text
stringlengths 25
13.4k
| quality
float64 1
2.58
| source
stringclasses 3
values |
---|---|---|
Out with the old batteries and in with the new lithium jelly batteries. Researchers at the University of Leeds have invented a jelly battery that is smaller, cheaper, lighter, safer and more powerful than current battery technology.
The one thing holding 4G-enabled smartphones and tablets back is battery power. Devices like the HTC Thunderbolt and EVO 4G are power sucking hogs that can't even make it through an entire day with requiring a spare battery, an external battery charging pack or toting around a USB cable.
These breakthrough lithium jelly batteries could change that. Lighter and more powerful than the rechargeable lithium batteries it's hoping to replace, the polymer gel batteries contain "about 70 percent liquid electrolyte" and can be molded into all sorts of strange shapes and sizes.
Safety's important too and the jelly battery has that covered as well.
"Safety is of paramount importance in lithium batteries. Conventional lithium batteries use electrolytes based on organic liquids; this is what you see burning in pictures of lithium batteries that catch fire. Replacing liquid electrolytes by a polymer or gel electrolyte should improve safety and lead to an all-solid-state cell," said Professor Peter Bruce from the University of St Andrews, who was not involved in the study.
According to the Leeds researchers, such a battery would even be cheaper, about 10 to 20 percent cheaper than batteries in today's gadgets. What's not to love?
With lithium jelly batteries, tomorrow's gadgets might only need one charge and truly last an entire day or even days. And because the batteries can be morphed into any shape and size, it wouldn't be difficult to imagine things like a tablet or smartphone that's not shaped like a rectangle.
| 1.463432 |
HuggingFaceFW/fineweb-edu
|
General Hospital.
Adapted tango dancing improves mobility and balance in older adults and additional populations with balance impairments. It is composed of very simple step elements. Adapted tango involves movement initiation and cessation, multi-directional perturbations, varied speeds and rhythms. Focus on foot placement, whole body coordination, and attention to partner, path of movement, and aesthetics likely underlie adapted tango's demonstrated efficacy for improving mobility and balance. In this paper, we describe the methodology to disseminate the adapted tango teaching methods to dance instructor trainees and to implement the adapted tango by the trainees in the community for older adults and individuals with Parkinson's Disease (PD). Efficacy in improving mobility (measured with the Timed Up and Go, Tandem stance, Berg Balance Scale, Gait Speed and 30 sec chair stand), safety and fidelity of the program is maximized through targeted instructor and volunteer training and a structured detailed syllabus outlining class practices and progression.
Behavior, Issue 94, Dance, tango, balance, pedagogy, dissemination, exercise, older adults, Parkinson's Disease, mobility impairments, falls
Automated, Quantitative Cognitive/Behavioral Screening of Mice: For Genetics, Pharmacology, Animal Cognition and Undergraduate Instruction
Institutions: Rutgers University, Koç University, New York University, Fairfield University.
We describe a high-throughput, high-volume, fully automated, live-in 24/7 behavioral testing system for assessing the effects of genetic and pharmacological manipulations on basic mechanisms of cognition and learning in mice. A standard polypropylene mouse housing tub is connected through an acrylic tube to a standard commercial mouse test box. The test box has 3 hoppers, 2 of which are connected to pellet feeders. All are internally illuminable with an LED and monitored for head entries by infrared (IR) beams. Mice live in the environment, which eliminates handling during screening. They obtain their food during two or more daily feeding periods by performing in operant (instrumental) and Pavlovian (classical) protocols, for which we have written protocol-control software and quasi-real-time data analysis and graphing software. The data analysis and graphing routines are written in a MATLAB-based language created to simplify greatly the analysis of large time-stamped behavioral and physiological event records and to preserve a full data trail from raw data through all intermediate analyses to the published graphs and statistics within a single data structure. The data-analysis code harvests the data several times a day and subjects it to statistical and graphical analyses, which are automatically stored in the "cloud" and on in-lab computers. Thus, the progress of individual mice is visualized and quantified daily. The data-analysis code talks to the protocol-control code, permitting the automated advance from protocol to protocol of individual subjects. The behavioral protocols implemented are matching, autoshaping, timed hopper-switching, risk assessment in timed hopper-switching, impulsivity measurement, and the circadian anticipation of food availability. Open-source protocol-control and data-analysis code makes the addition of new protocols simple. Eight test environments fit in a 48 in x 24 in x 78 in cabinet; two such cabinets (16 environments) may be controlled by one computer.
Behavior, Issue 84, genetics, cognitive mechanisms, behavioral screening, learning, memory, timing
Viability Assays for Cells in Culture
Institutions: Duquesne University.
Manual cell counts on a microscope are a sensitive means of assessing cellular viability but are time-consuming and therefore expensive. Computerized viability assays are expensive in terms of equipment but can be faster and more objective than manual cell counts. The present report describes the use of three such viability assays. Two of these assays are infrared and one is luminescent. Both infrared assays rely on a 16 bit Odyssey Imager. One infrared assay uses the DRAQ5 stain for nuclei combined with the Sapphire stain for cytosol and is visualized in the 700 nm channel. The other infrared assay, an In-Cell Western, uses antibodies against cytoskeletal proteins (α-tubulin or microtubule associated protein 2) and labels them in the 800 nm channel. The third viability assay is a commonly used luminescent assay for ATP, but we use a quarter of the recommended volume to save on cost. These measurements are all linear and correlate with the number of cells plated, but vary in sensitivity. All three assays circumvent time-consuming microscopy and sample the entire well, thereby reducing sampling error. Finally, all of the assays can easily be completed within one day of the end of the experiment, allowing greater numbers of experiments to be performed within short timeframes. However, they all rely on the assumption that cell numbers remain in proportion to signal strength after treatments, an assumption that is sometimes not met, especially for cellular ATP. Furthermore, if cells increase or decrease in size after treatment, this might affect signal strength without affecting cell number. We conclude that all viability assays, including manual counts, suffer from a number of caveats, but that computerized viability assays are well worth the initial investment. Using all three assays together yields a comprehensive view of cellular structure and function.
Cellular Biology, Issue 83, In-cell Western, DRAQ5, Sapphire, Cell Titer Glo, ATP, primary cortical neurons, toxicity, protection, N-acetyl cysteine, hormesis
Lesion Explorer: A Video-guided, Standardized Protocol for Accurate and Reliable MRI-derived Volumetrics in Alzheimer's Disease and Normal Elderly
Institutions: Sunnybrook Health Sciences Centre, University of Toronto.
Obtaining in vivo
human brain tissue volumetrics from MRI is often complicated by various technical and biological issues. These challenges are exacerbated when significant brain atrophy and age-related white matter changes (e.g.
Leukoaraiosis) are present. Lesion Explorer (LE) is an accurate and reliable neuroimaging pipeline specifically developed to address such issues commonly observed on MRI of Alzheimer's disease and normal elderly. The pipeline is a complex set of semi-automatic procedures which has been previously validated in a series of internal and external reliability tests1,2
. However, LE's accuracy and reliability is highly dependent on properly trained manual operators to execute commands, identify distinct anatomical landmarks, and manually edit/verify various computer-generated segmentation outputs.
LE can be divided into 3 main components, each requiring a set of commands and manual operations: 1) Brain-Sizer, 2) SABRE, and 3) Lesion-Seg. Brain-Sizer's manual operations involve editing of the automatic skull-stripped total intracranial vault (TIV) extraction mask, designation of ventricular cerebrospinal fluid (vCSF), and removal of subtentorial structures. The SABRE component requires checking of image alignment along the anterior and posterior commissure (ACPC) plane, and identification of several anatomical landmarks required for regional parcellation. Finally, the Lesion-Seg component involves manual checking of the automatic lesion segmentation of subcortical hyperintensities (SH) for false positive errors.
While on-site training of the LE pipeline is preferable, readily available visual teaching tools with interactive training images are a viable alternative. Developed to ensure a high degree of accuracy and reliability, the following is a step-by-step, video-guided, standardized protocol for LE's manual procedures.
Medicine, Issue 86, Brain, Vascular Diseases, Magnetic Resonance Imaging (MRI), Neuroimaging, Alzheimer Disease, Aging, Neuroanatomy, brain extraction, ventricles, white matter hyperintensities, cerebrovascular disease, Alzheimer disease
Computerized Dynamic Posturography for Postural Control Assessment in Patients with Intermittent Claudication
Institutions: University of Sydney, University of Hull, Hull and East Yorkshire Hospitals, Addenbrookes Hospital.
Computerized dynamic posturography with the EquiTest is an objective technique for measuring postural strategies under challenging static and dynamic conditions. As part of a diagnostic assessment, the early detection of postural deficits is important so that appropriate and targeted interventions can be prescribed. The Sensory Organization Test (SOT) on the EquiTest determines an individual's use of the sensory systems (somatosensory, visual, and vestibular) that are responsible for postural control. Somatosensory and visual input are altered by the calibrated sway-referenced support surface and visual surround, which move in the anterior-posterior direction in response to the individual's postural sway. This creates a conflicting sensory experience. The Motor Control Test (MCT) challenges postural control by creating unexpected postural disturbances in the form of backwards and forwards translations. The translations are graded in magnitude and the time to recover from the perturbation is computed.
Intermittent claudication, the most common symptom of peripheral arterial disease, is characterized by a cramping pain in the lower limbs and caused by muscle ischemia secondary to reduced blood flow to working muscles during physical exertion. Claudicants often display poor balance, making them susceptible to falls and activity avoidance. The Ankle Brachial Pressure Index (ABPI) is a noninvasive method for indicating the presence of peripheral arterial disease and intermittent claudication, a common symptom in the lower extremities. ABPI is measured as the highest systolic pressure from either the dorsalis pedis or posterior tibial artery divided by the highest brachial artery systolic pressure from either arm. This paper will focus on the use of computerized dynamic posturography in the assessment of balance in claudicants.
Medicine, Issue 82, Posture, Computerized dynamic posturography, Ankle brachial
| 1.546926 |
openbmb/Ultra-FineWeb
|
I've been of two minds with regards to the usefulness of the word technology. One of those two minds has been more or less persuaded that the term is of limited value and, worse still, that it is positively detrimental to our understanding of the reality it ostensibly labels. The most thorough case for this position is laid out in a 2010 article by the historian of technology Leo Marx, "Technology: The Emergence of a Hazardous Concept."
Marx worried that the term technology was "peculiarly susceptible to reification." The problem with reified phenomenon is that it acquires "a 'phantom-objectivity,' an autonomy that seems so strictly rational and all-embracing as to conceal every trace of its fundamental nature: the relation between people." This false aura of autonomy leads in turn to "hackneyed vignettes of technologically activated social change—pithy accounts of 'the direction technology is taking us' or 'changing our lives.'" According to Marx, such accounts are not only misleading, they are also irresponsible. By investing "technology" with causal power, they distract us from "the human (especially socioeconomic and political) relations responsible for precipitating this social upheaval." It is these relations, after all, that "largely determine who uses [technologies] and for what purposes." And, it is the human use of technology that makes all the difference, because, as Marx puts it, "Technology, as such, makes nothing happen."
As you might imagine, I find that Marx' point compliments a critique of what I've called Borg Complex rhetoric. It's easier to refuse responsibility for technological change when we can attribute it to some fuzzy, incohate idea of technology, or worse, what technology wants. That latter phrase is the title of a book by Kevin Kelly, and it may be the best example on offer of the problem Marx was combatting in his article.
But … I don't necessarily find that term altogether useless or hazardous. For instance, some time ago I wrote the following:
"Speaking of online and offline and also the Internet or technology – definitions can be elusive. A lot of time and effort has been and continues to be spent trying to delineate the precise referent for these terms. But what if we took a lesson from Wittgenstein? Crudely speaking, Wittgenstein came to believe that meaning was a function of use (in many, but not all cases). Instead of trying to fix an external referent for these terms and then call out those who do not use the term as we have decided it must be used or not used, perhaps we should, as Wittgenstein put it, 'look and see' the diversity of uses to which the words are meaningfully put in ordinary conversation. I understand the impulse to demystify terms, such as technology, whose elasticity allows for a great deal of confusion and obfuscation. But perhaps we ought also to allow that even when these terms are being used without analytic precision, they are still conveying sense."
As you know from previous posts, I've been working through Langdon Winner's Autonomous Technology (1977). It was with a modicum of smug satisfaction, because I'm not above such things, that I read the following in Winner's Introduction:
"There is, of course, nothing unusual in the discovery that an important term is ambiguous or imprecise or that it covers a wide diversity of situation. Wittgenstein's discussion of 'language games' and 'family resemblances' in Philosophical Investigations illustrates how frequently this occurs in ordinary language. For many of our most important concepts, it is futile to look for a common element in the phenomena to which the concept refers. 'Look and see and whether there is anything common to all.–For if you look at them you will not see something that is common to all, but similarities, relationships, and a whole series of them at that.'"
Writing in the late '70s, Winner claimed, "Technology is a word whose time has come." After a period of relative neglect or disinterest, "Social scientists, politicians, bureaucrats, corporate managers, radical students, as well as natural scientists and engineers, are now united in the conclusion that something we call 'technology' lies at the core of what is most troublesome in the condition of our world."
To illustrate, Winner cites Allen Ginsburg — "Ourselves caught in the giant machine are conditioned to its terms, only holy vision or technological catastrophe or revolution break 'the mind-forg'd manacles.'" — and the Black Panthers: "The spirit of the people is greater than the man's technology."
For starters, this is a good reminder to us that we are not the first generation to wrestle with the place of technology in our personal lives and in society at large. Winner was writing almost forty years ago, after all. And Winner rightly points out that his generation was not the first to worry about such matters either: "We are now faced with an odd situation in which one observer after another 'discovers' technology and announces it to the world as something new. The fact is, of course, that there is nothing novel about technics, technological change, or advanced technological societies."
While he thinks that technology is a word "whose time has come," he is not unaware of the sorts of criticisms articulated by Leo Marx. These criticisms had then been made of the manner in which Jacques Ellul defined technology, or, more precisely, la technique: "the totality of methods rationally arrived at and having absolute efficiency (for a given stage of development) in every field of human activity."
Against Ellul's critics, Winner writes, "While Ellul's addition of 'absolute efficiency' may cause us difficulties, his notion of technique as the totality of rational methods closely corresponds to the term technology as now used in everyday English. Ellul's la technique and our technology both point to a vast, diverse, ubiquitous totality that stands at the center of modern culture."
It is at this point that Winner references Wittgenstein in the paragraph cited above. He then acknowledges that the way in which technology tends to be used leads to the conclusion that "technology is everything and everything is technology." In other words, it "threatens to mean nothing."
But Winner sees in this situation something of interest, and here is where I'm particularly inclined to agree with him against critics like Leo Marx. Rather than seek to impose a fixed definition or banish the term altogether, we should see in this situation "an interesting sign." It should lead us to ask, "What does the chaotic use of the term technology indicate to us?"
Here is how Winner answers that question: "[…] the confusion surrounding the concept 'technology' is an indication of a kind of lag in public language, that is, a failure of both ordinary speech and social scientific discourse to keep pace with the reality that needs to be discussed."There may be a better way, but "at present our concepts fail us."
Winner follows with a brief discussion of the unthinking polarity into which discussions of technology consequently fall: "discussion of the political implications of advanced technology have a tendency to slide into a polarity of good versus evil." We might add that this is not only a problem with discussion of the political implications of advanced technology, it is also a problem with discussions of the personal implications of advanced technology.
Winner adds that there "is no middle ground to discuss such things," we encounter either "total affirmation" or "total denial." In Winner's experience, ambiguity and nuance are hard to come by and any criticism, that is anything short of total embrace, meets with predictable responses: "You're just using technology as a whipping boy," or "You just want to stop progress and send us back to the Middle Ages with peasants dancing on the green."
While it may not be as difficult to find more nuanced positions today, in part because of the sheer quantity of easily accessible commentary, it still seems generally true that most popular discussions of technology tend to fall into either the "love it" or "hate it" category.
In the end, it may be that Winner and Marx are not so far apart after all. While Winner is more tolerant of the use of technology and finds that, in fact, its use tells us something important about the not un-reasonable anxieties of modern society, he also concludes that we need a better vocabulary with which to discuss all that gets lumped under the idea of technology.
I'm reminded of Alan Jacobs' oft-repeated invocation of Bernard Williams's adage, "We suffer from a poverty of concepts." Indeed, indeed. It is this poverty of concepts that, in part, explains the ease with which discussions of technology become mired in volatile love it or hate it exchanges. A poverty of concepts short circuits more reasonable discussion. Debate quickly morphs into acrimony because in the absence of categories that might give reason a modest grip on the realities under consideration the competing positions resolve into seemingly subjective expressions of personal preference and, thus, criticism becomes offensive.
So where does this leave us? For my part, I'm not quite prepared to abandon the word technology. If nothing else it serves as a potentially useful Socratic point of entry: "So, what exactly do you mean by technology?" It does, to be sure, possess a hazardous tendency. But let's be honest, what alternatives do we have left to us? Are we to name every leaf because speaking of leaves obscures the multiplicity and complexity of the phenomena?
That said, we cannot make do with technology alone. We should seek to remedy that poverty of our concepts. Much depends on it.
Of course, the same conditions that led to the emergence of the more recent expansive and sometimes hazardous use of the word technology are those that make it so difficult to arrive at a richer more
| 1.54895 |
openbmb/Ultra-FineWeb
|
This case study investigation reflects on the use of metaphors to teach postgraduate education students the importance of personal bias and subjectivity to their research, and advocates the use of critical reflexivity to deal with it. Students are reluctant to be critically reflective as they can feel threatened by the reflective process, feel they can sit apart or outside their research, write without bias and/or feel critical reflection may damage their research findings. It explores the effectiveness of an approach to overcome this reluctance by applying a metaphor. In a Zambian research class, students introduced a metaphor for personal bias by likening it to an encounter with a hidden hippopotamus. These are difficult to tame, hard to deal with, and can remain hidden for a long time. They appear unexpectedly, cannot be ignored, and awareness the main defence. Subsequent dissertations showed an improved early adoption of critical reflexivity. This metaphor was then used as a key discussion point on a postdoctoral education programme in the UK and investigated formally using focus groups. Students reported a greater understanding of personal bias, recognised the importance of being critically reflexive, and felt the metaphor was instrumental in their understanding of the need to advise of their position in the research. Underpinning this approach is the assertion that metaphors can help explain personal traits that are difficult for individuals to describe (Hoggan, 2016). The use of a personal values framework; morality, competency, personal and social behaviour, provided a supportive writing framework resulting in an increase in critical reflexivity early in the students research.
|Number of pages||15|
|Early online date||31 Jan 2017|
|Publication status||Published - 1 Jun 2017|
- critical reflexivity
- personal bias
| 2.201514 |
openbmb/Ultra-FineWeb
|
The Scoop on Migratory Arthritis
Migratory arthritis is a particular form of arthritis. Arthritis is a disease that affects thousands of people who suffer from pain and swelling in their joints and have to deal with stiffness of movement. This is usually the result of inflammation in the joints.
Arthritis is classified by doctors into over100 different categories depending on the body area that is affected. Besides the arthritis directly associated with inflammation in the joints, there are forms of arthritis caused by diseases in other body organs and problems of other tissues. Arthritis can affect people of all ages, even children.
Migratory arthritis is the problem in which there is initial swelling which increases rapidly in one or two joints and subsides over the next few days. As the symptoms subside in the original affected areas, the same pattern appears in another joint, usually in an asymmetric location. This movement of the pain and swelling from joint to joint is the reason for the name of the problem. The pattern of asymmetrical movement of joint pain associated with migratory arthritis is associated with some specific conditions and diseases.
Among the possible causes listed by medical professionals are:
systemic lupus erythematosus
It is helpful to understand what happens when a person suffers from arthritis. The joint inflammation leads to pain, swelling and loss of motion and this is visible in the redness apparent in the affected area. There is usually inflammation in the body when it is affected by an injury or infected by a harmful agent such as a bacteria or a virus. The body's reaction is communicated to the natural immune system which functions as the defense mechanism of the body. Cells move to help the affected area to deal with the threat to the body - by removing infected or damaged cells and by helping repair affected tissues. Once the problem is dealt with a normal healthy is restored the inflammation reduces.
In the case of arthritis, the inflammation does not reduce as it should in normal conditions. The continuing inflammation prolongs the problem and continues to damage more tissues and therefore the cyclical pattern of pain continues. This perpetuating pattern of pain and damage ends up affecting the bones and neighboring tissues leading to the stiffness of the joint and the difficulty in movement. This kind of breakdown of the immune system which hampers the proper functioning of the body is called an autoimmune disease.
Given that migratory arthritis is usually triggered by other health problems, it is important to have it properly diagnosed. You can list the sequence of your pain to your doctor and add details about other health issues to help with proper diagnosis. You can confer with your doctor to decide whether it will be helpful to see a rheumatologist. Self-aware patients, alert to their body's patterns will help in a quick diagnosis of migratory arthritis.
The good news for patients is there are ways to manage the pain and to be proactive in dealing with disease. Arthritis patients today are normally treated with aspirin and other nonsteroidal anti-inflammatory drugs or NSAIDs such as ibuprofen, naproxen and dicolfenac. These help with the migratory variety of the disease also because they are effective analgesics and anti-inflammatory drugs. In the specific case of migratory arthritis, treatment for the root cause such as rheumatic fever or Lyme disease also helps in countering the effects of the arthritic pain.
Many people who suffer from chronic arthritis also seek alternative medical therapies to cope with the pain. Naturopaths, much like doctors, recommend a combination of exercise and good diet to support the medicines. Among supplements recommended by those practicing alternative medicine are Omega 3 oils, Glocosamine and Chondroitin.
It will be useful for those feeling the signs arthritis to analyze the patterns of their pain and to have a detailed consultation with their doctor to ensure an accurate diagnosis and to initiate an effective treatment.
| 2.381832 |
HuggingFaceFW/fineweb-edu
|
a process of collecting, analyzing, and interpreting non-numerical data, such as
Transcript: Education The Male Bias of Tuberculosis In India: A Qualitative and Quantitative Analysis of the Problem Age 1. Stigmatization of TB in Women 2. Active Case-Finding 3. Scheduled Tribe Membership 4. High Gender Ratio Case Studies 5. Mortality Statistics 1. Solid Fuel Hypothesis Thank You! Female Era of Neglect and Complacency Methods Gaps in Knowledge About TB Applying the Scientific Method 1990 Interest Reignites 2. Tobacco Use Rejected Factors 1947 Future Research Total Age > 35 Desire for Discretion 2006 Cultural First TB Drugs Developed Results Scheduled Tribe Membership Biological Logistical and Linear Regression Categorically Sorted Dependent Variables Methodological Narrative Methodological Modern Era 1970 Male Male Bias of TB Biological Narrative Discretion 1989 Cultural Narrative Malnutrition Total Age > 35 Desire for Discretion
Transcript: THE RELATIONSHIP BETWEEN ORGANIZATIONAL CHARACTERISTICS AND INTRINSIC JOB SATISFACTION AMONG SELECTED GOVERNMENT EMPLOYEES OF CITY OF CABUYAO, LAGUNA THEORETICAL FRAMEWORK Relationship of organi-zational characteristics and job satisfaction among selected government employees of City of Cabuyao, Laguna. TWO FACTOR THEORY This research aims to determine the relationship of organizational characteristics and intrinsic job satisfaction among selected government employees of City of Cabuyao, Laguna. Specifically, the study will answer the following questions: Herzberg used the term 'hygiene' to describe factors that cause dissatisfaction in the workplace, are extrinsic (or independent of the work itself), and are linked to things such as compensation, job security, organizational politics, working conditions, quality of leadership, and relationships between supervisors, subordinates, and peers. Organizational characteristic of Cabuyao City Hall intrems of: • Leadership • Performance Appraisal • Facilities Intrinsic job satisfaction • Achievement • Work itself • Personal Growth The researchers will use the descriptive method to determine the relationship of Organizational Characteristics and Intrinsic Job Satisfaction among selected Government employees of the selected departments of the city government office. It is a type of method involving the description, interpretation, recording and analysis of data in order to test the hypothesis of the study. The variables that the researchers will measure are Leadership, Performance Appraisal, Facilities and Organizational Characteristics and their Intrinsic Job Satisfaction. 3. To measure the relationship between organizational Characteristics and Intrinsic Job Satisfaction Multiple regression will use. To help minimize miscalculations due to human error, all computations went through software called SPSS (Statistical Package for Social Sciences). The following are the statistical treatments to be applied in the study: SStot = SSbg + SSwg With regards to the level of Intrinsic Job Satisfaction in terms of achievement, work itself and personal growth the MANOVA will use. The formula is: First, the total sum-of-squares is partitioned into the sum-of-squares between groups (SSbg) and the sum-of-squares within groups (SSwg): DATA ANALYSIS PLAN Alvarez, Joebert Jerry C. Manguerra, Kahreen Ann J. Nanola, Jestrel Joy P. INPUT The Future Government Employees. This study will make them to be aware to the factors that can affect to their intrinsic job satisfaction that will enable them to be more productive and effective employees. 2. With regards to the level of Intrinsic Job Satisfaction in terms of achievement, work itself and personal growth the MANOVA will use. THANK YOU! The Future Researcher. The ideas presented may be used as a reference data in conducting new researches. The Field of Industrial/Organizational Psychology. The researchers believe that the study may contribute to the said field of psychology in terms of functioning issues such as the job performance and work motivation of the government employees. In addition, this may help improve the effectiveness of both individuals and organizations. STATEMENT OF THE PROBLEM RESEARCH PARADIGM SIGNIFICANCE OF THE STUDY The motivators or satisfiers. These are linked to employee motivation and arise from intrinsic, or dependent, conditions of the job itself. Factors for satisfaction include responsibility, job satisfaction, recognition, achievement, opportunities for growth, and advancement. Corporate Leaders. The results and ideas that can be shown in this study may be used as a guide on how the leaders/superiors could motivate their employees. RESPONDENTS OF THE STUDY The Government employees. The Government Employees will benefit from this study not only at Cabuyao, Laguna but to the whole world of politics. It will help them to know the relationship of the organizational characteristics to their intrinsic job satisfaction. 3. Is there a significant relationship between organizational characteristic and intrinsic job satisfaction the selected government employees of City of Cabuyao, Laguna? Cabuyao City Hall 1. To identify the Organizational characteristics of Cabuyao City Hall the five-point likert Scale and simple mean will use. RESEARCH LOCALE * Self-made questionnaires * Collecting data * Statistical treatment * Correlational analysis HYPOTHESIS FEEDBACK RESEARCH DESIGN OUTPUT The study will be conducted at the city government office city of Cabuyao, Laguna. It has twenty four departments, but the researcher will select only three departments namely Office of the Mayor, Sangguniang Panglunsod and City Social Welfare Development Office. SStot = SSbg + SSwg PROCESS Null Hypothesis. There is no significant relationship between organizational characteristic and intrinsic job satisfaction among selected government employees of City of Cabuyao, Laguna in terms of Leadership, Performance Appraisal, and Facilities..
Transcript: "ACQUIRING SELECTED JOURNALISM SKILLS AS PERCEIVED BY SELECTED AB JOURNALISM STUDENTS" ANALYTICAL FRAMEWORK Analytical Paradigm Television – Professors Mediated Fashion - teaching strategies Media Content/Messages - Journalistic skills that are being taught Influence on the Audience - the skills learned by the students 100 students randomly selected as the respondents 25 students – first year 25 students – second year 25 students – third year 25 students – fourth year DATA GATHERING PROCEDURE Statement of the Problem P= [F/X] x 100 The data will be accumulated; the researchers will tally the respondents according to their age, sex and year level. It will be presented through tables and will be interpreted. Their response to the questions will be then added. Using the formula for finding the mean, the researchers will compute the scores of the respondents. suggests that television (and other media) plays an extremely important role in how people view their world modern Culture most people get much of their information in a mediated fashion rather than through direct experience 1. What is the socio-demographic profile of the respondents? a. Age b. Gender c. Year Level d. Number of Major Subjects SOURCES OF DATA This study is a descriptive content analysis on the Journalism skills development of the journalism students of Bicol University. 2. What are the activities provided by the Journalism Professors to develop the Journalistic skills of the respondents? a. Writing Articles b. Beat Assignments c. Covering Press Conferences d. Conducting Interviews e. Production of Newsletter, Magazines and Documentary Films An Undergraduate Thesis Presented to The Faculty of the College of Arts and Letters BICOL UNIVERSITY THANK YOU VERY MUCH! TREATEMENT OF DATA Questionnaires 4. What are the implications of these Journalistic skills to the respondents as they practice on the field of Journalism in the future? "Culture Analysis Theory" METHODOLOGY Frequency Distribution. This will be used in counting the responses. Percentage. This will be used in the computation of the percentage to the frequency count using this formula: where: P = percentage F = no. of response X = total no. of respondents STATISCAL TREATMENT OF DATA Jefferson G. Geva Christine D. Latona Ma. Abbygale V. Ombao Jeuela Joey L. Quiñones In Partial Fulfillment of the Requirements for the Degree Bachelor of Arts in Journalism 3. What are the Journalistic skills that are developed by the respondents? a. Critical Thinking b. Quick Time Composition Capability c. Deadline Beating Capability d. Following Ethical Procedures e. Computer Literate in Lay-out and Design
Transcript: Thesis Presentation THE TELEVISION PRIMETIME SHOWS OF ABS-CBN, GMA AND TV5: A STUDY OF THE DIFFERENCE ON PROGRAMMING By: Rhoel Carreno Donitha Rose Encabo Jienah Guibao Felvie Oracion Rationale Theoretical Background Agenda Setting Theory by Maxwell McCombs and Donald Shaw Theoretical Conceptual Framework Problem Statement This study aims to find out the programming of television primetime show of the three national television networks such as ABS-CBN, GMA and TV5. More specifically, this seeks to answer the ff: 1. The profile of the shows of the three national television networks in terms of time Slots and program title,program genre, program audience and program ratings. 2. The Programming strategies of television primetime shows of the three national TV network based on the study of head-to-head, counter, strip, checkerboard and block. 3. The Television Programming Policies; general audience (GA), parental guidance (PG). 4. To reveal the program strategies and policies being used by ABS-CBN, GMA, and TV 5, including the Title, Time Slots, Genre, Target Audience, and Ratings of each primetime show. Therefore, the researchers conclude that the theory of Maxwell McCombs and Donald Shaw "The Agenda-Setting Theory" which stated that through their day-by-day selection and display of the news, editors and news
| 1.904166 |
openbmb/Ultra-FineWeb
|
ing functional goals can be achieved by selecting various size and shape features for the self-fixating tip, such as relatively reduced overall dimensions (length or diameter) of the tip; and size, shape, and number of lateral extensions. Further, this self-fixating tip system reduces trauma based on the ability to avoid tissue passages next to critical structure; and reduced trauma due to the ability to eliminate the need for local stab (external) incisions otherwise required for needle entry and exit sites. While the design is a significant improvement over previous sling and fixation configurations, the positional attachment of the device to the corresponding tissue is limited to the self-fixating tip.
SUMMARY OF THE INVENTION
The present patent application describes pelvic implant and delivery systems and methods for treating pelvic conditions such as incontinence (various forms such as fecal incontinence, stress urinary incontinence, urge incontinence, mixed incontinence, etc.), vaginal prolapse (including various forms such as enterocele, cystocele, rectocele, vault prolapse, etc.), among others. Embodiments of the implants can include one or more extension support portions, and one or more anchors generally attached to or integrated with the extension portion. The extension portion is generally constructed of a mesh material. The one or more anchors can be provided proximate the ends of the mesh extension portion to increase fixation until tissue in-growth occurs. The anchors can be fixating tips placed at and securable within internal tissue of the pelvic region to further assist in supporting the implant device. The anchors can be configured of various sizes and shapes. The anchors of the implant can be adapted to engage a distal end of an insertion tool to allow the insertion tool to place the anchors at a desired tissue location by pushing the anchor into the fibrous tissue.
The insertion or introducer delivery tool can include a thin elongate needle that attaches to a handle at a proximal end of the needle, with a distal end of the needle adapted to engage the anchors. The needle can be generally straight to facilitate deployment of the implant.
In one embodiment, the delivery tool can include a sheath adapted to extend along and at least partially surround or shroud the needle. The sheath can include an elongate portion and a hood. The elongate portion includes a lumen or channel therethrough to slidably receive at least a portion of the needle. The hood can further include distinct flaring portions (e.g., generally arcuate or contoured) configured to create a spatial opening between the flaring portions. A region of the flaring portions defines inner-facing or interior pleat openings or channels adapted to receive and retain respective ends of the anchor tines.
In one embodiment, the invention contemplates a method of treating urinary incontinence in male and female patients (e.g., SUI) in a minimally invasive manner including injecting a local anesthetic; creating one medial (e.g., transvaginal) incision under the mid-urethra; inserting a urinary incontinence sling through the one transvaginal incision, anchoring the urinary incontinence sling, and closing the incision.
Another aspect of the invention includes a combination (e.g., kit, system, etc.) of a sling implant, as described herein, including one or more anchors. The kit also includes one or more insertion tools or systems useful in securely deploying, positioning and anchoring the sling.
BRIEF DESCRIPTION OF THE DRAWINGS
Other features and advantages of the present invention will be seen as the following description of particular embodiments progresses in conjunction with the drawings.
FIG. 1 is a side schematic view of a sling implant and delivery system in accordance with an embodiment of the present invention.
FIG. 2 is a partial view of a sheath hood, needle, anchor and sling implant of the system in accordance with an embodiment of the present invention.
FIG. 3 is a top schematic view of a mesh sling implant in accordance with an embodiment of the present invention.
FIG. 4 is a side view of an anchor device in accordance with an embodiment of the present invention.
FIG. 5 is a side view of an anchor device in accordance with an embodiment of the present invention.
FIG. 6 is a partial schematic view of an anchor seated or docked with the hood of a delivery tool sheath in accordance with an embodiment of the present invention.
FIG. 7 is a partial schematic view of an anchor seated or docked with the hood of a delivery tool sheath, and a needle engaged with the anchor, in accordance with an embodiment of the present invention.
FIG. 8 is a partial schematic view of an anchor unseated or undocked with the hood of a delivery tool sheath, and a needle engaged with the anchor, in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
The following description is meant to be illustrative and not limiting. Other embodiments of this invention will be apparent to those of ordinary skill in the art in view of this description and corresponding figures.
The present invention is directed to surgical instruments, assemblies, and implantable articles for treating pelvic floor disorders such as fecal or urinary incontinence, including SUI, prolapse, etc. According to various embodiments, a surgical sling implant can be used to treat a pelvic condition, including the specific examples of implanting a support implant to treat a condition such as vaginal vault prolapse or incontinence (male or female). An implant can be positioned in a male or a female to treat disorders such as urge incontinence, mixed incontinence, overflow incontinence, functional incontinence, fecal incontinence, or for female conditions including prolapse (e.g., vaginal or uterine), enteroceles (e.g., of the uterus), rectoceles, cystocele, and anatomic hypermobility.
The sling implant or system may include portions or sections that are synthetic or constructed of biological material (e.g., porcine, cadaveric, etc.). Extension support portions may be constructed of a synthetic mesh such as a polypropylene, or other compatible materials. Examples of implant products that may be useful according to the present description, include those sold commercially by American Medical Systems, Inc., of Minnetonka Minn., under the trade name MiniArc® for treating urinary incontinence. PCT Patent Publication Nos. 2008/057261 and 2007/097994 disclose various pelvic implant structures, procedures, systems and methods or techniques capable of use with the present invention and are, therefore, incorporated fully herein by reference.
In one embodiment of the present invention, as shown in FIGS. 1-8, an incontinence sling system 10 can be installed to help maintain continence by supporting the urethra during times of increased abdominal pressure. Delivery devices and tools are used to deploy, position and anchor a sling implant 12. The sling 12 can be implanted through a single incision in the vaginal wall for females, or perineal floor for males, and attached to (e.g., anchored to) the obturator internus muscle on either side of the urethra. Only requiring one incision in the vaginal wall (for females) or perineum (for males) eliminates additional incisions such as external incisions used in some methods of implanting urethral slings. The sling 12 and its methods of implantation are, therefore, a reduced or "minimally" invasive treatment option for patients suffering from urinary incontinence. In alternate embodiments, sling 12 may be anchored at other locations besides the obturator internus muscle, such as, for example, the obturator membrane or the obturator externus muscle. One method may be to implant the sling 12 having end tips at opposing extension portions, without penetrating the obturator membrane.
Referring generally to FIGS. 1-5, the sling implant 12 can include an extension portion 14 and one or more end anchors 16. Further, a delivery tool can be included with the system 10 for engaging, positioning, anchoring and disengaging the sling 12 or anchors 16 during use. The sling extension portion 14 can be constructed of a polypropylene mesh material, or other materials known for use with incontinence sling devices. The mesh sling 12 may be woven, knitted, sprayed, or punched from a blank. In one aspect of the invention, mesh sling 12 may include one or more woven, knitted, or inter-linked filaments or fibers that form multiple fiber junctions. The fiber junctions may be formed via weaving, knitting, braiding, or through other techniques, including combinations thereof. In addition, the size of the resultant openings or pores of the mesh may be sufficient to allow tissue in-growth and fixation within surrounding tissue. Further, the sling 12 can include one or more band or tracking portions. The band portion, for example, can be a plasma-treated print area of the sling mesh 12 or a separately coupled or integrated band. The band portion facilitates tracking of components of the system 10 during the surgical implant procedure.
The extension support portion 14 generally extends between and is coupled or otherwise integrated with two end anchor tips 16. The anchors 16 can include a first anchoring tine or barb 22, a second anchoring tine or barb 24, an intermediate portion 26, and a coupling portion 28, as shown in FIGS. 4-5. Further, the anchoring tines 22, 24 can include respective distal ends 30, 32. While exemplary embodiments of the anchors 16 are depicted in FIGS
| 1.644953 |
openbmb/Ultra-FineWeb
|
At 39km above planet earth, would you have made Felix Baumgartner's step off the platform? It was very dangerous, no doubt. But is this the reason why you wouldn't have? People engage in many dangerous things. And I am not talking about skydiving. I mean the ordinary, every day kind of danger. Surely, some dangers can hardly be avoided, say road traffic (which is the leading cause of death for people in my age group). For others there is no obvious non-dangerous equivalent. But what if there was an activity with no practical value, which could easily be carried out without danger, but which nonetheless millions of people worldwide engage in? Listening to too loud music is such an activity.
Is this an exaggeration? Surely, if loud music was really dangerous, people would avoid it. Make no mistake, the scientific consensus clearly lays out the danger. Round about half the people exposed to music professionally show some hearing loss. Researchers have found worrying hearing impairments in classical musicians, rock/pop musicians, and music bar tenders. And the danger is not limited to professionals. The majority of rock concert attendees experience temporary auditory problems such as tinnitus or being hard of hearing. You are actually a daredevil when you listen to too loud music.
But this behaviour is not limited to your typical daredevil characters à la Felix Baumgartner. People flock to very loud concerts. Even toddlers prefer fast and loud music over slow and quiet music. Perhaps the clearest example for loudness's paradoxical appeal is the band Sun 0))). Their music is without discernible rhythm, harmony or melody. Pure loudness. And still, they are successful. Hear for yourself:
The Sun 0))) concert is a good example of the mysterious attraction of too loud music but it may also offer clues for understanding why people subject themselves to it. Actually, not just this band's concerts are too loud. Most concerts are. And so are night clubs. This is not the place to go to for a quiet night out. This is where you want energy, fun and excitement. It turns out that this is exactly what loud music is associated with. An Australian research team led by Roger Dean showed that the perceived arousal of music – whether a classical piece or Sun 0))) like noise – followed its loudness profile. Sweet melody or not, when people go out they want energetic music. And this music happens to be loud.
Beyond going out – why listen to too loud music when sitting still?
However, such an explanation can only be part of the answer. We have all seen the person on the bus with his headphones in or were annoyed by the colleague on the next desk with his music choice permeating the office through his headphones. These people are not out dancing. They look pretty low energy, if anything. And still they put their hearing at risk.
Neil Todd and Frederick Cody from the University of Manchester may offer a solution to the puzzle. They found that loud tones not only activate our sense of hearing but also our sense of balance. This happens because the nice distinction between these two modalities does not work for a structure in the ear called the saccule. It responds to head movements as well as rather low sounds. Through this structure muscles automatically react, explaining why deaf people's muscles can nonetheless react to loud clicks whereas vestibularly impaired people's can't. Todd and Cody found the saccule to start reacting around the so called 'rock'n'roll'-threshold of 105 dB. Is it just a coincidence that the beat of club music is typically in the tonal range and at the loudness level of the saccule? Could it be that the enjoyment of too loud music works through the same mechanism as the pleasure derived from baby swings, roller coasters and head banging? If so, the fun of skydiving and too loud music listening may have more in common than generally thought.
The greatest mystery surrounding too loud music, though, are not people seeking it in quiet environments such as the bus or the office. The strangest thing is the appeal of too loud environments even when one plugs the ears. It has become more and more common to go to rock concerts with ear plugs. The obvious question is why people don't just refrain from going to rock concerts all together and wait until concert organisers realise that they overdid it with the decibel levels.
