MCS) researchers, after "adjusting for several potential confounders including maternal alcohol consumption, education, depression, age, and poverty status", observed "a significant association between HDP and a twofold increased risk of ASD." They also reported that: "exposure of foetal cortical neurons to 3% serum isolated from women with an established HDP increased neuronal growth and branching in vitro." The authors have reported similar things with attention-deficit/hyperactivity disorder (ADHD) in mind too ; something that might be particularly important in the context of autism and ADHD overlapping in quite a few people (see here). Curran EA. et al. Exposure to Hypertensive Disorders of Pregnancy Increases the Risk of Autism Spectrum Disorder in Affected Offspring. Mol Neurobiol. 2017 Oct 3. Curran EA. et al. Hypertension in pregnancy and autism spectrum disorder in a British cohort: Long term consequences for mother and child. Pregnancy Hypertension: An International Journal of Women's Cardiovascular Health. 2016; 6: 153. Curran EA. et al. The effect of hypertensive disorders of pregnancy on the risk of attention-deficit/hyperactivity disorder in the offspring: Long term consequences for mother and child. Pregnancy Hypertension: An International Journal of Women's Cardiovascular Health. 2016; 6: 169–170.
1.646678
openbmb/Ultra-FineWeb
U.S. News: Reverse Mortgage Is One Way To Stay at Home During Pandemic As employment options decline and older Americans remain at a heightened risk of developing severe cases of COVID-19 during the global pandemic, a reverse mortgage can be one tool that allows seniors to remain a home, writes U.S. News and World Report in an article published this week. The article outlines several ways for seniors to remain at home rather than going out to work, including sharing knowledge online and tutoring; freelancing; seeking remote work; renting out space in an owned home; and tapping into home equity. When it comes to tapping into home equity, U.S. News points to reverse mortgages as one option, for those who qualify and are at least 62 years old. A sale-leaseback is another option, the article notes. "Homeowners who want to avoid dipping into retirement funds during an economic downturn may find that their house is a source of cash," the article writes. "However, with home equity lines of credit being suspended by some banks, retirees need to get creative. "Reverse mortgages are one option for retirees who are at least 62 years old. With a reverse mortgage, a lender makes regular payments to a senior based on the value of their property. Once the homeowner moves or passes away, the loan must be repaid. This typically requires the sale of the property." Read the article at U.S. News and World Report. Companies featured in this article: Join the Conversation (4) see all - "'With a reverse mortgage, a lender makes regular payments to a senior based on the value of their property. "' What nonsense. First, only ADJUSTABLE RATE HECMs currently offer that option. (All HECMs are reverse mortgages but NOT all reverse mortgages are HECMs, no matter what the practice in the industry is.) Second the amount of the payments are not based on the value of the home. They are based on the difference between 1) the principal limit and 2) the sum of the unpaid balance and the net amortized balances in set asides as of the time that the payouts begin; the payout is then determined based on a amortization concept where the computational interest is the sum of the EXPECTED INTEREST and the ongoing MIP annual rate —(reminder there are two — 0.5% on the oldest and most recently endorsed HECMs but 1.25% on those HECMs receiving case number assignments beginning after October 3, 2010 and ending before October 3, 2017) divided by 12 and 2) and the computational time period is either a fixed number of months or, in the case of tenure payments, the number of months until the youngest borrower turns 100 starting with the date that the payouts will begin. When one says it is based in any part on the value of the home, this shows such folks do not understand that the HECM is not a home value issue but a contract. Under the statute of frauds, all real estate related transactions must be in writing — i.e. must be contracts (including mortgages)!!! Beyond that these folks who emphasize home value show they do not understand the critical role that the Maximum Claim Amount plays in determining the HECM Principal Limit. It seems currently when most columnists are told things that are not exactly correct about reverse mortgages (and HECMs, in particular), they do little original research and run with that information as if the columnists lived in Greece in 360 BC and the information THEY received, came DIRECTLY from the gods on Mount Olympus. - John, Thank you. Everything is OK but like everyone else we are getting restless. The days here are beach living weather. What a waste…!! Take care and be safe, Jim Veale - One thing needs clarification, the time period for tenure payments. The time is the youngest borrower's current age in HECM years to the actual age of 100. So if a senior is 69 and 5 months, that senior is exactly 69 years old in HECM years. That senior would have 31 years (or 372 months) to age one hundred for HECM tenure payment calculation purposes. string(113) "_URL_ Share your opinion
1.06298
Zyphra/Zyda-2
Transmissions for Forklifts - Utilizing gear ratios, a transmission or gearbox provides speed and torque conversions from a rotating power source to another machine. The term transmission refers to the entire drive train, along with the gearbox, prop shaft, clutch, final drive shafts and differential. Transmissions are most normally used in vehicles. The transmission alters the productivity of the internal combustion engine to be able to drive the wheels. These engines have to operate at a high rate of rotational speed, something that is not right for stopping, starting or slower travel. The transmission increases torque in the process of decreasing the higher engine speed to the slower wheel speed. Transmissions are also used on fixed machines, pedal bikes and wherever rotational torque and rotational speed need adaptation. Single ratio transmissions exist, and they operate by altering the torque and speed of motor output. Lots of transmissions comprise several gear ratios and can switch between them as their speed changes. This gear switching can be accomplished automatically or manually. Forward and reverse, or directional control, may be provided as well. The transmission in motor vehicles will generally connect to the engines crankshaft. The output travels through the driveshaft to one or more differentials in effect driving the wheels. A differential's main function is to be able to alter the rotational direction, although, it can also supply gear reduction as well. Torque converters, power transmission as well as various hybrid configurations are other alternative instruments used for torque and speed change. Standard gear/belt transmissions are not the only machinery available. The simplest of transmissions are simply called gearboxes and they provide gear reductions in conjunction with right angle change in the direction of the shaft. Sometimes these simple gearboxes are utilized on PTO machines or powered agricultural machines. The axial PTO shaft is at odds with the usual need for the driven shaft. This particular shaft is either horizontal or vertically extending from one side of the implement to another, depending on the piece of machinery. Silage choppers and snow blowers are examples of much more complex machines which have drives providing output in multiple directions. The type of gearbox utilized in a wind turbine is a lot more complicated and bigger as opposed to the PTO gearboxes used in farm machines. These gearboxes change the slow, high torque rotation of the turbine into the faster rotation of the electrical generator. Weighing up to several tons, and based on the size of the turbine, these gearboxes generally contain 3 stages to accomplish a whole gear ratio beginning from 40:1 to more than 100:1. In order to remain compact and so as to distribute the massive amount of torque of the turbine over more teeth of the low-speed shaft, the primary stage of the gearbox is normally a planetary gear. Endurance of these gearboxes has been an issue for some time. Click to Download the pdf
2.167115
openbmb/Ultra-FineWeb
Apr 09, 2007 — Millions of honeybees across the country are dying mysteriously. Entire hives or colonies of bees are collapsing. Scientists say it's some new threat. They're scrambling to find answers. As Bob Allen reports, bees are crucial in pollinating billions of dollars worth of crops every spring.
1.09795
openbmb/Ultra-FineWeb
Recession Survival Strategies For A Chartered Accountant When Australian businesses and companies recruit a chartered accountant, then they anticipate someone who has those specialized skills along with the technical experience which goes with being an expert. You can get more information about the best-chartered accountant via Recession Survival Strategies For A Chartered Accountant Image Source: Google They expect quality work, and they'll pay extra cash to an experienced professional chartered accountant in Sydney. Truly, accountants are in the ideal position of assisting their business to survive the downturn and its own fiscally messy aftermath. The followings hints can help devise approaches to accomplish that: 1. Plan ahead. A respectable chartered accountant at Sydney understands the intricacies of fiscal planning. These financial experts attempt to predict the need in the forthcoming months. If you're among many public accountants in Sydney, then you understand this could be anywhere from a few months to a few years. 2. Assist your clients. If you can find a means to supply exactly the same (if not better) level of support at a lower price or at least, without raising the price tag, you've got a better prospect of keeping customers despite the financial recession. 3. Request discounts from providers. As they say, nothing ventured nothing gained. In an economic recession, competition for the company might be fiercer. 4. Use your tools wisely. If you're a chartered accountant at Sydney, you understand how to examine your accountancy requirements in addition to your organization. 5. Track prices. All companies have variable and fixed costs, as chartered cost accountants understand. Careful financial planning involves making comprehensive reports. Reports will be able to help you monitor and analyze prices. 6. Control expenses. Understanding what those variables are and placing steps to minimize its impact can help considerably in restraining prices. 7. Make strategic decisions depending on the large image. Think about the company your company is in and the market generally. As an expert accountant at Sydney, be informed of business and financial trends through surveys, investigations, and studies.
1.008937
Zyphra/Zyda-2
One in eight people suffer from malnutrition In a world where technology has advanced to a point where I can instantly have a face-to-face conversation via online video with a friend in Tokyo, nearly 870 million people, or one in eight, still suffer from malnutrition, according to a new UN report. While worldwide hunger declined from 1990 to 2007, progress was slowed by the global economic crisis. Over the last few years, numerous and record-breaking extreme weather events have also taken tolls on food production. Currently, food prices hover just below crisis levels. "We find it entirely unacceptable that more than 100 million children under five are underweight," the heads of the Food and Agriculture Organization (FAO), International Fund for Agricultural Development (IFAD), and the World Food Programme (WFP) write in a forward to the report, State of Food Insecurity in the World 2012, adding that such children "are unable to realize their full human and socio-economic potential, and that childhood malnutrition is a cause of death for more than 2.5 million children every year." From the early 1990s to today, the number of those going to bed hungry has fallen by around 132 million, dropping from 18.6 percent to 12.5 percent of the total world population. While this is laudable progress, regions still make a big difference. In fact, hunger has actually risen in Africa: 64 million people have been added to the number of hungry on the continent since the early 1990s. Population growth rates are also highest in Africa. Article continues at Malnutrition, Famine image via Wikipedia.
1.902733
HuggingFaceFW/fineweb-edu