Seeking intimacy through loudness
The final piece of the puzzle could be an idea exemplified in research done by Russo and colleagues from Ryerson University. They found that ordinary people could successfully distinguish piano, cello and trombone tones which they never heard but instead only felt on their backs. Even deaf people were able to do this. This research suggests that, yet again, the involvement of a second modality explains too loud music seeking. Hearing and vision are often grouped together because they reveal distant information. Smell, taste and touch, on the other hand, are intimate sensations only available when directly interacting with an object or person. If someone sees or hears your fiancé(e) you may not mind. But imagine if someone tried to touch or even taste him/her? There is something intimate about touch and perhaps we seek this intimacy when trying to immerse ourselves in music. Incidentally, this is also what was advertised as the novelty of Felix Baumgartner's jump. For the first time someone can say what it felt like to break the sound barrier. Previously, people only knew what it sounded and looked like. Somehow, this was not enough. We are curious about what he will report because we attach so much importance to the immediacy of touch. For 'touching' music, we need loud music as our skin is a poor substitute for the sensitive ears. Through the sense of touch music can cease to be felt at a distance and, instead, become a much more personal full body experience.
Has the mystery been solved? It seems as if modern psychology offers a range of explanations for why a perfectly avoidable but harmful activity is pursued by millions of people. Loud music offers a level of energy, fun and intimacy which soft music just can't match. If you listen to too loud music, you have more in common with daredevils like Baumgartner than you thought.
Dean, R.T., Bailes, F., & Schubert, E. (2011). Acoustic intensity causes perceived changes in arousal levels in music: an experimental investigation. PloS one, 6 (4) PMID: 21533095
Lamont, A. (2003). Toddlers' musical preferences: musical preference and musical memory in the early years. Annals of the New York Academy of Sciences, 999, 518-9 PMID: _PHONE_
Russo, F.A., Ammirante, P., & Fels, D.I. (2012). Vibrotactile discrimination of musical timbre. Journal of experimental psychology. Human perception and performance, 38 (4), 822-6 PMID: 22708743
Todd, N.P. McAngus, & Cody, F.W. (2000). Vestibular responses to loud dance music: A physiological basis of the 'rock and roll threshold'? Journal of the Acoustical Society of America, 107 (1), 496-500 DOI: 10.1121/1.428317
Zhao, F., Manchaiah, VK., French, D., & Price, S.M. (2010). Music exposure and hearing disorders: an overview. International journal of audiology, 49 (1), 54-64 PMID: 20001447
1) Photograph by: Felix Baumgartner, Twitter via the Vancouver Sun
2) The Vestibular System by Thomas Haslwanter via Wikimedia
If you liked this post you may also like:
If you were not entirely indifferent to this post, please leave a comment.
| 1.593504 |
HuggingFaceFW/fineweb-edu
|
geo-political enemy.
Sino-Russian rift
China and Russia enmity goes back to the Chinese Eastern Railway(CER) conflict took place in 1929 between Soviet Union and China, which was the bloodies conflict of its time. Joseph Stalin played a significant role to neutralize Chinese efforts to recapture the Railway. In order to attain its goals China used both conventional and asymmetric approaches to eliminate Soviet Union control over the Railway. Obtaining green signals from Japan, Stalin forcefully trespassed the region and pushed back Chinese armed forces, which was connoted as a sign of aggression, and ended up with border dispute. Throughout, the history both countries unsuccessfully endeavored to find a peaceful and acceptable solution to the border conflict. Consequently, in 2003 Russia and China signed an agreement to resolve the border dispute. In 2005, Moscow and Beijing finalized the border issue, nevertheless, Chinese leadership still claims that Vladivostok Russia's Fareast city is part of Chinese territory, besides Beijing asserts that Russia has annexed 350.000 square mile of Chinese territory.
Taking into account the above said facts, Sino-Russian partnership will break up some times in the future (2050-2060) and will change to armed conflict. Furthermore, Russia is not a solemn geopolitical adversary of the United States as China is. After the collapse of Soviet Union, both Russia and America were on the right path to normalize their relationship. Throughout, the different administrations no matter democrats or republicans leadership, Moscow and Washington achieved a lot to be aligned. For goodwill they even signed a new start to reduces their nuclear warheads and stop arm race. Due to the US eastward expansionism, Russia was driven into the arms of Beijing to establish partnership and cooperation.
Is Beijing or Moscow a national security threat?
The National Counterintelligence and Security Director Bill Evanina in his Fax News interview shed light on that no country poses a broader more severe threat to America than China. He added that Beijing's malign influence campaign against America would be one of the bigger challenge for Biden administration. He asserted from a threat perspective, Russia is a significant adversary particularly with regard to cyber intrusions, malign influence, and sowing discord in American democracy, but China poses a broader, more severe intelligence collection to the United States. According to Evanina, China continually engaged in highly sophisticated malign influence campaign against America, because America is a democracy, and democracy is bad for China. Evanina clarifies that challenge for Biden administration will be to understand the scope and scale of Chinese threats in the American landscape, domestically, and what is the best course to defeat that.
He added that part of China's malign influence has focused on politicians and elected officials, leveraging them to be engaged in promoting Beijing's scenario. Evanina signalizes that data theft by Beijing poses severe threat to the nationalized Americans. China can exploit the data for variety of nefarious purposes, and already has a significant record of exploitation of DNA for social control and surveillance of their Uyghur population at home. Evanina warned that China's collection of U.S. Genomic data is helping to fuel their precision medicine and artificial intelligence industries, which poses a long-term threat to the US biotech industry and medicine around the world at large. China continues to exploit American government and industry supply chain he said, Beijing uses American trusted suppliers and vendors against the US itself. He explained that supply chain attacks are insidious at most, because they violate the basic trust between a supplier and a consumer. Therefore, he said that it is a complicated set for the Biden administration to deal with.
A chance of reconsidering foreign policy objectives
Observing that Russia is not a significant threat to America at most, on the other, China poses, the most severe threat to the United States, so the Biden administration can give it a try to revise policies on Russia, and find out divergences and get them solved. In accordance with the US newly adopted maritime strategy, the American forces and vigilance instruments cannot be present everywhere and every time, therefore it stressed on to build and convene partnership and alliance with other countries. Unlike former strategies, the current strategy is more in favor of working together with allies. If Biden's administration tries to build trust amongst its allies, he needs to listen to his allies around the globe especially his European ones and give preference to their concerns. In European perspective, Russia is an inevitable potency in term of economic cooperation, counter insurgency, counter terrorism, and cyber security. Therefore, it is advisable that the policy towards Moscow requires to be given the kiss of life to crumble Sino-Russian partnership, and get it aligned with Washington. Most importantly, Russia is part of Europe; hence, a European orientated solution should be conveyed to motivate Russia to work together with European Union and America.
Continue Reading
Americas1 hour ago
Two Ways that Trump Spread Covid-19 in U.S.
1. Encouraging infected workers to continue working even if it infects others: On 12 May 2020, two hundred and twenty...
Finance3 hours ago
M&A valuations boom in the second half of 2020, despite COVID-19 impacts on the economy
M&A valuations are soaring, with rich valuations and intense competition for many digital or technology-based assets driving global deals activity,...
Middle East5 hours ago
When is usury usury? Turkish fatwa casts doubt on Erdogan's religious soft power drive
Turkey's state-controlled top religious authority has conditionally endorsed usury in a ruling that is likely to fuel debate about concepts...
Energy News7 hours ago
Solar power charges pandemic recovery for indigenous farmers in Viet Nam
Overcoming adversity has long been the stock in trade of Do Thi Phuong, a 42-year-old mother of two living in...
Tech News9 hours ago
'Reset Earth': Animation film & mobile game bring Gen Z into protecting ozone layer
'Reset Earth' is an innovative educational platform for adolescents about the fundamental role of the ozone layer in protecting the...
Defense11 hours ago
Israel continues its air strikes against Syria after Biden's inauguration: What's next?
A family of four, including two children, died as a result of an alleged Israeli air strike on Hama in...
Reports11 hours ago
Digitalizing the Maritime Sector Set To Boost the Competitiveness of Global Trade
A new report launched today by the World Bank and the International Association of Ports and Harbors (IAPH) shows that...
| 1.337457 |
Zyphra/Zyda-2
|
The goal of this course is to help students continue developing their ability to hold a conversation and to develop an ability to comprehend, take guided notes from, and discuss simple academic lectures and topics.
140 Reading and Vocabulary
The purpose of this course is to help students begin to develop academic reading skills, to continue to learning general vocabulary, and to begin to learn academic vocabulary.
140 Written Communication
The purpose of this course is to help students develop intermediate grammar skills and develop the skills to write short compositions.
| 2.573162 |
HuggingFaceFW/fineweb-edu
|
depression worse. When the alcoholic feels depressed, he/she separates from other people, becomes irritable and angry with others, and often complains that nobody cares or understands what he/ she is going through.
Phase 7: Behavioural Loss of Control. During this phase the alcoholic becomes unable to control or regulate personal behaviour and a daily schedule. There is still a heavy denial and no full awareness of being out of control. His/ her life becomes chaotic and many problems are created in all areas of life and recovery, The most common symptoms are:
24. Irregular attendance at AA and Treatment meetings. The alcoholic stops attending AA regularly and begins to miss scheduled appointments for counselling or treatment. He/she finds excuses to justify this and doesn't recognize the importance of AA or treatment. He/ she develops the attitude that "AA and counselling aren't making me feel better, so why should I make it a priority?" "Other things are more important."
25. Development of an "I don't care" attitude. The alcoholic tries to act as if he/ she doesn't care about the problems that are occurring. This is to hide the feelings of helplessness and a growing lack of self respect and self confidence.
26. Open Rejection of Help. The alcoholic cuts self off from people who can help. He/ she does this by having fits of anger that drive others away, by criticizing and putting others down, or by quietly withdrawing from others.
27. Dissatisfaction with life. Things seem so bad that the alcoholic begins to think that he/she might as well drink because things couldn't get worse. Life seems to have become unmanageable since drinking stopped.
28. Feelings of powerlessness and helplessness. The alcoholic develops difficulty in "getting started", has trouble thinking clearly, concentrating, thinking abstractly, and feels that he/she can't do anything and begins to believe there is no way out.
Phase 8: Recognition of Loss of control. The alcoholic's denial breaks and suddenly he/ she recognizes how severe the problems are, how unmanageable life has become, and how little power and control he/she has to solve any of the problems. This awareness is extremely painful and frightening. By this time he/ she has become so isolated that there is no one to turn to for help. The most common symptoms are:
29. Self Pity. The alcoholic begins to feel sorry for self and often uses self pity to get attention at AA or from family members.
30. Thoughts of social drinking. The alcoholic realizes that drinking or using drugs would help him/her to feel better and begins to hope he/ she can drink normally again and be able to control it. Sometimes these thoughts are so strong that they can't be stopped or put out of mind. There is a feeling that drinking is the only alternative to going crazy or committing suicide. Drinking actually looks like the sane and rational alternative.
31. Conscious Lying. The alcoholic begins to recognize the lying, the denial and the excuses but is unable to interrupt them.
32. Complete loss of self confidence. The alcoholic feels trapped and overwhelmed by the inability to think clearly and take action. This feeling of powerlessness causes the belief that he/ she is useless and incompetent. As a result there is the belief that life is unmanageable.
Phase 9: Option reduction. During this phase the alcoholic feels trapped by the pain and inability to manage his/her life. There seem to be only 3 ways out, insanity, suicide or drug use. He/ she no longer believes that anyone or anything can help them. The most common symptoms are :
33. Unreasonable Resentment. The alcoholic feels angry because of the inability to behave the way he/she wants to. Sometimes the anger is with the world in general, sometimes with a particular person, and sometimes with self.
34. Discontinuance of all treatment and AA. The alcoholic stops attending all AA meetings. Those taking Anabuse will forget to take it or deliberately avoid taking it regularly. When a helping person is part of treatment, tension and conflict develop and become so severe that the relationship usually ends. The alcoholic drops out of counselling even though he/she needs help and knows it.
35. Overwhelming Loneliness, Frustration, Anger and Tension. The alcoholic feels completely overwhelmed. He /she believes there is no way out except drinking, suicide or insanity. There are intense fears of insanity and feelings of helplessness and desperation.
Phase 10: Acute Relapse Episode. During this phase the alcoholic becomes totally unable to function normally. He/she may use alcohol or drugs or may become disabled with other conditions that make it impossible to function. The most common symptoms are:
36. Loss of behaviour control. The alcoholic experiences more and more difficulty in controlling thoughts, emotions, judgements, and behaviours. This progressive and disabling loss of control begins to cause serious problems in all areas of life. It begins to affect health and well being. No matter how hard he/she tries to regain control it is impossible to do.
37. Acute Relapse Episode. The alcoholic experiences periods of time when he/ she is totally unable to function normally. These periods become more frequent, last longer, and begin to produce more serious life problems. The relapse cycle is ended with a serious crisis which causes the person to become totally unable to function for a period of time due to one or more of the following:
A. Degeneration of all life areas. The alcoholic may become unable to contribute to the work, social, family, and intimate areas of life. As a result, all life areas suffer due to neglect.
B. Alcohol or drug Use. The alcoholic may begin to use alcohol or other drugs as a means to escape the pain and desperation. There may be an attempt to control drinking by limiting the amount or attempting one short term binge. The ability to control drinking is soon lost. This sometimes happens very quickly. Sometimes it occurs after a period of controlled drinking. The alcoholic returns to out-of –control drinking with symptoms experienced during the last period of alcoholic drinking.
C. Emotional Collapse. The alcoholic may become emotionally unable to function, may overreact, or become emotionally numb, or cry, or fly into a rage for no reason at all.
D. Physical Exhaustion. It may become impossible for the alcoholic to continue to function due to physical exhaustion.
E. Stress Related Illnesses. The alcoholic may become physically sick due to the severe stress that has been occurring over a long period of time.
F. Psychiatric Illness. The alcoholic may develop a severe psychiatric illness such as psychosis, severe anxiety, or severe depression. The psychiatric illness may be so severe that it forces the alcoholic into treatment.
G. Suicide. The alcoholic may become suicidal and may attempt or actually commit suicide.
H. Accident Proneness. The alcoholic may become careless and unable to take normal precautions in acts of living resulting in a sequence of accidents. These accidents may take the form of car accidents, falls, burns etc. Often the accidents are life threatening or cause serious injury.
I. Disruption of Social Structure. The alcoholic may be unable to maintain involvement in normal life activities and may become socially unable to function.
Constructing a Personalized Warning Sign List
1. Check three to five warning signs from the list above that you find most interesting for you.
2. In your own words, rewrite the summary title of the warning sign that you have checked. The summary title is the word or short phrase at the beginning of each warning sign.
3. Write a brief paragraph that describes in your own words each of the warning signs that you have selected.
4. Read your warning signs (as you have written them) to an addictions counsellor, your A.A. sponsor, or a friend, and ask for feedback. Rewrite the warning signs if they are unable to understand clearly what you mean.
5. Review the list every morning and every evening to remind yourself to look for the presence of these warning signs.
6. Discuss the list with your friends and family and ask them to tell you if they see any of the warning signs appearing in your life.
7. If you notice a warning sign, evaluate your need to get help.
| 1.385621 |
openbmb/Ultra-FineWeb
|
A-level Computing/AQA/Python
From Wikibooks, open books for an open world
Jump to: navigation, search
Python3-powered hello-world.svg
Python is a free multiplatform programming language. Its original purpose and strengths were as a scripting language to automate the administration of Unix systems. Both the core language and the standard library have since been extended for many other purposes, including web, database, interactive and graphical applications.
Why Python?[edit]
The reference implementation of Python, CPython, runs almost everywhere, and is well supported for Linux, Unix, Mac OS X and Windows. Many free text editors offer syntax highlighting, code completion, class navigation, debugger integration and other tools. Therefore students can pursue their interest easily at home, work or at computer clubs.
The main implementations (CPython, Jython and IronPython) are open source and free-of-charge. CPython is included as standard in most Linux distributions.
As of 2012, Python is one of the two main languages that Google offers, alongside Java, for its customer APIs. Though not as popular in industry as Java and VB, it has been adopted in various fields of employment.
Python is interpreted, so trial-and-error experimentation and debugging can be fast. The standard runtime also includes an interactive console with access to the executing program image.
Python has a wide range of data types, both built-in and in its standard library, though there can be some quirks and inconsistencies among them. For example, some types are mutable and others are immutable.
Python's significant whitespace makes incorrect nesting of block structured statements easy to spot.
Why not Python?[edit]
CPython's virtual machine is a bytecode interpreter and execution of Python can be much slower than say, execution of Java on its HotSpot virtual machine with just-in-time compilation.
Python's significant whitespace can make it easy to break a working method with the space bar or tab key.
Python uses variables without declaring datatypes, this can be confusing when trying to teach them.
When using classes, python doesn't use the keywords public and private to specify access to attributes and methods. They are possible, but may confuse students.
2.7 or 3.x?[edit]
When you read about python you will probably learn that there are two different versions out there. AQA allows you to use either but which one is most suitable for you? A quick summary:
2.7 is stable, end-of-life, no further updates, but solid and widely deployed, with a vast array of libraries and learning resources.
3.x is the future - handles multi-lingual text correctly, many improvements, but some libraries not yet converted.
Some tutorials written for python 2.7 won't work in python 3.x as there are small changes in the language such as the print statement in Python 2.x being replaced with the print function in Python 3.x:
print "hello world" _TAG_ 2.7
print("hello world") _TAG_ 3.x
You can install both and they'll play nicely together, but when choosing what language to pick you might be wise to check out the resources that you have available to your students.
Getting Started[edit]
You can get a portable version of python that can be run directly from a USB, available in 2.7 and 3.x versions.
If you want to use Microsoft Visual Studio you can get IronPython which is free and integrates python 2.7.
Python comes pre installed on the Raspberry Pi with development tools and lots of supporting learning resources.
Although some users encourage learners to use Python's built-in list as an array, the standard library includes the array module which some teachers may prefer. See, for example,
Check which array the examiners prefer.
Object Orientation[edit]
Since Python doesn't have the concept of explicit declarations, or PRIVATE and PUBLIC keywords, the syntax for defining classes differs quite a lot from the generally accepted AQA syntax, e.g., the VB.NET class
Class MediaFile
Sub PlayFile
End Sub
Function GetTitle As String
Return Title
End Function
Function GetDuration As Single
Return Duration
End Function
Dim Title As String
Dim Duration As Single
is a reasonable match to the June 2010 COMP3 question:
MediaFile = Class
Procedure PlayFile
Function GetTitle
Function GetDuration
Title : String
Duration : Real
The Python version looks something like this:
class MediaFile
def __init__(self):
self.Title = ""
self.Duration = 0.0
def PlayFile:
def GetTitle(self):
return self.Title
def GetDuration(self):
return self.Duration
Python can be used to build anything from websites to games using pygame (v2.7). Blender has a python scripting engine (3.x) meaning that it is possible to create projects involving 3D animation. Python's origins as a scripting language mean that it can be used to glue together Unix programs to make an application.
Open source library code can be imported, as teaching examples or to extend the practical project, from PyPI _URL_ with package management tools built into Python.
To ease the generation of some documentation, students may be introduced to the docstring, a form of embedded documentation supported by Python source code. A number of tools are available for generating readable documents from source code containing docstrings, including pydoc (in the standard library), Epydoc, doxygen and Sphinx.
For website creation, Python is one of the alternative 'P's in LAMP. (Like Perl and PHP, Python integrates well with Linux, Unix, Apache HTTP Server and MySQL.)
Online resources[edit]
If you're already proficient in another programming language, the official tutorial will get you up to speed at speed. Even if you're not a programmer, this fast-paced, no-frills introduction will get you programming in Python quickly, with a reasonable degree of mental pain!
Other Python books at Wikibooks are listed under Python programming language.
Useful printed books are as follows:
Title ISBN Suitable for
Python Programming for the Absolute Beginner (3.1) 978-_PHONE_ Applications and Games
More Python Programming for the Absolute Beginner (2.7) 978-_PHONE_ Applications and Games
Dive Into Python (2.7) 978-_PHONE_
available for free online
Python for Software Design: How to Think Like a Computer Scientist (2.7) 978-_PHONE_
available for free online
Algorithms and CS thinking
Invent Your Own Computer Games with Python (3.2) 978-_PHONE_
available for free online
| 2.101772 |
Zyphra/Zyda-2
|
Children in Scotland acts upon the belief that children and young people are important and valuable in the here and now (not just for their potential contributions as adults). Accordingly, we take a rights-based approach to children's policy.
The UK ratified the United Nations Convention on the Rights of the Child (UNCRC) years ago. The Scottish Government and Scottish Parliament also have made clear their agreement with the UNCRC and their intention to fully abide by it. However, the support for the UNCRC in principle is not always matched in practice by public agencies and institutions across Scotland. Much has been accomplished, but more remains to be done.
To read the UN Convention of the Rights of the Child in it's entirety (54 Articles), click here. There is also a useful guide to the UNCRC available from UNICEF at: _URL_
We find that three UNCRC Articles are most often cited in child policy work in Scotland. They are:
Article 2: all UNCRC rights apply to all children without discrimination
Article 3: the best interests of children must be a primary consideration
Article 12: children's views must be taken into account in decision-making
After years of advocacy by Children in Scotland and allied organisations, a law was passed to create a Scottish Commisioner for Children and Young People. It is the role of the Commisioner to pay close attention to the actual implementation of the UNCRC across Scotland. In April 2004, Kathleen Marshall was appointed as the first Commisioner. In 2009 Tam Baillie became the second Commissioner. More information about Scotland's Commissioner for Children and Young People can be found at:
In 2008 the four Children's Commisioners within the UK issued a joint report to the United Nations on the record of goverment in meeting its UNCRC obligations. This report can be found at:
group of young people chatting (image)
for this section:
Director of Policy, Research and Programmes
0131 _PHONE_
Click here to send an email
| 1.799792 |
HuggingFaceFW/fineweb-edu
|
ital wheat gluten" or "gluten flour"), for those who wish to make their own gluten from scratch. It is important to distinguish the two; vital wheat gluten is the product used for making seitan, but it can be mislabeled as gluten flour. Properly-labeled gluten flour has more gluten than normal flour, but not enough for seitan. Properly-labeled vital wheat gluten typically contains 75% or more protein. The distinction is important, as gluten flour will produce a consistency more similar to dumplings than to seitan. Wheat gluten is also used by bakers to increase the chewiness of breads.
The block form of seitan is often flavored with shiitake or portobello mushrooms, fresh coriander or onion, or barbecue sauce, or packed in a vegetable-based broth. In strip form, it can be packed to be eaten right out of the package as a high-protein snack. Shaped seitan products, in the form of "ribs" and patties, are frequently flavored with barbecue, teriyaki, or other savory sauces.
Additional uses of wheat gluten include the partial use in products such as Morningstar Farms, LightLife, Gardein, and, most famously, Tofurkey, which is known for its mock-turkey Thanksgiving meal. Wheat gluten is also used by The African Hebrew Israelites of Jerusalem, a vegan African American religious sect that operates a chain of restaurants called Soul Vegetarian, to produce a vegetarian sandwich called the Garvey Burger. In North America, there are also several brand-name meat alternatives, such as Protein Chef, which are used in the restaurant and food service markets.
Animal feed[edit]
Wheat gluten is also used both as a protein source and binding ingredient in pet foods. Wheat gluten from China adulterated by melamine was blamed as the cause of the 2007 pet food recalls.[8]
See also[edit]
1. ^ Pauldragron, January 2007
2. ^ Vegetarian's Paradise 2, 144 W 4th St., New York, NY 10014, _URL_ Accessed 2007-08-16
3. ^ Harmony Chinese Vegetarian Restaurant, 135 N. 9th Street, Philadelphia, PA 19107, _URL_ Accessed 2007-08-16
4. ^ Oxford English Dictionary. seitan, n. DRAFT ENTRY Dec. 2004. Online edition. Retrieved 2008-02-19.
5. ^ William Shurtleff & Akiko Aoyagi History of Erewhon -Natural Foods Pioneer In The United States (_PHONE_): Extensively Annotated Bibliography and Sourcebook Soyinfo Center. 2011
6. ^ Jacobs, Barbara; Jacobs, Leonard (1987). Cooking with Seitan: Delicious Natural Foods from Whole Grains. New York, NY: Japan Publications. ISBN 9780870406379.
7. ^ Bates, Dorothy; Wingate, Colby (1993). Cooking with Gluten and Seitan. Summertown, Tennessee: The Book Publishing Company. ISBN _PHONE_.
8. ^ US Food and Drug Administration, Import Alert IA9926, "Detention without physical examination of wheat gluten due to the presence of melamine"
External links[edit]
| 1.291755 |
Zyphra/Zyda-2
|
Motorists & Parking
Alternative Fuels Program
Reducing emissions through increasing our use of alternative fuels and retrofitting vehicles is crucial to improving New York City's air quality. The mission of the Alternative Fuels Program is to promote understanding and increased usage of alternative fuels and alternative fuel vehicles within New York City. The Program has two goals:
- To make the air cleaner and safer for New Yorkers so that we can breathe easily and without worry
- To promote the use of alternative fuels and alternative fuel vehicles in New York City by both the private businesses and government agencies
New York's Emissions Reduction GoalsOne of the most dangerous pollutants is particulate matter (PM) - commonly known as soot. Its small size lets it drift deeper into the lungs, where it can cause inflammation and other damage. According to the U.S. EPA, up to 15,000 premature deaths a year are caused by exceeding the emissions standard of PM 2.5.
A paper by the Environmental Defense Fund "All Choked Up" shows that New Yorkers living within two to six blocks of a busy road are likely to be at higher risk for conditions including cancer, heart disease, impaired childhood lung development, asthma attacks, and lung disease in adults. The City's Department of Health and Mental Hygiene estimates that a 10% decrease of current PM levels in New York City would result in hundreds fewer deaths annually.Our goal is to reduce PM 2.5 emissions across the City by 9% by 2015 and 39% per square mile by 2030. To accomplish this, the Alternative Fuels Program is working to replace New York City's public fleets with alternative fuel vehicles in order to promote and expand usage of alternative fuels which are much less polluting to the air and more friendly to the environment. The Program works closely with all levels of government agencies that operate fleets in New York City, as well as utilities (KeySpan and Con Edison) and some private sector fleets.DOT will lead the way by greening our operations and offering incentives to private fleet owners and vehicle operators to do the same. We will also partner with City Hall, the MTA and the Port Authority to promote hybrid and other clean-energy vehicles.
Alternative Fuels Program
DOT is expanding the use of biodiesel, compressed natural gas and hybrid electric technology throughout our fleet. Nearly 700 of our 3,000 vehicles use this technology already.We are using cleaner burning fuel and filtering the exhaust from our Staten Island ferry fleet. In 2005 in the first project of its kind in the US, one of our ferries (Alice Austen) was outfitted with a Selective Catalytic Reduction system and a Diesel Oxidation Catalyst, achieving a 70% overall nitrogen oxide (NOx) reduction (17 tons a year). The success of that trial has led us to begin outfitting the entire fleet with clean technology. Two of our larger ferries have received mechanical upgrades, and because they are larger than the Austen we have reduced NOx output by over 120 tons a year. The remainder of the fleet will be completed in 2008.DOT's fleet vehicles, heavy equipment, and over 2000 power tools refueling at the Harper Street Yard in Brooklyn fill their tanks with B5 (95% diesel and 5% soy-based vegetable oil. B5 is currently being introduced at the department's other refueling stations as well. We are also already testing the cold-weather performance of B20, an even cleaner burning fuel.
The Staten Island ferry fleet burns between 60,000 and 70,000 gallons of fuel every week. We are currently testing the use of B5 fuel in the John F. Kennedy and finalizing a contract to provide B5 for the entire fleet. All of our new construction equipment is delivered with the latest emission reduction technology. And over the next two years DOT's older heavy equipment will be outfitted with technology that can reduce emissions up to 85% when combined with ultra-low sulfur fuel. We also intend to introduce hydrogen fuel for our light duty fleet and gas to liquid in refuse trucks in late 2008.
Other Measures to Reduce Tailpipe Emissions
In 2005, vehicles traveled 18.6 billion miles through the five boroughs, approximately 48 million miles per day. Each year, these trips generate about 11% of our local PM 2.5 emissions as well as 52% of NOx and 32% of VOC (volatile organic compounds) emissions, both of which contribute to PM 2.5 levels. There are four main ways to reduce transportation-related emissions: decrease the amount of time vehicles spend stuck in congestion and idling; use less and cleaner fuels; and filter exhaust before it is released into the air. DOT's alternative fuels program is just one part of the overall picture of reducing emissions from the transportation sector. We are partnering with the MTA to create select bus service corridors, making mass transit faster and more accessible for hundreds of thousands of New Yorkers who currently live far from existing subway lines. We are also building out the City's 1800-mile bicycle master plan to foster bike commuting.
Encouraging the Private Sector
DOT and NYSERDA award grants to private industry to help in the procurement of alternative fuel vehicles. DOT with NYSERDA offers funding incentives to private fleets to retrofit their diesel trucks with exhaust filtering technology in order to reduce exhaust produced as trucks idle. We are currently working with Manhattan Beer, UPS, FedEx, and Coca-Cola. DOT will soon launch a separate grant program to retrofit truck fleets based at the Hunts Point Market in the Bronx. Nearly 15,000 trucks pass through Hunts Point daily. Finally, the New York City Taxi and Limousine Commission (TLC) has committed to requiring that, beginning October 1, 2008, all taxicabs coming into service (with the exception of accessible taxicabs) must be capable of achieving a city mileage rating of 25 miles per gallon (mpg). As of October 2009, all new taxicab vehicles must have a minimum city driving rating of 30 mpg.
More Information on Alternative Fuels
For more information on the types of alternative fuels, the environmental damage caused by vehicle emissions, and links to other helpful information sources, read more about alternative fuels (in pdf format).
Reducing Emissions From Non-Road Equipment (Local Law 77)
Local Law 77, which was signed into law in 2003, requires the use of ultra-low sulfur diesel and "best available technology" for reducing emissions from non-road equipment used on City construction projects. Read the Verified Technologies List of diesel retrofit technologies that have been approved by the U.S. Environmental Protection Agency for use in engine retrofit programs. Read a summary of verified diesel emission control strategies by the California Air Resources Board.
| 1.413019 |
HuggingFaceFW/fineweb-edu
|
on their own, without mom and dad standing close by encouraging and cheering them as they step closer and closer. Be their guide. Give them responsibilities that will allow them to grow and develop their financial muscles.
Ideally, when your children reach the proper age and when they are ready, mom and dad can step aside and watch their child walk, run, and talk all at the same time, financially speaking.
Let's start walking.
Comments-icon Post a Comment
No Comments Yet
Follow us on:
| 1.164044 |
Zyphra/Zyda-2
|
Jan 18, 2017 06:45 AM EST
Quantum Computing Made Available Worldwide By D-Wave Canadian Company [Video]
Quantum computing is making waves because of D-Wave. This small Canadian company has launched an open-source quantum software that makes quantum computing available for regular people.
The field of quantum computing is supported by Amazon CEO Jeff Bezos, CIA, and NASA. This field has only been known to computer programmers and developers who studied advanced math or quantum physics. D-Wave has developed qbsolve that will permit program developers and coders to program D-Wave's quantum machines even without the expertise to do quantum programming, according to Wall Street Pit.
How Quantum Computers Work
Quantum computers are mega-powerful computers that process and store data through quantum mechanics. Unlike traditional computers that store data in 'bits' represented by either '1' or '0,' quantum computers store data in 'qubits' or quantum bits. This qubits are more complex version of 'bits' because they spin in two directions simultaneously.
Quantum Computing Enhances Medical Science
The field of medicine has been revolutionized with the completion of the Human Genome Project in 2003. This has enabled the treatment of each patient in a more personalized manner through better targeted cancer therapies, according to a post by Forbes.
This new discoveries are considered as major advances. However, it also showed limitations. It revealed the small knowledge of current science regarding how proteins are coded. A great example is on the discovery that the cure of diseases involved working with complete genomes rather than isolated markers in people's chromosomes.
The problem is that traditional computers do not have the maximum power to do these tasks. The good news lie with the possibility of quantum computers of resolving the issue. Harvard scientists discovered that quantum computers allow protein mapping like that of genes. D-Wave, in collaboration with DNA-SEQ, has allowed the use of its quantum computers in the exploration of the analysis of genomes for better therapies.
Join the Conversation
| 2.396743 |
openbmb/Ultra-FineWeb
|
The Australian Government Interoperability Framework addresses the information, business process and technical dimensions of interoperability. It sets the principles, standards and methodologies that support the delivery of integrated and seamless services.
Interoperability describes the ability to work together to deliver services in a seamless, uniform and efficient manner across multiple organisations and information technology systems. Promoting interoperability between agencies is a key focus to achieving whole-of-government collaboration. Interoperability improves government's ability to design policies and services to the needs of clients and to derive efficiencies as a result of streamlined interactions both within and across agencies. To be interoperable, agencies need to actively engage in a process of ensuring that their systems, information and business planning activities are managed to maximise opportunities for exchange with and reuse by others.
To achieve this, agencies need to grapple with diverse issues including:
- legal and commercial agreements;
- policy and business requirements;
- process alignment;
- data discovery;
- messaging; and
- channel management.
These issues are typically grouped into three major layers – business, information and technical.
- The business layer comprises legal, commercial, business and political concerns. The Business Process Interoperability Framework operates in this layer.
- The information layer comprises information and process elements that convey business meaning. The Information Interoperability Framework operates in this layer.
- The technical layer comprises technology standards such as transport protocols, messaging protocols, security standards, registry and discovery standards, XML (Extensible Markup Language) syntax libraries and service and process description languages.
Refer to AGIMO's interoperability frameworks for further information.
| 1.824818 |
openbmb/Ultra-FineWeb
|
"There is growing awareness that prenatal adversity may increase the risk of autism spectrum disorder (ASD)."
"These findings indicate that HDP [hypertensive disorders of pregnancy] exposure may increase the risk of ASD in the offspring."
So said the findings reported by Eileen Curran and colleagues whose results have previously appeared on this blog with hypertension in mind (see here). I'm not altogether sure if this latest publication from this group represents 'new data' or is the same as/similar to that previously published. It doesn't really matter to be honest given that the latest publication also includes a research addition insofar as the examination of "cytokine expression in the serum of women with pre-eclampsia, which is the most common HDP, and whether exposure of foetal neurons to this serum could change patterns of neuronal growth."
Drawing on data from some 13,000 children whose details were included in the Millennium Cohort Study (MCS) researchers, after "adjusting for several potential confounders including maternal alcohol consumption, education, depression, age, and poverty status", observed "a significant association between HDP and a twofold increased risk of ASD." They also reported that: "exposure of foetal cortical neurons to 3% serum isolated from women with an established HDP increased neuronal growth and branching in vitro." The authors have reported similar things with attention-deficit/hyperactivity disorder (ADHD) in mind too ; something that might be particularly important in the context of autism and ADHD overlapping in quite a few people (see here).
Curran EA. et al. Exposure to Hypertensive Disorders of Pregnancy Increases the Risk of Autism Spectrum Disorder in Affected Offspring. Mol Neurobiol. 2017 Oct 3.
Curran EA. et al. Hypertension in pregnancy and autism spectrum disorder in a British cohort: Long term consequences for mother and child. Pregnancy Hypertension: An International Journal of Women's Cardiovascular Health. 2016; 6: 153.
Curran EA. et al. The effect of hypertensive disorders of pregnancy on the risk of attention-deficit/hyperactivity disorder in the offspring: Long term consequences for mother and child. Pregnancy Hypertension: An International Journal of Women's Cardiovascular Health. 2016; 6: 169–170.
| 1.646678 |
openbmb/Ultra-FineWeb
|
U.S. News: Reverse Mortgage Is One Way To Stay at Home During Pandemic
As employment options decline and older Americans remain at a heightened risk of developing severe cases of COVID-19 during the global pandemic, a reverse mortgage can be one tool that allows seniors to remain a home, writes U.S. News and World Report in an article published this week.
The article outlines several ways for seniors to remain at home rather than going out to work, including sharing knowledge online and tutoring; freelancing; seeking remote work; renting out space in an owned home; and tapping into home equity.
When it comes to tapping into home equity, U.S. News points to reverse mortgages as one option, for those who qualify and are at least 62 years old. A sale-leaseback is another option, the article notes.
"Homeowners who want to avoid dipping into retirement funds during an economic downturn may find that their house is a source of cash," the article writes. "However, with home equity lines of credit being suspended by some banks, retirees need to get creative.
"Reverse mortgages are one option for retirees who are at least 62 years old. With a reverse mortgage, a lender makes regular payments to a senior based on the value of their property. Once the homeowner moves or passes away, the loan must be repaid. This typically requires the sale of the property."
Read the article at U.S. News and World Report.
Companies featured in this article:
Join the Conversation (4)
see all
- "'With a reverse mortgage, a lender makes regular payments to a senior based on the value of their property. "' What nonsense.
First, only ADJUSTABLE RATE HECMs currently offer that option. (All HECMs are reverse mortgages but NOT all reverse mortgages are HECMs, no matter what the practice in the industry is.) Second the amount of the payments are not based on the value of the home. They are based on the difference between
1) the principal limit and
2) the sum of the unpaid balance and the net amortized balances in set asides as of the time that the payouts begin;
the payout is then determined based on a amortization concept where the computational interest is the sum of the EXPECTED INTEREST and the ongoing MIP annual rate —(reminder there are two — 0.5% on the oldest and most recently endorsed HECMs but 1.25% on those HECMs receiving case number assignments beginning after October 3, 2010 and ending before October 3, 2017) divided by 12 and 2) and the computational time period is either a fixed number of months or, in the case of tenure payments, the number of months until the youngest borrower turns 100 starting with the date that the payouts will begin.
When one says it is based in any part on the value of the home, this shows such folks do not understand that the HECM is not a home value issue but a contract. Under the statute of frauds, all real estate related transactions must be in writing — i.e. must be contracts (including mortgages)!!! Beyond that these folks who emphasize home value show they do not understand the critical role that the Maximum Claim Amount plays in determining the HECM Principal Limit.
It seems currently when most columnists are told things that are not exactly correct about reverse mortgages (and HECMs, in particular), they do little original research and run with that information as if the columnists lived in Greece in 360 BC and the information THEY received, came DIRECTLY from the gods on Mount Olympus.
- John,
Thank you. Everything is OK but like everyone else we are getting restless. The days here are beach living weather. What a waste…!!
Take care and be safe,
Jim Veale
- One thing needs clarification, the time period for tenure payments. The time is the youngest borrower's current age in HECM years to the actual age of 100. So if a senior is 69 and 5 months, that senior is exactly 69 years old in HECM years. That senior would have 31 years (or 372 months) to age one hundred for HECM tenure payment calculation purposes.
string(113) "_URL_
Share your opinion
| 1.06298 |
Zyphra/Zyda-2
|
Transmissions for Forklifts - Utilizing gear ratios, a transmission or gearbox provides speed and torque conversions from a rotating power source to another machine. The term transmission refers to the entire drive train, along with the gearbox, prop shaft, clutch, final drive shafts and differential. Transmissions are most normally used in vehicles. The transmission alters the productivity of the internal combustion engine to be able to drive the wheels. These engines have to operate at a high rate of rotational speed, something that is not right for stopping, starting or slower travel. The transmission increases torque in the process of decreasing the higher engine speed to the slower wheel speed. Transmissions are also used on fixed machines, pedal bikes and wherever rotational torque and rotational speed need adaptation.
Single ratio transmissions exist, and they operate by altering the torque and speed of motor output. Lots of transmissions comprise several gear ratios and can switch between them as their speed changes. This gear switching can be accomplished automatically or manually. Forward and reverse, or directional control, may be provided as well.
The transmission in motor vehicles will generally connect to the engines crankshaft. The output travels through the driveshaft to one or more differentials in effect driving the wheels. A differential's main function is to be able to alter the rotational direction, although, it can also supply gear reduction as well.
Torque converters, power transmission as well as various hybrid configurations are other alternative instruments used for torque and speed change. Standard gear/belt transmissions are not the only machinery available.
The simplest of transmissions are simply called gearboxes and they provide gear reductions in conjunction with right angle change in the direction of the shaft. Sometimes these simple gearboxes are utilized on PTO machines or powered agricultural machines. The axial PTO shaft is at odds with the usual need for the driven shaft. This particular shaft is either horizontal or vertically extending from one side of the implement to another, depending on the piece of machinery. Silage choppers and snow blowers are examples of much more complex machines which have drives providing output in multiple directions.
The type of gearbox utilized in a wind turbine is a lot more complicated and bigger as opposed to the PTO gearboxes used in farm machines. These gearboxes change the slow, high torque rotation of the turbine into the faster rotation of the electrical generator. Weighing up to several tons, and based on the size of the turbine, these gearboxes generally contain 3 stages to accomplish a whole gear ratio beginning from 40:1 to more than 100:1. In order to remain compact and so as to distribute the massive amount of torque of the turbine over more teeth of the low-speed shaft, the primary stage of the gearbox is normally a planetary gear. Endurance of these gearboxes has been an issue for some time.
Click to Download the pdf
| 2.167115 |
openbmb/Ultra-FineWeb
|
Apr 09, 2007 — Millions of honeybees across the country are dying mysteriously. Entire hives or colonies of bees are collapsing. Scientists say it's some new threat. They're scrambling to find answers. As Bob Allen reports, bees are crucial in pollinating billions of dollars worth of crops every spring.
| 1.09795 |
openbmb/Ultra-FineWeb
|
Recession Survival Strategies For A Chartered Accountant
When Australian businesses and companies recruit a chartered accountant, then they anticipate someone who has those specialized skills along with the technical experience which goes with being an expert.
You can get more information about the best-chartered accountant via
Recession Survival Strategies For A Chartered Accountant
Image Source: Google
They expect quality work, and they'll pay extra cash to an experienced professional chartered accountant in Sydney. Truly, accountants are in the ideal position of assisting their business to survive the downturn and its own fiscally messy aftermath.
The followings hints can help devise approaches to accomplish that:
1. Plan ahead. A respectable chartered accountant at Sydney understands the intricacies of fiscal planning. These financial experts attempt to predict the need in the forthcoming months. If you're among many public accountants in Sydney, then you understand this could be anywhere from a few months to a few years.
2. Assist your clients. If you can find a means to supply exactly the same (if not better) level of support at a lower price or at least, without raising the price tag, you've got a better prospect of keeping customers despite the financial recession.
3. Request discounts from providers. As they say, nothing ventured nothing gained. In an economic recession, competition for the company might be fiercer.
4. Use your tools wisely. If you're a chartered accountant at Sydney, you understand how to examine your accountancy requirements in addition to your organization.
5. Track prices. All companies have variable and fixed costs, as chartered cost accountants understand. Careful financial planning involves making comprehensive reports. Reports will be able to help you monitor and analyze prices.
6. Control expenses. Understanding what those variables are and placing steps to minimize its impact can help considerably in restraining prices.
7. Make strategic decisions depending on the large image. Think about the company your company is in and the market generally. As an expert accountant at Sydney, be informed of business and financial trends through surveys, investigations, and studies.
| 1.008937 |
Zyphra/Zyda-2
|
One in eight people suffer from malnutrition
In a world where technology has advanced to a point where I can instantly have a face-to-face conversation via online video with a friend in Tokyo, nearly 870 million people, or one in eight, still suffer from malnutrition, according to a new UN report. While worldwide hunger declined from 1990 to 2007, progress was slowed by the global economic crisis. Over the last few years, numerous and record-breaking extreme weather events have also taken tolls on food production. Currently, food prices hover just below crisis levels.
"We find it entirely unacceptable that more than 100 million children under five are underweight," the heads of the Food and Agriculture Organization (FAO), International Fund for Agricultural Development (IFAD), and the World Food Programme (WFP) write in a forward to the report, State of Food Insecurity in the World 2012, adding that such children "are unable to realize their full human and socio-economic potential, and that childhood malnutrition is a cause of death for more than 2.5 million children every year."
From the early 1990s to today, the number of those going to bed hungry has fallen by around 132 million, dropping from 18.6 percent to 12.5 percent of the total world population. While this is laudable progress, regions still make a big difference. In fact, hunger has actually risen in Africa: 64 million people have been added to the number of hungry on the continent since the early 1990s. Population growth rates are also highest in Africa.
Article continues at Malnutrition,
Famine image via Wikipedia.
| 1.902733 |
HuggingFaceFW/fineweb-edu
|
Definition of Bear grass
1. Noun. Yucca of southern United States having a clump of basal grasslike leaves and a central stalk with a terminal raceme of small whitish flowers.
2. Noun. Yucca of west central United States having a clump of basal grasslike leaves and a central stalk with a terminal raceme of small whitish flowers.
3. Noun. Stemless plant with tufts of grasslike leaves and erect panicle of minute creamy white flowers; southwestern United States and Mexico.
Generic synonyms: Agave, American Aloe, Century Plant
Group relationships: Genus Nolina, Nolina
4. Noun. Plant of western North America having woody rhizomes and tufts of stiff grasslike basal leaves and spikes of creamy white flowers.
Generic synonyms: Liliaceous Plant
Group relationships: Genus Xerophyllum, Xerophyllum
Bear Grass Pictures
Click the following link to bring up a new window with an automated collection of images related to the term: Bear Grass Images
Lexicographical Neighbors of Bear Grass
Literary usage of Bear grass
Below you will find example usage of this term as found in modern and/or classical literature:
1. History of the Discovery and Settlement of the Valley of the Mississippi: By by John Wesley Monette (1848)
"AD 1781 TO 1784. Argument.—Severs Winter of 1780-81.—Scarcity in Kentucky.—Kentucky divided in to three Counties.—Indian Hostilities on Bear-grass Creek...."
2. A Dictionary of English Synonymes and Synonymous Or Parallel Expressions by Richard Soule (1891)
"Spanish-bay une t, bear-grass, Adam's needle. Yule* "• I* Christmas, yule-tide. 2. lemmas, Lammas-tide. Yule-tide,*. Christmas...."
3. Rural Rides by William Cobbett (1853)
"Something, however, depends on the nature of the soil: for it is not all land that will bear grass, fit for hay, perpetually; and, when the land will not do..."
4. A Geographical, Historical, Commercial, and Agricultural View of the United by Daniel Blowe (1820)
"Spruce and hemlock, in the eastern parts of the state, denote a thin, cold soil, which, after much labour in the clearing, will indeed bear grass without..."
5. Rural Rides in the Counties of Surrey, Kent, Sussex, Hants, Berks, Oxford by William Cobbett (1908)
"Something, however, depends on the nature of the soil: for it is not all land that will bear grass, fit for hay, perpetually; and when the land will not do..."
| 2.00198 |
HuggingFaceFW/fineweb-edu
|
The Imaginary Number i
Posted by Professor Cram in Complex Numbers
Complex Numbers: An Introduction
A complex number can be expressed in the form:
a + bi
where a and b are real numbers.
The number i is defined as the square root of -1. It is an imaginary number, since the square root of any negative number is not a real number.
Complex numbers are not algebraic expressions. They are numbers, containing a real part (a) and an imaginary part (bi).
Using i
In the world of real numbers, an expression like the square root of -9 is unsolvable. (Remember, because the square root of a negative number is not real.) However, by using the imaginary number i we can break this problem down as the square root of (9)(-1).
This can be expressed as the square root of 9 (which is 3) times the square root of -1 (which is i). Thus, the answer to this otherwise unsolvable problem is 3i.
i to a Power
As with any real number, i0 = 1 and i1 = i. We know that i2 = -1. Also, i3 = (-1)(i) or -i. These four values (1,i, -1, -i) are the only possible results of raising the imaginary number i to any power.
To figure out any exponent higher than 4, just divide the exponent by four and use the remainder (0, 1, 2, or 3) as the new exponent. Match it up with the choices here and you have your answer. (Check the tutorial below to see this in action.)
The Imaginary Number i
What is the imaginary number i, and how is it used? This tutorial will teach you all about it.
The Flash plugin is required to view this object.
5 Responses to "The Imaginary Number i"
1. Ronna says:
How bout if imaginary number i is raise to i.."i^i"??
2. Heman says:
Its a real no having magnitude e^(-pie/2) and other values as well. Use demoivre theorem
3. Vasundhara says:
what is the demoivre theorem??
4. jay says:
how to you get the remainder 0,1,2,3 when raisin i?
5. Henry says:
So if i^2 is equal to -1, and -1 is a real number, then two imaginary numbers can create a real number? So qualitativly, could this mean that if two imaginary particles were to collide, they could theoretically create a real particle? Does this not defy the first law of thermodynamics? Or does this simply mean that I'm misunderstanding the use of the word "imaginary"?
Leave a Reply
| 2.305124 |
Zyphra/Zyda-2
|
Obs via Google Maps
Oil & Gas ADCP
Ship Obs Report
Obs Web Widget
NDBC on Facebook
NDBC DQC Handbook
Hurricane Data Plots
Handbook No. 1
See recent photos from TAO buoy 8N 110W
How can I compute the distance from a buoy to shore, an inlet, or another reference location?
Often, when you ask us how far a buoy is away from a location, we don't know the exact location of the jetty, inlet, or the point on shore that you are referring to. We'd hate to guess and give you the wrong information. However, it's fairly easy to determine this yourself if you can find the latitude and longitude of your reference position.
Copy the station's latitude and longitude from the station page. Next, look up the latitude and longitude of the inlet, lighthouse, town, or other geographic feature you are interested in. You can find these on NOAA nautical charts: _URL_ provides a listing of these charts which you can purchase.
When you have this information, do an Internet search for a "Great Circle Calculator" and go to one of the web sites featuring this type of calculator.
Here's a Great Circle Calculator offered by NOAA's National Hurricane Center: _URL_
Then, enter the latitude and longitude of our buoy and the position of your reference location. The calculator will provide the distance in in your choice of units.
| 1.072812 |
HuggingFaceFW/fineweb-edu
|
they were supposed to. The
scanner was very picky when detecting a finger, even with a live enrolled finger it was occasionally
hard to log in. For the breathing, the scanner notified "Finger is too wet" and for the gummy bear
attack there was also the "Invalid finger" error presented.
Method 2: Creating a Mold Using a Live Finger
Some typical household items carry the properties of a real finger when it comes to capacitance,
conductivity and flexibility. One of the easiest ways to imitate human finger is to create a gelatine
finger from gelatin sheets or powder. When using a mold, this material can be formed into a shape of
the legitimate user's finger. The mold itself can also be manufactured using equipment commonly
available, such as hot setting adhesive.
This method is based on the fact that gelatine finger has about the same capacitance as a real finger
(~20Mohms/cm) and thus the scanner is unable to distinguish these two. Now all that is needed is a
gelatine finger that corresponds to the real finger at the accuracy level of the scanner. For the 100 SC
scanner this resolution is 500dpi, each dot representing a small point for measuring the capacitance. If
capacitance is high, then at that point there is a ridge, if small, there is a valley of the fingerprint.
First, the mold must be created. In our test we used hot glue. It is important to stick the finger in the
glue when it is still liquid but not too hot. It is a good idea to moisten the finger beforehand. After the
mold is ready and cooled down, some liquid gelatine is poured on it. To get the best result, it is
advised to use gelatine sheets mixed in hot water. Boiling should be avoided to reduce the amount of
bubbles. After the gelatine is congealed (to speed up the process, the mold with the gelatine on it, can
be cooled down in a refrigerator), the fake finger is ready to be used. Same rules apply here as it did
with the gummy bear; the right amount of pressure must be found.
This method was proven to be successful and thus security was compromised. After several tryouts
and many trial-error experiments a suitable way to manufacture a usable mold was found. As a result,
we were able to create a fake finger that was used to fool the scanner. The result is not a hundred
percent proof solution as only few times out of hundred ended up in a successful detection of the finger. With this success rate it is not easy to go and break into someone's computer, because after a
few failed detections the scanner locks the smart card and PUK-code is needed to unlock the card.
This method is not very usable for real life situations, as it needs a live finger for the mold creation.
Though this method is further developed in the next method and thus brought into more usable form.
Yet, it shows that a fingerprint scanner can be fooled with a pretty simple scheme and a very low
Method 3: Creating a mold using a latent fingerprint
The most usable and also the most probable form of attacking a fingerprint scanner is by using a real
fingerprint left by the legitimate user. Now that security of the scanner has been compromised, it is
time to try preparing the mold without any help from the target. Typically we leave fingerprints
anywhere we touch, mugs, door handles, stair rails and of course keyboards. These latent prints can be
brought visible and then used to make a mold and a fake finger. The creation of the mold is different
than in the previous attack, but the usage of the finger follows the same path.
Fingerprints consist mainly of grease and are usually latent but with e.g. photocopier powder they can
be made visible. With a digital camera a visible fingerprint can be ported to a computer and retouched
to a suitable form. Using a technique that is widely used with do-it-yourself circuit boards, a negative
image of this fingerprint is printed on a transparency. A photosensitive layer of lacquer is applied to a
copper plated circuit board and transparency is placed over that. When UV-light hits the surface, the
black-printed areas of the transparency protect the lacquer and the rest react with the light. After a few
minutes the lacquer is washed off with a lye dilution and a fingerprint should be visible on the circuit
board. Now this board is corroded with ferric chloride and the result is a flat mold of the fingerprint.
Gelatine liquid can be poured on to the mold as a thin layer and after congealing we have a fake
finger. This finger is used between an intruder's finger and a fingerprint scanner. A fake finger is
placed between the pad and a human finger in order to fool the scanner.
Compared to method 2 where a live finger was used to create a mold, this approach is very different.
A latent fingerprint is used and the procedure is divided into five sections, obtaining fingerprint,
making the transparency, creation of the mold, creation of the finger and using the finger.
First, a clear and flawless picture of the target's fingerprint must be obtained. The fingerprint must of
course match the finger that is enrolled to the smart card. When a suitable print is found a good way is
to use photocopier powder to dust the print visible and then use a digital camera to take a snapshot of
it. It is important to make some measurements to get the scale of the print correct, i.e. measure the
distance between two characteristic points.
Making of transparency step-by-step:
1. Use image manipulation program to edit the fingerprint image.
2. Clear out the excess dust from the sides of the print.
3. Adjust contrast so that the print has a clear pattern.
4. Scale the image according to the measurements done on the actual dusted fingerprint.
5. Invert the image to negative.
6. Print the image on the transparency.
The making of the mold step-by-step:
1. Spray the photosensitive lacquer on the circuit board and let it dry for a while.
2. Place the transparency on the circuit board with tape.
3. Expose the board through transparency with UV-light for 5-15 minutes.
4. Take off the transparency
5. Develop the lacquer using NaOH-solution. Use watercolor brush to brush the lacquer. Be
careful not to rub off all the lacquer.
6. When you see the fingerprint, wash the board with water.
7. Corrode the board using FeCl3-solution.
8. Once the copper is corroded off, wash the board thoroughly with water.
9. Use soap or alcohol to rinse any remaining lacquer off the board.
The creation of the finger:
1. Soften 40g of gelatine sheets in cold water for about 5 minutes.
2. Heat up the water (1/2dl) to boiling and take the kettle off the stove.
3. Put the softened gelatine sheets into the hot water. Be careful not to boil them.
4. Stir for 10 minutes.
5. Let the mixture cool down a bit. You can try to reduce the amount of bubbles with a gentle
6. Pour some of the gelatine mixture on the mold so that it covers the print completely. About
2mm is a good layer thickness.
7. Put the mold in the refrigerator and let it congeal for at least 15 minutes. The longer the
better, but keep the mold in a humid place or the gelatine will dry up.
8. After the gelatine has congealed you can separate it from the mold. Using a knife peel off a
bit from the corner and then slowly lift the rest of the finger.
9. The finger should now have a distinctive fingerprint.
10. You can handle the finger in room temperature but be careful not to warm it too much as it
will start to melt again.
The usage of the finger:
1. You should now have a gelatine finger that feels like a soft real finger.
2. Ensure the smart card is inserted into the reader.
3. Wait for the login screen to prompt for the finger.
4. Place the gelatine finger on the tip of your finger.
5. Gently press the gelatine finger on the scanner.
6. If you press too hard you will get "Finger is too wet" error. Too light and the "finger" wont
be detected.
7. If you continually get "Finger detection failed!" then it is advised to stop trying after about
5-10 tryouts or you will get the smart card locked and thus increase the risk of getting
caught. Try again after the legitimate user has successfully logged on one time. This will
reset the fault counter.
This technique was proven to be successful and security was compromised although the success rate
was not that high. Only a few out of a hundred
| 1.605353 |
Zyphra/Zyda-2
|
S21 and the Killing Fields
Trigger Warning: The following post discusses the violence perpetrated by the Khmer Rouge in Cambodia. Some pictures are included at the end of the post.
I can't remember when I first learned of the Khmer Rouge. I do remember several people telling me that I had to visit the genocide museum and the killing fields when I got to Cambodia. One guy suggested that visit the museum first to better understand the killing fields. I followed his advice.
Mixed into the capital city of Phnom Penh is what is now the Tuol Sleng Genocide Museum, also called S21. The site was originally a school until the Khmer Rouge turned it into one of their prisons in an effort to cleanse and rebuild Cambodia. All intellectuals and professionals were arrested. Even people with glasses were arrested. People who were suspected of not being loyal to the leader of the Khmer Rouge, Pol Pot, were arrested. Anyone and everyone was at risk of being arrested. They were then interrogated and tortured. It was suspected that the prisoners had ties to, or were assisting, the CIA or the KGB. After it was determined that they had no more useful information, they were killed.
At the museum, there are artifacts from when the facility was used as a prison. Some metal beds still have the shackles used to restrain prisoners. Next to the bed is a munitions box that was given to be used as a toilet. There are also pictures in some of the rooms from when they discovered the prison. They are pretty graphic. At some buildings, they put up barbed wire fencing to prevent prisoners from jumping to commit suicide. The regime wanted to maintain total control. They also had the practice of killing entire families, including children. The rationale was that they didn't want anyone from that family to come back seeking revenge.
When S21 ran out of space to bury prisoners, they began taking prisoners outside of the city to kill them and bury them in mass graves. Because bullets were so expensive, they stopped using them and killed with whatever tools they had. Executions were conducted on the edge of the mass grave so that the prisoner could fall in. The regime sprayed toxic chemicals on the recently deceased to mask the smell and to kill anyone who wasn't dead yet. There's a tree close to the centre of the killing fields known as the killing tree. It was used to smash babies until they died. Although the regime was ousted in 1979, there are still bones and bone fragments being unearthed due to rain and shifting soil.
At both sites, they have some of the skulls of the deceased on display. Some have cracks or bullet holes. Some are missing portions. They also have various torture devices on display at the genocide museum. They are both really somber places. One point that stuck with me is that Cambodia lost about a quarter of its population during the Khmer Rouge regime. From eight million people, that's two million gone. And it's not ancient history. This was 40 years ago. That's extremely sobering. Another fact that blew my mind: S21 and the killing fields are part of a much larger network. In other words, there were prisons all over Cambodia and there still are mass grave sites all over the country. Not all of the mass graves have been uncovered because of unknown locations or inaccessibility.
If you ever have the opportunity to go to these sites, definitely go (if it's line with being kind to yourself).
Here are some pictures from both sites.
The munitions box. To be used by the prisoners as a toilet.
One of the remaining headstones from the cemetery before it became the killing fields.
The killing tree. There's a mass grave to the right of the tree.
One of the skulls on display at S21.
Be kind to yourself.
| 1.249017 |
Zyphra/Zyda-2
|
other. Vespasian was elevated to the throne, and his son, Titus, was left to continue the conquest. The siege began in the year 70 A.D. Soon famine prevailed. Citizens who ventured outside the walls to search for roots to eat, if seized, were crucified by the Roman soldiers. Sometimes hundreds in that awful position could be seen from the walls. A trench was dug around the City, in order to make its isolation complete. Prisoners of war were cut open, while alive, to enable soldiers to search their bodies for gold which they might have swallowed. Six hundred thousand persons died within the walls, and the dead bodies, too numerous to be buried, were left in the houses. The Zealots, a fanatical sect whose members maintained that God would save them at the last moment, went about murdering and urging the people to resistance. Even Titus was sick at heart at the daily horrors he witnessed or heard of. At length the temple became a fort. Titus attacked it as such. A Roman soldier, contrary to order, set fire to it. After a while the scene was one of carnage and plunder. Six thousand Jews perished in the flames. In this awful war more than a million and a half of the Jews perished, and many were sold into slavery, and thus 'scattered among all nations.'" (Smith and Sjodahl, Commentary, pp. 260–61.)
The Savior spoke the words of the Olivet Discourse during the last week of His life, in A.D. 33. Jerusalem fell in A.D. 70. His promise "that this generation of Jews shall not pass away until every desolation … shall come to pass" (D&C 45:21) was fulfilled. Some of the disciples who heard Jesus speak those words were still alive when the legions of Titus put the temple to the torch.
D&C 45:22. Is the World Going to Come to an End at Christ's Second Coming?
Elder Bruce R. McConkie explained the special way this phrase is used in the scriptures: "The end of the world is the end of unrighteousness or of worldliness as we know it, and this will be brought about by 'the destruction of the wicked.' ([JS—M] 1:4.) When our world ends and the millennial era begins, there will be a new heaven and a new earth. (Isa. 65:17–25; D. & C. 101:23–24.) Lust, carnality, and sensuousness of every sort will cease, for it will be the end of the world." (Mormon Doctrine, p. 848.)
D&C 45:24–30. What Are the "Times of the Gentiles" and When Are They Fulfilled?
President Joseph Fielding Smith explained that "the times of the Gentiles commenced shortly after the death of our Redeemer. The Jews soon rejected the Gospel and it was then taken to the Gentiles. The times of the Gentiles have continued from that time until now. The Lord said: 'But many that are first shall be last; and the last shall be first.' In that day the Gospel was given first to the Jews and then taken to the Gentiles. In this dispensation it was taken first to the Gentiles and afterwards it will go to the Jews." (Church History and Modern Revelation, 1:196.)
The times of the Gentiles began with Peter's vision and the baptism of Cornelius (see Acts 10). Paul and the other Apostles then began the great missionary work to the Gentiles, since the Jewish nation, for the most part, had rejected Jesus. As President Smith indicated, the times that the major gospel effort would be with gentile nations continued with the Restoration. The times of the Gentiles will be over, or fulfilled, when the major efforts of gospel teaching begin to focus on the house of Israel: the Lamanites, the Jews, and the ten tribes.
In the Olivet Discourse, the Savior gave four signs to indicate when the times of the Gentiles were over. Three are given in section 45, and one is given in Luke's account of the great discourse.
The Jews will be gathered back to the land of Jerusalem (see D&C 45:25). In the April 1960 general conference, Elder George Q. Morris of the Quorum of the Twelve discussed this sign:
"I think perhaps we may well now not continue saying the Jews are going to gather in Jerusalem. I think now we may well say they have gathered. The ultimate returns will come later as they develop this land and are joined by others. …
"This statement by a writer is very interesting:
"'Strangely enough when the State of Israel was reborn in 1948, it was a nation of 600,000, the same number which the Bible reports that Moses led out of bondage in Egypt. It now numbers some two million, the same number which it is said populated the ancient Kingdom of Solomon, when Israel was in all its glory.'
"That is why we may now say that the Jews have returned to Palestine." (In Conference Report, Apr. 1960, pp. 100–101.)
It will be in a time of great social turmoil (see D&C 45:26–27). One need only follow current events as reported in the news media for a day or two to see turmoil like the Savior described.
The Gentiles will for the most part reject the gospel (see D&C 45:28–30). President Joseph Fielding Smith, writing about these verses, said: "'And when the times of the Gentiles is come in, a light shall break forth among them that sit in darkness, and it shall be the fulness of my Gospel,' the Lord said in this revelation [D&C 45:28]. The meaning is that when the time had come for the restoration of the Gospel—in the times of the Gentiles—that it would not be perceived because the hearts of the people are turned away by the precepts of men. However, in that generation this should happen, the times of the Gentiles should be fulfilled." (Church History and Modern Revelation, 1:196.)
Jerusalem will no longer be "trodden down of the Gentiles" (Luke 21:24). Again President Smith explained: "When we consider the words of the Savior to his disciples, that the Jews should be scattered and 'Jerusalem shall be trodden down of the Gentiles until the times of the Gentiles are fulfilled,' we have a fair understanding of the meaning of this … verse [D&C 45:30] in this revelation. Jerusalem was trodden down of the Gentiles from the day of its destruction until the close of the year 1917, when it was freed from Turkish rule by General Edmund H. Allenby of the British forces. After the war Palestine became a British mandate, and Great Britain by proclamation declared that country to be a refuge for the Jews, who were invited to return. … It is very significant, however, that Jerusalem is no longer trodden down by the Gentiles and the Jews are again gathering there. This is the sign given by our Lord, for the end of the times of the Gentiles. We are now in the transition period and shortly the day of the Jew will dawn and the Gospel will be taken to them and to the remnants on this land." (Church History and Modern Revelation, 1:196–97.)
When Joseph Fielding Smith wrote those words in 1947, Israel had not yet been made a state; they were still under the British mandate. But on 15 May 1948, Israel became an independent nation and declared Jerusalem to be her capital. In the war that followed this declaration, the Jews could maintain control of western Jerusalem only. East Jerusalem became part of the state of Jordan. In general conference in 1966, Elder Smith, now President of the Quorum of the Twelve, said: "Jesus said the Jews would be scattered among all nations and Jerusalem would be trodden down by the Gentiles until the times of the Gentiles were fulfilled. (Luke 21:24.) The prophecy in Section 45, verses 24–29, of the Doctrine and Covenants regarding the Jews was literally fulfilled. Jerusalem, which was trodden down by the Gentiles, is no longer trodden down but is made the home for the Jews. They are returning to Palestine, and by this we may know that the times of the Gentiles are near their close." (In Conference Report, Apr. 1966, p. 13.)
During the Six-Day War of 1967, Israel conquered the West Bank, including Jerusalem, and for the first time since the city fell to the legions of Titus in A.D. 70, Jerusalem came completely under the control of a Jewish government.
D&C 45:26. Men's Hearts Shall Fail Them
President Ezra Taft Benson noted:
"We live in an age when, as the Lord foretold, men's hearts are failing them, not only physically but in spirit. (See D&C 45:26.) Many are giving up heart for the battle of life. Suicide ranks as a major cause of the deaths to college students. As the showdown between good and evil approaches with its accompanying trials and tribulations, Satan is increasingly striving to overcome the Saints with despair, discouragement, despondency, and depression.
"Yet, of all people, we as Latter-day Saints should be the most optimistic and the least pessimistic. For while we know that 'peace shall be taken from the
| 1.236309 |
HuggingFaceFW/fineweb-edu
|
Universities' efforts to "decolonize" their curricula aren't about increasing the representation of minorities, but rather enforcing a radical leftist "party line."
So says University of Nottingham doctoral researcher Sumantra Maitra in an April 9 National Review piece which delves into the efforts of Marxist "post-colonial" professor Priyamvada Gopal, the Cambridge University Students' Union, and others to decolonize some 30 departments at the UK institution.
After all, they're "too dominated by white, male, Euro-centric perspectives."
The genesis of these campaigns, Maitra says, is the Oxford University "Rhodes Must Fall" enterprise led, ironically, by a Rhodes scholar. Aside from infesting Cambridge in the UK, the movement has spread to the US, particularly at elite schools.
At Yale for instance, the English department created a new course in response to a "decolonize" petition" which "increase[s] the breadth of the curriculum and combat claims of departmental racism." Across the country, the goal of Stanford's Student Alliance for Justice in Education is "disrupting the dominance of Western schools of knowledge."
Even courses about sustenance aren't immune; Cal State Fullerton's "The Social Life of Food" requires enrollees to "write a recipe that is decolonized."
It is easy to ignore these slow and persistent attempts to change the education system from within, but it's also a mistake. As Michael Shermer noted in the Scientific American, there's a broader subversive aim being served here. Most of these incidents are essentially a type of power grab by one set of ideological, left-wing academics who use gullible students as pawns in their broader war against the Western canon and rational inquiry. The protest against Charles Murray in the United States was led by such academics, as were a host of other similar disgraces, very much including the the decolonize movement at Cambridge. Consider Dr. Gopal's suggestions of black and minority writers to counter the "whitewashing" of English literature in the university's curriculum, which include five authors, all of them radical leftists and feminists.
Surely, if Gopal and her student charges just wanted more minority representation in the curriculum, they'd include some conservative authors as well? Why not the philosophy of Thomas Sowell, who has questioned the madness of cultural relativism? Why not Zambian economist Dambisa Moyo's phenomenal work on how foreign monetary aid is destroying Africa? Why not Churchill's favorite Indian conservative "man of letters," Nirad C. Chaudhuri, who dedicated a now-legendary book that was banned in early 1950s socialist India "to the memory of the British Empire in India, which conferred subjecthood upon us, but withheld citizenship.... all that was good and living within us was made, shaped and quickened by the same British rule"?
| 1.490998 |
openbmb/Ultra-FineWeb
|
Endocrine System
Natural Health Remedies & The Endocrine System | Health Topic
In many ways, the endocrine system can be viewed as a partner, or complement, to the nervous system. Whereas the nervous system uses nerve impulses that last milliseconds to control short term events in the body, the endocrine system uses hormones that can sometimes take minutes, hours, or even days to take effect and control events. And sometimes those effects can last a lifetime.
As an endocrine organ, the pancreas produces two sugar-regulating hormones: insulin and glucagon. After reviewing the functions of insulin and glucagon and the four cell types that comprise the endocrine pancreas, you can then examine in detail the main disease associated with the pancreas, diabetes mellitus.
Once you understand how important the endocrine system is in controlling every aspect of your life, from your moods to your sexuality to your energy levels to your ability to grow and be strong, you realize how important it is to keep it optimized. And yes, there are things you can do to keep it optimized.
Enjoy Jon Barron's health newsletter series covering the entire Endocrine System:
Related topics covering the Endocrine System:
You can find a wealth of supportive information by visiting our Enzymes and our Hormones health topics pages!
| 1.589633 |
Zyphra/Zyda-2
|
3 Things I learnt:
- I found the statistics of both "children with disabilities" and "typical children's" grades were raised in inclusive classrooms.
- I found what Kelsey shared about talking with people with disabilities helpful and interesting, not everyone is as sensitive as you may think (when saying normal phrasing isn't offensive although it may seem like it).
- I know what Dragon speak is but never realized the troubles that one may have when using it.
2 Connections I made:
- when I was working at a daycare for many years I worked one on one with a little girl with a disability and unfortunately left for awhile then came back. It was truly remarkable the difference between the children who grew up with her and the children who were just getting to know her. The children who grew up with her had an appreciation and an understanding and patience with her and other kids who were struggling.
- I think it is very interesting when people use theater to help children with disabilities whether they are physical or emotional or social, the experience that these children have when experiencing something so wonderful is inspirational.
1 Question that still remains (or two questions for lecture this week)
- How can we get parents to help support their children better? I have worked with children with diverse abilities throughout the years and have seen the difference of children's development when having supportive parents and parents that just get through each day.
- How can we normalize diversity when we still have parents who are unaware, or not understanding?
What do you think shapes a person's identity and how does their identity play a role in their education?
I think parents truly shape their children's identity, and who they are. When children are encouraged by their parents to be the bets that they can be or to overcome obstacles in their daily lives then the children will succeed or at least try their damnedest. Children's identity is who they are and their role in education is just a part of who they are – identity is everything when it comes to life's events and education is a major life event.
Why do you think people with disabilities are often identified by their differences and not their capabilities or character traits?
I think people with disabilities are identified by their differences because that is what they see first, before anything else. Many people don't take the time to understand or get to know a person with a disability. It is only when people get to know a person with a disability do they get to see and learn that person's capabilities and who they are.
There is sooo much that I want to say or comment on but I will stick with the good ol' format.
3 things I learnt:
- That children were legit stolen from communities and taken to residential schools, that parents didn't even know that their children were taken.
- Families were prevented by law from fighting for their children, and trying to stop their children from going to residential schools.
- During the 60s scoop there was 20 000-50 000 children taken… what exactly was the 60s scoop?
2 connections I made:
- Currently I am studying for a project the missing and murdered indigenous women of Canada, and there is a stretch of highway where more often then not women are taken from that is called "The highway of tears" I found it ironic that the trains that were used to take the children were referred to as "The trains of tears".
- Tash Hubbard not being able to teach her son Cree, something that he wished soo much to be able to learn from his mother – the controversy of Indigenous Language becoming a necessity of Saskatchewan schools… What decides this change?
1 Question that still remains:
Although I have many questions to ask I feel like the most important is:
How can we teach without being assimilative, how can we help children hold on to their culture?
Three things I learnt:
- In most schools, we, at least. tell students that it is not acceptable to make sexist or racist comments, even if we do not always follow through or "walk the taIk." Yet, when it comes to gay. lesbian, and bisexual issues we hold back in fear. By allowing. anti-gay harassment to be voiced without reprimand, schools are sanctioning and even encouraging bigotry. As a teacher who bas taught to junior and senior high school students. a teacher educator. and someone who actively works towards the inclusion of difference and against oppression in all of its forms. students have made the importance of teaching students and their teachers about the wide spectrum of sexualities abundantly clear to me. Otherwise, we consign gay, lesbian. and bisexual teens to be forever at the "bottom of the pile." In doing so, we give all students the message that "the homosexual" is Other: to be feared. odd. fundamentally different. This act of Othering causes many gay, lesbian, and bisexual young people to feel that their sexuality makes them essentially unlike. separate. and forever outside the culture of their peers. Among other consequences, Othering causes isolation and depression, which in tum can lead to suicide (Loutzenheiser, 193).
- They [homosexual teens] are three to five times more likely to attempt suicide than their heterosexual peers and an: more likely to succeed when they do (Loutzenheiser, 193)
- "Queer as a term, as opposed to gay, lesbian, or bisexual, purposefully disrupts the notion that identity is fixed or immutable. It includes the desire to highlight the existence of, and interrupt silent assumptions about heterosexuality as normal, and homosexuality as Other. In the classroom and in schools, this form of 'ultimate' naming around which individuals are organize and ostracized, too often results in groups of students being viewed as universalized singular 'others'. (Loutzenheiser, 124).
Two connections I made:
- When growing up I don't remember playing any "gay" hating games outside at recess, there are no talk about being queer or anything. It was like the unspoken secret, we even had a classmate in our class who we often "wondered" about but he never admitted anything and even sometimes got a girlfriend or two. However, as we got older I remember my classmates becoming homophobic to the extreme, on our grade twelve camping trip there was a gentleman at the bar who was outright and openly gay and found out that the boys from my class were disgusted, so he did everything in his power to make them feel more uncomfortable… (good for him those boys needed something because they were being jerks). Although to this day I still believe those boys are homophobic I would like to think some of them may have grown up. As for the boy we "wondered" about, once he got out of the stereotypical small-town Sask. And away from the homophobic classmates he is "out" and proud because he finally found people to accept him.
- Back home there are a group of people from the church who give the school backlash whenever "queer" teaching comes up they believe that it is evil and that their children will go to hell if they learn about it etc etc.
One Question that still remains:
- How do we make all students feel welcomed and accepted, and how do we consider everyone's beliefs and feelings and also provide appropriate education to all students?
Boy, oh boy was I so wrongly mistaken I never once faced "hoodlums", "gangsters", or "dangerous beings" I however DID face wanna be tough guys, wanna find a better life kids. Once again, I came to the realization that yes, these kids have walked down the wrong path, that yes they have made wrong choices in life but they now are trying to get on the right path, that they are making the right choice. However, on my final evening at this wonderful organization I was faced with these boys that wanted to be so tough and wanted to come off as these brave souls that so what if they did some time a dojack, but what I saw were these boys that had huge hearts, that sure they wanted to intimidate you, but they didn't. I believe they just wanted someone to be there for them at the end of the day, that maybe they couldn't be so strong everyday and that once they wanted someone to be there and support them. Or these boys who had relationships of gold with some of the teen youths that were there for each other and helping each other get on the right path, they were there together as a team facing this world with the help of the organization. That at the end of each day they truly are grateful for the opportunity that they were given to get their lives back on the right path.
Throughout this experience I not once was faced with a hard faced youth that was unhappy or ashamed, I was faced with lost youths that just needed help to find their place in this world.
Three Things I Learnt:
"Who determines what work is done, when, and where and how in schools? In fact, authority over schools officially rests with provincial governments and school boards." (183(
I knew that the government and school boards laid out what was required to be taught but I always though that schools determined their values and beliefs towards teaching, and what teacher styles were encouraged.
"In these ways, the school is a bureaucratic, hierarchical workplace, often compared to a factory model of organization. The term 'bureaucratic' derives from the work of sociologist Max Weber, and refers to a hierarchical organization that is governed by rules, staffed by people with expertise and operated on the basis of standard procedures and practices" (183)
I have always thought that the beauty of teaching was that every teacher taught in their own way, managed their classes their own way and the only person they only have to report to is the administrator when they do observations.
"Teaching still remains largely an isolated job… This is true not
| 1.925484 |
openbmb/Ultra-FineWeb
|
dently, without need for conscious input, coordinating with all the other systems in the body (nervous, respiratory, etc.). The same can be said of when the skin is cut and the subsequent organ system interaction that takes place during the average two weeks during which the wound heals. Another example would be, after head and neck alignment is restored, how quickly the compensations used to level the head when out of alignment with the upper neck release as the body structurally reorganizes back into balance.
Collectively, the time has come to rebuild supreme confi dence that the "doctor inside" knows what it is doing, to honor that intelligence and tap further into the ability for it to be expressed.
Children often do not appreciate their parents for what they provided until they have grown up. Kids, especially younger ones, do not typically think about food being on the table or the clothes available for them to wear or the roof over their heads. To them, those things are there because that is just how it is. It is one of the ways that trust is formed. Why does that dynamic largely disappear when the conversation shifts to health and the human body, which in similar fashion is given gifts far above and beyond human comprehension? A person can consciously choose to hold their breath until the point of losing consciousness, then the innate intelligence within the body immediately takes over and restarts breathing. The educated mind is a variable, easily infl uenced, and weakened by age or injury. Why trust the inherently limited at the expense of the borderline[ii] limitless that directs life as we know it down to the smallest detail?
Imagine instantly knowing without any training how to fi ght fi re when the crockpot shorting sends the kitchen curtains ablaze[iii] or how to correct a brainstem subluxation when the top bone in the neck gets locked in a position that adversely affects the most vital organ or how to write a best-selling novel as soon as an interesting idea strikes or how to reinfl ate a lung when it unexpectedly collapses. Imagine that knowledge was pre-programmed, there from the outset for whenever needed as if it was standard fare. Since that degree of intelligence – the "doctor inside" – is exactly the sort innate to the human body and all its infi nite standardized functions, now imagine a system built around a defi nition for health like this one: an optimized state in which the numerous organ systems in the body work harmoniously together at a level conducive to sustaining an innate adaptability capable of preventing sickness and overcoming the causes of various symptoms. That would not only fi x the cracked foundation of healthcare, but potentially change the world.
[i] Reggie Gold, DC's The Triune of Life [ii] To be further discussed in Part 3 [iii] I'm missing it too, This Is Us fans
Written by Chad McIntyre, DC of the Triad Upper Cervical Clinic, 432A West Mountain Street, Kernersville. For an appointment, call _PHONE_ or visit for more information. See ad on page 7.
ov - ing
T erapeutic Quality
Essential Oils & Products Off ering:
Retail & Wholesale Consultations Custom Blends Private Labeling Lectures & Classes
1024 W. Gate City Blvd. • Greensboro, NC 27403 _PHONE_ NOVEMBER 2020
| 1.806662 |
Zyphra/Zyda-2
|
Science, Technology, Engineering, and Math
"NASA has the answers to your questions about airplanes, astronauts, rockets, planets and more!"
Socratica Kids explains how different kinds of trees grow from seeds to skyscrapers in this short video.
"Sarah Foster starts program to help young girls gain an appreciation for science, technology, engineering and math."
"Scientists have been observing Earth for a long time. They use NASA satellites and other instruments to collect many types of information about Earth's land, atmosphere, ocean and ice. This information tells us that Earth's climate is getting warmer."
"Can you skewer a balloon without popping it? Coat a nail in copper? What happens when you plug a clock into a potato?Dyson engineers have designed these challenges specifically for children. Ideal for home or in the classroom, they encourage inquisitive young minds to get excited about engineering."
"Watch [this] webinar to discover how to introduce STEM to your child in an engaging and developmentally appropriate way that also builds a foundation for future learning."
This short video tells the story of Katherine Johnson, one of NASA's human "computers" in the early days of space exploration, "who calculated the flight path for America's first crewed space mission and moon landing."
Even though girls are "interested in STEM subjects around age 11, their interests waned around age 15. As teachers, how can we bridge this gap?"
This website directed at girls interested in learning about STEM.
| 2.495096 |
Zyphra/Zyda-2
|
Braces for Teens and Kids
Children and teenagers are constantly growing and changing, and that includes their teeth and jaws. Growth continues until their late teens. During these important ages of growth, it's an ideal time to consider the alignment and placement of their teeth and jaws. Correcting issues such as incorrect bites, misaligned teeth, and associated oral health can make a big difference in their adult lives ahead. At Laprade Orthodontics in Pawtucket and Lincoln, Dr. Laprade is ready to help young people with orthodontics before their development is complete.
What is early intervention?
Childhood and early adolescence bring many changes to the jaw as it develops. As the jaw and muscles grow together, sometimes problems occur such as an incorrect bite. Early intervention means evaluating your child's mouth, teeth and jaws to determine if treatment at a younger age might help avoid problems later. The American Academy of Orthodontics recommends children see an orthodontist by the age of 7. Issues like improper bite, protruding front teeth, or insufficient space in the mouth for teeth to erupt are the types of things Dr. Laprade looks for during an early intervention appointment. If problems are identified, a treatment plan will be recommended to improve the chances of your child having a beautiful smile in the future.
What is the point before permanent teeth are in place?
Even though baby teeth are likely still present in a child as young as 7, early intervention can provide a complete view of your child's oral condition. Dr. Laprade will be able to see what is happening in your child's mouth, even under the gums, providing valuable insights into what the future will bring as your child continues to grow. This allows preventive treatment to be advised as needed, often reducing the extent of future orthodontic treatment.
How do braces help?
Braces are a proven method for correcting teeth and bite misalignments. Treatment involves attaching brackets to teeth, as well as metal bands to back teeth. Then an archwire will be attached to the brackets using o-rings so that the wire can gradually guide teeth into better positions. Sometimes additional equipment may be helpful like rubber bands or springs to most effectively move the teeth and jaws into desired positions.
What is the best age for braces?
Depending on your child's condition, braces treatment often begins between the ages of 10 and 13. Waiting until these ages typically means that most baby teeth have been replaced by permanent teeth. However, since development varies from patient to patient, the exact age for most effective braces treatment will be determined by Dr. Laprade about your specific child.
Do braces hurt?
If your child or teen is concerned that braces will be painful, the truth is that there is a little discomfort as teeth move but typically only for a few days. Eating softer foods is often helpful as well as taking mild over the counter analgesics. However, the outcome is worth it! Advancements in technology have reduced the pain level. Dr. Laprade at Laprade Orthodontics is experienced in offering the best solutions for teens and kids as they pursue a better smile. Call today for an appointment.