Definition of Bear grass 1. Noun. Yucca of southern United States having a clump of basal grasslike leaves and a central stalk with a terminal raceme of small whitish flowers. 2. Noun. Yucca of west central United States having a clump of basal grasslike leaves and a central stalk with a terminal raceme of small whitish flowers. 3. Noun. Stemless plant with tufts of grasslike leaves and erect panicle of minute creamy white flowers; southwestern United States and Mexico. Generic synonyms: Agave, American Aloe, Century Plant Group relationships: Genus Nolina, Nolina 4. Noun. Plant of western North America having woody rhizomes and tufts of stiff grasslike basal leaves and spikes of creamy white flowers. Generic synonyms: Liliaceous Plant Group relationships: Genus Xerophyllum, Xerophyllum Bear Grass Pictures Click the following link to bring up a new window with an automated collection of images related to the term: Bear Grass Images Lexicographical Neighbors of Bear Grass Literary usage of Bear grass Below you will find example usage of this term as found in modern and/or classical literature: 1. History of the Discovery and Settlement of the Valley of the Mississippi: By by John Wesley Monette (1848) "AD 1781 TO 1784. Argument.—Severs Winter of 1780-81.—Scarcity in Kentucky.—Kentucky divided in to three Counties.—Indian Hostilities on Bear-grass Creek...." 2. A Dictionary of English Synonymes and Synonymous Or Parallel Expressions by Richard Soule (1891) "Spanish-bay une t, bear-grass, Adam's needle. Yule* "• I* Christmas, yule-tide. 2. lemmas, Lammas-tide. Yule-tide,*. Christmas...." 3. Rural Rides by William Cobbett (1853) "Something, however, depends on the nature of the soil: for it is not all land that will bear grass, fit for hay, perpetually; and, when the land will not do..." 4. A Geographical, Historical, Commercial, and Agricultural View of the United by Daniel Blowe (1820) "Spruce and hemlock, in the eastern parts of the state, denote a thin, cold soil, which, after much labour in the clearing, will indeed bear grass without..." 5. Rural Rides in the Counties of Surrey, Kent, Sussex, Hants, Berks, Oxford by William Cobbett (1908) "Something, however, depends on the nature of the soil: for it is not all land that will bear grass, fit for hay, perpetually; and when the land will not do..."
2.00198
HuggingFaceFW/fineweb-edu
The Imaginary Number i Posted by Professor Cram in Complex Numbers Complex Numbers: An Introduction A complex number can be expressed in the form: a + bi where a and b are real numbers. The number i is defined as the square root of -1. It is an imaginary number, since the square root of any negative number is not a real number. Complex numbers are not algebraic expressions. They are numbers, containing a real part (a) and an imaginary part (bi). Using i In the world of real numbers, an expression like the square root of -9 is unsolvable. (Remember, because the square root of a negative number is not real.) However, by using the imaginary number i we can break this problem down as the square root of (9)(-1). This can be expressed as the square root of 9 (which is 3) times the square root of -1 (which is i). Thus, the answer to this otherwise unsolvable problem is 3i. i to a Power As with any real number, i0 = 1 and i1 = i. We know that i2 = -1. Also, i3 = (-1)(i) or -i. These four values (1,i, -1, -i) are the only possible results of raising the imaginary number i to any power. To figure out any exponent higher than 4, just divide the exponent by four and use the remainder (0, 1, 2, or 3) as the new exponent. Match it up with the choices here and you have your answer. (Check the tutorial below to see this in action.) The Imaginary Number i What is the imaginary number i, and how is it used? This tutorial will teach you all about it. The Flash plugin is required to view this object. 5 Responses to "The Imaginary Number i" 1. Ronna says: How bout if imaginary number i is raise to i.."i^i"?? 2. Heman says: Its a real no having magnitude e^(-pie/2) and other values as well. Use demoivre theorem 3. Vasundhara says: what is the demoivre theorem?? 4. jay says: how to you get the remainder 0,1,2,3 when raisin i? 5. Henry says: So if i^2 is equal to -1, and -1 is a real number, then two imaginary numbers can create a real number? So qualitativly, could this mean that if two imaginary particles were to collide, they could theoretically create a real particle? Does this not defy the first law of thermodynamics? Or does this simply mean that I'm misunderstanding the use of the word "imaginary"? Leave a Reply
2.305124
Zyphra/Zyda-2
Obs via Google Maps Oil & Gas ADCP Ship Obs Report Obs Web Widget NDBC on Facebook NDBC DQC Handbook Hurricane Data Plots Handbook No. 1 See recent photos from TAO buoy 8N 110W How can I compute the distance from a buoy to shore, an inlet, or another reference location? Often, when you ask us how far a buoy is away from a location, we don't know the exact location of the jetty, inlet, or the point on shore that you are referring to. We'd hate to guess and give you the wrong information. However, it's fairly easy to determine this yourself if you can find the latitude and longitude of your reference position. Copy the station's latitude and longitude from the station page. Next, look up the latitude and longitude of the inlet, lighthouse, town, or other geographic feature you are interested in. You can find these on NOAA nautical charts: _URL_ provides a listing of these charts which you can purchase. When you have this information, do an Internet search for a "Great Circle Calculator" and go to one of the web sites featuring this type of calculator. Here's a Great Circle Calculator offered by NOAA's National Hurricane Center: _URL_ Then, enter the latitude and longitude of our buoy and the position of your reference location. The calculator will provide the distance in in your choice of units.
1.072812
HuggingFaceFW/fineweb-edu
they were supposed to. The scanner was very picky when detecting a finger, even with a live enrolled finger it was occasionally hard to log in. For the breathing, the scanner notified "Finger is too wet" and for the gummy bear attack there was also the "Invalid finger" error presented. Method 2: Creating a Mold Using a Live Finger Some typical household items carry the properties of a real finger when it comes to capacitance, conductivity and flexibility. One of the easiest ways to imitate human finger is to create a gelatine finger from gelatin sheets or powder. When using a mold, this material can be formed into a shape of the legitimate user's finger. The mold itself can also be manufactured using equipment commonly available, such as hot setting adhesive. This method is based on the fact that gelatine finger has about the same capacitance as a real finger (~20Mohms/cm) and thus the scanner is unable to distinguish these two. Now all that is needed is a gelatine finger that corresponds to the real finger at the accuracy level of the scanner. For the 100 SC scanner this resolution is 500dpi, each dot representing a small point for measuring the capacitance. If capacitance is high, then at that point there is a ridge, if small, there is a valley of the fingerprint. First, the mold must be created. In our test we used hot glue. It is important to stick the finger in the glue when it is still liquid but not too hot. It is a good idea to moisten the finger beforehand. After the mold is ready and cooled down, some liquid gelatine is poured on it. To get the best result, it is advised to use gelatine sheets mixed in hot water. Boiling should be avoided to reduce the amount of bubbles. After the gelatine is congealed (to speed up the process, the mold with the gelatine on it, can be cooled down in a refrigerator), the fake finger is ready to be used. Same rules apply here as it did with the gummy bear; the right amount of pressure must be found. This method was proven to be successful and thus security was compromised. After several tryouts and many trial-error experiments a suitable way to manufacture a usable mold was found. As a result, we were able to create a fake finger that was used to fool the scanner. The result is not a hundred percent proof solution as only few times out of hundred ended up in a successful detection of the finger. With this success rate it is not easy to go and break into someone's computer, because after a few failed detections the scanner locks the smart card and PUK-code is needed to unlock the card. This method is not very usable for real life situations, as it needs a live finger for the mold creation. Though this method is further developed in the next method and thus brought into more usable form. Yet, it shows that a fingerprint scanner can be fooled with a pretty simple scheme and a very low Method 3: Creating a mold using a latent fingerprint The most usable and also the most probable form of attacking a fingerprint scanner is by using a real fingerprint left by the legitimate user. Now that security of the scanner has been compromised, it is time to try preparing the mold without any help from the target. Typically we leave fingerprints anywhere we touch, mugs, door handles, stair rails and of course keyboards. These latent prints can be brought visible and then used to make a mold and a fake finger. The creation of the mold is different than in the previous attack, but the usage of the finger follows the same path. Fingerprints consist mainly of grease and are usually latent but with e.g. photocopier powder they can be made visible. With a digital camera a visible fingerprint can be ported to a computer and retouched to a suitable form. Using a technique that is widely used with do-it-yourself circuit boards, a negative image of this fingerprint is printed on a transparency. A photosensitive layer of lacquer is applied to a copper plated circuit board and transparency is placed over that. When UV-light hits the surface, the black-printed areas of the transparency protect the lacquer and the rest react with the light. After a few minutes the lacquer is washed off with a lye dilution and a fingerprint should be visible on the circuit board. Now this board is corroded with ferric chloride and the result is a flat mold of the fingerprint. Gelatine liquid can be poured on to the mold as a thin layer and after congealing we have a fake finger. This finger is used between an intruder's finger and a fingerprint scanner. A fake finger is placed between the pad and a human finger in order to fool the scanner. Compared to method 2 where a live finger was used to create a mold, this approach is very different. A latent fingerprint is used and the procedure is divided into five sections, obtaining fingerprint, making the transparency, creation of the mold, creation of the finger and using the finger. First, a clear and flawless picture of the target's fingerprint must be obtained. The fingerprint must of course match the finger that is enrolled to the smart card. When a suitable print is found a good way is to use photocopier powder to dust the print visible and then use a digital camera to take a snapshot of it. It is important to make some measurements to get the scale of the print correct, i.e. measure the distance between two characteristic points. Making of transparency step-by-step: 1. Use image manipulation program to edit the fingerprint image. 2. Clear out the excess dust from the sides of the print. 3. Adjust contrast so that the print has a clear pattern. 4. Scale the image according to the measurements done on the actual dusted fingerprint. 5. Invert the image to negative. 6. Print the image on the transparency. The making of the mold step-by-step: 1. Spray the photosensitive lacquer on the circuit board and let it dry for a while. 2. Place the transparency on the circuit board with tape. 3. Expose the board through transparency with UV-light for 5-15 minutes. 4. Take off the transparency 5. Develop the lacquer using NaOH-solution. Use watercolor brush to brush the lacquer. Be careful not to rub off all the lacquer. 6. When you see the fingerprint, wash the board with water. 7. Corrode the board using FeCl3-solution. 8. Once the copper is corroded off, wash the board thoroughly with water. 9. Use soap or alcohol to rinse any remaining lacquer off the board. The creation of the finger: 1. Soften 40g of gelatine sheets in cold water for about 5 minutes. 2. Heat up the water (1/2dl) to boiling and take the kettle off the stove. 3. Put the softened gelatine sheets into the hot water. Be careful not to boil them. 4. Stir for 10 minutes. 5. Let the mixture cool down a bit. You can try to reduce the amount of bubbles with a gentle 6. Pour some of the gelatine mixture on the mold so that it covers the print completely. About 2mm is a good layer thickness. 7. Put the mold in the refrigerator and let it congeal for at least 15 minutes. The longer the better, but keep the mold in a humid place or the gelatine will dry up. 8. After the gelatine has congealed you can separate it from the mold. Using a knife peel off a bit from the corner and then slowly lift the rest of the finger. 9. The finger should now have a distinctive fingerprint. 10. You can handle the finger in room temperature but be careful not to warm it too much as it will start to melt again. The usage of the finger: 1. You should now have a gelatine finger that feels like a soft real finger. 2. Ensure the smart card is inserted into the reader. 3. Wait for the login screen to prompt for the finger. 4. Place the gelatine finger on the tip of your finger. 5. Gently press the gelatine finger on the scanner. 6. If you press too hard you will get "Finger is too wet" error. Too light and the "finger" wont be detected. 7. If you continually get "Finger detection failed!" then it is advised to stop trying after about 5-10 tryouts or you will get the smart card locked and thus increase the risk of getting caught. Try again after the legitimate user has successfully logged on one time. This will reset the fault counter. This technique was proven to be successful and security was compromised although the success rate was not that high. Only a few out of a hundred
1.605353
Zyphra/Zyda-2