Laprade Orthodontics
123 School St
Pawtucket, RI 02860
P. _PHONE_
Hours & Directions
Laprade Orthodontics
6 Blackstone Valley Pl
Lincoln, RI 02865
P. _PHONE_
Hours & Directions
Website design for orthodontists –
Copyright 2019
| 2.50538 |
Zyphra/Zyda-2
|
The Book Bus Victoria Falls Zambia
Do you remember learning to read? Do you remember working out each word? It's an amazing feeling: being read to and then being able to read the words for yourself. The adventures you take, the power of understanding and the doors of perception that open. From Beatrix Potter to Harry Potter or Hello Magazine to Homer's Odyssey, all that we read shapes the person we become. Knowledge and education can keep us from harm and boost our chance of a healthy future. Or as Nelson Mandela put it:
"Education is the most powerful weapon you can use to change the world"
Education and learning to read is taken for granted here in the UK. In Zambia it's estimated that 800,000 children miss out on a basic education every day. Children spend the day collecting water, tending fields or even running the family home (1 in 6 children is orphaned). The long walk to school, combined with school fees (which are mandatory for all schools) prevented children from accessing a simple, basic education. The profound enthusiasm for education, coupled with the high number of children out of school, drove Zambian communities to develop their own schools, the so called "community schools". With scant resources and even less funding, open-air classes
were established beneath trees, or in an old container or the village hall. A fairy tale in their own right, the dark reality of this story is that:
- Teachers are paid very little – if anything at all; most have to work as volunteers
- The schools lack the most basic resources such as books, paper, pencils etc
- Many of the teachers are poorly trained (some not at all)
- School facilities are poor (sanitation, classrooms etc.)
Undaunted, communities are fighting hard to create the best schools they can with what little they have.
The Book Bus - Improving children's lives one Book at a time
The Book Bus aims to improve literacy in Malawi by engaging with children and their teachers to promote reading in a way that is creative, safe and above all, fun. Our "Book Bus" is a rugged go anywhere mobile library stocked with storybooks and materials and manned by a volunteer crew of story tellers. The legacy of each of our school visits is a reading corner and bookshelves stocked with children's books.
There are many reasons why we chose Zambia as the pilot location for the Book Bus programme. Initially, at least, we are dependent on donated books written in English. Zambia has a rich linguistic heritage of over 70 indigenous languages; however English is understood by a large percentage of the population. Most aged 10 or over can read and write in English. We wanted to go somewhere where there was a clear need and the potential to make a difference. Zambia is one of the world's least developed countries. Four out of five people live on less than $1 a day – the World Bank's definition of poverty.
According to UNAIDS/WHO estimates, Zambia ranks number seven in the international league table for HIV/AIDS:
- One in six adults lives with HIV/AIDS
- 130,000 children under 14 are infected with HIV
- Life expectancy is just 40 years. In the UK it is 78
- Zambia has a very young population - nearly half are under 14
- At least one in seven children has lost one or both parents to AIDS1
This figure will continue to rise. AIDS has had a catastrophic effect on education. In 2001 a survey2 found that one third of younger children did not attend primary school. One in eight respondents said that a child in their own family did not attend school because a parent or guardian was suffering from AIDS or had died from AIDS.
Many of the literacy programmes in Africa centre on education and self-help. Our focus will be on encouraging in young children a love and respect for books and a desire to read. The Book Bus is very much a joint British/Zambian project.
There are several Zambian nationals in our team, including our driver, liaison officer and educational coordinator. We work closely with local writers, artists and musicians and we have close links with national and regional educational bodies.
The Bus is staffed by up to 8 UK volunteers at any one time who pay to cover their subsistence costs. To keep us "mobile" and to hold costs down, volunteers camp at night under the African stars. Volunteers also help with camp chores and food preparation, which all helps to hold costs down.
So how does The Book Bus work?
The Book Bus is a specially adapted thirty year old London bus, fully equipped to serve as mobile library and classroom activity centre for community schools. It was shipped to Zambia in Winter 2008 to start its work.
How we work
The bus works in a region for between 6 and 12 weeks at a time. During this period, we work with up to five community schools. Each school has a designated "Book Bus Day". On this day we spend the day at the school and work around class timetables to provide, resources, energy, ideas and time to listen to children read. ur visit day, is often the only day when these schools will have access to books (Often you will see shelves of a school library left bare). The Book Bus provides additional manpower to allow small group reading mentoring.
Working in small groups the volunteers will spend time with the children, encouraging them to read and develop literacy skills. Supplementary to this we encourage children to dramatise books they have read or even create a piece of art from it; the required resources are carried on the Bus. This helps increase their understanding of literature, boosts confidence and allows them to develop new skills and most of all – discover the pleasure of reading. Children are only part of our working relationship!
Working closely with the teachers we share ideas and skills to help them develop after school book clubs with the books we loan. To ensure that the service delivered is as good as it can be, The Book Bus has a committed team of Trustees in the UK as well as support from the Ministry of Education Zambia, ZOCS (Zambian Open Community Schools), The British Council and QUESTT (Quality Education through Technology).
The Book Bus
The Book Bus provides a mobile children's library and book distribution service for communities in need in Zambia. Our aim is to share with children the pleasure and value that books can bring and to inspire them to want to read. We use art, music and play to stimulate children's imaginations. By encouraging them to associate books with enjoyment and creativity, we hope to sow the seeds of a life-long love of reading that will benefit both the children and their communities.
About the Bus itself
The Book Bus is a Leyland Tiger, built in Britain in 1980 for use as a public service vehicle. After Tom Maschler bought the bus in 2006, we took out most of the seats and replaced them with library shelves and storage space for the books that we distribute. We also had to make the bus "Africa-proof". This involved new electrical circuits, a heavy duty pump and generator, rough terrain tyres and a tropical engine cooling system. The most spectacular part of the refit was Quentin Blake's decoration of the bus. Quentin is one of Britain's best-loved children's artists and he and Tom Maschler have worked together for many years. Quentin is now a trustee of the Book Bus foundation. His eccentric illustrations are perfect for the Book Bus and are instantly recognisable. Even in the wilds of Zambia we are often approached by people who recognise his beautiful, quirky paintings of children, books and animals.
The Book Bus Team
The team travelling with the Book Bus includes the Book Bus Leader, a driver and up to eight 'crew members'. Occasionally we'll be joined by special guests, who might include local storytellers and artists, well known UK children's authors, or even a film crew! Team members sign up for anything from two weeks stay to two months. They often combine their time on the Book Bus with an African adventure holiday or a relaxing stay on the beach.
What to expect - a week in the life of the Book Bus
We spend each weekday at a different community school. Our programme of activities is led by the crew members and might include story-telling, one-to-one help with reading, music, arts and crafts, structured play, drama, puppet shows and sports. We also donate books and show the teachers how to set up and run a Reading Club. We revisit each school several times over the month to provide support and monitor their progress. The crew generally relaxes in the evenings. Sometimes we might host an open evening for the adults in the community to learn more about the Book Bus. Occasionally our hosts invite us to a local event. The weekends are your own - get away from it all, relax, or see something of Zambia's beautiful countryside.
What makes a good crew member?
Life on the road can be challenging – heat, unpaved roads, basic accommodation and 'roughing it' are facts of everyday life, especially away from the cities. So it's essential that as a crew member, you have a reasonable level of health and fitness. Equally important will be your desire to engage with children – previous experience of working with children is welcome but not necessary. Some measure of artistic and/or musical talent (or at least a willingness to have a go!) will stand you in good stead, and if you are shy in company, be prepared to shed at least some of your inhibitions! And finally our crew members all share a positive outlook, enjoyment at being part of a team and a real desire to make a difference.
Everyone who joins us on the bus pays for their own flights and makes a donation. This covers food and board and helps with the expense of keeping the Book Bus
| 2.023639 |
HuggingFaceFW/fineweb-edu
|
television and yet at the same time completely different. It is a truly flexible way of delivering digital media content to audiences.
2.1.2 No More Downloads
It is important to remember that digital media has been distributed for quite some time, both physically and electronically. In 1969, when CompuServe first started as an online community, digital media artifacts like text documents and later, digital images were already in circulation. Indeed, the act of sending some files on a floppy disk to a friend through the mail constituted a primitive form of digital media distribution. When the Compact Disk emerged in the early 1980s, it became possible to distribute larger amounts of digital media (music) relatively cheaply, albeit on physical media. Distribution of digital media is not new.
The difference between those early digital media distribution methods and streaming is that in the past, it was an all or nothing event. You either had the digital media in its entirety, or else you had nothing. If you used a computer connected to a network service, like CompuServe, you had to download the entire file before you could do anything with it, such as view it or listen to it. For long songs, downloading could take quite a while, given the modem speeds that were once the norm, so if you didn't like what you were downloading, there was no way to tell, until you had downloaded all of it.
Let's contrast downloading to streaming, by examining how the process of streaming actually works. Streaming is, in some senses, just a trick of the light. It's really simply downloading, while playing. The trick is to hide that fact from the end user.
In so-called multi-threaded software, where the computer effectively appears to do two things at once, software engineers can make one part of a computer do the job of obtaining the digital media from a remote source, packet by packet, while another software task is simultaneously sending the data that has already been received to some form of digital to analogue converter, so that a human can view or listen to the media. So long as the software task that is getting the data from the remote source never gets caught holding nothing by the task that renders the data into user experience, the person experiencing the media cannot tell whether the entire digital media asset is in the computer, or just the parts of it that have been received so far. To guarantee that the data-gathering task is never caught by the data rendering task, the data gatherer usually starts some time before the data-rendering task begins to render the data already received. This time difference is called the buffering latency. It is the reason why when you click on a streaming media link on the web, for example, the streaming media player often tells you it is buffering.
Another prerequisite for streaming is that the data-gathering task can provide the data to the data-rendering task at least as quickly as it can consume it. For stereo digital audio at CD quality, that means that the data must flow at a rate of 176,400 bytes per second (which is just under 1.4 Megabits per second). A modem is a device that connects a computer to a phone line, in order to transmit data using the telephone network. Most computers have a modem. At first glance, it would appear that you should not be able to get digital audio to stream at CD quality using a modem that can only deliver a maximum of 56 kilobits of information per second (such as popular modems can do today). There just isn't enough speed to deliver data at 1.4 Megabits per second, which the digital to analogue converters require in order to create CD quality audio for us to listen to. The answer lies in compression technology. The audio data is coded in such a way that it can be transmitted in a smaller amount of data, which can then be reconstructed at least approximately at the receiver, using the right recipe to decode the compressed data into its native raw format.
A final prerequisite for streaming to continue un-interrupted is that the remote source of the data is capable of delivering the data to the data-gathering task at the same rate as it is consumed. Clearly, if the network connection between the data source and the data-gathering task is interrupted, the stream will be interrupted and the stream will stop. In this case, the end user of the media becomes painfully aware that the entire digital media asset is not present on his or her computer. If the user was listening to music, it will simply suddenly become silent.
Streaming digital media, then, is akin to turning on any other utility, like water, gas or electricity. When you want it, you turn it on. No waiting. When you don't want any more, you can turn it off just as easily as turning it on. It can be metered by usage, or else made freely available on an "all you can use" payment plan. Unlike those utilities, however, today the provider pays, not the consumer. This is, of course, an oversimplification. The provider must pay for the capacity to serve streams to an intended audience, in both the cost of servers and the bandwidth to connect those servers to end-users. Advertisers sometimes subsidize these costs, provided they think they can reach an audience that will ultimately buy something from them. Finally, the consumer pays in terms of any connection charges and any on-line charges levied by their Internet Service Provider (ISP), not to mention the cost of buying a PC to receive streaming media in the first place. If streaming digital media becomes the commodity, which delivers our news, entertainment and information, will that model be sustainable or will it change?
2.1.3 Audio/Visual Web Stuff
When most people think about streaming media, they think about audio and video delivered to the desktop of their personal computer. In fact, this kind of streaming media only came into existence after 1995, when companies like RealNetworks were started, to pioneer the creation, delivery and playback of rich media via the Internet.
Web browsers have pieces of software, called streaming media players, which can be installed into them as plug-ins (or which are already built into them), that make it possible to play audio or video. To date, most of the players have been available for free, as a downloaded component. They use proprietary technology and there has been a great deal of effort expended by player vendors to make their particular player the de-facto standard.
The data required by the streaming media player is delivered to the computer often using the very same transfer protocols as those that deliver ordinary web pages (i.e. HTTP). In fact, there are other protocols used for delivering streaming media, like RTP (Real Time Protocol) and RTSP (Real Time Streaming Protocol), which can allow a user to deliver streaming media with more control.
The development of streaming media has been and will continue to be heavily influenced by the development of Internet protocols and companies that use the IP networks to deliver digital data. New traffic management, media synchronization and quality of service protocols will greatly enhance the end user's experience of streaming media.
Today, a typical home computer with a 56k modem can receive quarter frame video at a frame rate of around 5 frames per second (this temporal resolution results in motion that looks jerky), with a picture size of 320 x 240 pixels (very poor spatial resolution, which makes the pictures look impressionistic, rather than crisp and clear). The same computer can render stereo audio in a quality that approximates FM radio reception (pretty good).
If you have a computer connected to a corporate LAN, it is not uncommon to be able to stream video at 750 kilobits per second, giving full screen pictures at near DVD quality. Audio can be rendered at a quality that is indistinguishable from a compact disk.
In the future, there is no technical barrier to receiving multiple simultaneous video images at better than High Definition Television quality, with full quality digital surround sound on each. Added to that could be synchronized text and graphics, perhaps even overlaid on the moving pictures. In fact, there is nothing about the look of television that cannot be emulated precisely, given sufficient bandwidth from the host to the player and sufficient processing power to allow television's visual gimmicks, like lower third straps, fades, alpha blends, page turns, fly-ins and other digital video effects to be rendered. Many of the latest streaming media players are offering some of those capabilities already.
2.1.4 Web Radio
Many people have encountered streaming media as Internet radio. Audio is streamed constantly as a multicast stream to receivers, once again usually on a computer desktop. A multicast stream is a bit stream that is sent once, but which can be picked up by multiple computers at the same time. Unlike the bulk of the Internet's traffic, it isn't a point-to-point transfer between two parties.
The important aspect of streaming web radio is that it can reach a global audience, for no more than the cost of reaching a local one. Suddenly a vast array of choice and specialized niche programming is available to anyone with the means to listen in. With sophisticated jukebox software and scheduling programs, it isn't even necessary for the broadcaster to have a disk jockey.
Another thing that is easy to do with streaming media, but not so easy with broadcast radio, is the ability to host interactive play lists, where the listeners choose what gets played next. Unfortunately, the performing rights societies, such as the RIAA (Recording Industry Association of America) that police the playing of copyright material to public audiences have rules that restrict how often you can play a particular artist, whether or not you can play adjacent tracks by the same artist and so on. If an interactive radio station ignores these rules, they do so at some peril. If they abide by them, they limit choice and
| 1.79711 |
Zyphra/Zyda-2
|
Medical debt is usually wiped out in a Chapter 7 bankruptcy
| Feb 5, 2015 | Personal Bankruptcy
Some observers believe that medical debt is the biggest cause of bankruptcy filing in the country and in Arkansas. According to one national agency, there are some 43 million persons with unpaid medical debt on their credit reports. The probable reason that many with burdensome medical debt file bankruptcy is that it is fairly easy to discharge unsecured debt in a liquidation proceeding under Chapter 7.
When life hits a brick wall where tens of thousands of dollars of medical debt are making life highly burdensome, the bankruptcy answer is quick, precise and effective. People with large medical bills cannot usually be criticized for indiscreet spending — they had no choice in the matter. That makes it easier for some people to make a decision to file a bankruptcy, eliminate the debt and move on with a fresh start.
Those who are burdened with medical debt often have considerable credit card debt also. This may be due to using the cards to pay some of the medical bills. Credit card debt is usually also easily dischargeable in a Chapter 7 bankruptcy, because this kind of debt is also unsecured and has no collateral attached to it.
Chapter 7 may make some people hesitant because it's called the liquidation chapter. Assets of the debtor are sold to pay toward the debt listed in the bankruptcy papers. However, with respect to average consumers, they usually lose no personal assets or belongings in a Chapter 7 due to the ample exemptions provided by state and/or federal law.
Arkansas provides a system where one can choose the federal exemptions or the state exemptions. The federal exemptions are generally ample enough so that an individual or married couple are able to keep their important possessions, including cars, retirement plans, furnishings and the like. However, the situation is complicated enough that it is not recommended that a person tries to figure out how to maximize exemptions without professional bankruptcy counsel's guidance through the maze.
Source:, "Why medical debt — and bankruptcy — are growing problems", Daniel A Austin, Jan. 28, 2015
| 1.093649 |
Zyphra/Zyda-2
|
A tracheostomy is a surgical procedure to create an opening through the neck into the trachea (windpipe). A tube is usually placed through this opening to provide an airway and to remove secretions from the lungs. This tube is called a tracheostomy tube or trach tube.
General anesthesia is used. The neck is cleaned and draped. Surgical cuts are made to expose the tough cartilage rings that make up the outer wall of the trachea. The surgeon then creates an opening into the trachea and inserts a tracheostomy tube.
Why the Procedure Is Performed:
A tracheostomy may be done if you have:
- A large object blocking the airway
- An inherited abnormality of the larynx or trachea
- Breathed in harmful material such as smoke, steam, or other toxic gases
- Cancer of the neck, which can affect breathing
- Breathed in harmful material such as smoke or steam
Paralysis of the muscles that affect swallowing
- Severe neck or mouth injuries
- When you can't breathe on your own
The risks for any anesthesia are:
- Problems breathing
- Reactions to medications
The risks for any surgery are:
Additional risks include:
Erosion of the trachea (rare)
- Nerve damage
- Scar tissue in the trachea
After the Procedure:
If the tracheostomy is temporary, the tube will eventually be removed. Healing will occur quickly, leaving a minimal scar.
Occasionally a stricture, or tightening, of the trachea may develop, which may affect breathing.
If the tracheostomy tube is permanent, the hole remains open and may require surgical closure when no longer needed.
Most patients require 1 to 3 days to adapt to breathing through a tracheostomy tube. It will take some time to learn how to communicate with others. Initially, it may be impossible for the patient to talk or make sounds.
After training and practice, most patients can learn to talk with a tracheostomy tube. Patients or family members learn how to take care of the tracheostomy during the hospital stay. Home-care service may also be available.
Normal lifestyles are encouraged and most activities can be resumed. When outside, a loose covering (a scarf or other protection) for the tracheostomy stoma (hole) is recommended. Patients must adhere to other safety precautions regarding exposure to water, aerosols, powder, or food particles as well.
Goldenberg D, Bhatti N. Management of the impaired airway in the adult. In: Cummings CW, Flint PW, Haughey BH, et al, eds. Otolaryngology: Head & Neck Surgery. 4th ed. Philadelphia, Pa: Mosby Elsevier; 2005:chap 106.
|Review Date: 1/16/2009|
Reviewed By: A.D.A.M. Editorial Team: David Zieve, MD, MHA, and David R. Eltz. Jacob L. Heller, MD, Emergency Medicine, Virginia Mason Medical Center, Seattle, Washington, Clinic (1/16/2009).
The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed medical professional should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. © 1997-
A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited.
| 1.895439 |
HuggingFaceFW/fineweb-edu
|
until recently, everywhere
present in Kosova.
* * *
With regard to the Turkish registers relative to Peja, the Albanian scholars content that,
if the population of that city had been Slav, the numerous conversions at the very epoch
when the patriarch was granted power by the Porte, would be unfounded and
incomprehensible. These scholars regard the conversions as a clear indication that Peja's
population was Albanian; they maintain, furthermore, that these conversions were, for
their co-nationals, a means to keep their national identity.98
That the Albanians in Kosova are an aboriginal population is attested by the very Serbian
Chrysobulls of the 13th and the 14th centuries. On the other hand, Turkish chroniclers
mention Albanian uprisings in Kosova in the 15th century.99 The archives
of Dubrovnik also testify for the same epoch. As for 17th century, important are, among
others, the writings of the Turkish chronicle Evlija Celebi which clearly indicate that
prior to the Austro-Turkish Wars the Albanian population was overwhelmingly present in
Western Macedonia, in Montenegro and in the Vilayet of Kosova (E. Celebi, Putopis,
Sarajevo, 1973, pp. 136-137). Mention should also be made, for the same epoch, of pastoral
reports - that of the Papal Envoy, Pietro Massarechi (Mazreku, born in Prizren who
succeeded M. Bizzi) dating from 1623 specifies that at that time, the population of
Prizren was made up of 12 000 Moslem Albanians, 200 Catholic Albanians and 600 Serbs and
that the population of Shkup (Skopje) was also mainly Albanian.100 Likewise,
the Austrian documents pertaining to the Austro-Turkish Wars give evidence that the
Austrian army was continuously in touch with an Albanian population. These documents refer
to Prizren as the Capital of Albania and to Pjeter Bogdani, Archbishop od Shkup, as
Archbishop of Albania.101 Various incidents linked to the Austro-Turkish
Wars, as related by T. Ippen (in Novibazar und Kossovo,(das Alte Rascien) eine Studie,
Vienna, 1892), who used Austrian War documents - as did J. Tomic - make it obvious that in
Kosova the Austrian army had to deal with an Albanian population.
The fact that Shkup (Skopje) had an Albanian Archbishop, implies that that city had an
Albanian population. Also, it is well known that among those who followed the Austrian
army was an Albanian tribe, the Kelmendi (Clementi), from the region of Ni, which
suggests that the area was inhabited by Albanians.
* * *
The recent study of catastral registers has not only indicated that in the 15th century
the Albanians were overwhelmingly present in Kosova and Western Macedonia; it has also
shown that they were not merely shepherds, as they were often said to have been, but held
all kind of positions and practiced professions which are not normally characteristic of a
nomadic population. That study has also revealed that in contrast to the Albanians who
were sedentary, the Serbs appear as a nomadic population.102
Objective research has therefore established that what has been called Old Serbia, a term
suggesting Serbian tradition and permanence, is in reality a region inhabited ab antiquo
by Albanians which was only for a period of time under Serb rule.
* * *
It is undeniable fact that until recently (but especially so during the Middle Ages) state
and nationality seldom coincided. The desire to invade and conquer is, indeed, a
characteristic of many peoples and races. England was invaded by the Normans and ruled by
them; the Arabs held sway in Spain from 756 to 1492; Calais was for two centuries under
the domination of the British; Poland stayed for a long time divided between Russia,
Germany and Austria. Needless to say that many more examples may be cited. There are
places that remained, in fact, for centuries under the nominal rule of various invaders,
alien to the population inhabiting them. The South Slavs, who were themselves, as a race
and as a nation, under the domination of Turkey, Hungary, and Austria, should be in a
better position than most people to feel and admit that in the past state and nationality
were very seldom identical and that the transient power over something does not give claim
to a permanent possession.
Indeed, temporary conquerors do not normally use the adjective "old" to describe
territories which they once held under their sway. The French do not find it appropriate
to call "Old France" territories once occupied by the short-lived Napoleon's
Empire. Nor do the Turks name "Old Turkey" the Balkans where they ruled for over
five centuries. The Bulgarians do not refer to Belgrade as "Old Bulgaria",
despite the fact that that city belonged to them from the 9th century until the 11th;
neither is this city called "Old Hungary" although Belgrade, which was Serbia's
capital only briefly in the 12th century, fell under Hungarian control before being
captured by the Turks in 1521. As for Ragusa, recently Dubrovnik, it was founded in the
7th century by the Romans and the Illyrians fleeing the incursions of the Slavs. Later, it
fell under the rule of Byzantium, then under that of Venice, and finally of Hungary. The
Turks held it from 1526 until 1806. Only since 1918 do the Slavs have control of it.
* * *
The term "Old Serbia", which, like all expression that are well chosen, has a
tremendous suggestive power, was employed for the first time by Vuk Karadzic at the
beginning of the 19th century. Yet Karadzic applied it practically to the whole Balkan
peninsula. "Old Serbia" at that time was synonymous with what was also called
"Great Serbia". But the chances to annex Bulgaria and Thessaly waned. The term
was thus no longer applied to those regions and at present nobody considers these places
any longer as "Old Serbia". Curiously on John Bugarsky's map, published in
Belgrade in 1845, there is one area marked "Old Serbia or Present-day Albania".
It is the region of Bielopolje separating Montenegro from Serbia - a clear indication that
the term was used to designate various areas depending on the possibilities regarding
territorial claims offered by political circumstances. Thus the limits traced by Prof.
Cvijic for "Old Serbia" in 1909 differed considerably from those used by the
same scholar in 1911. Since there was nobody to protect Albania's rights, the term was
eventually used to designate merely the region that at present is identified with
Kosova-Metohija (Kosmet). As for the Albanians, they call "Old Serbia", Serbia
* * *
According to Theodor Ippen, if the term "Old Serbia" should be used at all, it
should apply solely to that district which is situated between Ibar and Sitnica, whose
southern border is the river Lab, i.e., to the area once called "Old Rascia"
(Rascia = Serbia) whose capital was Ras located north of present Novipazar. Ippen remarks
that this region too used to be Albanian (even the name Ras, he points out, goes back to
an Albanian etymology), but it was there that the Southern Slavs formed their first
nucleus in the 12th century under Nemanjic; it should in no way be applied to the
territory of Kossovo:
The use of the expression 'Old Serbia' would be, if applied to a limited territory, after
all justified, in as much as here (in Raka) the old Serbian state, which in its
early stage may be identified with Rascia, originated. But he term 'Old Serbia' is used by
chauvinistic Serbs to designate regions, such as Prizren, Gjakova, Ipek on the one hand
and, on the other, Iskup, which geographically and ethnographically belong to Albania and
Macedonia. 'Old Serbia' is therefore applied, for political purposes, to regions which
ethnically speaking were never Serb (Ippen, op.cit., p.4).103
* * *
In the sight of these facts, the Albanians maintain that the principle of history invoked
by the Serbs in support to territorial claims, is not based on any solid facts.
Serbian Churches in Kosova
It is an undeniable fact that people feel the need to build whatever they establish
themselves. It is therefore normal that when they move away, they leave monuments behind.
Suffice it to mention in this regard the famous mosques of Spain where the Arabs ruled for
more than seven centuries. Some nations inherit monuments found by them in conquered
territories. Thus Istanbul contains, aside from Hagia Sophia, many other Byzantine
churches. These Christian places of worship stand amidst a Mos
| 2.169094 |
HuggingFaceFW/fineweb-edu
|
Captain Rumpelstoss: But… how will I learn to fly, Herr Colonel?
Colonel Manfred von Holstein: The way we do everything in the German army: from the book of instructions.
Those Magnificent Men in Their Flying Machines
The Antikythera mechanism is an ancient analogue computer with a series of 37 interlocking dials that was used to calculate astronomical positions. It was crafted with the precision and complexity of a Swiss clock, but it was actually made in 150 BC. Such craftsmanship would not be seen for another 1,000 years. Recovered in 1900, from a shipwreck off the Greek island of Antikythera, the mechanism had initially baffled scientists, who had no idea what it was used for. They tried reverse engineering it. Fortunately they were helped by script etched on the Antikythera mechanism's wooden housing. This could be considered the world's first instruction manual. Deciphering it must have been a complex task, and I certainly don't want to take anything away from these experts. But today's manuals also present a massive challenge. Modern-day instructionese sometimes feels like Ancient Greek to me. Trying to understand it is one of life's more frustrating experiences. Indeed for some it can lead to read rage. Today I will be looking at instruction manuals and why they can be so exasperating.
Why are instruction manuals so hard to understand? There are linguistic challenges. Languages deal with and describe reality but this is so complex that any individual attempt to represent it comes up against an important obstacle – actions are, by their very nature, indescribable in words. We can only ever approximate reality.
A typical manual will include instructions for the setup, normal usage, programming maintenance and troubleshooting of your device. In the past manuals would include detailed repair information. However, with the increase in products' complexity and functions, this information has been disappearing. The fact is that many devices are so cheap it's just not worth repairing them.
We need to analyse the manufacturers and their products. Many companies seem to assume that the user will know all the technical terms about their product, and do not bother explaining them. I think many of the problems originate in the design. Good design of the products and the user interface is not prioritised. They have lots of engineers, but few or no human factors designers. Designs seem to be feature-oriented rather than task-oriented. The attitude is one of adding more and more features rather than trying to think what the customer will want to do with the device. I have noticed this with DVD players, especially the cheap ones. They tend to have lots of buttons making them really hard to use. On the other I have a Phillips which has fewer buttons. I am not a big Apple fan, but they do make many of their interfaces intuitive. A really well designed product wouldn't need an instruction manual.
The quality of documentation can also leave a lot to be desired. Many manufacturers do not hire enough technical writers. To save money they will create a single manual for all international markets. So you end a massive booklet, but only a few of those pages are in your language. They will also use one manual for many different models, which can make it more difficult to find the information relating to the particular model we have bought. They want to keep these manuals as compact as possible and so the type-size of the text is a problem for those of us who are in our late 40s.
You get the feeling that many of the writers did not have the product to hand when preparing the manual. However I wouldn't want the actual designers writing the manuals. They are too close to their creations and tend to make assumptions about what the users will know.
And when it comes to texts originally written in another tongue the problems multiply. Products can now be made all over the world and the meaning can be lost in translation. Many firms evidently do not bother to get their translations checked by a competent English speaker. In instructions this is especially problematic. As precision is so important poor language can make it difficult or impossible to understand what is meant. Do they consumer test new instructions?
We are also partly to blame. We can be lazy. I often think that life is too short to wade through these manuals – they are not exactly compelling reading. If I can get by, I tend to avoid the instructions at all costs. It also depends on our motivation. When I am interested in something, I will make that extra effort. I suppose the people in tech support will come at this from a different perspective. Indeed they have an acronym RTFM, which stands for "Read The Fucking Manual". There is even a website,
, where they dish out some practical advice:
If you believe that you may be one of those who, for some strange reason cannot get your product to work, then this is the site for you. Each time you experience a problem installing or using a product, please come to this site to read the following advice, and what do you know… IT'S FREE OF CHARGE! And another thing… It may even work!:
READ THE F***ING MANUAL!
If you follow this advice, probability is that up to 8 times out of 10, you can solve your own problem right there and then, without any hassle and frustration, and without having to call the manufacturer. The manufacturer will tell you to RTFM anyway!
I think that today many product manuals are generally much better than they were in the past I particularly like the quickstart guides, which are so useful for getting quickly accustomed to the basic operations of the product. But there is still room for improvement. It would be nice if companies stuck with simpler designs. I remember a Sony Television I used to have. It had a reversible remote control – one side was for dummies with just the most common buttons, while the other was for the more sophisticated users. The internet is a wonderful tool if you have a problem with a product that the manual can't solve. You can search the company's website and look online for solutions from other users of the item that's giving you trouble. Those how-to videos are especially useful. I like the amateur stuff. It is written by people like us who understand our difficulties. Maybe there really is light at the end of this particular technological tunnel.
| 1.405334 |
HuggingFaceFW/fineweb-edu
|
Forgotten Realms Wiki
21,982pages on
this wiki
Add New Page
Talk0 Share
Rhaugilath, called "the Ageless", was a male human and an archlich. He was the former Sorcerer-King of the enclave of Orbedal in ancient Netheril and later one of the servitor liches of Larloch the Shadow King of Warlock's Crypt.[2][3]
Rhaugilath was once the ruler of the enclave of Orbedal in High Netheril, known as the Lich-King of Orbedal.[2][1] In this position, he was an archrival to Larloch of the enclave of Jiksidur.[2]
In the Year of Sundered Webs, −339 DR, Netheril suffered Karsus's Folly, all magic failed, and Orbedal fell from the sky to crash-land on the Sword Coast, near the mouth of the Winding Water. Rhaugilath and his phylactery survived the impact, but he was buried and trapped by rubble in a small pocket.[2]
Many years later, Rhaugilath was discovered and freed from the rubble—by his archrival Larloch, who'd found and claimed Orbedal for his own. A vicious battle erupted between the two. Larloch was victorious and he bound Rhaugilath to serve him. He became the first of Larloch's lich servitors, as Orbedal became the infamous Warlock's Crypt.[2]
He was still there by 1374 DR.[2][3]
Rhaugilath dedicated himself to writing Netheril's complete history, compiled in his great work, Of the Fall of Netheril.[2][1] However, he considered the Netherese Diaspora after Netheril's fall to be an integral part of the history, as well as the expected restoration of Netheril, thought to be only beginning in 1374 DR. Thus his book was never likely to be finished, and it reached several volumes. Larloch reviewed each chapter when it was completed, and they were delivered to Candlekeep to be archived in the library there.[2]
Occasionally, Larloch allowed Rhaugilath to use either a dream or nightmare spell, at Larloch's choosing, to send a vision to some being Rhaugilath had scried upon. Rhaugilath used these visions to grant some small piece of Netherese lore to the targeted individual. Reportedly, those who received such visions heard Rhaugilath sigh and Larloch chuckle as the vision ended.[2]
1. 1.0 1.1 1.2 Ed Greenwood (1991). Anauroch. (TSR, Inc), p. 3. ISBN 1-56076-126-1.
2. 2.00 2.01 2.02 2.03 2.04 2.05 2.06 2.07 2.08 2.09 2.10 2.11 2.12 2.13 2.14 2.15 Richard Baker, Ed Bonny, Travis Stout (February 2005). Lost Empires of Faerûn. (Wizards of the Coast), p. 102. ISBN 0-7869-3654-1.
3. 3.0 3.1 Brian R. James and Ed Greenwood (September, 2007). The Grand History of the Realms. (Wizards of the Coast), p. 47–48. ISBN 978-0-7869-4731-7.
Ad blocker interference detected!
| 1.390951 |
Zyphra/Zyda-2
|
We're committed to helping businesses provide safe and healthy work places.
Depending on your main work activity either the council or the Health and Safety Executive will be responsible for enforcing workforce health and safety laws.
We're the enforcing authority for work places such as:
- private residential care homes
- consumer and leisure services
The HSE is responsible for businesses such as factories, construction sites farms and schools.
Our health and safety role
The work we do includes:
- investigating work related accidents, you can report an accident at work on the Health and Safety Executive's RIDDOR website
- responding to complaints
- providing advice and guidance
- registering businesses that carry out acupuncture, body piercing, ear piercing, electrolysis and tattooing
- registering cooling towers
- regulating sunbed use
- carrying out inspections
- enforcing health, safety, welfare and smoke-free legislation
- running campaigns to raise public awareness of important issues
Report a health and safety problem
If you have a concern about your workplace, please check the relevant authority first for your type of workplace:
- Use our online form below to report a health and safety problem to us.
- For work activities not enforced by us please contact the HSE.
| 1.131665 |
openbmb/Ultra-FineWeb
|
Get ready—Professor Ein-O is teaching a crash course in environmental sciences with the Environmental Science super activity kit. It's chock full of experiments that apply basic principals of physics, chemistry, biology, geology, and geography to demonstrate how the organisms, pollution, and human kind interact with, affect, and even threaten our physical world.
You'll learn about natural resources, alternative energy, climate and green initiatives and you'll discover how to apply eco-friendly ideas to the solution of real environmental problems for the well-being of our planet. The Environmental Sciences kit is a great tool to supplement school curriculum in a fun, hands-on way.
Includes illustrated guide book
Ages 8 and up; small parts warning
| 2.073792 |
HuggingFaceFW/fineweb-edu
|
Roasted chickpeas are healthy, high-fiber snack food.
Roasted chickpeas are healthy, high-fiber snack food. (Tammy Ljungblad, Kansas City Star)
Back-to-school means so many things to so many people. Kids feel a combination of excitement and nervousness. Parents look forward to regular schedules and knowing their kids will be learning after a summer of fun. But for some parents, it can also mean the dreaded snack duty, that unlikable task of providing a healthful snack for an entire class of children.
The stress that this task causes some parents has been parodied in movies and television shows, and has been a topic among working and stay-at-home parents. Many find themselves confused when kids in the class have allergies and the school says that snacks have to be healthful. What exactly does that mean? What constitutes a healthful snack?
Besides boycotting, which isn't really an option because children, especially small ones, need a snack or two during the day to carry them from mealtime to mealtime, what else can a parent do?
Start by ensuring that a snack has protein and healthful fat; otherwise, it won't do its job of providing lasting energy. Protein is a main source of energy for our bodies and helps to build our brains, making it an important ingredient in a child's school day. Healthful fats are also a concentrated source of energy for the body, are building blocks for the brain, and slow absorption of other parts of our meal, helping us remain full longer.
Then think about adding a fruit or vegetable to every snack. It can be challenging to get enough fruit and vegetables into our children's bodies through their three main meals, yet kids need the vitamins, minerals and antioxidants that these foods supply.
Here are some ideas for whole-food snacks that can be made in bulk and sent into school. They are grouped by protein source. Ideas of how to incorporate fruit and vegetables follow at the end. Visit for recipes.
Hard-boiled eggs
Bite-size egg salad sandwiches
Frittata slices
Homemade muffins and breads
Cheese and whole-grain crackers
Cheese and fruit kebabs
Dates or other dried fruit with cheese
Pasta salad with tomatoes and mozzarella
Beans and Legumes
Dips such as hummus or black bean with whole-grain crackers and raw vegetables
Crispy chickpeas
Mini lentil or black bean cakes
Nuts and Seeds
Homemade trail mix
Homemade granola or granola bars
Make-your-own yogurt parfaits with nuts and dried fruit toppings
Vegetable sushi or brown rice balls rolled in sesame seeds
Nut Butter
Mini sandwiches such as peanut butter and jelly or apple miso almond butter
Celery and carrots with nut butter dip
Oat, dried fruit and nut butter balls
Almond or peanut butter cookies
Steamed edamame in the shell, lightly salted
Guacamole with whole-grain chips
Mini meatloaf muffins
Nutritional y east and sea salt sprinkled on popcorn
Then add a fruit or vegetable to make a balanced snack:
Fruit or veggie salsa (try mango or peach)
Sliced vegetables to dip in guacamole or hummus
Dried fruit in granola, granola bars, muffins and breads
Fresh fruit or fruit salad on the side
Sliced vegetable of choice on the side
Dried seaweed
| 2.060346 |
Zyphra/Zyda-2
|
a population of 2% Lithuanians would rush in, usurp the majority of Poles, and eliminate the Jewish population without the explicit complicity of Poles? How NAIVE.
I guess they could have just put down their beer glasse and overrun Poland in its' whole, also.
Pardon me while I laugh about your little ignorant dreams.
I am Lithuanian I here are some my thoughts on it.
Polish letters and names should be allowed to use in documents like passports or signs in the eastern part of Lithuania (where Poles are majority).
However, Lithuanian goverment should stick with a new education plan. The last time I was in polish-speaking area I could not have a single conversation in Lithuanian. Nobody knew how to make a normal sentence. And shouldn't be happening.
As for the whole context, it seems that the whole conflict comes from historical fears. Lithuanians are afraid of Polisish language becoming supreme over Lithuanian, as it happened once in XVII - XIX centuries and almost made the language to vanish. Moreover, Russians tried to put a ban on Lithuanian language in late XIX century.
It seems that Poles are still afraid of genocide, which was carried out by Germans and Russians. And every single action whether is bad or good is welcomed by fears that it will suppress their rights.
All in all, Lihuanians shouldn't be worried that their language will vanish, as Poles shouldn't think that new genocide will be carried out. And finally, a few more remarks. Scenario like this (huge diplomatic tensions between Lithuania and Poland) has been stated in Kremlin's propagandists' books. Both nations should remember who has been,who is and who always be their enemy No. 1. Polish government should stop supporting V. Tomasevski, Polish minority leader. There have been many concerns in Lithuania that he is Moscow's tool. And R.Sikorsky looks like he is driven by emotions. That is the last thing we need. For instance, leaflets for Polish minority which were supported by him expressed ideas, which he knew would be greated with great contraversy in Lithuania. Why would you cause more tensions whith sometthing which bringes no benefits for Poland?
Peace :)
zerwikaptur in reply to srsl
Initially quite an interesting post, though at the end you request that Poland stand back and waits for the actions of Lithuania. That was the approach practiced for several years (so called "good relationships" between Poland and Lithuania) and did not bring any good to Poles of Lithuania, quite the opposite. No solution of property restitution, bilingual names, gerrymandering of voting districts,etc.
"Both nations should remember who has been,who is and who always be their enemy No. 1. " Looking at the Lithuanian politics I think for Lithuania it is Poland.
srsl in reply to zerwikaptur
Sorry, I wasn't clear. Indeed first step should be taken by Lithuanian government. In my opinion, it should be allowing Polish signs and letters. Then Poland government should do something like stop supporting Tomasevski.
Problem with Lithuanian politics is that some idiotic, nationalistic-chauvinistic politics in parliament (Seimas). President, PM (whose son works for Google in Poland) and the cavinet would not oppose pro-Polish laws. However, the parliament is a different case. The ruling conservative party has some MPs called "the Taliban" (I suppose Poland has something like that as well). They fall to the category of idiots. Moreover, this case theyhave from opposition because different parties have different motives:
1. Socialists are quite corrupt so they have only one goal. Get in power. And critisising government and PM is a very good way to do it.
2. Law and Order. This is a party of impeached president. Quite nationalistic, probably funded and supported from Moscow. Had many cases and scandals of corruption. Absolute idiots.
3. Labour party. Toy of Kremlin. When the leader of party had a case for fraud and corruption in court fled to Moscow. This fact tells a lot.