S21 and the Killing Fields Trigger Warning: The following post discusses the violence perpetrated by the Khmer Rouge in Cambodia. Some pictures are included at the end of the post. I can't remember when I first learned of the Khmer Rouge. I do remember several people telling me that I had to visit the genocide museum and the killing fields when I got to Cambodia. One guy suggested that visit the museum first to better understand the killing fields. I followed his advice. Mixed into the capital city of Phnom Penh is what is now the Tuol Sleng Genocide Museum, also called S21. The site was originally a school until the Khmer Rouge turned it into one of their prisons in an effort to cleanse and rebuild Cambodia. All intellectuals and professionals were arrested. Even people with glasses were arrested. People who were suspected of not being loyal to the leader of the Khmer Rouge, Pol Pot, were arrested. Anyone and everyone was at risk of being arrested. They were then interrogated and tortured. It was suspected that the prisoners had ties to, or were assisting, the CIA or the KGB. After it was determined that they had no more useful information, they were killed. At the museum, there are artifacts from when the facility was used as a prison. Some metal beds still have the shackles used to restrain prisoners. Next to the bed is a munitions box that was given to be used as a toilet. There are also pictures in some of the rooms from when they discovered the prison. They are pretty graphic. At some buildings, they put up barbed wire fencing to prevent prisoners from jumping to commit suicide. The regime wanted to maintain total control. They also had the practice of killing entire families, including children. The rationale was that they didn't want anyone from that family to come back seeking revenge. When S21 ran out of space to bury prisoners, they began taking prisoners outside of the city to kill them and bury them in mass graves. Because bullets were so expensive, they stopped using them and killed with whatever tools they had. Executions were conducted on the edge of the mass grave so that the prisoner could fall in. The regime sprayed toxic chemicals on the recently deceased to mask the smell and to kill anyone who wasn't dead yet. There's a tree close to the centre of the killing fields known as the killing tree. It was used to smash babies until they died. Although the regime was ousted in 1979, there are still bones and bone fragments being unearthed due to rain and shifting soil. At both sites, they have some of the skulls of the deceased on display. Some have cracks or bullet holes. Some are missing portions. They also have various torture devices on display at the genocide museum. They are both really somber places. One point that stuck with me is that Cambodia lost about a quarter of its population during the Khmer Rouge regime. From eight million people, that's two million gone. And it's not ancient history. This was 40 years ago. That's extremely sobering. Another fact that blew my mind: S21 and the killing fields are part of a much larger network. In other words, there were prisons all over Cambodia and there still are mass grave sites all over the country. Not all of the mass graves have been uncovered because of unknown locations or inaccessibility. If you ever have the opportunity to go to these sites, definitely go (if it's line with being kind to yourself). Here are some pictures from both sites. The munitions box. To be used by the prisoners as a toilet. One of the remaining headstones from the cemetery before it became the killing fields. The killing tree. There's a mass grave to the right of the tree. One of the skulls on display at S21. Be kind to yourself.
1.249017
Zyphra/Zyda-2
other. Vespasian was elevated to the throne, and his son, Titus, was left to continue the conquest. The siege began in the year 70 A.D. Soon famine prevailed. Citizens who ventured outside the walls to search for roots to eat, if seized, were crucified by the Roman soldiers. Sometimes hundreds in that awful position could be seen from the walls. A trench was dug around the City, in order to make its isolation complete. Prisoners of war were cut open, while alive, to enable soldiers to search their bodies for gold which they might have swallowed. Six hundred thousand persons died within the walls, and the dead bodies, too numerous to be buried, were left in the houses. The Zealots, a fanatical sect whose members maintained that God would save them at the last moment, went about murdering and urging the people to resistance. Even Titus was sick at heart at the daily horrors he witnessed or heard of. At length the temple became a fort. Titus attacked it as such. A Roman soldier, contrary to order, set fire to it. After a while the scene was one of carnage and plunder. Six thousand Jews perished in the flames. In this awful war more than a million and a half of the Jews perished, and many were sold into slavery, and thus 'scattered among all nations.'" (Smith and Sjodahl, Commentary, pp. 260–61.) The Savior spoke the words of the Olivet Discourse during the last week of His life, in A.D. 33. Jerusalem fell in A.D. 70. His promise "that this generation of Jews shall not pass away until every desolation … shall come to pass" (D&C 45:21) was fulfilled. Some of the disciples who heard Jesus speak those words were still alive when the legions of Titus put the temple to the torch. D&C 45:22. Is the World Going to Come to an End at Christ's Second Coming? Elder Bruce R. McConkie explained the special way this phrase is used in the scriptures: "The end of the world is the end of unrighteousness or of worldliness as we know it, and this will be brought about by 'the destruction of the wicked.' ([JS—M] 1:4.) When our world ends and the millennial era begins, there will be a new heaven and a new earth. (Isa. 65:17–25; D. & C. 101:23–24.) Lust, carnality, and sensuousness of every sort will cease, for it will be the end of the world." (Mormon Doctrine, p. 848.) D&C 45:24–30. What Are the "Times of the Gentiles" and When Are They Fulfilled? President Joseph Fielding Smith explained that "the times of the Gentiles commenced shortly after the death of our Redeemer. The Jews soon rejected the Gospel and it was then taken to the Gentiles. The times of the Gentiles have continued from that time until now. The Lord said: 'But many that are first shall be last; and the last shall be first.' In that day the Gospel was given first to the Jews and then taken to the Gentiles. In this dispensation it was taken first to the Gentiles and afterwards it will go to the Jews." (Church History and Modern Revelation, 1:196.) The times of the Gentiles began with Peter's vision and the baptism of Cornelius (see Acts 10). Paul and the other Apostles then began the great missionary work to the Gentiles, since the Jewish nation, for the most part, had rejected Jesus. As President Smith indicated, the times that the major gospel effort would be with gentile nations continued with the Restoration. The times of the Gentiles will be over, or fulfilled, when the major efforts of gospel teaching begin to focus on the house of Israel: the Lamanites, the Jews, and the ten tribes. In the Olivet Discourse, the Savior gave four signs to indicate when the times of the Gentiles were over. Three are given in section 45, and one is given in Luke's account of the great discourse. The Jews will be gathered back to the land of Jerusalem (see D&C 45:25). In the April 1960 general conference, Elder George Q. Morris of the Quorum of the Twelve discussed this sign: "I think perhaps we may well now not continue saying the Jews are going to gather in Jerusalem. I think now we may well say they have gathered. The ultimate returns will come later as they develop this land and are joined by others. … "This statement by a writer is very interesting: "'Strangely enough when the State of Israel was reborn in 1948, it was a nation of 600,000, the same number which the Bible reports that Moses led out of bondage in Egypt. It now numbers some two million, the same number which it is said populated the ancient Kingdom of Solomon, when Israel was in all its glory.' "That is why we may now say that the Jews have returned to Palestine." (In Conference Report, Apr. 1960, pp. 100–101.) It will be in a time of great social turmoil (see D&C 45:26–27). One need only follow current events as reported in the news media for a day or two to see turmoil like the Savior described. The Gentiles will for the most part reject the gospel (see D&C 45:28–30). President Joseph Fielding Smith, writing about these verses, said: "'And when the times of the Gentiles is come in, a light shall break forth among them that sit in darkness, and it shall be the fulness of my Gospel,' the Lord said in this revelation [D&C 45:28]. The meaning is that when the time had come for the restoration of the Gospel—in the times of the Gentiles—that it would not be perceived because the hearts of the people are turned away by the precepts of men. However, in that generation this should happen, the times of the Gentiles should be fulfilled." (Church History and Modern Revelation, 1:196.) Jerusalem will no longer be "trodden down of the Gentiles" (Luke 21:24). Again President Smith explained: "When we consider the words of the Savior to his disciples, that the Jews should be scattered and 'Jerusalem shall be trodden down of the Gentiles until the times of the Gentiles are fulfilled,' we have a fair understanding of the meaning of this … verse [D&C 45:30] in this revelation. Jerusalem was trodden down of the Gentiles from the day of its destruction until the close of the year 1917, when it was freed from Turkish rule by General Edmund H. Allenby of the British forces. After the war Palestine became a British mandate, and Great Britain by proclamation declared that country to be a refuge for the Jews, who were invited to return. … It is very significant, however, that Jerusalem is no longer trodden down by the Gentiles and the Jews are again gathering there. This is the sign given by our Lord, for the end of the times of the Gentiles. We are now in the transition period and shortly the day of the Jew will dawn and the Gospel will be taken to them and to the remnants on this land." (Church History and Modern Revelation, 1:196–97.) When Joseph Fielding Smith wrote those words in 1947, Israel had not yet been made a state; they were still under the British mandate. But on 15 May 1948, Israel became an independent nation and declared Jerusalem to be her capital. In the war that followed this declaration, the Jews could maintain control of western Jerusalem only. East Jerusalem became part of the state of Jordan. In general conference in 1966, Elder Smith, now President of the Quorum of the Twelve, said: "Jesus said the Jews would be scattered among all nations and Jerusalem would be trodden down by the Gentiles until the times of the Gentiles were fulfilled. (Luke 21:24.) The prophecy in Section 45, verses 24–29, of the Doctrine and Covenants regarding the Jews was literally fulfilled. Jerusalem, which was trodden down by the Gentiles, is no longer trodden down but is made the home for the Jews. They are returning to Palestine, and by this we may know that the times of the Gentiles are near their close." (In Conference Report, Apr. 1966, p. 13.) During the Six-Day War of 1967, Israel conquered the West Bank, including Jerusalem, and for the first time since the city fell to the legions of Titus in A.D. 70, Jerusalem came completely under the control of a Jewish government. D&C 45:26. Men's Hearts Shall Fail Them President Ezra Taft Benson noted: "We live in an age when, as the Lord foretold, men's hearts are failing them, not only physically but in spirit. (See D&C 45:26.) Many are giving up heart for the battle of life. Suicide ranks as a major cause of the deaths to college students. As the showdown between good and evil approaches with its accompanying trials and tribulations, Satan is increasingly striving to overcome the Saints with despair, discouragement, despondency, and depression. "Yet, of all people, we as Latter-day Saints should be the most optimistic and the least pessimistic. For while we know that 'peace shall be taken from the
1.236309
HuggingFaceFW/fineweb-edu
Universities' efforts to "decolonize" their curricula aren't about increasing the representation of minorities, but rather enforcing a radical leftist "party line." So says University of Nottingham doctoral researcher Sumantra Maitra in an April 9 National Review piece which delves into the efforts of Marxist "post-colonial" professor Priyamvada Gopal, the Cambridge University Students' Union, and others to decolonize some 30 departments at the UK institution. After all, they're "too dominated by white, male, Euro-centric perspectives." The genesis of these campaigns, Maitra says, is the Oxford University "Rhodes Must Fall" enterprise led, ironically, by a Rhodes scholar. Aside from infesting Cambridge in the UK, the movement has spread to the US, particularly at elite schools. At Yale for instance, the English department created a new course in response to a "decolonize" petition" which "increase[s] the breadth of the curriculum and combat claims of departmental racism." Across the country, the goal of Stanford's Student Alliance for Justice in Education is "disrupting the dominance of Western schools of knowledge." Even courses about sustenance aren't immune; Cal State Fullerton's "The Social Life of Food" requires enrollees to "write a recipe that is decolonized." It is easy to ignore these slow and persistent attempts to change the education system from within, but it's also a mistake. As Michael Shermer noted in the Scientific American, there's a broader subversive aim being served here. Most of these incidents are essentially a type of power grab by one set of ideological, left-wing academics who use gullible students as pawns in their broader war against the Western canon and rational inquiry. The protest against Charles Murray in the United States was led by such academics, as were a host of other similar disgraces, very much including the the decolonize movement at Cambridge. Consider Dr. Gopal's suggestions of black and minority writers to counter the "whitewashing" of English literature in the university's curriculum, which include five authors, all of them radical leftists and feminists. Surely, if Gopal and her student charges just wanted more minority representation in the curriculum, they'd include some conservative authors as well? Why not the philosophy of Thomas Sowell, who has questioned the madness of cultural relativism? Why not Zambian economist Dambisa Moyo's phenomenal work on how foreign monetary aid is destroying Africa? Why not Churchill's favorite Indian conservative "man of letters," Nirad C. Chaudhuri, who dedicated a now-legendary book that was banned in early 1950s socialist India "to the memory of the British Empire in India, which conferred subjecthood upon us, but withheld citizenship.... all that was good and living within us was made, shaped and quickened by the same British rule"?
1.490998
openbmb/Ultra-FineWeb
Endocrine System Natural Health Remedies & The Endocrine System | Health Topic In many ways, the endocrine system can be viewed as a partner, or complement, to the nervous system. Whereas the nervous system uses nerve impulses that last milliseconds to control short term events in the body, the endocrine system uses hormones that can sometimes take minutes, hours, or even days to take effect and control events. And sometimes those effects can last a lifetime. As an endocrine organ, the pancreas produces two sugar-regulating hormones: insulin and glucagon. After reviewing the functions of insulin and glucagon and the four cell types that comprise the endocrine pancreas, you can then examine in detail the main disease associated with the pancreas, diabetes mellitus. Once you understand how important the endocrine system is in controlling every aspect of your life, from your moods to your sexuality to your energy levels to your ability to grow and be strong, you realize how important it is to keep it optimized. And yes, there are things you can do to keep it optimized. Enjoy Jon Barron's health newsletter series covering the entire Endocrine System: Related topics covering the Endocrine System: You can find a wealth of supportive information by visiting our Enzymes and our Hormones health topics pages!
1.589633
Zyphra/Zyda-2
3 Things I learnt: - I found the statistics of both "children with disabilities" and "typical children's" grades were raised in inclusive classrooms. - I found what Kelsey shared about talking with people with disabilities helpful and interesting, not everyone is as sensitive as you may think (when saying normal phrasing isn't offensive although it may seem like it). - I know what Dragon speak is but never realized the troubles that one may have when using it. 2 Connections I made: - when I was working at a daycare for many years I worked one on one with a little girl with a disability and unfortunately left for awhile then came back. It was truly remarkable the difference between the children who grew up with her and the children who were just getting to know her. The children who grew up with her had an appreciation and an understanding and patience with her and other kids who were struggling. - I think it is very interesting when people use theater to help children with disabilities whether they are physical or emotional or social, the experience that these children have when experiencing something so wonderful is inspirational. 1 Question that still remains (or two questions for lecture this week) - How can we get parents to help support their children better? I have worked with children with diverse abilities throughout the years and have seen the difference of children's development when having supportive parents and parents that just get through each day. - How can we normalize diversity when we still have parents who are unaware, or not understanding? What do you think shapes a person's identity and how does their identity play a role in their education? I think parents truly shape their children's identity, and who they are. When children are encouraged by their parents to be the bets that they can be or to overcome obstacles in their daily lives then the children will succeed or at least try their damnedest. Children's identity is who they are and their role in education is just a part of who they are – identity is everything when it comes to life's events and education is a major life event. Why do you think people with disabilities are often identified by their differences and not their capabilities or character traits? I think people with disabilities are identified by their differences because that is what they see first, before anything else. Many people don't take the time to understand or get to know a person with a disability. It is only when people get to know a person with a disability do they get to see and learn that person's capabilities and who they are. There is sooo much that I want to say or comment on but I will stick with the good ol' format. 3 things I learnt: - That children were legit stolen from communities and taken to residential schools, that parents didn't even know that their children were taken. - Families were prevented by law from fighting for their children, and trying to stop their children from going to residential schools. - During the 60s scoop there was 20 000-50 000 children taken… what exactly was the 60s scoop? 2 connections I made: - Currently I am studying for a project the missing and murdered indigenous women of Canada, and there is a stretch of highway where more often then not women are taken from that is called "The highway of tears" I found it ironic that the trains that were used to take the children were referred to as "The trains of tears". - Tash Hubbard not being able to teach her son Cree, something that he wished soo much to be able to learn from his mother – the controversy of Indigenous Language becoming a necessity of Saskatchewan schools… What decides this change? 1 Question that still remains: Although I have many questions to ask I feel like the most important is: How can we teach without being assimilative, how can we help children hold on to their culture? Three things I learnt: - In most schools, we, at least. tell students that it is not acceptable to make sexist or racist comments, even if we do not always follow through or "walk the taIk." Yet, when it comes to gay. lesbian, and bisexual issues we hold back in fear. By allowing. anti-gay harassment to be voiced without reprimand, schools are sanctioning and even encouraging bigotry. As a teacher who bas taught to junior and senior high school students. a teacher educator. and someone who actively works towards the inclusion of difference and against oppression in all of its forms. students have made the importance of teaching students and their teachers about the wide spectrum of sexualities abundantly clear to me. Otherwise, we consign gay, lesbian. and bisexual teens to be forever at the "bottom of the pile." In doing so, we give all students the message that "the homosexual" is Other: to be feared. odd. fundamentally different. This act of Othering causes many gay, lesbian, and bisexual young people to feel that their sexuality makes them essentially unlike. separate. and forever outside the culture of their peers. Among other consequences, Othering causes isolation and depression, which in tum can lead to suicide (Loutzenheiser, 193). - They [homosexual teens] are three to five times more likely to attempt suicide than their heterosexual peers and an: more likely to succeed when they do (Loutzenheiser, 193) - "Queer as a term, as opposed to gay, lesbian, or bisexual, purposefully disrupts the notion that identity is fixed or immutable. It includes the desire to highlight the existence of, and interrupt silent assumptions about heterosexuality as normal, and homosexuality as Other. In the classroom and in schools, this form of 'ultimate' naming around which individuals are organize and ostracized, too often results in groups of students being viewed as universalized singular 'others'. (Loutzenheiser, 124). Two connections I made: - When growing up I don't remember playing any "gay" hating games outside at recess, there are no talk about being queer or anything. It was like the unspoken secret, we even had a classmate in our class who we often "wondered" about but he never admitted anything and even sometimes got a girlfriend or two. However, as we got older I remember my classmates becoming homophobic to the extreme, on our grade twelve camping trip there was a gentleman at the bar who was outright and openly gay and found out that the boys from my class were disgusted, so he did everything in his power to make them feel more uncomfortable… (good for him those boys needed something because they were being jerks). Although to this day I still believe those boys are homophobic I would like to think some of them may have grown up. As for the boy we "wondered" about, once he got out of the stereotypical small-town Sask. And away from the homophobic classmates he is "out" and proud because he finally found people to accept him. - Back home there are a group of people from the church who give the school backlash whenever "queer" teaching comes up they believe that it is evil and that their children will go to hell if they learn about it etc etc. One Question that still remains: - How do we make all students feel welcomed and accepted, and how do we consider everyone's beliefs and feelings and also provide appropriate education to all students? Boy, oh boy was I so wrongly mistaken I never once faced "hoodlums", "gangsters", or "dangerous beings" I however DID face wanna be tough guys, wanna find a better life kids. Once again, I came to the realization that yes, these kids have walked down the wrong path, that yes they have made wrong choices in life but they now are trying to get on the right path, that they are making the right choice. However, on my final evening at this wonderful organization I was faced with these boys that wanted to be so tough and wanted to come off as these brave souls that so what if they did some time a dojack, but what I saw were these boys that had huge hearts, that sure they wanted to intimidate you, but they didn't. I believe they just wanted someone to be there for them at the end of the day, that maybe they couldn't be so strong everyday and that once they wanted someone to be there and support them. Or these boys who had relationships of gold with some of the teen youths that were there for each other and helping each other get on the right path, they were there together as a team facing this world with the help of the organization. That at the end of each day they truly are grateful for the opportunity that they were given to get their lives back on the right path. Throughout this experience I not once was faced with a hard faced youth that was unhappy or ashamed, I was faced with lost youths that just needed help to find their place in this world. Three Things I Learnt: "Who determines what work is done, when, and where and how in schools? In fact, authority over schools officially rests with provincial governments and school boards." (183( I knew that the government and school boards laid out what was required to be taught but I always though that schools determined their values and beliefs towards teaching, and what teacher styles were encouraged. "In these ways, the school is a bureaucratic, hierarchical workplace, often compared to a factory model of organization. The term 'bureaucratic' derives from the work of sociologist Max Weber, and refers to a hierarchical organization that is governed by rules, staffed by people with expertise and operated on the basis of standard procedures and practices" (183) I have always thought that the beauty of teaching was that every teacher taught in their own way, managed their classes their own way and the only person they only have to report to is the administrator when they do observations. "Teaching still remains largely an isolated job… This is true not
1.925484
openbmb/Ultra-FineWeb