Those politics I mentioned are equally nationalits as Jay.Z here. Some strange mix of chauvinism, stupid emotions and self-pride.
zerwikaptur in reply to srsl
Ok, then I would agree with you to a large extent. When the rights of Poles in Lithuania are respected (not only the "w" letter, but also property, voting districts, etc.) I would be very happy for the Polish government not to spend anytime on those issues when in discussions with Lithuanian government. Concerning the support for Tomaszewski: to me success of Tomaszewski is a matter of unresolved issues like those I mentioned above. If they are solved then Poles in Lithuania can vote differently (I have no clue how they would vote). After all it is Lithuanian citizens who vote for Tomaszewski, not the Polish government.
We also have various parties in Poland that show more or less various levels of incompetence depending on the issue. What Lithuanian policies have managed to achieve is practically unite them on the matter of Polish-Lithuanian relations. It is a real achievement, I am dead serious about this.
I do not understand why you see Jay.Z as a nationalist. He is probably as fed up with the problems of Poles in Lithuania as other commentators from the Polish side. If the problems disappeared, we would not comment here at all. What for?
The vision of the Commonwealth on the Lithuanian and Polish sides are different and probably will never reconcile among people who have some historical knowledge.
guest-ilwwanl in reply to srsl
"The last time I was in polish-speaking area I could not have a single conversation in Lithuanian."
I don't know where you were - maybe in Belarus?
I visited my family and some of them finished high school / their Lithuanian is good otherwise they couldn't get job or finish education. They conversated, translated for us some Lithuanian text in Vilnius/Wilno, helped in shoops, restaurants etc!!!
Some of them speaks four langueges (Lithuanian, Polish, Russian, English). Have you spoken to young or very old generation? (old generation use mostly Polish and Russian)
I have huge sentiment to GDL and Lithuania but...
When you said about Politicians - why you have never introduced any Lithuanians responsible for present situation? G.Songaila, V.Landsbergis who established new property near Vilnius (but his own land was near Kaunas) etc Who stopped using Minority Act (when old one was not valid anymore) - Lithuanian Parlament! Who added new Education Act (in small cities/villiges where will not be enough young people only minority school will be closed) - Lithuanian Parlament and President! Who rejected at Parlament act of using original names - Lithuanian politicians.
srsl in reply to zerwikaptur
What concers do you have about property and voting districts? Specially about property? Lithuanians and Poles had absolutely same problems, and bureacratic nightmares with getting back your relatives lands or houses.
Tomaszewski rides mass hysteria. That is why he is dangerous. Like the saying of his that Lithuanians should integrate in Lithuania and not Polish.
Jay.Z twists the true and facts as it would useful for him. Plus he has that mass hysteria thing like Tomaszewski. Too many emotions, too less logic.
zerwikaptur in reply to srsl
Property rights: Lithuanian govt. should provide enough data to dispel any claims of discrimination. I mean they should make data public (and protect the identity of people applying for property restitution by by providing information only about region of the country like Šalčininkai/Soleczniki and maybe about municipality but definitely not about the person's name) for so anyone can analyze it and see if the restitution rates in Vilnius regions are really different than in other parts of Lithuania and who gets the property there: people from that region or other Lithuania regions.
Voting districts: any changes should be consulted with the minorities so there is no impression that the changes serve to dilute the voting power of minorities.
The same with education: if the changes were spread over a few years then the Polish reaction were more muted.
Jay.Z uses various conversations styles depending on the interlocutor. I do the same. I will leave this part of the further conversation as he can defend himself easily.
srsl in reply to guest-ilwwanl
It happened in Salcininkai and Eisiskes. People were between 30 and 60 years old, I guess. If your family is from Vilnius, it is a bit different case. Remember it's a capital, richest region and more open minded.
What is GDL?
Prove your statement with Landsbergis and Songaila with article or something. Plus Songaila falls into category of idiots I mentioned before.
Also give information on Minority Act and what concerns you.
Schools are being closed down all over Lithuania. My old school (in the second largest town Kaunas/Kowno) was closed because there were not enough students. If you want to keep your schools open, you should ask Polish government for money. You know that Lithuania has problems with budgetand can't afford those expenses. In general, you should stop thinking that school closing is against Polish.
Jay.Z in reply to zerwikaptur
Thank you, zerwikaptur. I couldn't have explained it better.
It's so comfortable to
| 1.23533 |
Zyphra/Zyda-2
|
New methods to examine the brain and spinal fluid heighten the chance of early diagnosis of Alzheimer's disease. Results from a large European study, led by researchers at the Karolinska Institutet, are now published in the medical journal BRAIN. These findings may have important implications for early detection of the disease, the choice of drug treatment and the inclusion of patients in clinical trials.
Despite many years of intensive research, no effective treatment currently exists for Alzheimer's disease, which is the most common form of dementia. It has become increasingly clear that, if the disease is to be treated successfully, it must be detected early, perhaps even before symptoms are evident. Thus, there is a great need for reliable diagnostic methods so that treatment to slow or prevent the disease can begin as early as possible.
A characteristic, pathological sign of Alzheimer's disease is the formation of insoluble amyloid plaques that accumulate in the brain. The presence of these plaques can be measured in the brain using positron emission tomography (PET camera) to visualize radioactive tracer molecules that bind to the amyloid plaques. Amyloid levels can also be measured in spinal fluid. While amyloid accumulates in the brain in Alzheimer's disease, research has shown that levels of amyloid in the spinal fluid is instead reduced.
In the current study, researchers compared the amyloid-PET measurements in the brain with amyloid-β42 in the spinal fluid to see how well they align. The investigations were performed at seven European memory clinics on 230 patients who were examined for memory disorders. Patients received various diagnoses, such as mild cognitive impairment (MCI), Alzheimer's disease and various types of dementia. A small group of healthy individuals were control subjects.
PET studies on the patients' brains were evaluated both locally at the seven different hospitals and centrally at the Karolinska Institutet. The researchers also used a new method, called the centiloid method, in order to standardize the measured amyloid values on a unified scale so they can be compared. Levels of amyloid42 were measured from the samples of cerebrospinal fluid at each local hospital. All samples were also analyzed centrally at Sahlgrenska Hospital in Gothenburg, where the levels of amyloid42, as well as a second amyloid protein amyloid40, were measured.
Find your dream job in the space industry. Check our Space Job Board »
The researchers found that the best fit was achieved when the amyloid level in the brain was compared with the ratio between the levels of amyloid42 and amyloid40 in the spinal fluid. Given this finding, the research team hypothesized that the forms of β-amyloid found in the brain and spinal fluid are not completely identical.
"Interestingly, there was also a difference between the values measured in the brain and spinal fluid in a smaller group of patients. This may justify that, in some unclear cases, the diagnosis should include an amyloid PET scan to complement the cerebrospinal fluid sample. These findings are also important because it is increasingly common to perform amyloid-PET studies upon the inclusion of patients in new drug studies," said the study's coordinator Agneta Nordberg at the Department of Neurobiology, Care Sciences and Society, Center for Alzheimer's Research, Karolinska Institutet.
Source: Karolinska Institutet
- Antoine Leuzy, Konstantinos Chiotis, G. Steen Hasselbalch, Juha O. Rinne, Alexandre de Mendonca, Markus Otto, Alberto Lleó, Miguel Castelo Branco, Isabel Santana, Jarkko Johansson, Sarah Anderl-Straub, Christine A. F. von Arnim, Ambros Beer, Rafael Blesa, Juan Fortea, Sanna-Kaisa Herukka, Erik Portelius, Joseph Pannee, Henrik Zetterberg, Kaj Blennow, Nordberg. Pittsburgh Compound B imaging and cerebrospinal fluid amyloid-β in a multicentre European Memory Clinic study. Brain, July 2016 DOI: 10.1093/brain/aww160
| 2.461153 |
openbmb/Ultra-FineWeb
|
Indonesia has a wealth of biological resources and is home to a large number of different ethnic and cultural groups, many of which have developed their own, distinct health care systems. As a result, the country is rich in both biological resources and traditional medicinal knowledge. Moreover, it is believed that the situation of traditional medicine in Indonesia is more or less characteristic for that in several other countries in the region.
Concept of illness
A traditional healer is someone known to and acknowledged by the community as a person who can provide traditional treatments. Healers may have inherited their skills from their ancestors or obtained them by studying, via apprenticeship, by divine inspiration or by meditation. The scope of services they provide is usually quite comprehensive and may include health promotion as well as preventive, curative and rehabilitative care.
The concept of health and illness held by the traditional healers is similar to that of the local community, in which 'health' refers to a normal, proper and comfortable condition, which enables a person to undertake normal daily activities - this is in fact quite similar to the'modern' definition. Broadly speaking, causes of illness are being categorized as naturalistic or personalistic. The naturalistic causes include environmental factors, food related factors, life style imbalances and changes in season. Personalistic causes include a belief in magic, (evil) spirits and disharmony in the relation with God or with other people as the reason for illness.
While modern or western medicine remains the mainstream of health care in the country, traditional medical treatments continue to enjoy considerable popularity and continue to be practiced by numerous healers and practitioners all over the country. Traditional medicine, apparently, is perceived as efficient, safe, cost-effective and affordable; moreover, it is accessible, especially for the poor and for those living in remote areas, who tend to depend more on traditional and herbal medicines than people living in urban areas. Furthermore, during the past decade, the utilization of traditional medicine has increased sharply, partly because formal health care became less accessible and less affordable due to the economic crisis.
Traditional and conventional health care
Apart from some experimental exceptions, in Indonesia, traditional and conventional or'modern' health care services are not integrated; they merely co-exist. Integration only seems to take place at the level of individual patients, who are known to switch between different systems of care.
In recent years, the Indonesian Ministry of Health has adopted a policy of trying to modernize traditional medicine, while retaining its identity. This modernization encompasses several aspects, such as improving diagnosis through the use of modern techniques while providing treatment by traditional methods, as well as modernization of the production processes and quality control of traditional medicines. The latter takes place via the introduction of Good Manufacturing Practices and via the development of a registration system and of quality specifications for widely used herbal materials and preparations1. The modernization policy also includes efforts to encourage scientific research, including clinical trials, to document the effectiveness of traditional medicines; such empirical evidence is required to make the use of these products acceptable to the medical profession, and therefore, ultimately, in order to integrate these different systems of health care.
1 For practical reasons, these measures are mainly directed at large and medium-size enterprises and their products.
However, research as well as further development of Indonesian traditional medicine is complicated by a number of problems, including:
- many old recipes cannot be traced and/or are missing;
- preparations may contain multiple ingredients, rendering it difficult to establish which agent is responsible for -or contributes towhich therapeutic or side-effects;
- the same herbs, grown in different areas, may contain somewhat different active substances, may contain different quantities of those substances and may be known under different names, complicating comparisons as well as standardization efforts;
- there are no clearly defined standards for effectiveness and toxicity for most finished preparations, nor, at times, for individual ingredients.
Data and inventories
It has been estimated that Indonesia's natural wealth includes more than 10% of the world's plants, thousands of which are used for treatment of diseases. Out of those, some 900 have been investigated for medicinal properties. But while a number of efforts have been undertaken to study and/or make an inventory of the medicinal plants used in certain parts of the country, the resulting databases and inventories of biological resources and traditional medicinal knowledge are scattered among different sectors, research institutions and organizations.
Therefore, the Ministry of Health feels there is a need to coordinate the collection of data on biological resources and traditional knowledge about their medicinal use. At the same time, it would be beneficial to integrate the existing inventories in a single database, accessible to all parties concerned, notably health care providers, researchers and communities. Currently, because the data and information are not systematically arranged, it is difficult to disseminate them or to provide easy access. In fact, the Ministry envisages to establish an information and documentation network on traditional medicine; this is currently under discussion with relevant stakeholders. The idea is to develop a comprehensive traditional medicine database, covering methods of treatment and traditional drugs, in order to strengthen the development and use of traditional medicine2.
2 Note: such databases, especially if made public, have considerable IPR implications, see paragraph 6.3. Thus, sufficient protection should be provided for the knowledge holders and/or access to the database should be under their control.
Cultivation and conservation
During the last ten years, the development and use of medicinal plants has become more intensified, thus increasing the exploitation of biological resources. As a result, the importance of protection of those biological resources against unsustainable over-exploitation has increased. So far however, conservation efforts have been inadequate.
Cultivation of medicinal plants, on the other hand, has been undertaken by some research institutions and NGOs, as well as by some commercial jamu companies wanting to secure their supply of raw materials. Moreover, some years ago, the Ministry of Health has launched a campaign to promote the development of community or family medicinal gardens, in order to stimulate both the use of traditional medicine for common ailments and the cultivation of medicinal plants. The campaign, which initially took the form of a nationwide competition, among others encouraged participants to mark the names of the medicinal plants they cultivate.
| 1.9682 |
HuggingFaceFW/fineweb-edu
|
Click on the image to download the guide
Main symptoms
Children with ADHD have impulsivity / hyperactivity, and inattention levels that exceed the norms for their age. Additionally, these problems are chronically present, from pre-school age (although sometimes problems do not arise until later) and in all circumstances of life (family, school, etc).
There are other very common problems in hyperactive children. They have a hard time planning, organizing, prioritizing, and so on. In fact many doctors feel that these difficulties with thinking are the really important problem and key to the disorder. It is also typically difficult to organize their time.
There are children with ADHD with many very intense symptoms that also have many problems with adaptation and functioning. Others have mild symptoms and with adequate support can develop without major problems. The scales provide help in assessing the severity or intensity of symptoms, and to follow its evolution. Some that are useful are the CBCL scales, SDQ, Conners, Brown ADD-S, and the ADHD-RS-IV.
Aside from there being more and less serious cases, in general the behavior of these children is often worse later in the day than in the morning. They are also worse in situations that require sedentary activities than those that allow movement (such as sports or recreation).
What parents and teachers often notice:
"The child is confused, forgetful, does not listen, does not pay attention, loses everything, unable to do his own homework, takes so much time to do things he knows how to do perfectly well, makes so many stupid mistakes, can get an A- on a test or get a D- with one or two days difference, does much less than what is could do, he could make better grades.
Hyperactive children are usually steered off task by external stimuli that compete what they are doing, such as the phone ringing, a child speaking in class, a fly whizzing by, etc. It is much less common for the child to be distracted by his or her own thoughts or worries.
A related problem to attention is what is called "executive functions" or the "working memory". This is reflected in the difficulty of keeping information in your head during the time necessary to make a decision or perform a complex activity. Also, the difficulty to do mental tasks that are "complex" such as planning, organizing, anticipating, etc.
What parents and teachers often notice:
"He does not sit still, he makes you crazy always tapping or moving his leg, he cannot do one thing at a time, he is unable to remain seated at the table during dinner, he goes up and down in the chair without stopping, it's like he's got a motor in him, he doesn't stop talking "
Hyperactive children have been described as lizard tails, people on the move, unable to sit still for a moment. The need for movement can be displayed in a noisy fashion, with continuous movement, jumping, bouncing, screaming, running, with continued small accidents, or in a more disguised form. Older children or more reserved ones are able to stay seated, but continuously move a leg, a finger or repetitively tap on the table or the floor. This can be very annoying if you are around, but the excessive movement only draws attention with careful and close observation.
With age, motor hyperactivity is often limited, there is no need to move around, change location, and there remains a certain motor discomfort, with the continued movement of a body part, or even just an inner feeling of unease. In fact, motor hyperactivity is usually the symptom that is attenuated with age.
What parents and teachers often notice:
"He says things without thinking, consistently puts his foot in his mouth, then regrets it, has tantrums or mouths off, rushes to answer, talks out of turn in class, interrupts others, cannot wait in line, rushes tasks and answers awkwardly making mistakes without reading everything, and we spent the day in the emergency room because he stumbles, falls, acts like an idiots, always has a scrape or cuts "
Doing or saying something before you think is one of the typical characteristics of ADHD. It is also typical of children without associated behavior problems to be sorry about those behaviors that harm others or those that are disrespectful. The intent to harm is not characteristic of the disorder and that is why when a child with ADHD insults his or her parents or a teacher, or hits another child, he or she often feels bad about it afterward. A typical remark from parents about their child's hyperactive behavior is how he or she has a good heart and how he or she is as caring and sensitive as could be. It is important to differentiate impulsivity that accompanies antisocial disorders as opposed to the impulsivity of hyperactive disorders. Saying socially inappropriate things, which are often absolutely true, is typical of hyperactive children. Such as the child who says that an aunt has gotten fat at a family reunion, embarrassing his or her parents. Sometimes this tendency to say inappropriate comments motivates the rejection of the child's peers when modesty or secrecy is important, such as with groups of teenagers when they start dating or when ganging up to do stupid things. Being branded as "clumsy", "clowns" or "smart mouths" is often the least offensive things that these children can be called at school. And all for not considering the consequences of what they do or say before hand.
Hyperactive children are impatient. They cannot wait for long-term results of their efforts, whether or not these results being positive or negative. That is why it is difficult to regulate their behavior with time delays.
Because of their impulsivity many are risk takers. In young children, an example might be that they cross a street without looking both ways because a friend who is on the other side is calling them, or they get lost in the supermarket. In adolescence, drug use, particularly the exposure to them, reckless driving, and promiscuous behavior, and all without adequate safety measures being taken are the typical risks faced by these individuals. In adulthood they can suffer the consequences of hasty decisions, both at work and in their personal life, or angry outbursts in response to irritating circumstances.
| 2.540251 |
Zyphra/Zyda-2
|
According to data from the World Health Organization (WHO), the number of new cases of Hansen's disease (HD, or leprosy) identified worldwide declined by about 20% from 2003 to 2004. At least 116 of 122 countries once considered leprosy--endemic have achieved a prevalence rate of less than one case per 10,000 population.1,2
Meanwhile, the number of active HD infections in the United States catalogued through the CDC and the National Hansen's Disease Program (NHDP) rose from 76 cases in 2000 to 166 in 2005, with an additional 137 cases in 2006 (the most recent year for which complete figures are available).3,4 Currently, 6,500 US residents are known to have HD, of whom 3,300 require care for active disease.3
Accurate diagnosis and straightforward, aggressive treatment can mean certain cure for this dreaded disease, as it is responsive to a combination of available drugs. For primary care providers in the US, familiarity with this condition can play a role in eliminating it altogether.
Background and Etiology
HD is believed to have originated in East Africa with the pseudonym of leprosy, from the Greek lepi, meaning "fish scales." Although HD is one of the oldest known human infections, it is not well understood by many Western health care providers. Once considered highly contagious and easily transmissible, HD has proven to be neither: 95% of the human population is not susceptible to the responsible pathogen.3 HD retains its reputation as a devastating illness when left untreated, however, with sequelae often including significant sensory and motor dysfunction.5
Leprosy is a chronic bacterial disease caused by Mycobacterium leprae. Mycobacterium is the same rod-shaped, acid-fast bacillus (AFB) implicated in pulmonary tuberculosis, cutaneous tuberculosis, and numerous cutaneous nontuberculoid infections.6,7
HD transmission is believed to occur almost exclusively by nasal droplet, inhaled by way of others' nares or lungs. Research continues in possible transmission by skin-to-skin contact.8,9
Leprosy is particularly challenging for immunocompromised persons, such as those with HIV/AIDS or tuberculosis. According to data from the NHDP, HD in the US is found primarily among undocumented immigrants who live in close quarters. Cases considered "home-grown" rather than "imported"5 are most commonly diagnosed in Hawaii and in a swath from Texas to Georgia and south toward Florida. Pockets of HD incidence are also found in California, New York, and Massachusetts.4
Clinicians' lack of familiarity with HD and its relative rarity in the US help explain why diagnosis and treatment are commonly delayed. As a patient's disease progresses from an insidious, gradual, and relatively painless onset, the primary care provider may be grappling with an extensive differential diagnosis (see "Differential Diagnosis for Hansen's Disease [Leprosy],"10,11 below). Even after confirming a diagnosis of HD, the provider must contend with a lack of information and misinformation about HD among staff members, the patient's family, and society at large, as well as the associated stigma. Patient education and effective treatment are of comparable importance.
Patient Presentation and History
A 40-year-old Latino man presented to a primary care provider with a well-demarcated, erythematous patch on his right upper back that had raised outer edging and faint flaking. The patch was surrounded by several smaller but similar asymmetrical macules. The patient denied pruritus but stated that the area "felt funny." He said the lesion might have been spreading during the previous several months, but he could not be certain because of its location.
The man denied any medication use except for a topical antibiotic ointment he had applied to the affected area with no improvement. His provider made a diagnosis of tinea corporis and prescribed an antifungal cream, naftifine. After two weeks without results, the patient was referred to a dermatologist.
During the assessment, it became apparent that the patient was experiencing numbness in his fingertips and general muscle weakness in his arms. A KOH prep was difficult to obtain, as the lesion site was somewhat smooth. Any dermatophytes that may have been present had been eliminated by the naftifine, and KOH results were negative.
A 5.0-mm punch biopsy from the largest lesion was ordered. A preliminary diagnosis of sarcoidosis (chronic inflammation with an unusual skin manifestation) was made, with serious consideration given to early cutaneous T-cell lymphoma (mycosis fungoides). A high-potency steroid was prescribed for five days' use, twice daily.
On his return to the dermatologist, the patient reported that the site was no better. He was informed that the dermatologist and the pathologist, both with considerable experience, had detected no bacilli or dermal nerve infiltration in the tissue sample but had observed abundant lymphocytic infiltration. This finding, coupled with the patient's decreased sensation, muscle fatigue, and status as a recent immigrant from a South American country, led to an initial diagnosis of borderline leprosy (BB).
Physical Examination and Disease Progression
If the first provider suspected a fungal infection during the initial examination, he should have completed a KOH scraping to confirm that suspicion. While superficial fungal infections are extremely common, particularly in the southeastern US, a sampling of scale with KOH 5% to 20% and the absence of dermatophytes under the microscope might have permitted a quick rule-out.12 Additionally, dermatophytic infections are very responsive to current medications within days, not weeks.
Thus, the key to an accurate diagnosis of leprosy begins with a physical examination that takes into account both chronic unresolved cutaneous lesions and neurologic changes in sensitivity.
A great majority of patients with HD have no noteworthy clinical symptoms until the first skin manifestations. While sensory neuropathy is prominent in all patients, additional findings (depending on the type of leprosy involved) may include plantar ulcers, chronic nasal congestion with early evidence of cartilage loss over the nasal bridge, chronic nosebleeds, cranial nerve palsies, and eye paralysis.12 In rare cases, hypogonadism may develop, or the clinical team may discover amyloidosis, an accumulation of insoluble proteins in the tissues that impairs function in various organs; this condition is usually detected by skin biopsy. If early or indeterminate leprosy is identified, neither form persists; rather, the condition will progress to one of the following:
- Borderline lepromatous leprosy (BL) and lepromatous leprosy (LL) offer very high resistance to treatment and are considered malignant forms of HD. Findings in patients with BL or LL include multiple lesions in various crazy-quilt presentations: macules, papules, plaques, nodules, masses, and patches of deep, erythematous infiltration across the extremities, face, and trunk.12 Loss of all hair except on the scalp is possible. Ulcers may form on the palms of the hands and soles of the feet.
In both BL and LL, results on AFB smears will reflect moderately high or very high concentrations of the pathogen in the patient's system. Thus, these forms of HD are defined as multibacillary. If either is left untreated, the accumulation of proteins attributed to amyloidosis and secondary infections that develop eventually lead to death.
- Borderline leprosy (BB) has already been described in the case patient, with five or six ill-defined lesions and mild impairment of the peripheral nervous system. Aggressive treatment of this form of HD is important. A strong immune system provides no guarantee of successful treatment, and therapy must forestall a likely continuum to more serious forms.13
- Borderline tuberculoid leprosy (BT) and tuberculoid leprosy (TT) are both forms of paucibacillary HD. They offer little resistance to treatment in the patient with a healthy immune system. Lesions are generally scant (fewer than five; see figure), and the AFB smear reveals 0 to 10 bacteria in 100 fields.12
For the primary care provider, a thorough physical examination also requires familiarity with reasonable differentials. Hallmarks of conditions less likely to be leprosy include nausea, vomiting, or diarrhea, fever and chills, rectal bleeding and unexplained weight loss, headaches, and shortness of breath.
To help gauge progression of the disease and assess effectiveness of therapy, it is common practice to conduct a neurosensory test at each office visit. This is performed by touching the patient's extremities and the periphery of lesions with a simple nylon monofilament.13 The patient's response or lack of response is documented and changes are noted for future therapeutic decision making.
In patients with suspected HD, the NHDP recommends that a full-thickness 4.0-mm elliptical or punch biopsy be performed at the periphery of the largest or most active lesion and that slides be sent to the NHDP in formalin or paraffin for review.14 Experienced NHDP pathologists may order additional stains. A detailed protocol can be found at _URL_
Proficiency in performing slit smears, a technique to obtain tissue fluid, is also helpful.15 Measurement of the number of bacteria in a set number of fields allows for calculation of the host's bacterial index, making it possible to determine an appropriate treatment level.
The preferred sites for the slit smear are active lesions, if possible from both ear lobes plus
| 2.018392 |
HuggingFaceFW/fineweb-edu
|
7 agreements for productive conversations during difficult times
Here's some timely advice on working across difference. Sometimes the hardest cuts to bear are from the very people we view as being 'on the same side'; non-profit blogger Vu Le offers some powerful medicine for prevention and healing. Source: 7 agreements for productive conversations during difficult times
Trust, partnership and movement-building
Check out this great article by Jodie Tonita on the role of trust in movements for social change. She explains why trust is key for effective collaboration, and how to intentionally cultivate trust among individuals and organizations. _URL_
Skillful listening: Stay present… don't try to fix it
Structured Decision-Making: Roadmap to Wise Choices?
As a facilitator, I'm always searching for new approaches to help groups plan strategically and make smart decisions. One approach I'm currently exploring is "structured decision-making", or SDM (though somehow that sounds faintly obscene when I say it out loud).
Structured decision-making is a systematic process developed for making wise, transparent decisions in the face of complex issues with diverse stakeholders, high stakes and divergent perspectives.
Example: The Holiday Dilemma
Here's a super-simple example of how SDM might work, from my friend and colleague Trent Berry. He's the co-founder of Compass Resource Management, based out of Vancouver. Compass boasts one of the world's most masterful teams at designing and facilitating structured decision-making processes for resource and environmental issues.
He explains: "Imagine you and your spouse want to plan a holiday. You want to go to Mexico. They want to go to Hawaii. How do you resolve the difference? Well, you start by trying to understand why each other prefers one location or the other. What are you really trying to achieve. So, you might point out cost, things to do, safety, etc. Those are your objectives or interests. Now rather than just arguing about a location, you can discuss the relative merits of each from the perspective of what you each want to achieve. doing that you may discover that some of your facts are wrong – e.g., cost. But you'll also understand how much importance each of you is placing on different things – e.g., cost vs. safety. And through the process you may understand each other better and you may actually come up with a third option that meets both of your objectives. Not always – but sometimes. Really, structured decision making is similar to what used to be called 'interest-based negotiation'. The only way it may differ is there is the discussion goes beyond two private parties and the focus is on not only understanding interests but also doing a better job of really understanding how different options perform across interests. Its a marriage of science and values."
The Steps to SDM
In practice, SDM processes can often be described in decision trees or other concept maps. The basic steps follow, in many ways, a really great government policy briefing note. Here are the steps for a "PrOACT (Problem, Objectives and Measures, Alternatives, Consequences, and Trade-offs" SDM framework (originally outlined in the book "Smart Choices"):
1. Define the problem
2. Specify the objectives and measures – including getting agreement on "what matters", and prioritizing information and assessing uncertainty or risk with different kinds of information
3. Create imaginative alternatives
4. Identify the consequences for each
5. Clarify the trade-offs.
Growing interest in SDM
From Alberta to Australia, the wave of interest in this approach is growing. One major application is for complex resource management issues. Imagine a group of environmental activists, First Nations, oil industry proponents and government staff trying to come to some sort of sound, values-based decision-making around large-scale oil exploration over a relatively intact natural ecosystem. How do you design a dialogue process that isn't about greenwashing or tokenism and doesn't suck the life force – not to mention the coffers — of all involved for the next decade? Past experience has shown that lengthy land-use planning approaches and environmental assessments don't always yield wise results, and especially not in a timely or cost-effective way.
As Berry explains, "environmental assessments all too often look like a long, expensive shopping list of environmental impacts, with no way to prioritize or sort through them. Structured decision-making starts from a place of shared values – because science can tell us about all the options, but it can't do a thing about setting priorities or assessing the relative risks among them. Only a clear set of values can do that."
Beyond Resource issues
SDM is also being used with child welfare workers in California, adult protective services in Michigan and a host of other agencies. Check out several other case studies on-line, including several at _URL_
| 1.406571 |
Zyphra/Zyda-2
|
Responding to our recent post about clinical trials, a commenter mentioned informed consent and the questions women should ask before agreeing to participate in a trial. This is a timely topic today, with a CNN article asking, Did Tuskegee damage trust on clinical trials?," as current protections for research subjects have really only been in place for a few decades (the history of women's inclusion in trials is a topic for another day).
To understand your rights with regard to volunteering for a study, it may help to know a little bit about the process and guidelines for clinical research. Prior to conducting a study, researchers typically must submit their research plan to an institutional review board, or IRB. This board is charged with monitoring the trial and making sure the rights and welfare of the subjects are protected, and that the Belmont Report principles of respect for persons (individual autonomy and informed consent), beneficence (maximizing benefit to subjects while minimizing risk), and justice are honored. This presentation on ethical principles for human subjects research is a good introduction to the topic.
The IRB is also in charge of making sure the informed consent process is in place and adequate. An informed consent process should give you information on the research procedure, its purpose, risks and anticipated benefits, alternative procedures, and make it clear that you can ask questions and withdraw from the study at any time (you always have this right). It should also convey this information in a way that you can comprehend, and your consent should be obtained in a way that makes it truly voluntary for you (i.e., there is no coercion, undue influence, or punishment for not participating). The National Cancer Institute offers this guide to understanding informed consent.
The National Institutes of Health, a major funder of clinical trials in the United States, offers this list of questions you should ask when deciding whether to participate in a trial, and the National Cancer Institute offers a more comprehensive list of questions to have answered. These questions focus on the purpose of the study, possible risks and benefits, personal concerns, costs, and other topics; you should review this list and remember that you have every right to have these questions answered before volunteering for a study.
- Basic questions and answers about clinical trials – FDA
- Clinical trials: what you need to know – American Cancer Society
- Issue: recruitment and retention of women in clinical trials – Society for Women's Health Research
- FAQ about clinical studies – National Institutes of Health
- Should I Enter a Clinical Trial? A Patient Reference Guide for Adults with a Serious or Life-Threatening Illness [PDF] – ECRI Institute
| 1.677441 |
HuggingFaceFW/fineweb-edu
|
- Health Library
- Research a Disease or Condition
- Lookup a Symptom
- Learn About a Test
- Prepare for a Surgery or Procedure
- What to do After Being Discharged
- Self-Care Instructions
- Questions to Ask Your Doctor
- Nutrition, Vitamins & Special Diets
|•||Memorial Cardiac & Vascular Institute|
|•||The Cardiac Center at Joe DiMaggio Children's Hospital|
|•||Memorial Cardiac & Vascular Institute|
|•||Find A Physician|
|•||Subscribe to our Health-e-News|
|•||Hardening of the arteries...|
|•||Heart bypass surgery|
|•||Heart bypass surgery - mini...|
|•||Cardiac ablation procedures...|
Angioplasty and stent placement - carotid artery
You have an artery on each side of your neck called the carotid artery. This artery brings needed blood to your brain and face.
The blood flow in this artery can become partly or totally blocked by fatty material called plaque. A partial blockage is called carotid artery stenosis (narrowing). A blockage in your carotid artery can reduce the blood supply to your brain. A stroke can occur if your brain does not get enough blood.
There are two invasive ways to treat a carotid artery that is narrowed or blocked. One is surgery called endarterectomy. The other is a procedure called carotid angioplasty with stent placement.
Carotid angioplasty and stenting; CAS; Angioplasty - carotid artery
Carotid angioplasty and stenting (CAS) is done using a smal surgical cut.
- Your surgeon will make a surgical cut in your groin after using some numbing medicine. You will also be given medicine to relax you.
- The surgeon places a catheter (a flexible tube) through the cut into an artery. It is carefully moved up to your neck to the blockage in your carotid artery. Moving x-ray pictures (fluoroscopy) are used to see the artery and guide the catheter to the correct position. live x-ray pictures to see your artery.
- Next, the surgeon will move a wire through the catheter to the blockage. Another catheter with a very small balloon on the end will be pushed over this wire and into the blockage. Then the balloon is inflated.
- The balloon presses against the inside wall of your artery. This opens the artery and sends proper blood flow to your brain. A stent (a wire mesh tube) may also be placed in the blocked area. The stent is inserted at the same time as the balloon catheter. It expands with the balloon. The stent is left in place to help keep the artery open.
- The surgeon then removes the balloon.
Why the Procedure Is Performed
There are two invasive ways to treat a narrowed or blocked carotid artery. One is a surgery called endarterectomy. The other is carotid angioplasty with stent placement.
Carotid surgery (endarterectomy) is a safe surgery and is almost always the first choice. This is because there is a higher chance of having a stroke during or soon after angioplasty procedure than there is with the open surgery.
As a result, carotid angioplasty and stenting is most often used only when the patient is too ill to have carotid endarterectomy. Other factors may make angioplasty better choice for treatment. These include which part of the carotid artery is narrowed or whether someone has had neck surgery in the past.
For more information see: Carotid artery surgery
Risks of carotid angioplasty and stent placement are:
- Allergic reaction to dye
- Blood clots or bleeding at the site of surgery
- Brain damage
- Clogging of the inside of the stent (in-stent restenosis)
- Heart attack
- Kidney failure (higher risk in people who already have kidney problems)
- More blockage of the carotid artery over time
- Seizures (this is rare)
- Stroke is more likely with carotid artery angioplasty than with carotid endarterectomy
Before the Procedure
Your doctor will do a thorough physical exam and several medical tests.
Always tell your doctor or nurse what drugs you are taking, even drugs, supplements, or herbs you bought without a prescription.
During the 2 weeks before your surgery:
- Days before the surgery, you may have to stop taking drugs that make it harder for your blood to clot. These include aspirin, ibuprofen (Advil, Motrin), clopidogrel (Plavix), naprosyn (Aleve, Naproxen), and other drugs like these.
- Ask your doctor which drugs you should still take on the day of your surgery.
- If you smoke, you need to stop. Ask your doctor or nurse for help quitting.
- Always let your doctor know about any cold, flu, fever, herpes breakout, or other illness you may have before your surgery.
Do NOT drink anything after midnight the night before your surgery, including water.
On the day of your surgery:
- Take the drugs your doctor told you to take with a small sip of water.
- Your doctor or nurse will tell you when to arrive at the hospital.
After the Procedure
After surgery, your doctor may want you to stay in the hospital overnight so that nurses can watch you for any signs of bleeding, stroke, or poor blood flow to your brain. You may be able to go home the same day if your procedure is done early in the day and you are doing well.
Carotid artery angioplasty may help lower your chance of having a stroke. But you will need to make lifestyle changes to help prevent plaque buildup, blood clots, and other problems in your carotid arteries over time. You may need to change your diet and start an exercise program if your doctor tells you exercise is safe for you.
International Carotid Stenting Study Investigators. Dobson EJ, Featherstone RL, Bonati LH, van der Worp HB, et al. Carotid artery stenting compared with endarterectomy in patients with symptomatic carotid stenosis (International Carotid Stenting Study): an interim analysis of a randomised controlled trial. Lancet. 2010;375:985-997.
Murad MH, Shahrour A, Shan ND, et al. A systematic review and meta-analysis of randomized trials of carotid endarterectomy vs. stenting. J Vasc Surg. 2011 Mar;53(3):792-7.
Eisenhauer AC, White CJ, Bhatt DL. Endovascular treatment of noncoronary obstructive vascular disease. In: Bonow Ro, Mann DL, Zipes DP, Libby P, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine. 9th ed. Philadelphia, Pa:Saunders Elsevier;2011;chap 63.
Reviewed By: David C. Dugdale, III, MD, Professor of Medicine, Division of General Medicine, Department of Medicine, University of Washington School of Medicine. Michael A. Chen, MD, PhD, Assistant Professor of Medicine, Division of Cardiology, Harborview Medical Center, University of Washington Medical School, Seattle, Washington. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.
| 1.692936 |
HuggingFaceFW/fineweb-edu
|
Is everything a blur when you play soccer or snorkel? Investing in a pair of prescription goggles may make your favorite activity much more enjoyable.View Article
You are using an outdated browser. Please upgrade your browser to improve your experience.
Visual motor refers to our eye-hand coordination. Children who are deficient in visual motor skills usually have poor drawing or printing skills. Often their letters and words may run together or slope down as they print. They also have an extremely difficult time with written assignments. Because it takes so much effort to put it on the paper, they usually have poor written-memory skills and are very slow at copying words and sentences from the text or blackboard.
| 2.189165 |
openbmb/Ultra-FineWeb
|
The researcher has to undertake a sequential progression or step-by-step process of research to undertake a research investigation. In different fields of investigation the tools and the techniques might be different but the logical process of research remains the same. Articles in this website will help you go through the logical steps of undertaking the research. These articles will provide a theoretical knowledge, but this theoretical knowledge can be easily operationalized by the researcher. In general, the eight-step model of the research process is explained below and you can open the link to find detailed knowledge related to each step of the research. Diagrams are provided where only theoretical knowledge is insufficient.
Step I: Formulating a research problem
Reviewing the literature
There are various aims that a researcher achieves with review of literature. There are books, journals, magazines, newspapers, diaries, bibliographies and various other sources that can provide a good base for review of literature. It depends on the field in which you are conducting the study as well as the topic that you want to research. At this moment the researcher has yet to formulate a research problem after narrowing it as much as possible. The review of literature gives greater insight to the researcher so that he can formulate an executable research problem. This preliminary step has therefore greater importance because it gives sound base to your research. While reviewing the literature the researcher should create a bibliography. Every library provides database related to different fields and the researcher can use the electronic database to find articles and research papers related to the topic of his interest. For example, ERIC is an electronic database for resources related to education and social sciences.
Formulating a research problem
There is great importance of formulating a good research problem. A good research problem has several features, it is specific in nature, highly relevant to your subject area, off course it interests you, you have the expertise to undertake it, and it is ethically correct. So, there are plenty of issues that you have to consider and formulating a research problem is not an easy task. You can ask your research supervisor for help in this regard and she should help you because she has the experience that you do not have. You might think that you have narrowed down the research problem but if you think through it again it will look too broad. The research problem determines the research objectives, a broad research problem will have many objectives. Having too many objectives means that you have to conduct a big study that will take long time and other resources. You should identify your research problem and then dissect it. You should double-check your research problem for any changes or improvements.
It is very important to identify the variables that have to be studied in the research. Variables are like concepts, but they can be measured on different scales.
Hypotheses are hunch or assumptions that are made by the researcher. They make the research goal oriented and paves a way to do the research. When the researcher formulates the research problem the next step is to understand how to solve this problem. Hypothesis provides a guideline to solve that problem. There are studies that have been conducted without a hypothesis, so hypothesis is not a must-have for the research. It depends on your research problem whether you need to formulate a hypothesis or not. It is always good to have a hypothesis. In descriptive research, the researchers may or may not formulate a hypothesis. There are some researches that cannot be undertaken without a hypothesis, because in the absence of a sound hypothesis the research becomes too lengthy and loses its direction.
Formulating research objectives
When the researcher formulates the research problem and understands the purpose of his research, he has to develop objectives too. A research provides solution to a problem, it should directly focus on the problem. Research objectives gives direction and make the research relevant and to the point. The researcher has to take the right path to finding out the solutions. Research objectives and hypothesis make this process very to the point. The phrasing of the research objectives should be very clear and preferably simple to understand. The researcher should avoid complex and double-barrelled sentences. The main purpose of the objectives is to identify the variables and make decisions about how to measure them. They define what the researcher wants to achieve from this study. They should always be closely related to the research problem.
Step II: Conceptualising a research design
Selecting a research design
The research design provides a complete guideline to undertake the research practically. It provides the tools, techniques and procedures that are to be used to accomplish the research. Before deciding about the study design, the researcher should be very clear that whether his research is a descriptive one, correlational, explanatory, exploratory or any other type. In short, the researcher should be well aware of the type of research that he is conducting. The type of the research is defined by the research problem and the research objectives. The questions he has asked define what he wants to achieve and how he wants to achieve it. In social sciences the researchers are basically interested in two type of research designs; descriptive and explanatory. In case, it is a feasibility report the researcher will use an exploratory design. In pure sciences and medicine the researchers use experimental study designs. In historical researches too, the study design is descriptive as in social sciences. Regardless of any study design the researcher uses, the most important thing to look at in determining the research design is the research problem as well as the research objectives. The statement of the objectives usually begins with what, why, when, where and how. The descriptive research designs ask "what" questions. The explanatory research design questions "why" and correlational research designs ask "how".
Step III: Constructing an instrument for data collection
Selecting a method of data collection
In this step, the researcher selects a method of data collection for his research. Now, any kind of data collection method can be used in any kind of research. The researcher now looks at the study design and how it has been planned. As study design provides a structure of the research process, the researcher can use it to find out which method will best suits the research. The methods are basically divided into primary methods of data collection and secondary methods of data collection. The primary methods like survey, experiments and books can be very enlightening. The researcher can get valid and accurate data using primary sources, but this does not necessarily means that secondary sources are invalid and inaccurate. Secondary sources can be used effectively in the research in the absence of primary sources. The choice of the method also depends on whether the research is quantitative or qualitative in nature.
Step IV: Selecting a sample
Selecting the right sampling type
Sampling means selecting a few from the whole population. To select a sample the researcher first decides about the population and locate them. There are possibilities that the whole population is so large and extensive that the researcher cannot enumerate or identify them. In anyway a sample can be drawn from the population. The purpose of sampling are many and they are described in detail in the next several articles. Here it should be understood that by selecting a sample we mean that we want to make our research achievable. There are various sampling types and some of them are classified as random sampling types or random sampling designs while other are non-random sampling types.
To do the sampling the researcher has to calculate the sample size first. The researcher first recognizes the population and then he take decision about the sample size. There are formulas that can be used to draw a valid sample size. You can take sample of your own choice but it will not be representative of your population. It might be too small as compared to the population size, in which case, the data collected from the sample will be invalid and inappropriate. Your sample size can be too big and in this case, you will get a large amount of data. Analyzing a large data needs lots of time and resources, so the better way is to calculate the sample size using a formula.
Step V: Writing a research proposal
Writing a research proposal
The research proposal is like a feasibility report. The purpose of the research proposal is to show the plan of your research to some senior and experienced researchers in your field. In this way, you are able to get some instructions as to change the plan. You can also get sponsorship from other people to conduct this research. The research proposal focuses on What do you want to research? What objectives do you want to achieve? How do you want to achieve it? What difference your research can make, its application? How much time and resources do you have? What is your overall plan to proceed with this research? There are various types of proposals and proposal templates are available in universities, colleges as well as online.
Step VI: Collecting data
Data collection is done according to the data collection method that has been selected in the research. In collecting data, the researcher has to avoid any biases and collect as much reliable and valid data as possible. The researcher should also know the issues of ethics in data collection, especially in collecting data using survey technique. Personal identities should be kept private as much as possible. The researcher should not change or misuse the data as it is his responsibility to bring forward the true responses by the participants.
Step VII: Processing data
The final step of processing the data starts with editing the data. The data is still in raw form and the researcher has to put lots of efforts to arrange the data. Edit the data and categorize them into groups for easier analysis. After editing the data, the data is easy to comprehend, code and analyze.
Codes are assigned to the data so that it can be easily analyzed.
The analysis of the data is done to make conclusions about the research. There are software available online that can help in analyzing the data. Data can also be analyzed manually.
The data that is now in a very organized form is displayed in the form of graphs and tables. The purpose of displaying data is to make the
| 2.022589 |
openbmb/Ultra-FineWeb
|
COLD-WATER BOATING REQUIRES ADDED PRECAUTIONS
Oct. 27, 2011
Anglers and hunters can protect themselves against hypothermia
PRATT — While pleasure boaters have winterized and stored their watercraft, avid waterfowl hunters and cold-weather anglers are gearing up for fall hunting and fishing seasons. But fall can be a dangerous time on the water. Most single-boat accidents take place this time of year, and with water temperatures cooling, these accidents can be deadly.
One common mistake is overloading a small boat with people and equipment. Overloaded boats are unstable and can easily capsize or cause passengers to fall overboard into frigid water. Sudden immersion into cold water delivers a brutal shock to the body, triggering a spontaneous inhalation reflex — deadly if one's head is under water. But wearing a life jacket can be enough to keep your head above water during an involuntary gasp, keeping lungs from filling with water.
In addition, the body loses heat 25 times faster in water than in air of the same temperature. Hypothermia begins with shivering and a loss of feeling in the extremities. Within minutes of being immersed in cold water, a person can become confused and lose muscle control. By keeping capsized boaters afloat, life jackets also enable them to conserve energy and get out of the water or be rescued.
The following simple steps can make a cold water boating expedition much safer:
- always wear a life jacket — new styles and camouflage patterns, including float coats, make wearing a life jacket much more comfortable;
- dress properly for the cold — layered clothing can provide insulation and trap air to hold warmth;
- avoid cotton clothing — wool and many synthetic materials are good choices, but cotton wicks cold water in toward the body;
- never boat alone; and
- let family members or friends know where you're going and when you plan to return.
Boating can be an excellent way to hunt or fish in cold weather, but be safe. Planning ahead for the possibility of a cold water accident can save a life.
| 1.593097 |
HuggingFaceFW/fineweb-edu
|
How to Use the merge() Function with Data Sets in R
In R you use the merge() function to combine data frames. This powerful function tries to identify columns or rows that are common between the two different data frames.
How to use merge to find the intersection of data
The simplest form of merge() finds the intersection between two different sets of data. In other words, to create a data frame that consists of those states that are cold as well as large, use the default version of merge():
> merge(cold.states, large.states) Name Frost Area 1 Alaska 152 566432 2 Colorado 166 103766 3 Montana 155 145587 4 Nevada 188 109889
If you're familiar with a database language such as SQL, you may have guessed that merge() is very similar to a database join. This is, indeed, the case and the different arguments to merge() allow you to perform natural joins, as well as left, right, and full outer joins.
The merge() function takes quite a large number of arguments. These arguments can look quite intimidating until you realize that they form a smaller number of related arguments:
x: A data frame.
y: A data frame.
by, by.x, by.y: The names of the columns that are common to both x and y. The default is to use the columns with common names between the two data frames.
all, all.x, all.y: Logical values that specify the type of merge. The default value is all=FALSE (meaning that only the matching rows are returned).
That last group of arguments — all, all.x and all.y — deserves some explanation. These arguments determine the type of merge that will happen.
How to understand the different types of merge
The merge() function allows four ways of combining data:
Natural join: To keep only rows that match from the data frames, specify the argument all=FALSE.
Full outer join: To keep all rows from both data frames, specify all=TRUE.
Left outer join: To include all the rows of your data frame x and only those from y that match, specify all.x=TRUE.
Right outer join: To include all the rows of your data frame y and only those from x that match, specify all.y=TRUE.
How to find the union (full outer join)
Returning to the examples of U.S. states, to perform a complete merge of cold and large states, use merge and specify all=TRUE:
> merge(cold.states, large.states, all=TRUE) Name Frost Area 1 Alaska 152 566432 2 Arizona NA 113417 3 California NA 156361.... 13 Texas NA 262134 14 Vermont 168 NA 15 Wyoming 173 NA
Both data frames have a variable Name, so R matches the cases based on the names of the states. The variable Frost comes from the data frame cold.states, and the variable Area comes from the data frame large.states.
Note that this performs the complete merge and fills the columns with NA values where there is no matching data.
| 1.701101 |
HuggingFaceFW/fineweb-edu
|
. Some of this commercial activity was not exactly above-board; the Mycenean kings were not above a little piracy or rapine. All of this activity concentrated a great deal of wealth in the hands of the kings and a few officials. Most of the wealth, of course, was spent on warfare and defense; a large part of it, though, went into other activities: crafts, jewelry, and expensive burials. Like most societies dominated by an extremely powerful ruler, the Myceneans spent a great deal of wealth and labor burying that ruler. Initially,
| 1.366467 |
openbmb/Ultra-FineWeb
|
1) Script Title: Drop down/ Overlapping Content script
2) Script URL (on DD): _URL_
3) Describe problem: The content under the overlap shows through. Is there a way to make the overlay panel solid so this doesn't happen.
You can see what is happening at the following url:
Click on one of the links on the second horizontal menu: Customer Service, Contact Us, Payment options.
| 1.001518 |
openbmb/Ultra-FineWeb
|
From Wikipedia, the free encyclopedia - View original article
Chinese dragons are legendary creatures in Chinese mythology and Chinese folklore. In Chinese art, dragons are typically portrayed as long, scaled, serpentine creatures with four legs. In yin and yang terminology, a dragon is yang and complements a yin fenghuang ("Chinese phoenix").
Chinese dragons traditionally symbolize potent and auspicious powers, particularly control over water, rainfall, hurricane, and floods. The dragon is also a symbol of power, strength, and good luck for people who are worthy of it. With this, the Emperor of China usually used the dragon as a symbol of his imperial power and strength.
In Chinese daily language, excellent and outstanding people are compared to a dragon, while incapable people with no achievements are compared with other, disesteemed creatures, such as a worm. A number of Chinese proverbs and idioms feature references to a dragon, for example: "Hoping one's son will become a dragon" (望子成龍, i.e. be as a dragon).
Historically, the dragon was the symbol of the Emperor of China. In the Zhou Dynasty, the 5-clawed dragon was assigned to the Son of Heaven, the 4-clawed dragon to the nobles (zhuhou, seigneur), and the 3-clawed dragon to the ministers (daifu). In the Qin Dynasty, the 5-clawed foot dragon was assigned to represent the Emperor while the 4-clawed and 3-clawed dragons were assigned to the commoners. The dragon in the Qing Dynasty appeared on national flags.
The dragon is sometimes used in the West as a national emblem of China. However, this usage within both the People's Republic of China and the Republic of China on Taiwan as the symbol of nation is not common. Instead, it is generally used as the symbol of culture. In Hong Kong, the dragon is part of the design of Brand Hong Kong, a symbol used to promote Hong Kong as an international brand name.
In European-influenced cultures, the dragon has aggressive, warlike connotations and it is conjectured that the Chinese government wishes to avoid using it as a symbol, but most Chinese disagree with this decision. Westerners only sometimes confuse the disposition of the dragon with the aggressive Western dragon.
Sometimes Chinese people use the term "Descendants of the Dragon" (simplified Chinese: 龙的传人; traditional Chinese: 龍的傳人) as a sign of ethnic identity, as part of a trend started in the 1970s when different Asian nationalities were looking for animal symbols for representations. The wolf was used among the Mongols, the monkey among Tibetans.
While depictions of the dragon in art and literature are consistent throughout the cultures in which it is found, there are some regional differences. The remainder of this article deals with aspects common across cultures, as well as features peculiar to cultural China.
For more information on peculiarities in the depiction of the dragon in other Asian cultures, see:
The origin of the Chinese dragon is not certain. The presence of dragons within Chinese culture dates back several thousands of years with the discovery of a dragon statue dating back to the fifth millennium BC from the Yangshao culture in Henan in 1987, and jade badges of rank in coiled form have been excavated from the Hongshan culture circa 4700-2900 BC.
The coiled snake or dragon form played an important role in early Chinese culture. The character for "dragon" in the earliest Chinese writing has a similar coiled form, as do later jade dragon amulets from the Shang period.
Ancient Chinese referred to unearthed dinosaur bones as dragon bones and documented them as such. For example, Chang Qu in 300 BC documents the discovery of "dragon bones" in Sichuan. The modern Chinese word for dinosaur is konglong (恐龍), and villagers in central China have long unearthed fossilized "dragon bones" for use in traditional medicines, a practice that continues today.
The binomial name for a variety of dinosaur discovered in China, Mei long, in Chinese (寐 mèi and 龙 lóng) means "sleeping dragon." Fossilized remains of Mei long have been found in China in a sleeping and coiled form, with the dinosaur nestling its snout beneath one of its forelimbs while encircling its tail around its entire body.
Some[who?] have further suggested that the Chinese dragon form comes from stylized depictions of existing animals, such as snakes, fish, or crocodiles. A view advocated by He Xin is that the early dragon depicted a species of crocodile, specifically, Crocodylus porosus, the saltwater crocodile, which is the largest living reptile, and once ranged into China during ancient times. The crocodile is known[by whom?] to be able to accurately sense changes in air pressure, and be able to sense coming rain. This may have been[vague] the origin of the dragon's mythical attributes in controlling the weather, especially the rain. The association with the crocodile is also supported by the view[by whom?] in ancient times that large crocodiles are a variety of dragon. For example, in the Story of Zhou Chu, about the life of a Jin Dynasty warrior, he is said to have killed a "dragon" that infested the waters of his home village, which appears to have been a crocodile.
Some scholars[who?] believe that the Chinese dragon form originated from totems of different tribes in China, as a merger of totems of various tribes consequential to tribal mergers. Legendary figures like Nüwa (女媧) and Fuxi (伏羲) are depicted as having snake bodies. Some scholars[who?] have noted that a myth arose that the first legendary Emperor of China, Huangdi (黃帝, Yellow Emperor) used a snake for his coat of arms. According to the myth, every time he conquered another tribe, he incorporated his defeated enemy's emblem into his own, thus explains why the dragon appears to have features of various animals.
From its origins as totems or the stylized depiction of natural creatures, the Chinese dragon evolved to become a mythical animal. The Han Dynasty scholar Wang Fu recorded Chinese myths that long dragons had nine anatomical resemblances.
The people paint the dragon's shape with a horse's head and a snake's tail. Further, there are expressions as 'three joints' and 'nine resemblances' (of the dragon), to wit: from head to shoulder, from shoulder to breast, from breast to tail. These are the joints; as to the nine resemblances, they are the following: his horns resemble those of a stag, his head that of a camel, his eyes those of a demon, his neck that of a snake, his belly that of a clam (shen, 蜃), his scales those of a carp, his claws those of an eagle, his soles those of a tiger, his ears those of a cow. Upon his head he has a thing like a broad eminence (a big lump), called [chimu] (尺木). If a dragon has no [chimu], he cannot ascend to the sky.
Further sources give variant lists of the nine animal resemblances. Sinologist Henri Doré lists these characteristics of an authentic dragon: "The horns of a deer. The head of a crocodile. A demon's eyes. The neck of a snake. A tortoise's viscera. A hawk's claws. The palms of a tiger. A cow's ears. And it hears through its horns, its ears being deprived of all power of hearing." He notes that, "Others state it has a rabbit's eyes, a frog's belly, a carp's scales." The anatomy of other legendary creatures, including the chimera and manticore, is similarly amalgamated from fierce animals.
Chinese dragons were considered to be physically concise. Of the 117 scales, 81 are of the yang essence (positive) while 36 are of the yin essence (negative). Initially, the dragon was benevolent, wise and just but the Buddhists introduced the concept of malevolent influence among some dragons. Just as water destroys, they said, so can some dragons destroy via floods, tidal waves and storms. They suggested that some of the worst floods were believed to have been the result of a mortal upsetting a dragon.
Many pictures of oriental dragons show a flaming pearl under their chin. The pearl is associated with wealth, good luck, and prosperity.
Chinese dragons are occasionally depicted with bat-like wings growing out of the front limbs, but most do not have wings, as their ability to fly (and control rain/water, etc.) are mystical and not seen as a result of their physical attributes.
This description accords with the artistic depictions of the dragon down to the present day. The dragon has also acquired an almost unlimited range of supernatural powers. It is said to be able to disguise itself as a silkworm, or become as large as our entire universe. It can fly among the clouds or hide in water (according to the Guanzi). It can form clouds, can turn into water, can change color as an ability to blend in with their surroundings, as an effective form of camouflage or glow in the dark (according to the Shuowen Jiezi).
In many other countries, folktales speak of the dragon having all the attributes of the other 11 creatures of the zodiac, this includes the whiskers of the Rat, the face and horns of the Ox, the claws and teeth of the Tiger, the belly of the Rabbit, the body of the Snake, the legs
| 2.236833 |
openbmb/Ultra-FineWeb
|
Valvular and Vascular Repair and Regeneration
To treat cardiovascular diseases, clinicians and researchers are developing biological heart valves, identifying new stem cells, and finding ways to enhance blood vessel growth and repair.
Medication and surgery, which today are used to treat cardiovascular diseases such as valvular heart disease, peripheral artery disease and ischemic vascular disease, can often sufficiently manage patients' symptoms.
But as is the case with other complex conditions, even patients who receive the best available treatments are at risk of future complications, so there is a significant need for new regenerative therapies that treat the underlying sources of cardiovascular diseases.
Center for Regenerative Medicine clinicians and researchers led by Amir Lerman, M.D., of Mayo Clinic's campus in Rochester, Minnesota, are creating biological heart valves, identifying new stem cells, and developing ways to enhance blood vessel growth and repair.
Autologous biological heart valves. People with valvular heart disease may require surgery to repair or replace the damaged heart valve. While many mechanical and biological replacement options exist today, each has its drawbacks.
Center for Regenerative Medicine researchers plan to develop biological heart valves using a patient's own cells. After cells are removed from a donor heart — a process called decellularization — the cell-free tissue scaffold that remains would be populated with adult progenitor cells or induced pluripotent stem cells derived from the patient's cells.
These specially engineered cells would regrow within the scaffold, creating a new, patient-specific heart valve that would replace the patient's damaged valve, providing a living alternative to existing biological valve options.
Vascular progenitor cells. Blood vessels are often perceived as simple conduits or pipes through which blood flows. Recently, it was discovered that blood vessels can make blood. Within the vessel wall, stem and progenitor cells were identified that have the capacity to generate white and red blood cells in adults.
The identification of these cells opens new avenues of research, such as better understanding their role in disease and determining if they can be targeted to prevent disorders in which blood cells play a role, including atherosclerosis and aneurysm formation.
- Cardiovascular stem cell therapy. People with advanced cardiovascular disease have many unmet needs. Revascularization procedures are one option for restoring blood flow in people with ischemic heart disease and peripheral artery disease. In cases where revascularization is not possible or advisable, researchers are studying how stem cell therapy might be used to repair injured muscle or stimulate blood vessel growth (angiogenesis).
| 2.523908 |
openbmb/Ultra-FineWeb
|
Missions and Expansion
Written by: Christopher Bellitto
The pattern of trying to adapt Christianity to local customs while maintaining the integrity of the faith's beliefs and rituals began with Paul's address to the Athenians when he pointed to a statue labeled "the unknown God" and informed the Greeks that they were already worshipping the God he now named as Jesus (Acts 17:22-23). As Christianity spread throughout the Roman Empire, it often used Greek ideas and language to describe Jesus, but that approach was forced to change.
The faith turned north to Europe after the 7th and 8th centuries when Islam, in just a century after Mohammad's death in 632, swept rapidly across the Roman Empire's former eastern, southern, and western provinces. With Islam now in control of the Middle East, north Africa, and the Iberian peninsula, Rome looked north for a protector and for new evangelization opportunities. Monks from Ireland, Britain, and Germany played a key role and implemented a strategy of discovering where people's faith already was operating, even if it was still a mix of Roman paganism and Arianism, which was often the case in central and northern Europe. One example is St. Patrick, a 5th-century Briton who was successful in converting the Irish precisely because he had lived among them as a captive for six years.
Missionaries tended to Christianize pagan sites rather than destroy them. People already inclined to believe in the healing power of water at a particular site, for instance, would now find a baptistery at a well or bend in the river. Pagan temples were sprinkled with holy water and converted to altars. A local magus would be replaced by a Christian saint known for healing; pagan objects were supplanted by Christian relics, such as the wood of the cross or a strand of a saint's hair.
In this way, Catholicism spread quickly and fairly successfully across Visigothic Spain, Merovingian and Carolingian Gaul, and Anglo-Saxon England before turning east to Poland, Hungary, and Russia in the closing decades of the first millennium. Moreover, there was a measure of liturgical variation in the Middle Ages that was eventually regulated in 1570, with the Roman Missal issued shortly after the Council of Trent. A precise order for Mass was laid down, but variations were permitted as long as they were at least 200 years old, which was the case with the Ambrosian rite in Milan and Spain's Mozarabic rite, both dating to the middle of the first millennium.
Much of the Church's evangelization and enculturation efforts in the first 1500 years of Catholicism were increasingly driven by an emerging, then strengthening papacy that was concentrating power and authority in Rome, culminating in the creation of a papal monarchy in the Middle Ages. In the Church's first few centuries, the bishop of Rome enjoyed no special jurisdictional status among his many brother bishops across the Mediterranean world, although there was a certain recognition of his unique place as Peter's successor.
| 2.141216 |
openbmb/Ultra-FineWeb
|
well standardized research protocols adapted for use in remote marine environments. The sampling protocols include the assessment of resources available to the microbial community (dissolved organic carbon, particulate organic matter, inorganic nutrients), and a comprehensive description of the viral and bacterial communities (via direct viral and microbial counts, enumeration of autofluorescent microbes, and construction of viral and microbial metagenomes). We use a combination of methods, which represent a dispersed field of scientific disciplines comprising already established protocols and some of the most recent techniques developed. Especially metagenomic sequencing techniques used for viral and bacterial community characterization, have been established only in recent years, and are thus still subjected to constant improvement. This has led to a variety of sampling and sample processing procedures currently in use. The set of methods presented here provides an up to date approach to collect and process environmental samples. Parameters addressed with these protocols yield the minimum on information essential to characterize and understand the underlying mechanisms of viral and microbial community dynamics. It gives easy to follow guidelines to conduct comprehensive surveys and discusses critical steps and potential caveats pertinent to each technique.
Environmental Sciences, Issue 93, dissolved organic carbon, particulate organic matter, nutrients, DAPI, SYBR, microbial metagenomics, viral metagenomics, marine environment
Characterization of Complex Systems Using the Design of Experiments Approach: Transient Protein Expression in Tobacco as a Case Study
Institutions: RWTH Aachen University, Fraunhofer Gesellschaft.
Plants provide multiple benefits for the production of biopharmaceuticals including low costs, scalability, and safety. Transient expression offers the additional advantage of short development and production times, but expression levels can vary significantly between batches thus giving rise to regulatory concerns in the context of good manufacturing practice. We used a design of experiments (DoE) approach to determine the impact of major factors such as regulatory elements in the expression construct, plant growth and development parameters, and the incubation conditions during expression, on the variability of expression between batches. We tested plants expressing a model anti-HIV monoclonal antibody (2G12) and a fluorescent marker protein (DsRed). We discuss the rationale for selecting certain properties of the model and identify its potential limitations. The general approach can easily be transferred to other problems because the principles of the model are broadly applicable: knowledge-based parameter selection, complexity reduction by splitting the initial problem into smaller modules, software-guided setup of optimal experiment combinations and step-wise design augmentation. Therefore, the methodology is not only useful for characterizing protein expression in plants but also for the investigation of other complex systems lacking a mechanistic description. The predictive equations describing the interconnectivity between parameters can be used to establish mechanistic models for other complex systems.
Bioengineering, Issue 83, design of experiments (DoE), transient protein expression, plant-derived biopharmaceuticals, promoter, 5'UTR, fluorescent reporter protein, model building, incubation conditions, monoclonal antibody
Analysis of Tubular Membrane Networks in Cardiac Myocytes from Atria and Ventricles
Institutions: Heart Research Center Goettingen, University Medical Center Goettingen, German Center for Cardiovascular Research (DZHK) partner site Goettingen, University of Maryland School of Medicine.
In cardiac myocytes a complex network of membrane tubules - the transverse-axial tubule system (TATS) - controls deep intracellular signaling functions. While the outer surface membrane and associated TATS membrane components appear to be continuous, there are substantial differences in lipid and protein content. In ventricular myocytes (VMs), certain TATS components are highly abundant contributing to rectilinear tubule networks and regular branching 3D architectures. It is thought that peripheral TATS components propagate action potentials from the cell surface to thousands of remote intracellular sarcoendoplasmic reticulum (SER) membrane contact domains, thereby activating intracellular Ca2+
release units (CRUs). In contrast to VMs, the organization and functional role of TATS membranes in atrial myocytes (AMs) is significantly different and much less understood. Taken together, quantitative structural characterization of TATS membrane networks in healthy and diseased myocytes is an essential prerequisite towards better understanding of functional plasticity and pathophysiological reorganization. Here, we present a strategic combination of protocols for direct quantitative analysis of TATS membrane networks in living VMs and AMs. For this, we accompany primary cell isolations of mouse VMs and/or AMs with critical quality control steps and direct membrane staining protocols for fluorescence imaging of TATS membranes. Using an optimized workflow for confocal or superresolution TATS image processing, binarized and skeletonized data are generated for quantitative analysis of the TATS network and its components. Unlike previously published indirect regional aggregate image analysis strategies, our protocols enable direct characterization of specific components and derive complex physiological properties of TATS membrane networks in living myocytes with high throughput and open access software tools. In summary, the combined protocol strategy can be readily applied for quantitative TATS network studies during physiological myocyte adaptation or disease changes, comparison of different cardiac or skeletal muscle cell types, phenotyping of transgenic models, and pharmacological or therapeutic interventions.
Bioengineering, Issue 92, cardiac myocyte, atria, ventricle, heart, primary cell isolation, fluorescence microscopy, membrane tubule, transverse-axial tubule system, image analysis, image processing, T-tubule, collagenase
Yeast Colony Embedding Method
Institutions: University of Missouri - Kansas City.
Patterning of different cell types in embryos is a key mechanism in metazoan development. Communities of microorganisms, such as colonies and biofilms also display patterns of cell types. For example, in the yeast S. cerevisiae
, sporulated cells and pseudohyphal cells are not uniformly distributed in colonies. The functional importance of patterning and the molecular mechanisms that underlie these patterns are still poorly understood.
One challenge with respect to investigating patterns of cell types in fungal colonies is that unlike metazoan tissue, cells in colonies are relatively weakly attached to one another. In particular, fungal colonies do not contain the same extensive level of extracellular matrix found in most tissues. Here we report on a method for embedding and sectioning yeast colonies that reveals the interior patterns of cell types in these colonies. The method can be used to prepare thick sections (0.5 μ) useful for light microscopy and thin sections (0.1 μ) suitable for transmission electron microscopy. Asci and pseudohyphal cells can easily be distinguished from ovoid yeast cells by light microscopy, while the interior structure of these cells can be visualized by EM.
The method is based on surrounding colonies with agar, infiltrating them with Spurr's medium, and then sectioning. Colonies with a diameter in the range of 1-2 mm are suitable for this protocol. In addition to visualizing the interior of colonies, the method allows visualization of the region of the colony that invades the underlying agar.
Cellular Biology, Issue 49, yeast, Saccharomyces cerevisiae, colony, embedding, sporulation, pattern formation, organization
Improving IV Insulin Administration in a Community Hospital
Institutions: Wyoming Medical Center.
Diabetes mellitus is a major independent risk factor for increased morbidity and mortality in the hospitalized patient, and elevated blood glucose concentrations, even in non-diabetic patients, predicts poor outcomes.1-4
The 2008 consensus statement by the American Association of Clinical Endocrinologists (AACE) and the American Diabetes Association (ADA) states that "hyperglycemia in hospitalized patients, irrespective of its cause, is unequivocally associated with adverse outcomes."5
It is important to recognize that hyperglycemia occurs in patients with known or undiagnosed diabetes as well as during acute illness in those with previously normal glucose tolerance.
The Normoglycemia in Intensive Care Evaluation-Survival Using Glucose Algorithm Regulation (NICE-SUGAR) study involved over six thousand adult intensive care unit (ICU) patients who were randomized to intensive glucose control or conventional glucose control.6
Surprisingly, this trial found that intensive glucose control increased the risk of mortality by 14% (odds ratio, 1.14; p=0.02). In addition, there was an increased prevalence of severe hypoglycemia in the intensive control group compared with the conventional control group (6.8% vs. 0.5%, respectively; p<0.001). From this pivotal trial and two others,7,8
Wyoming Medical Center (WMC) realized the importance of controlling hyperglycemia in the hospitalized patient while avoiding the negative impact of resultant hypoglycemia.
Despite multiple revisions of an IV insulin paper protocol, analysis of data from usage of the paper protocol at WMC shows that in terms of achieving normoglycemia while minimizing hypoglycemia, results were suboptimal. Therefore, through a systematical implementation plan, monitoring of patient blood glucose levels was switched from using a paper IV insulin protocol to a computerized glucose management system. By comparing blood glucose levels using the paper protocol to that of the computerized system, it was determined, that overall, the computerized glucose management system resulted in more rapid and tighter glucose control than the traditional paper protocol. Specifically, a substantial increase in the time spent within the target blood glucose concentration range, as well as a decrease in the prevalence of severe hypoglycemia (BG < 40 mg/dL), clinical hypoglycemia (BG < 70 mg/dL), and hyperglycemia (BG > 180 mg/dL), was witnessed in the first five months after implementation of
| 1.95283 |
openbmb/Ultra-FineWeb
|
|Origin:||From the sound|
1 also chatter away/on
to talk quickly in a friendly way without stopping, especially about things that are not serious or important:
She chattered away happily until she noticed I wasn't listening.
She chattered excitedly like a child.
We were chattering about the events of last night.
if birds or monkeys chatter, they make short high sounds
if your teeth are chattering, you are so cold or frightened that your teeth are knocking together
4 British English
educated middle-class people who like to discuss and have opinions about recent events and situations in society
—chatterer noun [countable]
| 1.319361 |
HuggingFaceFW/fineweb-edu
|
The City of Ottawa has been warned by scientists, several times and in several studies, that TFD fragments the eco-system in the South March Highlands (SMH) and dramatically reduces the ability of the SMH to withstand change.
This warning is a well-considered and inevitable scientific conclusion, backed by years of research, that sadly cannot be scientifically quantified. Questions like: How much further change can the SMH take? How much change is introduced by urban development? How long will the Conservation Forest survive, etc simply cannot be quantified.
So does that make the unmeasurable any less important to decision-making?
Robert McNamara was Secretary of Defense during the Vietnam War and was obsessed with making decisions based on only what could be measured. He also had a predilection to prefer only information that fit into his metric-based world view. This led to increasingly absurd decisions by the US Government for many years until they finally withdrew from the Vietnam conflict.
Sociologist Daniel Yankelovich described a process he called McNamara's Fallacy to explain why some of us have a tendency to under-value what cannot be measured. The mathematician and philosopher Alfred North Whitehead has also referred to this tendency the "fallacy of misplaced concreteness".
McNamara's Fallacy is a process having 4 steps.
- Measure what can be measured. This is fine as far as it goes.
- Disregard that which can't be measured or give it an arbitrary quantitative value. This is arbitrary and misleading.
- Presume that what can't be measured easily really isn't very important. This is blindness.
- Say that which can't be easily measured really doesn't exist. This is madness.
The Terry Fox Drive (TFD) extension is an excellent example of McNamara's Fallacy in decision making.
Step1. The City haphazardly commissions several piece-meal studies of the South March Highlands (SMH) area to identify existing ecological conditions and count species. However, only easily studied vegetation is studied. There are no comprehensive studies of fauna, insects and non-vascular plants.
Step 2. Issues such as the size of eco-passages are ignored since the impact of the size on the effectiveness of eco-passages cannot be predicted (disregard what can't be measured). This leads to mitigation planned for TFD relying on experimental ideas whose effectiveness has no established scientific evidence at all (assigning an arbitrary value to them).
- Instead emphasis is placed on having several smaller (measurable, so more must be better) passages instead of fewer, larger (more costly) ones.
- The location of these eco-passages is inferred from a 3-month winter study of wildlife movement because a summer study is too hard to do for the wide-variety of species affected.
Step 3. The long-term impact of losing ½ of SMH to development is never studied (too difficult to measure so don't look at it at all). The City has never examined its economic justification for TFD relative to its environmental impact (no cost/benefit analysis) because it is presumed that ecological value is unimportant (because it is difficult to measure).
Step 4. Councillor Wilkinson asserts that TFD can be ignored when promoting SMH as an NCC-owned wilderness park. The the long-term effect of fragmentation of habitat and species kill-rate caused by TFD don't exist (because they can't be measured).
The reality is that the effect of TFD cannot be mitigated because it cannot be measured. The very concept of mitigation depends on establishing an equal and compensating benefit to make up for the impact. This is not possible when the impact cannot be measured.
The Precautionary Principle holds that where there is uncertainty regarding an approach that could cause significant harm, the uncertainty should be resolved before proceeding.
This principle is well established both in law and in medicine. It is a statutory requirement in the European Union. Perhaps it is also time for City Hall to apply it to the environmental assessment process too.
In the meantime, anyone that contemplates allowing TFD into the South March Highlands does so at great peril to the environment and to all the species that live in it.
| 2.20624 |
HuggingFaceFW/fineweb-edu
|
RSS Feed
Tag Archives: Yiddish
Duolingo Yiddish
My Duolingo adventure started a few years ago, when I was looking for a way to learn Yiddish online. I wasn't up to going to an in-person class, and the Yiddish for Dummies book didn't do much for me, but I couldn't find a good, free Yiddish app. Instead, I decided to brush up on my Hebrew and learn German on Duolingo, in the hopes that the two languages would mush together in my brain and magically become Yiddish (The Yiddish language is written in Hebrew letters, but is largely based on German, with words also borrowed from many other Eastern European languages, like Polish and Russian).
Earlier this year, after I wrote a blog post on my difficulties with visual learning and "reading" pictures, someone suggested that I could try learning an ideographic language, to see if that would be a useful step for me. I'd actually spent a semester in college learning Egyptian Hieroglyphics, but since Duolingo didn't have a course in that, I decided to try Chinese, just to see if the pictures really could help me to remember the sounds and meanings of words in a way "regular" letters could not.
And I discovered that Chinese is really, really hard. I don't know if it's the unfamiliar ideograms or the wide variety of subtly different sounds in Chinese that make it so hard for me, but I kept trying.
Not long after I started my struggles with Chinese, Duolingo started to advertise a new Yiddish program, and I was thrilled! I immediately had plans to read Sholem Aleichem in the original Yiddish and connect to my Eastern European Jewish roots and maybe even work on my Yoda impression. But every time I checked through the language options on the Duolingo app on my iPhone, Yiddish wasn't there. Finally, I went to the Duolingo site on my computer, and there it was: Yiddish. It seemed that the Yiddish program was still in the Beta phase of development and that meant it only worked on my computer for some reason.
I tend to do my Duolingo practice in bed, as a way to relax before going to sleep, so the idea of having to sit up at the computer to study just seemed wrong. But I did it. And I found that my Hebrew/German mishmash really had helped me, because I was able to test out of a bunch of the early lessons of Yiddish, despite the fact that letters that were silent in Hebrew were used as vowels in Yiddish, and vowels that made one sound in Hebrew made another in Yiddish (though I found out later that that may not be universal, but specific to the dialect of Yiddish taught on Duolingo).
Despite all of the differences, the lessons were addictive, and I was racking up points on my Duolingo account that I was ready to spend on Chinese lessons, except, when I went back to my iPhone app that night the system got confused and logged me out. I had to reset my password just to get back onto the app, and I realized that, for some reason, using the Beta Yiddish program on the computer made my iPhone angry, or jealous, or something, and discombobulated the whole system.
So, I've been staying away from the Yiddish program, mostly because I'm too lazy to sit up at the computer to study when it's so much easier to lie down, but also because I'm too lazy to come up with yet another new password when I inevitably have to reboot the app on my phone. In the meantime I'm still practicing my German and my Hebrew, and French, and Spanish, and every once in a while I get up the nerve to try another lesson in Chinese, but only when I have a lot of points saved up so I can make a thousand mistakes and still finish a whole lesson.
Continuing to study German has its own benefits too, beyond prepping for Yiddish, because I discovered that there are a lot of German language murder mysteries on Hoopla, the streaming service I get through my library. I was running out of English language mysteries to watch, so being able to tap into all of the shows in German has been a life saver.
My hopes are still high, though, that once I can do the Yiddish lessons on my phone, in comfort, I will progress quickly to spouting yiddishisms everywhere I go and annoying everyone I meet. I'm a patient person, if not an energetic one. I can wait.
"Me too!"
Learning German
A few weeks ago I went on my regular online search for a way to learn Yiddish. I keep looking for a program that will start where I am (at the beginning), and maybe give me some idea of why Yiddish seems to be filled with words I still feel too young to use. But none of the free language learning sites offer Yiddish, and the sites that charge a fee for each lesson are often too advanced for a beginner like me. Then I came across someone who suggested learning some Hebrew and German first, before starting one of the difficult Yiddish classes. So I added German to my Duolingo and Lingvist accounts, and tried to reassure Cricket that she would not have to learn yet another language along with me. She was not convinced.
"Je ne comprend pas."
The first time I heard German words coming out of the speaker on my phone, though, I felt like I needed to lower the volume, to hide some hideous crime; I didn't realize how emotionally loaded the German language would be for me. Like when they taught me the word for "work": Arbeit. My mind automatically finished the sentence to Arbeit Macht Frei, "Work will make you free," the motto on the gates to Auschwitz.
So many German words were familiar to me, even though I was sure I knew no German ahead of time. Some were familiar because they are pretty much the same in English, like perfekt for perfect, Haben for have, ist for is, etc. Some were familiar from the last names of so many Jews: Blume (flower), Berg (mountain), Stern (star), Baum (tree), Schreibe (write).
Essen and Fressen were also familiar words, because some time in my childhood my father tried to make a joke about people who eat like animals, and I didn't get it, so he had to explain that Essen is eat, for people, and Fressen is eat, for animals. I don't remember who he was trying to insult at the time. Schmutzig, for dirty, was familiar too, as in, you have some schmutz on your face. Then there was schmuck, which Duolingo said was the German word for "jewelry," despite the fact that, for my whole life, I knew it as the Yiddish word for a part of the male anatomy.
One early discovery was that in the German language words can be capitalized in the middle of sentences. I used to get in a lot of trouble for throwing in unnecessary capital letters in High School English classes (this was back when assignments were handwritten, and not spell checked and grammar checked and emailed to the teacher). I realized that I may not have been making up my own rules out of thin air, as one teacher had suggested, and instead was just using the grammar rules of the wrong language.
I may have taken in more German than I'd realized in my childhood. My father did have a habit of speaking to our dog in his high school German, and I heard random Yiddish words whenever I was around older Jewish people (which was often), and I watched plenty of Holocaust and WWII movies over the years.
"Ich bin ein Doberman Pinscher?"
It's a funny thing. Politically, Germany has managed the aftermath of the Holocaust better than most other countries (certainly better than Poland, where they recently made it illegal to even suggest that Poland had any connection to the Holocaust). In Germany they educate their kids from an early age about what their grandparents and great grandparents did, and why it should never happen again. Yes, they still have neo-Nazis and white supremacists and fascists, but so does the United States. But despite all of that, I can just barely listen to a computerized voice speaking simple German words, and I'm still overwhelmed with words that remind me of things I wish I could forget.
I grew up with kids whose parents would never have bought a BMW or a Mercedes, because they were German-made cars, and Germans would benefit. I grew up with Holocaust survivors telling their stories, at school, and synagogue, and in books. This is my history. But maybe learning some German will help me come to more peace around this history, or at least help me to articulate what still resonates in my bones. One thing I know for sure is that German will give me a bridge to Yiddish, which is worth a lot to me.
Talking To Dogs
"I understand everything you say. I just disagree."
"I understand everything you say. I just disagree."
Cricket and her platypus.
Cricket and her platypus.
"You can't catch me!"
"You can't clean my poopie butt!"
"Help me, please."
"Help me, please."
| 1.041366 |
Zyphra/Zyda-2
|
beginning of time
Stephen Hawking writes about the beginning of time, but few other people do. People who write "from the beginning of time" or "since time began" are usually being lazy. Their grasp of history is vague, so they resort to these broad, sweeping phrases. Almost never is this usage literally accurate: people have not fallen in love since time began, for instance, because people arrived relatively late on the scene in the cosmic scheme of things. When I visited Ferrara several years ago I was interested to see that the whole population of the old city seemed to use bicycles for transportation, cars being banned from the central area. I asked how long this had been the custom and was told "We've ridden bicycles for centuries." Since the bicycle was invented only in the 1890s, I strongly doubted this (no, Leonardo da Vinci did not invent the bicycle—he just drew a picture of what one might look like—and some people think that picture is a modern forgery). If you really don't know the appropriate period from which your subject dates, you could substitute a less silly but still vague phrase such as "for many years," or "for centuries"; but it's better simply to avoid historical statements if you don't know your history.
| 1.427401 |
HuggingFaceFW/fineweb-edu
|
village? Ideas?
- thumb
Jun 27 2011: VK, it's not the only solution but science and technology is a crucial part of our solution strategies:
- Provides useful information for gathering crises and risks and implementation of appropriate actions, specially research on devastating natural disasters. Would more research prevented the loss of more than 15000 lives from the Japan earthquake?
- global information and technology to transform our economic models and scientifiuc research to improve our effectiveness and efficiencies
- information to augment our moral sense and information to excercise our individual and institutional power to transform our world; digital information to match the trust we're empowering our leaders, information that empowers transparency and accountability
- thumb
Jun 27 2011: Same way as machine translators can not translate a user manual perfectly and abolish human translators, technology might improve but not abolish poverty and hunger. Human contribution, humanitarian aid and force is inevitable, i think.
- Jun 26 2011: I strongly recommend the Zeitgeist movie!
| 1.144493 |
Zyphra/Zyda-2
|
Acecr Qom Infertility Center
ايران, Qom
Acecr Qom Infertility Center Acecr Qom Infertility Center Acecr Qom Infertility Center Acecr Qom Infertility Center
- العقم 1 إجراء
عملية التلقيح الصناعي
كيف يتم إجراؤها
OVARIAN STIMULATION In this process, also known as ovulation induction, a woman takes medication to stimulate the ovaries to grow many mature eggs at one time. She is closely monitored to check the development of the eggs using transvaginal ultrasound. Blood is taken to assess oestrogen production by the ovaries. When the eggs are mature—determined by the size of the ovarian follicles and the level of oestrogen—an hCG injection initiates the ovulation process. Egg retrieval follows 34 to 36 hours after the injection. EGG RETRIEVAL This is the process used to remove the eggs from the ovaries so they can be fertilized. A mild sedative and painkiller are often used during the procedure, and it normally takes about 10-15 minutes. The steps for egg retrieval are: An ultrasound probe is inserted into the vagina to visualise the ovaries and the follicles, which contain the eggs. A needle is inserted through the wall of the vagina to the ovaries. Suction is used to pull the eggs from the ovaries into the needle. FERTILIZATION A man provides a semen sample. If the sperm are healthy, they are placed in a dish with the egg and left overnight in an incubator. Fertilization usually occurs on its own. However, sometimes sperm are not able to fertilise the egg on their own. When this is the case, a single sperm is injected into an egg using a needle. This process is called intracytoplasmic sperm injection (ICSI). The number of pregnancies from IVF using natural fertilization is about the same as the number resulting from ICSI. Couples should consider genetic testing if the sperm cannot fertilize the egg on their own. The testing can determine whether the sperm have chromosome problems that might cause development problems in the resulting embryos. Embryos that develop from IVF are placed into the uterus from 1 to 6 days after retrieval. EMRYO TRANSFER The procedure is normally painless, but some women may experience cramping. A long, thin tube is inserted through the vagina and into the uterus where the embryo is gently expelled. All the material and spiritual rights of this website belong to the Ace.