dently, without need for conscious input, coordinating with all the other systems in the body (nervous, respiratory, etc.). The same can be said of when the skin is cut and the subsequent organ system interaction that takes place during the average two weeks during which the wound heals. Another example would be, after head and neck alignment is restored, how quickly the compensations used to level the head when out of alignment with the upper neck release as the body structurally reorganizes back into balance. Collectively, the time has come to rebuild supreme confi dence that the "doctor inside" knows what it is doing, to honor that intelligence and tap further into the ability for it to be expressed. Children often do not appreciate their parents for what they provided until they have grown up. Kids, especially younger ones, do not typically think about food being on the table or the clothes available for them to wear or the roof over their heads. To them, those things are there because that is just how it is. It is one of the ways that trust is formed. Why does that dynamic largely disappear when the conversation shifts to health and the human body, which in similar fashion is given gifts far above and beyond human comprehension? A person can consciously choose to hold their breath until the point of losing consciousness, then the innate intelligence within the body immediately takes over and restarts breathing. The educated mind is a variable, easily infl uenced, and weakened by age or injury. Why trust the inherently limited at the expense of the borderline[ii] limitless that directs life as we know it down to the smallest detail? Imagine instantly knowing without any training how to fi ght fi re when the crockpot shorting sends the kitchen curtains ablaze[iii] or how to correct a brainstem subluxation when the top bone in the neck gets locked in a position that adversely affects the most vital organ or how to write a best-selling novel as soon as an interesting idea strikes or how to reinfl ate a lung when it unexpectedly collapses. Imagine that knowledge was pre-programmed, there from the outset for whenever needed as if it was standard fare. Since that degree of intelligence – the "doctor inside" – is exactly the sort innate to the human body and all its infi nite standardized functions, now imagine a system built around a defi nition for health like this one: an optimized state in which the numerous organ systems in the body work harmoniously together at a level conducive to sustaining an innate adaptability capable of preventing sickness and overcoming the causes of various symptoms. That would not only fi x the cracked foundation of healthcare, but potentially change the world. [i] Reggie Gold, DC's The Triune of Life [ii] To be further discussed in Part 3 [iii] I'm missing it too, This Is Us fans Written by Chad McIntyre, DC of the Triad Upper Cervical Clinic, 432A West Mountain Street, Kernersville. For an appointment, call _PHONE_ or visit for more information. See ad on page 7. ov - ing T erapeutic Quality Essential Oils & Products Off ering: Retail & Wholesale Consultations Custom Blends Private Labeling Lectures & Classes 1024 W. Gate City Blvd. • Greensboro, NC 27403 _PHONE_ NOVEMBER 2020
1.806662
Zyphra/Zyda-2
Science, Technology, Engineering, and Math "NASA has the answers to your questions about airplanes, astronauts, rockets, planets and more!" Socratica Kids explains how different kinds of trees grow from seeds to skyscrapers in this short video. "Sarah Foster starts program to help young girls gain an appreciation for science, technology, engineering and math." "Scientists have been observing Earth for a long time. They use NASA satellites and other instruments to collect many types of information about Earth's land, atmosphere, ocean and ice. This information tells us that Earth's climate is getting warmer." "Can you skewer a balloon without popping it? Coat a nail in copper? What happens when you plug a clock into a potato?Dyson engineers have designed these challenges specifically for children. Ideal for home or in the classroom, they encourage inquisitive young minds to get excited about engineering." "Watch [this] webinar to discover how to introduce STEM to your child in an engaging and developmentally appropriate way that also builds a foundation for future learning." This short video tells the story of Katherine Johnson, one of NASA's human "computers" in the early days of space exploration, "who calculated the flight path for America's first crewed space mission and moon landing." Even though girls are "interested in STEM subjects around age 11, their interests waned around age 15. As teachers, how can we bridge this gap?" This website directed at girls interested in learning about STEM.
2.495096
Zyphra/Zyda-2
Braces for Teens and Kids Children and teenagers are constantly growing and changing, and that includes their teeth and jaws. Growth continues until their late teens. During these important ages of growth, it's an ideal time to consider the alignment and placement of their teeth and jaws. Correcting issues such as incorrect bites, misaligned teeth, and associated oral health can make a big difference in their adult lives ahead. At Laprade Orthodontics in Pawtucket and Lincoln, Dr. Laprade is ready to help young people with orthodontics before their development is complete. What is early intervention? Childhood and early adolescence bring many changes to the jaw as it develops. As the jaw and muscles grow together, sometimes problems occur such as an incorrect bite. Early intervention means evaluating your child's mouth, teeth and jaws to determine if treatment at a younger age might help avoid problems later. The American Academy of Orthodontics recommends children see an orthodontist by the age of 7. Issues like improper bite, protruding front teeth, or insufficient space in the mouth for teeth to erupt are the types of things Dr. Laprade looks for during an early intervention appointment. If problems are identified, a treatment plan will be recommended to improve the chances of your child having a beautiful smile in the future. What is the point before permanent teeth are in place? Even though baby teeth are likely still present in a child as young as 7, early intervention can provide a complete view of your child's oral condition. Dr. Laprade will be able to see what is happening in your child's mouth, even under the gums, providing valuable insights into what the future will bring as your child continues to grow. This allows preventive treatment to be advised as needed, often reducing the extent of future orthodontic treatment. How do braces help? Braces are a proven method for correcting teeth and bite misalignments. Treatment involves attaching brackets to teeth, as well as metal bands to back teeth. Then an archwire will be attached to the brackets using o-rings so that the wire can gradually guide teeth into better positions. Sometimes additional equipment may be helpful like rubber bands or springs to most effectively move the teeth and jaws into desired positions. What is the best age for braces? Depending on your child's condition, braces treatment often begins between the ages of 10 and 13. Waiting until these ages typically means that most baby teeth have been replaced by permanent teeth. However, since development varies from patient to patient, the exact age for most effective braces treatment will be determined by Dr. Laprade about your specific child. Do braces hurt? If your child or teen is concerned that braces will be painful, the truth is that there is a little discomfort as teeth move but typically only for a few days. Eating softer foods is often helpful as well as taking mild over the counter analgesics. However, the outcome is worth it! Advancements in technology have reduced the pain level. Dr. Laprade at Laprade Orthodontics is experienced in offering the best solutions for teens and kids as they pursue a better smile. Call today for an appointment. Laprade Orthodontics 123 School St Pawtucket, RI 02860 P. _PHONE_ Hours & Directions Laprade Orthodontics 6 Blackstone Valley Pl Lincoln, RI 02865 P. _PHONE_ Hours & Directions Website design for orthodontists – Copyright 2019
2.50538
Zyphra/Zyda-2
The Book Bus Victoria Falls Zambia Do you remember learning to read? Do you remember working out each word? It's an amazing feeling: being read to and then being able to read the words for yourself. The adventures you take, the power of understanding and the doors of perception that open. From Beatrix Potter to Harry Potter or Hello Magazine to Homer's Odyssey, all that we read shapes the person we become. Knowledge and education can keep us from harm and boost our chance of a healthy future. Or as Nelson Mandela put it: "Education is the most powerful weapon you can use to change the world" Education and learning to read is taken for granted here in the UK. In Zambia it's estimated that 800,000 children miss out on a basic education every day. Children spend the day collecting water, tending fields or even running the family home (1 in 6 children is orphaned). The long walk to school, combined with school fees (which are mandatory for all schools) prevented children from accessing a simple, basic education. The profound enthusiasm for education, coupled with the high number of children out of school, drove Zambian communities to develop their own schools, the so called "community schools". With scant resources and even less funding, open-air classes were established beneath trees, or in an old container or the village hall. A fairy tale in their own right, the dark reality of this story is that: - Teachers are paid very little – if anything at all; most have to work as volunteers - The schools lack the most basic resources such as books, paper, pencils etc - Many of the teachers are poorly trained (some not at all) - School facilities are poor (sanitation, classrooms etc.) Undaunted, communities are fighting hard to create the best schools they can with what little they have. The Book Bus - Improving children's lives one Book at a time The Book Bus aims to improve literacy in Malawi by engaging with children and their teachers to promote reading in a way that is creative, safe and above all, fun. Our "Book Bus" is a rugged go anywhere mobile library stocked with storybooks and materials and manned by a volunteer crew of story tellers. The legacy of each of our school visits is a reading corner and bookshelves stocked with children's books. There are many reasons why we chose Zambia as the pilot location for the Book Bus programme. Initially, at least, we are dependent on donated books written in English. Zambia has a rich linguistic heritage of over 70 indigenous languages; however English is understood by a large percentage of the population. Most aged 10 or over can read and write in English. We wanted to go somewhere where there was a clear need and the potential to make a difference. Zambia is one of the world's least developed countries. Four out of five people live on less than $1 a day – the World Bank's definition of poverty. According to UNAIDS/WHO estimates, Zambia ranks number seven in the international league table for HIV/AIDS: - One in six adults lives with HIV/AIDS - 130,000 children under 14 are infected with HIV - Life expectancy is just 40 years. In the UK it is 78 - Zambia has a very young population - nearly half are under 14 - At least one in seven children has lost one or both parents to AIDS1 This figure will continue to rise. AIDS has had a catastrophic effect on education. In 2001 a survey2 found that one third of younger children did not attend primary school. One in eight respondents said that a child in their own family did not attend school because a parent or guardian was suffering from AIDS or had died from AIDS. Many of the literacy programmes in Africa centre on education and self-help. Our focus will be on encouraging in young children a love and respect for books and a desire to read. The Book Bus is very much a joint British/Zambian project. There are several Zambian nationals in our team, including our driver, liaison officer and educational coordinator. We work closely with local writers, artists and musicians and we have close links with national and regional educational bodies. The Bus is staffed by up to 8 UK volunteers at any one time who pay to cover their subsistence costs. To keep us "mobile" and to hold costs down, volunteers camp at night under the African stars. Volunteers also help with camp chores and food preparation, which all helps to hold costs down. So how does The Book Bus work? The Book Bus is a specially adapted thirty year old London bus, fully equipped to serve as mobile library and classroom activity centre for community schools. It was shipped to Zambia in Winter 2008 to start its work. How we work The bus works in a region for between 6 and 12 weeks at a time. During this period, we work with up to five community schools. Each school has a designated "Book Bus Day". On this day we spend the day at the school and work around class timetables to provide, resources, energy, ideas and time to listen to children read. ur visit day, is often the only day when these schools will have access to books (Often you will see shelves of a school library left bare). The Book Bus provides additional manpower to allow small group reading mentoring. Working in small groups the volunteers will spend time with the children, encouraging them to read and develop literacy skills. Supplementary to this we encourage children to dramatise books they have read or even create a piece of art from it; the required resources are carried on the Bus. This helps increase their understanding of literature, boosts confidence and allows them to develop new skills and most of all – discover the pleasure of reading. Children are only part of our working relationship! Working closely with the teachers we share ideas and skills to help them develop after school book clubs with the books we loan. To ensure that the service delivered is as good as it can be, The Book Bus has a committed team of Trustees in the UK as well as support from the Ministry of Education Zambia, ZOCS (Zambian Open Community Schools), The British Council and QUESTT (Quality Education through Technology). The Book Bus The Book Bus provides a mobile children's library and book distribution service for communities in need in Zambia. Our aim is to share with children the pleasure and value that books can bring and to inspire them to want to read. We use art, music and play to stimulate children's imaginations. By encouraging them to associate books with enjoyment and creativity, we hope to sow the seeds of a life-long love of reading that will benefit both the children and their communities. About the Bus itself The Book Bus is a Leyland Tiger, built in Britain in 1980 for use as a public service vehicle. After Tom Maschler bought the bus in 2006, we took out most of the seats and replaced them with library shelves and storage space for the books that we distribute. We also had to make the bus "Africa-proof". This involved new electrical circuits, a heavy duty pump and generator, rough terrain tyres and a tropical engine cooling system. The most spectacular part of the refit was Quentin Blake's decoration of the bus. Quentin is one of Britain's best-loved children's artists and he and Tom Maschler have worked together for many years. Quentin is now a trustee of the Book Bus foundation. His eccentric illustrations are perfect for the Book Bus and are instantly recognisable. Even in the wilds of Zambia we are often approached by people who recognise his beautiful, quirky paintings of children, books and animals. The Book Bus Team The team travelling with the Book Bus includes the Book Bus Leader, a driver and up to eight 'crew members'. Occasionally we'll be joined by special guests, who might include local storytellers and artists, well known UK children's authors, or even a film crew! Team members sign up for anything from two weeks stay to two months. They often combine their time on the Book Bus with an African adventure holiday or a relaxing stay on the beach. What to expect - a week in the life of the Book Bus We spend each weekday at a different community school. Our programme of activities is led by the crew members and might include story-telling, one-to-one help with reading, music, arts and crafts, structured play, drama, puppet shows and sports. We also donate books and show the teachers how to set up and run a Reading Club. We revisit each school several times over the month to provide support and monitor their progress. The crew generally relaxes in the evenings. Sometimes we might host an open evening for the adults in the community to learn more about the Book Bus. Occasionally our hosts invite us to a local event. The weekends are your own - get away from it all, relax, or see something of Zambia's beautiful countryside. What makes a good crew member? Life on the road can be challenging – heat, unpaved roads, basic accommodation and 'roughing it' are facts of everyday life, especially away from the cities. So it's essential that as a crew member, you have a reasonable level of health and fitness. Equally important will be your desire to engage with children – previous experience of working with children is welcome but not necessary. Some measure of artistic and/or musical talent (or at least a willingness to have a go!) will stand you in good stead, and if you are shy in company, be prepared to shed at least some of your inhibitions! And finally our crew members all share a positive outlook, enjoyment at being part of a team and a real desire to make a difference. Everyone who joins us on the bus pays for their own flights and makes a donation. This covers food and board and helps with the expense of keeping the Book Bus
2.023639
HuggingFaceFW/fineweb-edu
television and yet at the same time completely different. It is a truly flexible way of delivering digital media content to audiences. 2.1.2 No More Downloads It is important to remember that digital media has been distributed for quite some time, both physically and electronically. In 1969, when CompuServe first started as an online community, digital media artifacts like text documents and later, digital images were already in circulation. Indeed, the act of sending some files on a floppy disk to a friend through the mail constituted a primitive form of digital media distribution. When the Compact Disk emerged in the early 1980s, it became possible to distribute larger amounts of digital media (music) relatively cheaply, albeit on physical media. Distribution of digital media is not new. The difference between those early digital media distribution methods and streaming is that in the past, it was an all or nothing event. You either had the digital media in its entirety, or else you had nothing. If you used a computer connected to a network service, like CompuServe, you had to download the entire file before you could do anything with it, such as view it or listen to it. For long songs, downloading could take quite a while, given the modem speeds that were once the norm, so if you didn't like what you were downloading, there was no way to tell, until you had downloaded all of it. Let's contrast downloading to streaming, by examining how the process of streaming actually works. Streaming is, in some senses, just a trick of the light. It's really simply downloading, while playing. The trick is to hide that fact from the end user. In so-called multi-threaded software, where the computer effectively appears to do two things at once, software engineers can make one part of a computer do the job of obtaining the digital media from a remote source, packet by packet, while another software task is simultaneously sending the data that has already been received to some form of digital to analogue converter, so that a human can view or listen to the media. So long as the software task that is getting the data from the remote source never gets caught holding nothing by the task that renders the data into user experience, the person experiencing the media cannot tell whether the entire digital media asset is in the computer, or just the parts of it that have been received so far. To guarantee that the data-gathering task is never caught by the data rendering task, the data gatherer usually starts some time before the data-rendering task begins to render the data already received. This time difference is called the buffering latency. It is the reason why when you click on a streaming media link on the web, for example, the streaming media player often tells you it is buffering. Another prerequisite for streaming is that the data-gathering task can provide the data to the data-rendering task at least as quickly as it can consume it. For stereo digital audio at CD quality, that means that the data must flow at a rate of 176,400 bytes per second (which is just under 1.4 Megabits per second). A modem is a device that connects a computer to a phone line, in order to transmit data using the telephone network. Most computers have a modem. At first glance, it would appear that you should not be able to get digital audio to stream at CD quality using a modem that can only deliver a maximum of 56 kilobits of information per second (such as popular modems can do today). There just isn't enough speed to deliver data at 1.4 Megabits per second, which the digital to analogue converters require in order to create CD quality audio for us to listen to. The answer lies in compression technology. The audio data is coded in such a way that it can be transmitted in a smaller amount of data, which can then be reconstructed at least approximately at the receiver, using the right recipe to decode the compressed data into its native raw format. A final prerequisite for streaming to continue un-interrupted is that the remote source of the data is capable of delivering the data to the data-gathering task at the same rate as it is consumed. Clearly, if the network connection between the data source and the data-gathering task is interrupted, the stream will be interrupted and the stream will stop. In this case, the end user of the media becomes painfully aware that the entire digital media asset is not present on his or her computer. If the user was listening to music, it will simply suddenly become silent. Streaming digital media, then, is akin to turning on any other utility, like water, gas or electricity. When you want it, you turn it on. No waiting. When you don't want any more, you can turn it off just as easily as turning it on. It can be metered by usage, or else made freely available on an "all you can use" payment plan. Unlike those utilities, however, today the provider pays, not the consumer. This is, of course, an oversimplification. The provider must pay for the capacity to serve streams to an intended audience, in both the cost of servers and the bandwidth to connect those servers to end-users. Advertisers sometimes subsidize these costs, provided they think they can reach an audience that will ultimately buy something from them. Finally, the consumer pays in terms of any connection charges and any on-line charges levied by their Internet Service Provider (ISP), not to mention the cost of buying a PC to receive streaming media in the first place. If streaming digital media becomes the commodity, which delivers our news, entertainment and information, will that model be sustainable or will it change? 2.1.3 Audio/Visual Web Stuff When most people think about streaming media, they think about audio and video delivered to the desktop of their personal computer. In fact, this kind of streaming media only came into existence after 1995, when companies like RealNetworks were started, to pioneer the creation, delivery and playback of rich media via the Internet. Web browsers have pieces of software, called streaming media players, which can be installed into them as plug-ins (or which are already built into them), that make it possible to play audio or video. To date, most of the players have been available for free, as a downloaded component. They use proprietary technology and there has been a great deal of effort expended by player vendors to make their particular player the de-facto standard. The data required by the streaming media player is delivered to the computer often using the very same transfer protocols as those that deliver ordinary web pages (i.e. HTTP). In fact, there are other protocols used for delivering streaming media, like RTP (Real Time Protocol) and RTSP (Real Time Streaming Protocol), which can allow a user to deliver streaming media with more control. The development of streaming media has been and will continue to be heavily influenced by the development of Internet protocols and companies that use the IP networks to deliver digital data. New traffic management, media synchronization and quality of service protocols will greatly enhance the end user's experience of streaming media. Today, a typical home computer with a 56k modem can receive quarter frame video at a frame rate of around 5 frames per second (this temporal resolution results in motion that looks jerky), with a picture size of 320 x 240 pixels (very poor spatial resolution, which makes the pictures look impressionistic, rather than crisp and clear). The same computer can render stereo audio in a quality that approximates FM radio reception (pretty good). If you have a computer connected to a corporate LAN, it is not uncommon to be able to stream video at 750 kilobits per second, giving full screen pictures at near DVD quality. Audio can be rendered at a quality that is indistinguishable from a compact disk. In the future, there is no technical barrier to receiving multiple simultaneous video images at better than High Definition Television quality, with full quality digital surround sound on each. Added to that could be synchronized text and graphics, perhaps even overlaid on the moving pictures. In fact, there is nothing about the look of television that cannot be emulated precisely, given sufficient bandwidth from the host to the player and sufficient processing power to allow television's visual gimmicks, like lower third straps, fades, alpha blends, page turns, fly-ins and other digital video effects to be rendered. Many of the latest streaming media players are offering some of those capabilities already. 2.1.4 Web Radio Many people have encountered streaming media as Internet radio. Audio is streamed constantly as a multicast stream to receivers, once again usually on a computer desktop. A multicast stream is a bit stream that is sent once, but which can be picked up by multiple computers at the same time. Unlike the bulk of the Internet's traffic, it isn't a point-to-point transfer between two parties. The important aspect of streaming web radio is that it can reach a global audience, for no more than the cost of reaching a local one. Suddenly a vast array of choice and specialized niche programming is available to anyone with the means to listen in. With sophisticated jukebox software and scheduling programs, it isn't even necessary for the broadcaster to have a disk jockey. Another thing that is easy to do with streaming media, but not so easy with broadcast radio, is the ability to host interactive play lists, where the listeners choose what gets played next. Unfortunately, the performing rights societies, such as the RIAA (Recording Industry Association of America) that police the playing of copyright material to public audiences have rules that restrict how often you can play a particular artist, whether or not you can play adjacent tracks by the same artist and so on. If an interactive radio station ignores these rules, they do so at some peril. If they abide by them, they limit choice and
1.79711