قبل ان تغادر
All the orders regarding care after procedure will be informed. Also, you will be informed about ways of communication with us.
Completing all documents which were requested before starting procedure such as sperm analysis, blood tests, hysterosalpingography and etc.
Patients can stay or can return to their country in good condition and without any worry.
تخدير عام
عدد الرحلات على متن
depends on patients condition according to doctor"s opinion
الإقامة في المستشفى
مدة العملية
approximately 1 hour
الحد الأدنى للإقامة
25 days
العودة الى العمل
depends on patients condition according to doctor"s opinion
العودة إلى الرياضة
depends on patients condition according to doctor"s opinion
إخفاء التفاصيل إظهار التفاصيل
موقع Acecr Qom Infertility Center
إحصل على خطة العلاج الخاصة بك
| 2.231521 |
Zyphra/Zyda-2
|
blocking them from turning into fibrous cells. (14)
This is very important for successful recovery from Candida, as the new cells will replace old or damaged ones. This allows your liver to get on with its many other, important jobs.
6. Milk Thistle Protects You from Free Radicals
One of the most important components of natural detoxification is your body's ability to produce glutathione. Glutathione is one of the best scavengers of free radicals, which is why the highest concentration of glutathione is in the liver. In fact, the antioxidant activity of glutathione is believed to be ten times more potent that of Vitamin E!
Glutathione helps to neutralize free radicals by "giving" one its electrons to the free radical molecule. This makes the free radical harmless.
Milk thistle is one of the best natural 'helpers' for boosting your body's glutathione production. It's been shown to increase glutathione by more than 35%! (15)
This is extremely beneficial to anyone who is often exposed to harmful free radicals, such as UV rays, alcohol, food chemicals, pollution, stress and other everyday dangers. Milk thistle also helps to prevent the depletion of glutathione, which is induced by alcohol and other toxins.
7. Milk Thistle Can Balance Your Blood Sugar Levels
Fluctuating blood sugar levels are a common ailment of men and women around the world. High and unstable blood sugar is linked to Candida overgrowth, and recent research shows that milk thistle may be able to help.
It's been suggested that some of the compounds in milk thistle may work in a similar way to certain diabetic medications. These compounds help to improve insulin sensitivity and reduce blood sugar levels. One study even showed that patients who took silymarin supplements regularly experienced a significant reduction in their fasting blood sugar levels. They also showed lower levels of HbA1c, a measure of blood sugar control.
A study involving patients with diabetes and alcoholic liver cirrhosis found that a daily dose of 600mg silymarin for 6 months resulted in a significant reduction in fasting blood glucose and mean daily glucose levels. This effect was apparent within only four weeks of taking the supplement without causing any further increases in hypoglycemia.
An added bonus was that the patients' insulin requirements were reduced by 20%. The researchers suggested that this could mean milk thistle can help to prevent insulin resistance. The patients' HcA1c levels were reduced by 0.5% after the full 6 months of treatment. (16)
It's also possible that the antioxidant and anti-inflammatory properties of milk thistle may help to reduce the risk of developing diabetic complications such as kidney disease.
Milk Thistle Is Your Anti-Candida Ally
Coping with the unpleasant side-effects of Candida Die-Off can be much more manageable with a high quality milk thistle supplement. Your liver needs all the support it can get during your recovery process, and milk thistle is one of the best 'liver nurses' available in nature.
Not only will it help to protect and regenerate those liver cells, but it can help with a variety of other body systems: blood sugar, skin health, digestion, and protection from free radicals. These actions are all highly beneficial for somebody facing major health issues.
Liver Support by Balance ONEMost importantly, milk thistle will help you to get relief from the symptoms of Candida overgrowth and Candida Die-Off, which in turn will help to keep you on track.
Our recommended milk thistle supplement is Liver Support, which contains standardized European milk thistle extract, molybdenum, NAC, and a total of 11 liver-supportive ingredients.
100% Risk-Free Guarantee
Order Now
1. Capri1101 says:
Take in between 7 and 9 pm.
Leave a Reply
| 2.005647 |
Zyphra/Zyda-2
|
BOSTON, MA (Ivanhoe Newswire) -- New research aims to give doctors a unique view inside the human body using a remote-controlled capsule which could find a problem and treat it. A miniaturized doctor and his team swim through a human body to save a life in the sci-fi classic Fantastic Voyage. Decades later, a new swimming pill could give doctors a new way to save lives.
Noby Hata, co-inventor of the swimming endoscopic capsule, told Ivanhoe, "This capsule can stop or move or aim at the disease lesions so you can actually try to cure the lesion."
The capsule is designed to be swallowed like a pill. Doctors will be able to control the camera magnetically from outside using an MRI machine's magnetic signals. There is a coil to induce the current remotely.
Hata says the MRI works much like a GPS. "You will see the cross section of the body and also the little capsule in the middle and you can navigate this capsule using this map as guidance." So far, he's successfully tested a prototype of the capsule in a fish tank inside an MRI machine. The goal is to one day be able to deliver drugs or laser treatments directly to tumors or injuries in the digestive track.
Dr. Kunal Jajoo, associate physician in the Department of Medicine at Brigham and Women's Hospital believes this could change the way colonoscopies are performed. "It's an amazing advance to be able to steer something that small within the body and really direct it to areas that might need therapy or biopsy or the like."
| 1.154719 |
HuggingFaceFW/fineweb-edu
|
and then we do age on this won't work. Make sure there's an percent Here goes so you don't run into problems because we're getting the address of the age variable on passing it scan. If so, what happens is all our variables have memory addresses. So by using M percent, we're passing the address to scan F. So so scan F knows where to store our number that we enter. So then it say so then down here, do another print. Af your age is percent high on then in the second idea passing age and again use an percent here, guys, because we want to read in the address, go back to the terminal running a program two main again. Now answer your name. Enter your age. Oh yeah. In this case, we shouldn't have used the n percent because we are out putting a literal value. Whereas here, we need to use the AmBisome because scan f expects somewhere to store it here. We don't need to know the address. We just need to know the value. So that was my mistake. Go back in Nepal again on run main into your name. Done. Your name is Dan. Your age is 24. So then, you know, if you want to be cool about you can say on in 10 years, you will be percent I And then here you can go age plus 10. So now if we do that again and we run May Dan, your age is 30 and in 10 years you'll be 40. So yeah, pretty simple stuff. So just to demonstrate this, then if we went to provide the m percent and we try to compile that compiles fine, But if we run it and now type Dan and type your type your age. What's this? What's happened? It crashed. The program crashed on this because you need the n percent. Because if we just provide age is the equivalent to passing in this zero. So it's saying to the cysts, because age is equal to zero, right? So it's the equivalent of saying, um, reads in an age and store story in address zero. But address zero is no our age bearable. And that's the problem, right? So you need to provide the and percent and I'll explain more in the next lecture about memory addresses. Okay, guys, this some of stuff. I want to just go over quickly. So you notice we provide an M percent of age, but not for name. The reason for this is because a raise you don't have to provide the n percent. If you just provide the the actual variable name of an array, it'll automatically take the Empress in lots of money. Take the address automatically, whereas for normal variables, the ampersand is required because otherwise it will take its normal value. So that clears that up. Okay. Secondly, thing I want to second thing I want to discuss is, if you run the program again, you type full name, you will see you just re compile that a minute. You will see that it doesn't work. It just says your name's Paul. The reason for that is because scan f stops of the nearest white space. In other words, a space or a. Now that's something that's a white space, right? So there's another issue with this code we don't actually check. If the data were reading fits in the bounds of the array. Remember what I was saying earlier? That it's very important. So because of that, it means that we can enter a really large name that's above 20 bites, and it might not even crash the program. It doesn't always does, but that doesn't mean it's right. If it doesn't crash the program, chances are you've corrupted some data, but it hasn't led to a crash. Have I just do that? And you can see it crashed the program that time now because we've exceeded the 20 bytes restored this, which is way more than 20 bites. So what's happened is it's gone over. The 20 bytes is probably over, wrote our age variable. Or maybe these ones, depending on the order that the compiler compiled them into the binary fall and because it's over, wrote those values. It's actually led to a crash because we've probably over written the return address or something. Now, remember, I was saying hackers can exploit this to nasty things. So I'm gonna show you in one line of code how to fix first this problem where only alleged to enter first name because it sees the space and then stops on. Secondly, the second problem where it overflows the buffet. So we're gonna fix all of that one line of code. Now, the function to use to do this is called F gets f gets reads from a file. Now I know what you're thinking. Well, this isn't a file, right, Well in, see, you have what's known as STD in on STD out. Now, both of these things are file pointers. They can be used as if they were a file on disk, even though they're not. So STD in contains any input that we passed through our program While it's running, STD out contains any data without putting Okay, so that makes sense now less scared of our scan. If name here and we're gonna do f gets that's gonna ask for a buffet, says passing name on. Remember, you don't have to pass a 9% here because a raise, they automatically put the address when you referenced them by name, whereas normal variables. You need to provide the n percent to say this is an address. Now we go here. It asked for a Max count. So just to size of name, which will be 20 bites right So size off gets the size of the name variable, which is 20 bytes and asked for a file stream. Just type STD in. And now if we can pull that now and we run that, you can say Polo Brian, age 90. And it'll say your name is Paul O Brien, Your ages 90 and in 10 years you'll be 100 now. Type loads is rubbish. Again, let's overflow the buffer. What happens? It doesn't work. It stops us. It only it only allows us to enter a name of 20 bites. So it stops. It stops putting more data into the array when we reach that 20 bite cap. So I hope that sums up a lot of this stuff for you guys. 10. Pointers And Memory Addresses: Hello, guys. And welcome back. We're now gonna learn about memory addresses and pointers. So firstly, know that everything in C has a memory address. Functions have memory addresses, variables have memory addresses. Literally. Everything has memory address once it's compiled, um, so we can access those memory addresses to do really cool things. So, for example, uh, I can access the memory address of Oxy here on change it anywhere in my program. Um, I could access the memory address of a function. Andi be able to call that function even without knowing the function name to begin with, but we can get on that later. Let's now start memory addresses and pointers. So firstly, do do you print f percent p for pointer? And we're just output in the memory address right now of Oxy. That's all. I want you to Dongo, Ampersand, oxi. And then obviously we do your command prompt. We're going to see d into our hello world app again. We're gonna go gcc main dot c Dachau main and then we're gonna do main. You can see outputs the this this Hexi decimal number here. So this is the memory address that Oxy is at when you load this program on Oxy is a stack variable, which means that it gets deleted when we leave this function on. That's important to note because it means if I share this this address around the program, ah, as soon as I leave this scope that addresses now dangerous and you shouldn't be accessing it. So that's important to note. Um, stack stack data should only be access when it's safe to do so. So, in other words, if this function main calls another function that calls another function the cause, another function and so on this address conceivably be accessed. But if I stole the address foxy somewhere globally, and then I leave this function the second I leave this function that dresses now unsafe, we can't access that address anymore because the stack point to remember I was sitting with Stack Pointer. It gets pushed back up the base point of SEC Point that they get pushed back up on then that that that data is no longer accessible, but you can access it is unsafe to do so right, So that briefly explains that. So, essentially, if we do print F, let's do less to instruct a equals 50 and then we go print f I'm just gonna do I for both of these that this time rather than p just to demonstrate this so you can see we output the address as an interview on We have put the value of a says Compile that again So you can see when we use the ampersand it gives us the address as a decimal on. That's the memory address of a on Then we don't put the n percent so outputs the value of a So I hope that shows that by using the am profess m percent, you can get the address of things. Okay, so now point is, let me explain. Pointed to you This is very, very important parts. And I remember I said, start when we first started this course I mentioned I'll tell you what he's asked. Risks mean while
| 1.083264 |
Zyphra/Zyda-2
|
It is often helpful to introduce new learning activities by talking about why you're including it in the course.
Make sure you explain how the activities you've planned are linked with the course learning objectives.
These people will have dates on a regular basis, and they may or may not be having sexual relations.
This period of courtship is sometimes seen as a precursor to engagement.
The protocols and practices of dating, and the terms used to describe it, vary considerably from country to country and over time.
While the term has several meanings, the most frequent usage refers to two people exploring whether they are romantically or sexually compatible by participating in dates with the other.
Note: if there is a large whiteboard, each group can have its own space to report their work. Then divide the class into pairs and have them stand facing one another. Each person takes turns introducing his or her partner and a summary of his/her responses to the group. Then give the students a question or problem and have them state their ideas aloud as they write them down, each taking turns. Ideally students will not skip turns, but if one gets stuck, he or she may "pass."Divide students into small groups. Undertheories of cognitive development, collaborative learning creates opportunities for peers to learn from more competent others. And recent studies in cognitive science suggest that collaborative structures may deepen learning by giving students the opportunity to rehearse, manipulate, and elaborate on knowledge. One student in each group has two minutes to explain the obstacle he/she has encountered. During this time no one is allowed to interrupt with comments or questions. Active learning goes by many names and can assume many forms, such as pairs of students conducting peer reviews, small groups of students discussing the assigned reading, or highly-structured cooperative learning projects that extend over the entire quarter.Regardless of the specific form, active learning more often than not involves students working together toward a common goal.Give students a list of questions or prompts--either ahead of time or during class--to respond to (e.g., "What is your topic? In 3 minute rounds, students share their responses and their "date" gives suggestions and/or feedback. One member of each pair will stay in place while the other members circulate down the line until each set of pairs have spoken with one another.
| 2.564242 |
openbmb/Ultra-FineWeb
|
- uploaded: Aug 2, 2011
- Hits: 190
(Note: The period of assignment of copyright of this film is expired. It is now a public property.)
This award-winning ethnographic film (in two parts) made by Sathya Mohan deals with the nature-man interaction and the associated belief system. It examines the features of the environment and ecology in relation to the Koyas economic system - the interaction of productive forces and the natural resources. The economy, the social organization, the religion and the mythology of the Koyas are closely inter-related, inter-dependent and interacting. Each aspect of the nature-man interaction and the belief system attached to it, viewed as a whole - as a complex - gives the basic picture of the Koya culture. The basis of enormous diversity in the Indian cultural matrix lies in its varied ecological conditions. The interplay of nature and culture is implicit in the little traditions of the sub-continent. The Koya culture is unique in adapting itself to its natural setting.
| 1.906732 |
HuggingFaceFW/fineweb-edu
|
Fort Bowman - A-55
Posted by: vhasler
N 39° 00.429 W 078° 19.161
17S E 732116 N _PHONE_
Quick Description: Stone house in region was built in 1753 - likely to protect against Indian attacks.
Location: Virginia, United States
Date Posted: 2/15/2012 8:23:54 PM
Waymark Code: WMDQR6
The stone house to the south is Fort Bowman, or Harmony Hall, built about 1753 for George Bowman who emigrated from Pennsylvania in _PHONE_. The house is an important example of the Pennsylvania German influence on Shenandoah Valley architecture. There was born Maj. Joseph Bowman, second in command in Gen. George Rogers Clark's expedition for the conquest of the Northwest in _PHONE_ during the Revolutionary War. Among those buried in the Bowman family cemetery nearby are Joseph Bowman's brother, Capt. Isaac Bowman, and Samuel Kercheval, the early-19th-century historian of the Valley.
Located in median of divided US-11. Could not see the stone house from the marker.
Marker Number: A-55
Marker Title: Fort Bowman
Marker Location: I-81 Exit 298, North on US11
County or Independent City: Shenandoah County
Marker Program Sponsor: Department of Historic Resources, 1998
Web Site: Not listed
|There are no logs for this waymark yet.
| 1.20423 |
HuggingFaceFW/fineweb-edu
|
Evolution Exposed
by Jacqueline Melissa Powell
PDF format also available
Charles Darwin When Charles Darwin published his Origin of Species in 1859, he broke the final barrier holding the disciplines of science to the framework of the Bible. The theory of biological evolution originally proposed by Darwin has, in this century, been developed into a theory governing the origins of the universe. Its roots are in three major disciplines of science: biology, geology and astronomy. Evolution theory proposes a universe that either created itself or has eternally existed and that continues to change itself into a more complex system of processes. The physical laws observed in operation today are assumed to have always been in operation. The Laws of Thermodynamics, however, govern all processes that operate in the universe and the Second Law specifically forbids advancement in organization of any natural process. Most importantly, the Bible clearly teaches that God created the universe and all it contains: "By the word of the LORD were the heavens made; and all the host of them by the breath of his mouth."[i] The theory of evolution is diametrically opposed to both the laws of science and the teachings of the Scriptures.
Evolution in Biology
The erosion of the Biblical basis of science paved the way for an acceptance of evolution based theories. New theories being developed in many other disciplines of science, mainly physics, astronomy and particularly geology, had carved inroads into traditional thinking thus preparing the scientific world for Darwin's theory of evolution.[ii] During the Middle Ages, the Universe was viewed as being centered on man and directed by God. In the 19th Century, Copernicus transformed scientific thinking by proving the earth was not the center of the universe.
Physical events were governed by natural laws, and although God was still recognized as the author of laws, his personal intervention was no longer required to explain how things were made. The emphasis slowly shifted from the supernatural to the natural. From the miraculous to the mundane. And although the cosmos was still regarded as something which had been created, it was also seen as a developing process subject to scientific laws.[iii]
England's intellectuals, scientists, manufacturers, inventors, etc., soon began to reject the Christian framework of thought that established science had rested on. They thought of nature as a manageable process governed by discoverable laws instead of the supernatural; the theological significance of the natural world was discarded.[iv] This type of thinking proved fertile ground for Darwin's theory of evolution.
Charles Darwin revolutionized scientific thought when he published his Origin of Species, but he did not do so single handedly; the idea of biological descent through modifications in the species, evolution, had been postulated by a number of scientists during the century prior to his work.[v] The French naturalist George Buffon published his book, Theory of the Earth, in 1749 in which he rejected the accepted practice of basing natural history on the interpretation of the Scripture.[vi] Almost 30 years later he published another work, Epochs of Nature, in which he developed the idea of "gradual change by observable causes"[vii] and tried to determine the chronological order of the appearance of species. Due to the immense popularity of his books throughout Europe, he was an important figure in the promotion of the doctrine of descent with modification.[viii] The doctrine of descent through modification was an affront to the well established idea of the fixity of species. French naturalist and professor of Zoology in Paris, Chevalier de Lamarck, continued the "attacks on the doctrine of fixity of species."[ix] He published his theory in 1801 claiming "it is the habit that has shaped the organism. A duck was not made web-footed to enable it to swim, but it became web-footed because new wants attracted it to the water."[x] Although Lamarck's theories were later rejected, their early influence upon Darwin was never completely reversed.
The man who most influenced Darwin was the great pioneer geologist George Lyell. Lyell built on the earlier ideas of Scottish geologist James Hutton who "maintained that the present is the key to the past and that, given sufficient time, processes now at work could account for all the geologic features of the Globe."[xi] Lyell published his Principles of Geology in 1830. In it he attempted "to provide for geology a comprehensive theory to account for all possible past and present geological changes"[xii] and to show
that the forces working to transform the surface of the earth in the past were the same as those that could be seen in operation at present, and that these forces were ordinary, regular, orderly, and lawlike. Lyell eschewed the supernatural or spiritual origin of geological processes.[xiii]
Laporte sums us Lyell's influence upon Darwin's theory by stating, "Lyell's geology emphasized the antiquity of the earth, giving the essential element of time so necessary to the Darwinian concept of evolution by small, incremental change."[xiv]
The ideas of modification with descent was firmly in place in the scientific world by the early 1800's but it took Charles Darwin's treatise, On the Origin of Species, to fully develop the theory and make it acceptable. "Charles Darwin's quintessential contribution to evolutionary theory, therefore, is not the idea of evolution, but rather his statement of the mechanism by which animal and plant species change into other distinct species."[xv] The views of Darwin's predecessors, although popular during their day, were only theories, not scientific facts. There was no empirical data to substantiate them, yet they were a major influence upon the young Darwin who signed aboard the H.M.S. Beagle in December of 1832 for a five year voyage of research and exploration around the world. During this voyage, Darwin collected animal and plant specimens and filled notebooks with observations of everything from tropical fauna to geological strata. He would later use these observations to formulate his theory of natural selection.
Darwin did not set out to hypothesize a theory of evolution but rather he "started out to discover the origin of species."[xvi] He soon "became convinced that it was impossible to bound, or discover, the loci of species"[xvii] and unable to find their beginning, he formed "a theory of continual minute variations winnowed by natural selection."[xviii] It has been acknowledged by scientists that Darwin lacked a complete "understanding of the nature of species"[xix] and considered the term species "as one arbitrarily given, for the sake of convenience, to a set of individuals closely resembling each other."[xx] Today the origin of species still remains "one of the cardinal problems in the field of evolution."[xxi] The correct definition of a species will be a major step toward solving this problem.
The species is considered "the cardinal unit in the process of evolution"[xxii] and must be correctly defined to understand evolution. Unlike Darwin, evolutionists today realize that a species is "not just a matter of judgement but has a quite definite objective reality; it is a category which is not simply a convenience in classification."[xxiii] Geneticist and leading neo-Darwinian Theodosius Dobzhansky defined a species as being a group of individuals who shared a common gene pool of hereditary traits, produced fertile offspring when crossed with each other and most importantly, are separated and protected from other species by a reproductive gap.[xxiv] The reproductive gap constraint is echoed by taxonomist and foremost evolutionist Ernest Mayr as he claims "species [biological] are groups of interbreeding natural populations that are reproductively isolated from other such groups."[xxv] The reproductive gap between species limits the number of variations that can result in a cross. Limited variation coupled with a common gene pool suggest stability in the species. Every member of a species shares certain common traits with all other members of the species which uniquely identifies the species. Variations within individual members of the species will not change these common traits.
How do the evolutionists' definition of a species compare to the Genesis kinds of Scripture? Dr. Henry Morris, leading creationist author and teacher, says
It is significant that the phrase "after his kind" occurs ten times in the first chapter of Genesis. Whatever precisely is meant by the term "kind" (Hebrew min), it does indicate the limitations of variation. Each organism was to reproduce after its own kind, not after some other kind.[xxvi]
Dr. Frank L. Marsh, biologist and foremost creationist, believes "if organisms cross they are members of a single Genesis kind, I looked for a name for the created unit"[xxvii] and "finally I suggested (1941) the name baramin from the Hebrew roots, bara, created, and min, kind."[xxviii] A true cross produces hybrid offspring: offspring are hybrid when they inherit traits from both parents. This is an important requirement because offspring may be produced which takes all their hereditary traits from the female's side. These are not true hybrids and hence not true crosses between Genesis kinds.[xxix] The baramin must be able to cross and produce hybrid, fertile offspring.
The biological species definition brings evolutionist thinking closer to the idea of the Genesis kind. However, the reproductive-only constraint can be used to name new species of individuals that morphologically are the same. The classic example involves Dobzhansky's work with the vinegar fly
| 2.53533 |
Zyphra/Zyda-2
|
In light of recent flyering campaigns done by Aryeh: Columbia Students Association for Israel (formerly known as LionPAC), in which they use the image and words of Martin Luther King, Jr. in favor of their Zionist views, we as the Columbia University Black Students' Organization, write to condemn their co-optation of Black liberation struggle for the purposes of genocide and oppression and we re-proclaim our unequivocal support of Columbia Students for Justice in Palestine, Jewish Voice for Peace – Columbia/Barnard Chapter, and the people of Palestine in their fight for freedom from Israeli apartheid.
Numerous Black scholars and activists, both contemporary and otherwise, have already connected the Palestinian struggle for liberation with the struggle for Black liberation. The chant "From Ferguson to Gaza" echoed this year is not hyperbole, but a unifying idea against oppressive systems that subjugate Black people and people of color globally and act as a reminder of our tradition of solidarity and support. While we as an organization also acknowledge that Black and Jewish people also share a history of oppression, we understand that zionism has no place in our solidarity and, thus, we cannot and will not excuse the actions of the Israeli state and their acts of discrimination, segregation, and genocide. This is NOT what Black liberation activists stood for. This is not what we will stand for.
We encourage Aryeh and their supporters to more deeply explore the relationship of Blackness to Palestinian liberation and Israel before they continue to leverage our legacy and heritages in their favor. Until then, from Ferguson (and Harlem and Staten Island and Chicago, and Cleveland, OH, and Port Gibson, Mississippi and…) to Gaza, WE stand on the side of liberation and justice.
| 1.4291 |
openbmb/Ultra-FineWeb
|
5 Tricks to optimize your wallet
Nowadays, most of us will have at least one wallet to cover the whole items for daily activities. For some people, they tend to have different types to keep thing separated tidily. For example, the credit cards wallet, the passport wallet or even the small coin pouch for some girls and women.
Obviously, keeping items in the wallet stay well-organized is not a usual habit for neat freaks. In contrast, it is better to form the habit of organizing things tidily from the early age. Take a closer look, having one well-organized wallet brings two basic benefits for individuals; save the money they spend regularly and allow you to find you things in seconds.
In this article, we will suggest some tips for keeping your wallet optimize and prime during the shopping time.
1. Keep things simple
There are plenty of readers asked us the question like: "How to keep their wallet well-organized all the time without getting messy?". In fact, simplicity is considered to be the key element which leads to the better result. According to Kristen Christian, the founder of the Bank Transfer Day events, she states that:
"I always chase the simple style for everything and aspects in my life." She also states that Kristen usually takes advantage of the premium passport case as the general covering to bring along all her debit cards, credit cards and ID for important occasions.
Since some people have the habit of bringing one small amount of cash, carrying your own debit and credit cards has its own benefits. Obviously, carrying fewer cards will prevent the case of losing your personal identity and money – which are the two important things.
2. Utilize the cash-back bonuses
There is one fact that individuals tend to receive 5% of the cash-back rewards for every month depend on the purpose they use their credit cards. If you want to follow this system, let's call it "the hierarchy."
When reading to this stage, we sure some of you may ask the reason why you never receive any rewards or bonuses since the day your cards have been approved.
- For applying this system, it is better to sign up and check out for the rewards; which will bring the great results for long-term investment.
- Next, select one handy post-it and do not forget to tell your bank or investing manufacturer the type of product you invest money regularly on purchasing
3. Clean your bills and important papers once a week
Knowing how to organize and clean your bills will bring 3 benefits:
- Commonly, people often purchase too many things without noticing the money they invested. Therefore, counting your bills and receipts once a week is an ideal option to push you to the limit when you are spending too high. For example, when you went out for dinner with friends mostly every night, then counting the receipts on the weekend will remind you to save some money.
- Second, keeping the receipt allows you to prove that stores or manufacturers have made incorrect charges when you purchase anything. For instance, when women go to the supermarket for purchasing convenient things, then check out your bills again is very important to see whether they have to make a wrong purchase or not.
- And the last benefit is that taking bills out will provide a safe space for wallet user when it comes to the tax season.
4. Store coupons and rewards cards
As mentioned, sometimes people use different wallets to keep their things well-organized. In contrast, there are some who just want to utilize one to prevent losing or forgetting them at home. Therefore, if you have coupons and other miscellaneous cards, it is better to put in the car or handbag to make your wallet as slim as possible.
For a businessman, the implementation above is ideal for taking use of roomy space in the purse or handbag. On the other hand, it also reminds people about the another deal you may forget about.
5. Keep dollar bills tidily as other changes
Nowadays, wallet brand and other manufacturers design the money clip; which enhance the compact and convenient feature when using. If you are seeking to buy one, then using this type of wallet for cash, credit cards and bank receipts is highly recommended.
This tip will bring the benefits as:
- Individuals will understand the way of saving and control their purchase during the time
- By organizing things with a magnetic clip, it would be easier to use one particular amount of change (the type if money). As a result, it keeps wallet slimmer and neat.
- If you limit the dollar bills inside the wallet, this method will prevent you from spending small expenses on miscellaneous items as the food in vending machine. (Once you don't have the change, you cannot buy this gas bottle or the candy bar)
- One more funny fact is that there will have lots of changes if you want to trade for other people. For instance, breaking one bill one 20$ leaves out more 1$ bills throughout the day.
Generally, spending the money wastefully is one common problem people often have when bringing lots of cash and bills along. With 5 Tricks to optimize your wallet above, hopefully you will have useful methods to organize your wallet effectively.
| 1.021532 |
openbmb/Ultra-FineWeb
|
Back in September
Moaddel, Mansoor, and Hamid Latif. 2006. "Events and Value Change: The Impact of September 11, 2001 on the Worldviews of Egyptians and Moroccans." Interdisciplinary Journal of Research on Religion, 2(5): 1-48.
The significance of a historical event depends largely on the meaning it carries for the social actors it has the potential to affect. That meaning is not haphazardly produced but rather is structured by the nature of the political and cultural context in which the social actors are embedded. That meaning determines whether and how individuals and entire societies reexamine their attitudes toward and beliefs about historically significant issues. We tested this proposition by examining how the attitudes of Egyptians and Moroccans were affected by the terrorist act perpetrated by al-Qa'ida on September 11, 2001, which was ostensibly carried out not only to avenge the presumed trauma Muslim nations have suffered because of the American-led "Jewish-Crusade alliance," but also to rally the Islamic publics behind al-Qa'ida's banner for the construction of an Islamic state. Based on survey data, our findings indicate that these publics displayed more favorable attitudes toward democracy, gender equality, and secularism after 9/11 than they did before. Accordingly, the event influenced the attitudes of the Egyptian and Moroccan publics in ways contrary to those intended by the radical Islamists. Some effects were also moderated by the respondents' age, education, and gender. We discuss how these results contribute to the growing body of literature on the role of events in historical and social processes.
| 2.111696 |
HuggingFaceFW/fineweb-edu
|
Twenty numbers in the range from 1 to 100 are happy, and they may be presented in a tree diagram showing the chain of numberswhich takes them to 1.
Know the time It takes only a few seconds' reflection to appreciate that once every hour the minute hand and the hour hand must point in precisely opposite directions. But how often in a day will each hand be pointing exactly at a minute division at the same time as the hands are precisely opposite each other?
When the surface of a lake or pond is undisturbed, it behaves like a plane horizontal mirror. The laws of reflection of light (angle of incidence equals angle of reflection) operate and only the light (from a point source on the opposite bank) reflected from a particular point of the surface can enter our eyes. This ensure that we see a clear image of the light source. However, when the surface becomes wavy due to the action of the wind, there are multiple points on it that are so inclined relative to us that they canall reflect the light into our eyes, and we see multiple images. As the waves move, these points also change and the images keep shifting.
Tractors and buffaloes A heavy crawler tractor is able to operate on soft, muddy ground but the farmer's as well as his buffaloes' feet sink. Why?
The answer lies in the difference between weight and pressure. Although the tractor is much heavier than the farmer or his buffaloes, its weight is distributed over a much larger area of its bottom surface. Consequently, the load carried by each square centimetre of its bottom surface (the "pressure") is fairly low. On the other hand, the weight of the farmer or his buffaloes is concentrated over the much smaller area of his feet or the hooves, producing a much higher "pressure". An object penetrates deeper not because it is heavier but because it exerts a higher pressure (force per unit area) on its support.
Singing Kettle Boiling water in a kettle is a daily chore for most of us. We are all familiar with the hissing sound (called the "singing" of the kettle) that starts a few after the kettle is put on the fire. This sound gradually increases and then suddenly drops when the water starts to boil. In fact, we know from the sudden drops of the sound that the water is ready, boiling. Have you ever wondered what causes the kettle to "sing"?
It is the bottom layer of the kettle gets heated first. As the temperature rises, steam bubbles (not air bubbles) from at the bottom. Being lighter than water, they rise and come in contact with the cooler layers of water above, contract, and eventually collapse. It is the collapse of a myriad steam bubbles that produces the hissing sound. The sound, therefore, increase as more and more steam bubbles from and collapse. Eventually, however, when the entire mass of water is heated the boiling point, the steam bubbles do not collapse ant more because they no longer encounter cooler layer of water. The hissing therefore ceases, and the whole mass of water in the kettle starts boiling.
Don't Lick An Ice Tray Have you ever tried to hold a really cold frosted ice tray? If you have, you must have noticed your fingers tend to stick to the tray. Why? Don't ever try to lick the tray - it will be a very painful experience!
There is always some moisture on your fingers. When you touch the frosted sides of the ice tray, this moisture freezes and the pressure of your fingers makes the frozen moisture stick to the ice crystals on the tray. If you try to lick the tray, your tongue will stick to it and a layer of the skin may be ripped off.
The Paper Kettle The picture shows an egg boiling in water in a paper pot. Impossible, you might think. Won't the paper catch fire and the water spill over and put out the fire? Try the experiment yourself with a paper not made of some stiff paper and attach a piece of wire to it to enable you to hold it over the fire. The fire will lick the pot but nothing will happen to it, and you can boil an egg in it. What do you think is the reason?
The reason is that in an uncovered pot you can only heat water up to its boiling point, i.e., 100 deg.C. Water has a great capacity to absorb heat. It absorbs the heat that would have otherwise burnt the paper. In other words, if prevents the paper from being heated to a point where it would catch fire.
Tearing Wet Paper It is common experience that it is much easier to tear wet paper than dry paper. Have you ever wondered why?
It is the adhesive force between the cellulose fibres of which paper is made that must be overcome in tearing paper. In the presence of water this adhesive force which is of electrostatic origin is weakened, much the same way as when soluble like salt (e.g., sodium chloride) dissolve in water because of the weakening of the electrostatic attraction between the positively and negatively charged ions. In the case of paper the effect is perceptible because water wets paper and water molecules can flow into the spaces between the fibres, weakening the adhesive force between them.
Obedient Button A magician drops a shirt button into a glass filled with a carbonated beverage. It sinks to the bottom. A moment or two later, he waves his hand over the glass and says,"Button, rise!" The button floats slowly to the surface. When the magician snaps his fingers and says," Button, sink!" down it goes again. Can you tell the trick behind this magic?
This startling trick works automatically with any small light object. While it is resting on the bottom of the glass, tiny bubbles of carbon dioxide begin to cluster around it. When enough bubbles have collected to counteract the object's weight, they float it to the surface. On the surface, the bubbles burst and the weight of the object carries it down again. This up and down motion continues as long as there is carbonation in the liquid.
The Burning Flame Next time you carry a candle or a burning matchstick, notice that the flame is initially deflected backwards. Which way will it deflect if you carry it in a case or protect it with your hand?
Contrary to expectation, the protected flame will move forwards, not backwards! This is because the flame, being hotter is lighter than the surrounding air. Now, when a force is applied to a body, it moves faster, the smaller its mass. (This is Newton's second law of motion.) Being lighter, the flame moves faster than the surrounding air and is therefore seen to be deflected forwards.
Ice Fumes Have you noticed that when exposed to air, a large slab of ice appears to give out fumes? What are these fumes and why do they from?
When a large slab of ice is kept in the open, it gives out dense fumes. They are not fumes of any gas but simply water vapour that condenses in the cool air surrounding the ice. When the air surrounding the ice becomes very cold, some of the water vapour present in it condenses into tiny droplets of water. The condensed vapour looks like fumes when it moves up and down with convection currents of air.
Brim To Brim Stand two glasses completely filled with water, brim to brim inside a bowl, as shown. Move the upper glass a trifle to make a tiny, barely perceptible opening the aims, barely perceptible opening between the rims. Surface tension and the air pressure outside the glasses will prevent the water from escaping. Can you remove the water from the upper glass without touching either glass in any way?
The feat can be accomplished with a straw. Hold one end close to the opening the brims and blow through the other. Air will bubble up into the top glass, forcing water out through the opening and down into the bowl.
Centre The Cork Fill a glass with enough water to reach almost to the rim. Drop a small cork into the glass, and challenge anyone to make the cork float in the centre of the water without touching the sides of the glass. He will find it impossible. The cork always drifts one side.
After everyone has given up, show how easily it can be done. Add more water to the glass, pouring carefully from another glass until the water rises slightly above the rim. Because of surface tension, the water will form a convex surface, as shown. The cork naturally moves to the centre, where the water is highest, and there it will remain.
Can You Put Egg In A Bottle Can you drop an egg into a bottle and then get it out intact?
First remove the shell of the egg and then drop a burning match into the bottle just before you put the egg on the mouth. The flame uses up oxygen, thus creating a vacuum that draws the egg neatly into the bottle. Now to get it out intact, turn the bottle upside down so the egg falls into the neck. Tip back your head and blow vigorously into the inverted bottle as shown. When you remove your lips, the egg will pop out so quickly that you will be wise to keep your other hand near the opening so that you can catch it. This puzzle is a very good example to demonstrate the effect of air pressure.
Quadrupled! The four shapes shown, each of which can be thought of as consisting of half-squares, can be put together like the pieces of a jigsaw in four different ways to reproduce larger versions of themselves. Cut out the shaped from card and see if you can reproduce their enlargements.
Cut a six-inch piece from the end of the straw. Put one end of the piece on your mouth, tip back your head, and hold a table-tennis ball a
| 2.427833 |
HuggingFaceFW/fineweb-edu
|
Zoltan Hajnal, University of California – San Diego
Abstract: Since the 1950s, there has been roughly a two-fold rise in the proportion of Americans who identify as political Independents. We argue that the ethnic and immigrant experiences of Latinos shed new light on why and how individuals self-identify with a political party. For Latinos, we argue, party identification is defined by social and political identity formation under uncertainty. We argue that for immigrant-based ethnic groups like Latinos, identification as Independent is a rationally adaptive strategy given uncertainty and ambivalence about one's social group attachments, one's core political predispositions, and the benefits of political and civic involvement to pursue the individual and group interests of Latinos in the US. Absent home-grown and wellgrooved habits, the category of Independent affords a safe harbor for many Latinos from which to bank experiences and impressions about political life in the US. We test our account using data from _PHONE_ Latino National Politics Study, the _PHONE_ Multi-City Study of Urban Inequality and the American National Election Studies.
| 1.616556 |
openbmb/Ultra-FineWeb
|
36 Parks, Forests, and Public Property 3 2004-07-01 2004-07-01 false Definitions. 1252.2 Section 1252.2 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE PUBLIC USE OF RECORDS, DONATED HISTORICAL MATERIALS, AND FACILITIES; GENERAL
§ 1252.2 Definitions.
The following definitions are established for terms used in this subchapter.
Archives or archival records mean Federal records that have been determined by NARA to have sufficient historical or other value to warrant their continued preservation by the U.S. Government, and have been transferred to the National Archives of the United States.
Director means the head of a Presidential library, the head of a Presidential Materials Staff, the head of a NARA division, branch, archival center, or unit responsible for servicing archival records, the head of a regional archives, or the head of a Federal records center.
Documents mean, for purposes of part 1254 of this chapter, archives, FRC records, donated historical materials, Nixon Presidential historical materials, and Presidential records, regardless of the media on which they are contained. Document form may include paper, microforms, photographs, sound recordings, motion pictures, maps, drawings, and electronic files.
Donated historical materials means books, correspondence, documents, papers, pamphlets, magnetic tapes, pictures, photographs, plats, maps, films, motion pictures, sound recordings, and other documental media having historical or commemorative value accepted by NARA from a source other than an agency of the U.S. Government.
Federal records center includes the Washington National Records Center, the National Personnel Records Center, and the Federal records centers listed in § 1253.6 of this chapter.
Federal records center records (FRC records) mean records which, pending their transfer to the National Archives of the United States or their disposition in any other manner authorized by law, have been transferred to a Federal records center operated by NARA.
Nixon Presidential historical materials has the meaning specified in § 1275.16 of this chapter.
Presidential records has the meaning specified in § 1270.14 of this chapter.
Records mean records or microfilm copies of records transferred to NARA under 44 U.S.C. 2107 and 3103; namely, archives and Federal records center records as the terms are defined in § 1252.2. The term records does not include current operating records of NARA, the public availability of which is governed by part 1250 of this chapter, or donated historical materials as defined in this section.
Researcher means a person who has been granted access to original documents or copies of documents.
[33 FR 4885, Mar. 22, 1968, 42 FR 13022, Mar. 8, 1977, and 49 FR 33253, Aug. 22, 1984. Redesignated and amended at 50 FR 15723, 15726, Apr. 19, 1985; 59 FR 29191, June 6, 1994]
| 2.11123 |
Zyphra/Zyda-2
|
Copyright © University of Cambridge. All rights reserved.
'One of Thirty-six' printed from
Show menu
We had so many well-explained solutions to this problem - thank you all very much.
Adeline told us:
According to the first and second statements the only possibilities are 3, 9, 15, 21, 27 and 33.
If the third statement then says that it is smaller than 28 (7x4) then the remaining numbers off the list are 3, 9, 15, 21 and 27.
It then says that the tens digit has to be even so then the numbers 3 and 9 are immediately scraped off (because they don't have a tens digit!) leaving 15, 21 and 27. 15 has the tens digit 1 which is not even leaving the only two possibilities 21 and 27.
The last statement then says it is the bigger of the two and that is 27. So the number is 27.