Zyphra/Zyda-2
Medical debt is usually wiped out in a Chapter 7 bankruptcy | Feb 5, 2015 | Personal Bankruptcy Some observers believe that medical debt is the biggest cause of bankruptcy filing in the country and in Arkansas. According to one national agency, there are some 43 million persons with unpaid medical debt on their credit reports. The probable reason that many with burdensome medical debt file bankruptcy is that it is fairly easy to discharge unsecured debt in a liquidation proceeding under Chapter 7. When life hits a brick wall where tens of thousands of dollars of medical debt are making life highly burdensome, the bankruptcy answer is quick, precise and effective. People with large medical bills cannot usually be criticized for indiscreet spending — they had no choice in the matter. That makes it easier for some people to make a decision to file a bankruptcy, eliminate the debt and move on with a fresh start. Those who are burdened with medical debt often have considerable credit card debt also. This may be due to using the cards to pay some of the medical bills. Credit card debt is usually also easily dischargeable in a Chapter 7 bankruptcy, because this kind of debt is also unsecured and has no collateral attached to it. Chapter 7 may make some people hesitant because it's called the liquidation chapter. Assets of the debtor are sold to pay toward the debt listed in the bankruptcy papers. However, with respect to average consumers, they usually lose no personal assets or belongings in a Chapter 7 due to the ample exemptions provided by state and/or federal law. Arkansas provides a system where one can choose the federal exemptions or the state exemptions. The federal exemptions are generally ample enough so that an individual or married couple are able to keep their important possessions, including cars, retirement plans, furnishings and the like. However, the situation is complicated enough that it is not recommended that a person tries to figure out how to maximize exemptions without professional bankruptcy counsel's guidance through the maze. Source:, "Why medical debt — and bankruptcy — are growing problems", Daniel A Austin, Jan. 28, 2015
1.093649
Zyphra/Zyda-2
A tracheostomy is a surgical procedure to create an opening through the neck into the trachea (windpipe). A tube is usually placed through this opening to provide an airway and to remove secretions from the lungs. This tube is called a tracheostomy tube or trach tube. General anesthesia is used. The neck is cleaned and draped. Surgical cuts are made to expose the tough cartilage rings that make up the outer wall of the trachea. The surgeon then creates an opening into the trachea and inserts a tracheostomy tube. Why the Procedure Is Performed: A tracheostomy may be done if you have: - A large object blocking the airway - An inherited abnormality of the larynx or trachea - Breathed in harmful material such as smoke, steam, or other toxic gases - Cancer of the neck, which can affect breathing - Breathed in harmful material such as smoke or steam Paralysis of the muscles that affect swallowing - Severe neck or mouth injuries - When you can't breathe on your own The risks for any anesthesia are: - Problems breathing - Reactions to medications The risks for any surgery are: Additional risks include: Erosion of the trachea (rare) - Nerve damage - Scar tissue in the trachea After the Procedure: If the tracheostomy is temporary, the tube will eventually be removed. Healing will occur quickly, leaving a minimal scar. Occasionally a stricture, or tightening, of the trachea may develop, which may affect breathing. If the tracheostomy tube is permanent, the hole remains open and may require surgical closure when no longer needed. Most patients require 1 to 3 days to adapt to breathing through a tracheostomy tube. It will take some time to learn how to communicate with others. Initially, it may be impossible for the patient to talk or make sounds. After training and practice, most patients can learn to talk with a tracheostomy tube. Patients or family members learn how to take care of the tracheostomy during the hospital stay. Home-care service may also be available. Normal lifestyles are encouraged and most activities can be resumed. When outside, a loose covering (a scarf or other protection) for the tracheostomy stoma (hole) is recommended. Patients must adhere to other safety precautions regarding exposure to water, aerosols, powder, or food particles as well. Goldenberg D, Bhatti N. Management of the impaired airway in the adult. In: Cummings CW, Flint PW, Haughey BH, et al, eds. Otolaryngology: Head & Neck Surgery. 4th ed. Philadelphia, Pa: Mosby Elsevier; 2005:chap 106. |Review Date: 1/16/2009| Reviewed By: A.D.A.M. Editorial Team: David Zieve, MD, MHA, and David R. Eltz. Jacob L. Heller, MD, Emergency Medicine, Virginia Mason Medical Center, Seattle, Washington, Clinic (1/16/2009). The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed medical professional should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. © 1997- A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited.
1.895439
HuggingFaceFW/fineweb-edu
until recently, everywhere present in Kosova. * * * With regard to the Turkish registers relative to Peja, the Albanian scholars content that, if the population of that city had been Slav, the numerous conversions at the very epoch when the patriarch was granted power by the Porte, would be unfounded and incomprehensible. These scholars regard the conversions as a clear indication that Peja's population was Albanian; they maintain, furthermore, that these conversions were, for their co-nationals, a means to keep their national identity.98 That the Albanians in Kosova are an aboriginal population is attested by the very Serbian Chrysobulls of the 13th and the 14th centuries. On the other hand, Turkish chroniclers mention Albanian uprisings in Kosova in the 15th century.99 The archives of Dubrovnik also testify for the same epoch. As for 17th century, important are, among others, the writings of the Turkish chronicle Evlija Celebi which clearly indicate that prior to the Austro-Turkish Wars the Albanian population was overwhelmingly present in Western Macedonia, in Montenegro and in the Vilayet of Kosova (E. Celebi, Putopis, Sarajevo, 1973, pp. 136-137). Mention should also be made, for the same epoch, of pastoral reports - that of the Papal Envoy, Pietro Massarechi (Mazreku, born in Prizren who succeeded M. Bizzi) dating from 1623 specifies that at that time, the population of Prizren was made up of 12 000 Moslem Albanians, 200 Catholic Albanians and 600 Serbs and that the population of Shkup (Skopje) was also mainly Albanian.100 Likewise, the Austrian documents pertaining to the Austro-Turkish Wars give evidence that the Austrian army was continuously in touch with an Albanian population. These documents refer to Prizren as the Capital of Albania and to Pjeter Bogdani, Archbishop od Shkup, as Archbishop of Albania.101 Various incidents linked to the Austro-Turkish Wars, as related by T. Ippen (in Novibazar und Kossovo,(das Alte Rascien) eine Studie, Vienna, 1892), who used Austrian War documents - as did J. Tomic - make it obvious that in Kosova the Austrian army had to deal with an Albanian population. The fact that Shkup (Skopje) had an Albanian Archbishop, implies that that city had an Albanian population. Also, it is well known that among those who followed the Austrian army was an Albanian tribe, the Kelmendi (Clementi), from the region of Ni, which suggests that the area was inhabited by Albanians. * * * The recent study of catastral registers has not only indicated that in the 15th century the Albanians were overwhelmingly present in Kosova and Western Macedonia; it has also shown that they were not merely shepherds, as they were often said to have been, but held all kind of positions and practiced professions which are not normally characteristic of a nomadic population. That study has also revealed that in contrast to the Albanians who were sedentary, the Serbs appear as a nomadic population.102 Objective research has therefore established that what has been called Old Serbia, a term suggesting Serbian tradition and permanence, is in reality a region inhabited ab antiquo by Albanians which was only for a period of time under Serb rule. * * * It is undeniable fact that until recently (but especially so during the Middle Ages) state and nationality seldom coincided. The desire to invade and conquer is, indeed, a characteristic of many peoples and races. England was invaded by the Normans and ruled by them; the Arabs held sway in Spain from 756 to 1492; Calais was for two centuries under the domination of the British; Poland stayed for a long time divided between Russia, Germany and Austria. Needless to say that many more examples may be cited. There are places that remained, in fact, for centuries under the nominal rule of various invaders, alien to the population inhabiting them. The South Slavs, who were themselves, as a race and as a nation, under the domination of Turkey, Hungary, and Austria, should be in a better position than most people to feel and admit that in the past state and nationality were very seldom identical and that the transient power over something does not give claim to a permanent possession. Indeed, temporary conquerors do not normally use the adjective "old" to describe territories which they once held under their sway. The French do not find it appropriate to call "Old France" territories once occupied by the short-lived Napoleon's Empire. Nor do the Turks name "Old Turkey" the Balkans where they ruled for over five centuries. The Bulgarians do not refer to Belgrade as "Old Bulgaria", despite the fact that that city belonged to them from the 9th century until the 11th; neither is this city called "Old Hungary" although Belgrade, which was Serbia's capital only briefly in the 12th century, fell under Hungarian control before being captured by the Turks in 1521. As for Ragusa, recently Dubrovnik, it was founded in the 7th century by the Romans and the Illyrians fleeing the incursions of the Slavs. Later, it fell under the rule of Byzantium, then under that of Venice, and finally of Hungary. The Turks held it from 1526 until 1806. Only since 1918 do the Slavs have control of it. * * * The term "Old Serbia", which, like all expression that are well chosen, has a tremendous suggestive power, was employed for the first time by Vuk Karadzic at the beginning of the 19th century. Yet Karadzic applied it practically to the whole Balkan peninsula. "Old Serbia" at that time was synonymous with what was also called "Great Serbia". But the chances to annex Bulgaria and Thessaly waned. The term was thus no longer applied to those regions and at present nobody considers these places any longer as "Old Serbia". Curiously on John Bugarsky's map, published in Belgrade in 1845, there is one area marked "Old Serbia or Present-day Albania". It is the region of Bielopolje separating Montenegro from Serbia - a clear indication that the term was used to designate various areas depending on the possibilities regarding territorial claims offered by political circumstances. Thus the limits traced by Prof. Cvijic for "Old Serbia" in 1909 differed considerably from those used by the same scholar in 1911. Since there was nobody to protect Albania's rights, the term was eventually used to designate merely the region that at present is identified with Kosova-Metohija (Kosmet). As for the Albanians, they call "Old Serbia", Serbia * * * According to Theodor Ippen, if the term "Old Serbia" should be used at all, it should apply solely to that district which is situated between Ibar and Sitnica, whose southern border is the river Lab, i.e., to the area once called "Old Rascia" (Rascia = Serbia) whose capital was Ras located north of present Novipazar. Ippen remarks that this region too used to be Albanian (even the name Ras, he points out, goes back to an Albanian etymology), but it was there that the Southern Slavs formed their first nucleus in the 12th century under Nemanjic; it should in no way be applied to the territory of Kossovo: The use of the expression 'Old Serbia' would be, if applied to a limited territory, after all justified, in as much as here (in Raka) the old Serbian state, which in its early stage may be identified with Rascia, originated. But he term 'Old Serbia' is used by chauvinistic Serbs to designate regions, such as Prizren, Gjakova, Ipek on the one hand and, on the other, Iskup, which geographically and ethnographically belong to Albania and Macedonia. 'Old Serbia' is therefore applied, for political purposes, to regions which ethnically speaking were never Serb (Ippen, op.cit., p.4).103 * * * In the sight of these facts, the Albanians maintain that the principle of history invoked by the Serbs in support to territorial claims, is not based on any solid facts. Serbian Churches in Kosova It is an undeniable fact that people feel the need to build whatever they establish themselves. It is therefore normal that when they move away, they leave monuments behind. Suffice it to mention in this regard the famous mosques of Spain where the Arabs ruled for more than seven centuries. Some nations inherit monuments found by them in conquered territories. Thus Istanbul contains, aside from Hagia Sophia, many other Byzantine churches. These Christian places of worship stand amidst a Mos
2.169094
HuggingFaceFW/fineweb-edu
End of preview. Expand in Data Studio

High Quality Text Dataset

A curated collection of English-language texts for AI training and research.

Sources

Each dataset was processed as follows:

  1. Split into approximately 2 000-token chunks using the LLaMA 3.1 tokenizer.
  2. Cleaned by normalizing spaces, punctuation, and characters, and replacing emails and phone numbers with placeholders.
  3. Scored using the agentlans/GIST-all-MiniLM-L6-v2-quality-v3 classifier:
    • Only chunks with a quality score greater than 1 were included.
  4. Removed exact duplicates.

After filtering, 100 000 chunks per source were included in the final dataset.

Clustering

Agglomerative clustering was applied using embeddings from the Snowflake/snowflake-arctic-embed-xs model at multiple cluster counts: 100, 200, 500, 1 000, 2 000, 5 000, 10 000, 20 000, 50 000, 100 000, and 200 000 clusters, enabling flexible dataset configurations.

Example Entry

{
  "text": "Dr. Louise Glew has been appointed the Global Lead Scientist for WWF's Global Science Team. Louise's research focuses on understanding the social and ecological impacts of conservation interventions [...]",
  "quality": 2.0699,
  "source": "openbmb/Ultra-FineWeb"
}

Limitations

  • Primarily focuses on academic, educational, and pedagogical content intended for a general audience.
  • May include outdated, unreliable, or controversial information (such as self-published material, pseudoscience, or conspiracy theories).
  • Quality scores evaluate syntax and tone, but do not guarantee factual accuracy.
  • Occasional repetition may occur (for example, dictionary entries or geographic distance calculations).
  • Entries might be interrupted mid-word or mid-sentence.

Licence

Provided under the Open Data Commons Attribution License (ODC-BY).

Downloads last month
71