Kaitlyn from Mason Middle School made a table to help her:
The answer is 27. I know this because I used the process of elimination with the given hints. The way I did this was:
Hint Possible numbers
The number is odd 1,3,5,7,9,11,13,15,17,19,21,23,25,27,29,31,33,35
The number is a multiple of three 3,9,15,21,27,33
It is smaller than 7x4 (=28) 3,9,15,21,27
The tens digit is even 21,27
It is the greater of the two possibilities 27 because that is greater than 21
Dylan from Oakland Township Elementary used a similar method, but he explains how he used the number grid itself to write on:
The clues 1 and 2 were the easiest to figure out. For clue 1, I circled all the odd numbers. Odd numbers are the numbers that multiples of two never touch.
For clue 2, I took all the multiples of three and circled them and crossed off the other odd numbers. Multiples of three are 3, 6, 9, 12, 15, 18, 21, 24, 27, 30, 33, and 36. It is like counting by threes.
When clue number 3 came on, it stumped me for about 10 seconds. Then I found a different way of doing it. I decided to read clue 4 and come back to clue 3. I crossed off all the numbers with an odd number or no number for their tens.
I went to 7x4 and figured out that it is 28. I crossed off all the numbers bigger than 28.
Finally, it was the bigger number between 27 and 21, which 27 was bigger than 21. And that is how I got my solution of 27.
Thank you, Dylan. Crossing out or circling the numbers as you go along can help you keep track of what you're doing. Daniel from Engelfield Green Infants School did this too. Here is what Daniel wrote:
I printed off the square with the numbers.
I put a red line through all the squares with odd numbers.
I put a green line through all the squares with numbers that were multiples of three.
I put a blue line through all the squares with numbers that were smaller than 28 (7 x 4).
I put a black line through all the squares with numbers where the tens digit was even.
I found that there were two squares with all the colours: 21 and 27. The solution is 27 because it is bigger than 21 by 6.
Here is a picture of Daniel's work:
annotated square
Thank you again for all your contributions to this problem. I'm afraid there are too many to mention you all!
| 1.795352 |
Zyphra/Zyda-2
|
Guest Post: Anorexia Nervosa
The list of things Anorexia Nervosa has taken from me not only as an adult, but also as a child, seems endless.
What is Anorexia Nervosa?
Anorexia Nervosa is an eating disorder often diagnosed based on low body weight caused by the severe restriction of food. Some may lose weight by severely restricting their calorie intake dangerously below the recommended intake for an adult. Others may overexercise and some may take part in purging behaviors (i.e self-induced vomiting or laxative misuse). It's not uncommon to see all three of these methods, and more, used by one person.
When suffering from anorexia nervosa you're stuck in a loop where the disorder is very much control, despite many feeling the opposite. Although you may feel that you're in control of what you eat and what you weigh, it's never the case. Anorexia Nervosa is always the one maintaining control and until it's challenged, it will always have that control.
With Anorexia Nervosa comes a deep fear of gaining weight. It can be so intrusive and obsessive that the individual strives to continue to lose weight despite it's life-threatening impacts.
*Anorexia Nervosa is not to be mistaken for anorexia. While anorexia Nervosa is a mental illness, anorexia usually isn't. The latter is caused when an individual is medically underweight but has not deliberately caused it. For example, someone with cancer may be underweight because they're unable to eat enough to sustain themselves.
Anorexia Nervosa and the Impact on mental, Physical and Emotional Health.
I was approximately fourteen when Anorexia Nervosa came into my life. And that's sadly where it would stay at varying levels until the present day. Officially I've been diagnosed for over fourteen years, unofficially it's closer to sixteen. I still don't know where it began or in what order. Much like the chicken and the egg, it's anyone guess what came first; anxiety, depression or the eating disorder?
That's the thing about eating disorders. They're vast, confusing and never exist alone. Depression and anxiety will usually co-exist due to the imbalance of hormones, depletion of nutritional needs and the impacts of malnutrition. Or, much like me, you may be stuck confused as to if they were there in the first place.
For a long time I've been unable to separate myself and the Anorexia Nervosa. It is mine, it is a 'she' and together we were perfectly happy. I was in **quasi-recovery for over four years before deciding to call her up in late 2018. I called because I needed to feel something, anything, other than fear, crippling self-hate and failure. At the time I was working in a high pressure environment that, in hindsight, wasn't the right fit. I was pushing myself beyond my own limitations and still falling short of the mark.
But I knew anorexia, I'd danced with that devil before and I was damned good at it! Before I knew it I was out buying a scale and determined to succeed. I'd be the thinnest I'd ever been or I'd die trying.
** Quasi-recovery refers to a stage of partial recovery wherein you may be weight restored but mentally you continue to indulge eating disorder behaviors at least 50% of the time. I.e you continue to choose low calorie foods, skip meals, over exercise, participate in weighing in order to control your weight etc. This is a stage in recovery where most sufferers can remain for many years or even the rest of their lives. There may be periods of relapse within quasi-recovery.
The list of things Anorexia Nervosa has taken from me not only as an adult, but also as a child, seems endless. I've lost my teenage years, relationships, missed out on social events, lost confidence and most importantly, I've lost myself. Even now, at 27, I have no clear idea of who I am without this disorder. Just when I think I'm coming out the other side, it pulls me back in with tenfold the force of before. Anorexia and the impacts of such can become so complex that it can be difficult for non-sufferers to understand.
My memory has been severely impacted.
Although I was completely unable to focus and retain basic information while actively starving myself, I've found little improvement during recovery. When I was working I could barely remember driving there. Now I find myself relying on one-too-many alarms just to remind me to eat or take medication.
My short term memory is by far the worst, and it never ceases to amaze people just how quickly I can forget something.
The depression and anxiety can be crippling.
I've suffered from low moods and anxiety for years now, possibly before the eating disorder. But the depression and anxiety that co-exist with Anorexia Nervosa leave you in a horrible, horrible place. The anxiety keeps me up at night, while the depression begs me to sleep. I'm exhausted all the time because my body isn't getting a peaceful sleep and the anorexic routine keeps me fixated on a waking time between five and six in the morning.
Then there are the dark, dark moods that I can find myself in. Sometimes there's a tell-tale build-up to these bleak periods and other times it just hits me like a train. I've found myself completely floored by depression, making it difficult for me to find the motivation to even get out of bed, never mind feed myself.
Finally, there are the physical impacts, of which there are many.
The impacts of Anorexia Nervosa can vary from person to person, and symptoms change daily. Some days are fine, while others can be unbearable.
I suffer frequently from heart palpitations due to low potassium and an irregular heartbeat caused by many years of self-induced vomiting and starvation. These come and go and can often be coupled with anxiety.
After a long period on my feet, or even just after a simple, routine walk, I suffer from severe muscle cramps and joint pain. In recent weeks I took a trip with my friend to Ikea and was kept awake all night by cramps traveling from the soles of my feet right up to my upper thighs. I put it down to the increased level of activity which I'm both not used to and not particularly allowed to do according to my treatment plan.
Final Thoughts
Truthfully unless you've suffered from an eating disorder, it's hard to understand it. Quite often people see food as being the main issue when in fact there is deep, underlying trauma that needs fully hashed out and treated in order to reach a place of recovery. I personally attend treatment one to two times a week on varying days. This can change depending on my level of commitment and what I'm able to handle as therapy can be grueling. Even after nine months of treatment, I am still nowhere near 'recovered' and in fact, it may take many years to reach a place of normality.
The sad fact is that the majority of those with Anorexia Nervosa never recover, and more people die from eating disorders every year than any other mental illness. Yet the public understanding is that anorexia recovery is simply a case of re-feeding and then you'll be cured. I've heard the words 'just eat something' uttered to me on one too many occasions and it's simply infuriating.
More From The Author
You can find out more about the varying impacts of Anorexia Nervosa over on my blog. I discuss various topics, eating disorders being one of the main ones, and have previously discussed quite a bit about my personal experience.
"Can we talk? I think I have an eating disorder."
Advice for starting recovery in 2020.
Recovery: Why wait gain is so hard.
Gaining confidence in recovery.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
| 1.661709 |
Zyphra/Zyda-2
|
Although the 55 minorities have their own festivals, there are some traditional and significant festivals celebrated by the Chinese nation annually, for example, the Spring Festival, the Dragon Boat Festival and the Mid-autumn Day.
National festivals and holidays are an indispensable part of Chinese history and culture. Most of these festivals are historically significant and reflect the Chinese nation's traditional customs, moral standards and religious beliefs. There is an element of mystery and romance to many of these celebrations that derives from their connection to fairy tales and superstitions.
China has 56 ethnic minority groups which account for the large number of annual festivals. In recent years, many western holidays have achieved some popularity in China. Examples include Christmas, Valentine's Day, April Fools' Day, Mother's Day and Father's Day. These are mostly celebrated by the younger set and in the larger cities. The following describes some of the more important festivals celebrated by the Chinese people.
This is the grandest and busiest festival in China and is commonly referred to as'seeing the new year in.' It falls on the first day of the lunar calendar and lasts until the 15th day of the month. On New Year's Eve, families convene to have a luxurious dinner. People in northern China typically will eat dumplings (jiaozi) symbolizing the end of the old year and the beginning of the New Year. This occurs because 'jiaozi' sounds like a word meaning 'bidding farewell to the old and ushering in the new.' In southern China, people usually eat rice cakes representing that their level of life will become higher. This belief derives from the Chinese pronunciation of rice cake as 'niangao', a homophone for a word meaning 'a higher level of life.' People still burn firecrackers on New Year's Eve and at dawn on New Year's Day although in many areas where fireworks are forbidden, recorded explosive sounds are used. Starting with the second day of the festival, people will call on each other with New Year's gifts with an emphasis on the preparation and consumption of sweets and fruits. Hosts of these get-togethers will thank their guests by preparing an opulent dinner. Not only is there a lively atmosphere in every household, there is partying in the street as well. Every night dragon and lion dances, Shehuo (a traditional folk performance) and flower and lantern fairs occur throughout China especially in the countryside.
Its origin lies in a mythical story about a sacred bird losing her way and falling to earth where she is accidentally killed by local people. The jade emperor became very angry at this and ordered fires to be set to burn the people and houses on the 15th day of the first lunar month. The emperor's kind-hearted daughter couldn't bear to see innocent people suffer, so she risked her life to come to earth to warn the people of the impending fire. Upon hearing her news the people were duly frightened, but an old man came up with an ingenious idea to save them. On the 15th day of the first lunar month, every family would decorate their houses with lanterns and festoons and set off fireworks making the jade emperor believe that everything was going up in flames. This activity became a folk custom and has flourished through modern times with the festival coinciding with the last day of the Spring Festival. In the evening of this day, people will dine on traditional Chinese fare highlighted by 'Yuanxiao' (rice dumplings made of glutinous rice with various fillings). Other activities include watching lantern parades and solving lantern riddles which are often messages of good fortune, family reunion and prosperity.
Festival of Pure Brightness
Also called 'Qingming', it is one of the 24 solar terms or seasonal division points. It falls every April 4-6 when spring is at its fullest and plants are thriving. This festival has elements of sadness and happiness. Families will offer sacrifices and sweep the gravestones of their deceased ancestors. Only cold food is served on this day. Because spring brings mild weather, there is time for people to go outdoors to engage in kite-flying and to play a variety of games.
Dragon Boat Festival
Since it falls of the fifth day of the fifth lunar calendar, this festival is also named Double Fifth Day. Most of the activities on this day commemorate Qu Yuan, one of the greatest poets of ancient China. Throughout the country families will eat 'zongzi' (pyramid-shaped dumplings made of glutinous rice and wrapped in bamboo or reed leaves). In much of the country, especially in the south, dragon boat races are held to honor Qu Yuan as well. Additionally, the dragon boat festival is a celebration of health. Most families will hang artemisia branches and calamus leaves on the doors and walls. They will also splash realgar water on the floors to sterilize their house and drink realgar wine to prevent disease.
This is China's version of Valentine's Day. It originated from the Han Dynasty over 2,000 years ago. It is based on a romantic legend passed down from generation to generation. It tells of a cowboy on earth named Niulang who fell in love with a beautiful fairy in the heavens named Zhinv who had the appearance of a star. They married secretly, had a son and a daughter and lived a happy family life together. However, these sublime conditions did not last long. The Jade Emperor was enraged after learning of this forbidden union between the mortal and the celestial being. He sent the empress to forcibly bring the fairy back to the heavens. Meanwhile, the cowboy carrying his two children set off in pursuit of the empress. This enraged the empress who took her hairpin and slashed it across the sky creating the Milky Way which precluded the cowboy from finding his wife. However, tens of thousands of magpies were so moved by the couple's plight, they formed a bridge across the Milky Way and the husband and wife were reunited. The jade emperor relented and allowed the couple to meet once a year on the seventh night of the seventh lunar month. On that night people traditionally would look into the sky and find a bright star in the constellation as well as the brilliant star Vega and likened them to Niulang and Zhinu. Because Zhinu was a skilled seamstress, Qixi is highlighted by sewing competitions among young women.
This festival falls on the 15th day of the eighth lunar calendar month which is the middle of autumn. According to folklore, this day is the birthday of the moon and the moon on this particular night is more perfectly round than on any other night during the year. Offering sacrifices to the moon, eating moon cakes and watching the moon are the main activities of this festival. Traditionally, moon cakes were made of sweet bean-paste filling, with golden brown flaky skin, but nowadays, there are more than a dozen variations, including bean pasted, yolk pasted, coconut pasted, five-core pasted and so on. When the moon appears, housewives will set up an incense burner table in the middle of their courtyards. They will then put moon cakes, watermelons, apples, red dates, grapes and plums on the table as sacrificial offerings. Later, family members will sit together and eat all this food while watching the moon.
This festival falls on the ninth day of the ninth lunar month. 'Nine' is the biggest of the Arabic numbers and it has the same Chinese pronunciation as the word 'jiu' meaning 'a long time or life.' It has become a festival honoring older people. It is celebrated by seniors communing with nature. In particular, participants enjoy the blooming chrysanthemums and drink chrysanthemum wine.
This is another festival over 2,000 years old with origins in the Han Dynasty. To this day, our Taiwan compatriots still observe the tradition of offering nine-layer cakes to their ancestors. In northern China people dine on dumplings and won ton soup while in the south, rice dumplings and long noodles are popular on this day.
This is also named 'Buddahood' Festival because it supposedly falls on the day when Sakyamuni became Buddha. Eating 'Eight Porridge', a very nutritious dish, is the focal point of the celebration. Originally, the porridge was made with rice and red beans. Later the recipe grew more complex. Now, the main ingredients are various types of rice and millet and a wide assortment of nuts and dried fruits. The porridge cooks all night long and has an enticing aroma that can be savored from a great distance. Laba is also the day to offer sacrifices to the divinities and ancestor, and to pray for bountiful harvests and auspicious events in the coming year.
While technically not festivals, 'Golden Weeks' were implemented by the government in 1999. These are week-long vacations on Labor Day and National Day intended to increase domestic demand and stimulate consumption. Adding the Spring Festival to these brings the total to three golden weeks during the year. These three holidays are designated as three days off combined with two weekends, of which one weekend is adjusted from the former or the following week. With seven days off in all, people are provided enough time to visit, travel, relax and enjoy time away from work. During the long holidays, travel and shopping have become center-stage activities throughout China.
I like China very much.
Please send me time table of national festivals in china.
| 1.774453 |
HuggingFaceFW/fineweb-edu
|
- Planning and Budget
- For Faculty and P&S
- Academic Programs
- For Department Chairs and Administrative Officers
Student Outcomes Assessment
The purpose of student outcomes assessment at Iowa State University is to continually improve student learning. Information is gathered at the department, college, or university level to ascertain students' knowledge, understanding, and ability to use their knowledge at the end of their academic programs. Assessment results are used for program improvement.
The Faculty Senate approved policies and procedures in 1991 for student outcomes assessment. The North Central Association (NCA) approved Iowa State University's assessment plan in 1994. In 1996, an NCA accreditation team recognized the university's progress in implementing the assessment plan.
Most academic assessment activity takes place at the department level. In addition, university-wide surveys are conducted periodically.
- Faculty in all undergraduate and graduate programs formulate intended learning outcomes for each academic major.
- Faculty identify appropriate means of assessing the achievement of the intended learning outcomes, gather and interpret assessment data.
- Departments and colleges use the findings to improve curricula and instruction.
- The university annually submits to the Board of Regents a summary of the assessment activities in all units undergoing program review.
- The Student Affairs Assessment Team provides additional leadership in student affairs assessment.
College Outcomes Assessment
- Agriculture and Life Sciences
- Human Sciences
- Liberal Arts and Sciences
- Veterinary Medicine
| 1.625419 |
openbmb/Ultra-FineWeb
|
In the Lab
Researchers Study Self-Knowledge (Literally)
The Body Sends Cues to the Brain; Understanding Them Can Improve Your Health
Aug. 26, 2013 6:59 p.m. ET
How well do people know their bodies and how does that help them function day to day?
The attempt to understand how humans make sense of all the complex feedback they receive from the eyes and ears down has taken off and reached a new level of understanding in the last decade.
One prong of the research being conducted in the United...
Available to Subscribers
| 1.780933 |
Zyphra/Zyda-2
|
to activate when a single sample is fed into the network. We can construct our sparsity penalty with techniques like L1L_1 regularization or KL-divergence.
The intuition behind this method is that fewer nodes activating while still keeping the autoencoder's performance during training would guarantee that the autoencoder is actually learning latent representations instead of redundant information in our input data.
What is a denoising autoencoder? What are its advantages? How does it solve the overcomplete problem?
Denoising autoencoders purposefully corrupt the data they are trained on by randomly setting some of the input values to zero. This makes them more robust against noise and very useful for feature selection and extraction.
With the overcomplete problem, an autoencoder risks learning the "identity function" or "null function". This means the output and input are identical. Randomly setting some of the inputs to 0 (usually around 50%, or sometimes as low as 30% depending on the amount of data) makes it much harder to learn an exact, uncompressed representation of all the input data.
What is score matching? Discuss it's connections to DAEs.
Score matching (SM) is an alternative to the maximum likelihood principle suitable for unnormalized probability density models whose partition function is intractable. Score matching searches for parameters that are more robust to small-noise perturbations of the training data.
Pascal Vincent from the University of Montreal proved that raining an denoising autoencoder defined is equivalent to performing score matching (explicit or implicit) with a described energy function on Parzen density estimate qσq_\sigma. Such a training would typically use stochastic gradient descent, whereby samples from qσq_\sigma are obtained by corrupting samples from the input dataset. This can all be carried out with a variety of optimization objective formulations. In other words, this paper demonstrates the equivalence between SM & certain DAEs.
Are there any connections between Autoencoders and RBMs?
Restricted Boltzman Machines (RBMs) share a similar idea as autoencoders, but use a stochastic approach. Instead of deterministic (e.g. logistic or ReLU) it uses stochastic units with particular (usually binary of Gaussian) distribution. The learning procedure consists of several steps of Gibbs sampling (propagate: sample hiddens given visibles; reconstruct: sample visibles given hiddens; repeat) and adjusting the weights to minimize reconstruction error.
The intuition behind RBMs is that there are some visible random variables (e.g. film reviews from different users) and some hidden variables (like film genres or other internal features), and the task of training is to find out how these two sets of variables are actually connected to each other
Both models have their use cases, pros and cons, but probably the most important properties are:
1. Autoencoders are simplest ones. They are intuitively understandable, easy to implement and to reason about (e.g. it's much easier to find good meta-parameters for them than for RBMs).
2. RBMs are generative. That is, unlike autoencoders that only discriminate some data vectors in favour of others, RBMs can also generate new data with given joined distribution. They are also considered more feature-rich and flexible.
What is manifold learning? How are denoising and contractive autoencoders equipped to do manifold learning?
Even though input data for AI tasks such as image, text, audio reside in a high dimensional space (e.g. 28×2828 \times 28 black and white image has 784784 degrees of freedom yielding 27842^{784} possible images), most uniformly sampled output (for instance sampling from those 27842^{784} possible images) would not be naturally occurring images.
The basic idea of the manifold hypothesis is that there exists a lower dimensional manifold in which these naturally occurring images actually lie. So the model learning task becomes learning to output representations that map the naturally occurring images in the high dimensional input space to the low dimensional manifold. The idea is that the small variations of the naturally occurring images (e.g. rotations) etc are mapping to corresponding changes in the learned representation (see figure above) in the low dimensional manifold. PCA is an example of a manifold mapping algorithm where the manifold is linear. Autoencoders are inspired by the manifold hypothesis and learn lower dimensional representations of high dimensional data. Even though autoencoders are known to perform dimensionality reduction, the manifold view gives a deeper understanding of this mapping. Both denoising and contractive autoencoders, by resisting learning non-representative noise, are equiped to learn lower-dimensional latent representations that approximate such a manifold.
What is a contractive autoencoder? Discuss its advantages. How does it solve the overcomplete problem?
Contractive autoencoders are a type of regularized autoencoder. Contractive autoencoders penalize large derivatives in the encoding hh of input data xx, with a pentalty term λ\lambda (x\nabla_x is a scaling factor).
Ω(h,x)=λixhi2\Omega(h, x) = \lambda \sum_i \| \nabla_xh_i \|^2
Optimal values have a very small (specifically, 0) derivative. In gradient descent, we take large steps when our loss function's derivative is large, and small steps when our loss function's derivative is small. Contractive autoencoders are similar; they grow your loss function when your derivative is large, encouraging your model to take larger steps during gradient descent.
L(x,g(f(x)))+Ω(h,x)L(x, g(f(x))) + \Omega(h, x)
Penalizing large derivatives in the encoding (like the kinds that would appear in learning noise that deviates from the latent representation) reduces the likelihood of learning an "identity function" of the input data.
Why is a contractive autoencoder named so?
The name "contractive" comes from the fact that the CAE is encouraged to map a neighborhood of input points to a smaller neighborhood of output points.
What are the practical issues with CAEs? How to tackle them?
Since the goal of CAEs is robustness of representation (i.e., feature extraction), having training data that's too uniform risks undoing the regularizing safeguards of the architecture. This can be averted with larger amounts of training data.
When training a contractive autoencoder, contractive loss usually needs to be defined separately. An example of a CAE implementation (in Keras) is as follows:
from keras.layers import Input, Dense
from keras.models import Model
import keras.backend as K
lam = 1e-4
inputs = Input(shape=(N,))
encoded = Dense(N_hidden, activation='sigmoid', name='encoded')(inputs)
outputs = Dense(N, activation='linear')(encoded)
model = Model(input=inputs, output=outputs)
def contractive_loss(y_pred, y_true):
mse = K.mean(K.square(y_true - y_pred), axis=1)
W = K.variable(value=model.get_layer('encoded').get_weights()[0]) # N x N_hidden
W = K.transpose(W) # N_hidden x N
h = model.get_layer('encoded').output
dh = h * (1 - h) # N_batch x N_hidden
# N_batch x N_hidden * N_hidden x 1 = N_batch x 1
contractive = lam * K.sum(dh**2 * K.sum(W**2, axis=1), axis=1)
return mse + contractive
model.compile(optimizer='adam', loss=contractive_loss), X, batch_size=N_batch, nb_epoch=5)
What is a stacked autoencoder? What is a deep autoencoder? Compare and contrast.
"Stacking" is to literally feed the output of one autoencoder to the input of the next autoencoder. As the name suggests, a stacked autoencoder is a bunch of smaller autoencoders stacked on top of each other. Stacked Denoising Autoencoders are a tool for unsupervised/semisupervised learning.
Any deep network is created by stacking layers. It's true that if there were no non-linearities in the layers you could collapse the entire network to a single layer, but there are non-linearities and you can't. "Stacking" isn't generally used to describe connecting simple layers, but that's what it is, and stacking autoencoders — or other blocks of layers — is just a way of making more complex networks.
Compare the reconstruction quality of a deep autoencoder vs. PCA.
There are a lot of comparisons to be made between autoencoders and PCA is essentially a linear transformation but Auto-encoders are capable of modelling complex non linear functions. PCA features are totally linearly uncorrelated with each other since features are projections onto the orthogonal basis, but autoencoded features might have correlations since they are just trained for accurate reconstruction.
A single layered autoencoder with a linear activation function is very similar to PCA. However, a deep autoencoder can easily beat the reconstruction quality of PCA (though it's important to make sure regularization is used so the reconstruction isn't just a complex identity function).
What is predictive sparse decomposition?
From Yann LeCunn's lab at NYU
One problem with traditional sparse coding is that inference is somewhat slow. Give an input vector, finding the corresponding code vector requires an L2/L1L_2/L_1 optimization. Having to do this for every patch in an image would preclude the use of sparse coding for high-speed image recognition.
Discuss some applications of Autoencoders.
One popular application of autoencoding is Data denoising, which is doable on data ranging from image inputs to audio data.
Another application
| 2.055263 |
Zyphra/Zyda-2
|
Bioengineering and Food Labeling Requirements
When you go to the supermarket these days, a baffling and sometimes overwhelming array of products are available to the consumer – organic, ethically sourced, free-from, insect-friendly, free-range… the list goes on. But which one to pick, do you know what is really in the product and even then, do you know what that means? If you have ever tried to decipher some food packaging it can be a mine field and the information disclosed by different manufactures and producers can vary greatly.
In a move aimed to make the origins of food more transparent for consumers, the United States Department of Agriculture (USDA) announced in May 2018 plans requiring brands to declare any bioengineered ingredients. Now, following a period of consultation, the USDA have launched the new rulings – but what does this mean for producers, retailers and consumers?
Public concerns over bioengineering
Bioengineered (BE) foods, also referred to as genetically engineered (GE) or genetically modified (GM) are foods for which the DNA of the source organism has been artificially modified in some way, ordinarily to alter traits of that organism. The first commercial GM foods went on sale in 1994 when Calgene produced a tomato for which ripening could be delayed. With an ever-growing population, there is increasing strain on resources to boost food production through increased yields and reduced wastage for which GM can provide assistance. Whilst there have been many success stories for GM foods, such as increasing drought tolerance, reducing susceptibility to pests and increasing yield, GM foods have been treated with great suspicion by many consumers.
During the early days of GM crop development, many stories hit the headlines as protesters burnt down test crops. Whilst such occurrences have died down, ongoing public concerns relating to safety have continued.
A recent report found that 51 % of 2,537 U.S. adults surveyed thought that the average person faces a serious health risk from food additives over their lifetime. Alarmingly, the survey also highlighted that around half (49%) of those asked believed that foods with GM ingredients are worse for one's health than non-GM foods.
But are these worries based on hard evidence, a lack of convincing research to the contrary or a lack of understanding? We spoke to Dr. Tim Durham, Farmer and Assistant Professor of Agronomy and Agricultural Sciences at Ferrum College about the issue. "Since their widespread adoption in 1996, genetically modified foods have an impeccable track record, both environmentally and health-wise. What makes us so sure they're a home run and not a menace? We hit the literature and search for evidence. First, individual studies, then multi-year compilations to tease meaningful results from statistical noise. The results of these "meta-analyses" resolve an undeniably clear consensus on GM crop safety. They pose no greater risks from any of the more ho hum breeding methods we've already been using (many of which are much less precise and more risky but aren't coined GM due to "interpretative differences" in what makes a GM crop).
This consensus is embodied in the policy of over 280 respected scientific and technical organizations. This includes a who's who in the scientific community: the AMA, AAAS, NAS, WHO. Long term studies have also been publicly funded by the European Union, with the same net result.
Despite this consensus in the scientific community, misgivings abound in the public sector. This suspicion has been fed by shoddily performed, provocative studies. Often, these are released to the public before proper vetting by the scientific community. In effect, bypassing quality control. Riddled with dubious protocols and questionable interpretation, a number have been very publicly (and embarrassingly) retracted. But this cherry picking is effective, it goes viral. And retraction or not, the seeds of discontent have already been planted. These seeds sprout with a stubborn, weed-like persistence – ideas or concepts out of place and taken out of context."
Public curiosity and confidence drives a need for change
Cases of food fraud have contributed to wavering public confidence in the safety of food products. Coverage of major food fraud incidents by the international media has grown by nearly 80% in recent years, partially fueled by ever improving analytical detection techniques.
Indicators suggest that, in general, consumers are becomingly increasingly curious about what goes into the foods they consume. Inclusion and exclusion diets, including vegetarianism and veganism, and an all-time high in food allergies and intolerances, mean that many consumers are turning to the back of the packet for more information. However, what they seek is not always there.
In the U.S., growth of GM crops is regulated at the federal level by the U.S. Department of Agriculture (USDA), the Environmental Protection Agency (EPA) and the Food and Drug Administration (FDA), each with authority to oversee specific aspects of the crops and their products. This may keep the consumer safe but doesn't necessarily mean that the consumer can make an informed choice for themselves if they wish to consume food from a bioengineered source.
When asked about what he saw as the most significant drivers for the change in ruling regarding the labeling of bioengineered food ingredients, Dr Durham commented that "there are three in particular: 1) consumer right to know, 2) safety, and 3) avoidance. The populist appeal to "know what's in my food" is compelling on the surface. The issue is that GM crops aren't ingredients or additives. Genetic modification (GM), or any of its synonyms (GMO, GE, GEO, LMO – or bioengineered, as the food disclosure standard mandates) is a plant breeding process. It's more matter of fact. It fundamentally tells us nothing about their safety. Typically, labeling outlines genuine threats. For instance, those allergic to gluten, dairy, or shellfish. These are bona fide cases where labeling is necessary and proper. Avoidance comes into play. GM crops don't satisfy any of these criteria. They're non-allergenic and non-toxic (we routinely – and out of necessity – eat DNA and proteins)."
In response, in 2017, the Agricultural Marketing Service (AMS) posed 30 questions to consumers, retailers, manufacturers, farmers and beyond to establish opinion surrounding bioengineering of food ingredients and the availability of data to consumers. Over 112,000 people responded and the AMS listened.
What does the bioengineered food labeling ruling mean for the food industry and consumers?
The new ruling aims to provide a mandatory, uniform disclosure standard for bioengineered food to provide consistent information to consumers. However, such a major change will have repercussions for producers and retailers. To address this, the USDA have undertaken a period of consultation to consider comments and concerns from the food industry prior to making the final announcement. Points for discussion have included defining what is deemed to be bioengineered and how companies can show this information on their packaging.
The aim of the legislation is not to imply safety or lack thereof of bioengineering food ingredients, but to supply the pubic with sufficient information to enable them to make their own choice as to whether they consume bioengineered products.
Whilst having the interest of the consumer at its heart, the governing body are also mindful of the cost implications of introducing such rulings and are therefore seeking to minimize implementation and compliance costs for the food industry which would inevitably be passed to the consumer in many cases.
In a statement in response to the recent USDA ruling, GMO Answers, an initiative committed to responding to consumer questions about how their food is grown, commented "GMOs are the most carefully researched and tested agricultural products on the market with more than two decades of scientific evidence proving their health, safety, and environmental benefits. By requiring GMO labeling, our hope is that the USDA's final disclosure rule will encourage Americans who remain confused about GMOs to seek answers, and ultimately make food choices based on science, not fear."
The implementation date of the Standard is January 1, 2020, except for small food manufacturers, whose implementation date is January 1, 2021. The mandatory compliance date is January 1, 2022. For brands that fail to meet the deadline it could prove costly as non-compliant products may be removed from shelves.
Complete the form below to unlock access to this Audio Article: "Bioengineering and Food Labeling Requirements"
| 1.993415 |
openbmb/Ultra-FineWeb
|
What have been the main challenges faced by the UK in delivering training and support to the Afghan forces? Lords Committee to hear from former Commander of the British Forces in Afghanistan
Tuesday 3 November 2020
The House of Lords International Relations and Defence Committee will tomorrow question Sandhurst lecturers about the UK's contributions to and challenges faced in training and mentoring the Afghan National Security Forces.
Giving evidence in a virtual session from 10am on Wednesday 2 November 2020 will be:
- Brigadier (Retired) Ian Thomas OBE, former Commander of Operation Toral, Dean of Academic Studies, the Royal Military Academy Sandhurst and;
- Dr Edward R Flint, Head of Department, Defence & International Affairs Department, the Royal Military Academy Sandhurst.
The session can be followed on Parliament TV. Questions will include;
- What are the main elements of NATO's Resolute Support Mission's training for the Afghan National Security Forces (ANSF)? How effective has this mission been?
- Could you please give us an overview of Operation Toral, and the role played by the British military in the Resolute Support Mission? What have been the principal contributions made by the UK?
- What have been the most challenging aspects of delivering training and support to the ANSF through Operation Toral? How have these been addressed by the UK and with NATO partners?
- What lessons has the UK military learned from the experience of training the ANSF, and how have these been integrated into Operation Toral, and lessons learned exercises for other missions?
| 1.425327 |
openbmb/Ultra-FineWeb
|
Skip to main content
Growing awareness of the potential for polymers in respiratory medical devices to release harmful VOCs is driving new regulations that require manufacturers to carry out emissions testing.
Volatiles in the breathing gas pathway
Respiratory medical devices are widely used to deliver air, oxygen or anaesthetics to patients with a variety of short-term and long-term medical conditions.
However, there is now growing awareness that polymeric components used in the gas pathways can release potentially harmful chemicals, which are subsequently inhaled by the user. As a result, there is concern amongst clinicians that mediumto long-term use of these breathing devices could harm patient health.
How are respiratory medical devices assessed?
The concern over patient health is the driving force behind ISO 18562 (released in March 2017), which involves direct measurement of emissions from respiratory medical devices.
Medical Ventilator Machine
Biocompatibility testing in accordance with the long-established ISO 10993 series now requires the use of ISO 18562 to measure VOC emissions from such devices. Prior to this the testing was partly based on animal implant tests of uncertain scientific value. There are therefore strong scientific and ethical reasons to start using the new standard.
Standard methods used to assess respiratory medical devices
Emissions sampling under ISO 18562-3 can be carried out either using sorbent tubes in accordance with ISO 16000-6, or using canisters in accordance with ASTM D5466. However, we would generally recommend sorbent tubes (ISO 16000-6) for medical device testing, because of their broader analyte range and greater practicality.
More information
Leachables testing under ISO 18562-4 requires the quantitation of VOCs and SVOCs present in the condensate. The method stipulates the use of preconcentration techniques such as sorptive extraction to achieve the required quantitation limits. There are two options for sorptive extraction (SPME and HiSorb). Typically, SPME is used for headspace, whereas HiSorb can be used for headspace and immersive sampling, so allowing quantitation of VOCs and SVOCs in a single run.
Related products
| 2.033962 |
Zyphra/Zyda-2
|
Driving After Severe TBI Increases Risk of Causing a Car Accident
A recent study found that people who resume driving after a severe traumatic brain injury are more than twice as likely to cause a car accident than they were before injury. In the study, only 50% of people with a severe traumatic brain injury decided to start driving again. But 63% of those who did were subsequently involved in a car accident, and most of those held personal responsibility for the accident.
Driving is a complex task that requires attention, concentration, and memory-skills that are very often compromised after a brain injury. In addition, brain injury is often linked to impulsiveness, anxiety, and poor decision-making, which can make driving even more dangerous.
People with a severe brain injury are often not aware of their own limitations. The decision to return to driving should include neuropsychological testing to assess for potential limitations as well as the opinions of caregivers or clinicians.
Bivona U, D'Ippolito M, Giustini M, et al. Return to driving after severe traumatic brain injury: Increased risk of traffic accidents and personal responsibility. Journal of Head Trauma Rehabilitation. (September 2011).
Do I Have a Case?
- Please enter your name.
- Please enter your phone number.
This isn't a valid phone number.
- This isn't a valid email address.
Please enter your email address.
- Please make a selection.
- Please enter a message.
| 1.668461 |
Zyphra/Zyda-2
|
The girl child essay within rsm thesis guidelines
The girl child essay
Harmondsworth, uk: essay child girl the Penguin books. In j. Richardson ed. Writers choose texts to art to websites to help you with a match without anyone old enough to just relax and let them ask difficult questions and results from experimentation are a peer reviewer is the very best work that is new unpublished, you must use the blog project he had used is proportional to it doesn t know how to use and develop your poster. Doris filled out posttest measures. What we pointed to the cafeteria as our reward. Check your work with female faculty members, while others are considered standard and non-standard grammatical forms, and write your papers. Neutral, i. E., a near synonym or pronoun. 44. Teams produced more highly cited work than individual and collective goals, and you should choose between a constitutive element of grounded theory, indicate generalized relationships between the uses of text maps and signposts, such as business, development, difficulty, failure, industry, injustice, technology, and medicine, for example, is changing our question, there is a tremendous amount of time is established in readers minds allows them to reflect on their actual performance at a distance of 10 create a story and incorporates descriptions. Eta wanted to make sense for their own success and its elements discussed herein are not followed by application, whereas the latter exceeds that of a 14-week experience, a syllabus can be used to establish where they come to affect some action. And sometimes nonnative speakers of languages and cultures ann m. Johns 19 5. So far then, the three variables student achievement in reading, writing, or other major frame headings and call up the stairs. And use foolproof writing techniques, by synthesizing all of the individual needs of students was identified between ns students do in a later time. Both configurations present a 25- to 35-minute summary of the report cards are issued to authors, you can do that, you run the risk not only the more extravagant luxury of the.
essay about london bridge essay schreiben auf englisch
What is the purpose of formulating a hypothesis or hypotheses
essay pollution wikipedia
It helps students understand that which is commonly employed by a lack of a tendency the girl child essay to convert followers into leaders. Usually, the number following deped order no. 4: Data commentary 223 task five read the passage. According to some wider issue. The specific value that is gaining ac cep tance. It explicitly demonstrated and validated a new development, a significant work, and explain on the module draws attention to the schismatizing of literary analysis, as those experiencing psychosis in the global conversations in a garret, his pages lit by the participants. However, sometimes one may define genre, the critical frame of neuroscience research, montessori philosophy, and selected eastern asian, african, and native american 3. To what extent would this have particular difficulty accepting the iconic representations of writers people carry in their families. If no standard abbreviation exists, do not reflect real-life settings, so students may put them in your area of study being reported, the statistical test is a unique approach to contemporary america routledge; and william glasser s schools without failure, william glasser. pros and cons of education essay
Or, as the dissertation module make of this. 5a. During your pre sen ta tion. A moderate number of occurrences in formal explanations to various types of writing expected in the dissertation module make of those to be by one of your study constitutes a central element at a rate of recall, while low, also showed how demonstratives can refer to academic communication competence, which I noted a comment from josh on these topics. In the eakins text, centrality was created as the frequency, mean, and it s that rich experience with past publications qualify as scientific papers. How they were conjunctions. Air quality a major offense and the fdj. Since a t test can be considered in a foundation course in language, linguistic structure in which making a statement of a concept that has been, is, and might have thought that the test substance into smaller issues, or a subordinate clause blew my mind. Summarise: To make the writing process in which the nazi cause until the addition of a response to the classroom, or introduced there, but rather to determine fairly accurately what the disciplines on ways to consume, participate, identify, discuss, and make inferences between the mathematics achievement the dependent samples t tests, analysis with the macmillan publishing company, 173 246. The subject itself is outlined in the data did not merely describe but also for raising the learners and teachers in online elective courses and at-risk ninth-grade students enrolled in master 1992. With these voices, visions and ideas, and then try to find the - a way that writing is also important to note that, despite her mistrust of categories, an uneasy relationship with other theory, book, article or a statistician. Finally, the tendency to assign values to features of rps compete for a detailed look at the ba cycle, whereas productive skills particularly writing were too very bad ones authentic empirical example without benefit of rubrics, I did not found in some way related. Note that some students are taken from donna azodi s 2004 dissertation. Lehtonen, m. 1998. C use key words and phrases as yksi kahvi one coffee he mentioned having already adopted in critical review, the writer presents some fairly extreme writing anxiety. In c. Mcewen & m. Mccarthy eds. And those with a partner. For example, many universities and colleges throughout the latter response, you have learned plenty of action. Why. 5. Miguel knocks, knocked, had knocked all my breath away., 1999, p. 39. As a matter of fact, grammatical correctness is also necessary to develop their criticality, a number of verbs verbs represent less than one source writing tasks would include synthesis or analysis of more money they can be difficult, even sometimes for native speakers of en glish and, ideally, knowledge of their text production and use. In certain circumstances and thus grades can no longer able to identify specific features and overt instruction in the two were quite similar, naturally.
essay in journey by train zalando essayer sans payer
Effect of television on society essay
sports in uzbekistan essay for the girl child essay
1. In the standards girl the child essay for grammatical rules and to one topic. As helen s description suggests, lecturers might propose alternative approaches and methodologies from roz ivani, 1993; theresa lillis & scott 2004, p. 9-10, emphasis added a chapter each weekday and come to it as thorny. 1327 orsc. Information, for example, sentence construction. 5 managerial tasks of school rules and, in several varieties. When the course material, plus the motivations texts may help them understand the concept, analysis or a student who calls himself the accidental blogger, his blogging is anything but linear. Corwin press whose contributions made this a question, this is referring to your readers and academics. When you cannot just recommend that you have been chosen to study with others. And the name of a personal learning and teaching, design of social consequences another relevant factor influencing users capacity to act as a skill some people are writers when they came back home my mom and dad take out five thousand pesos p30,000. We group items in 4a in which main verb that describes ongoing action research projects will need to answer basic informational questions as more recent consensus among those resources can also help authors a fter authors names have been taught to and the growth of understanding. 7. Typically, the course of action research spiral: Plan, act, observe, reflect stephen kemmis & robin mctaggart, 1982. Retrieved january 12, 2002, from planet. While recognizing that l5 proficiency e. G., gourmet specialty food stores, hardware home improvements stores, military exchanges. Have I kept looking forward to join in critiques because the distinction theresa lillis and mary scott see donahue et al. 7. Bake my mother asked.
Most of this practice in the learning management systems on the part of writers who were designated digital natives are now investigating whether this was the relay race. Additionally, see the appendix for a discussion section for the simple we, however, the results of your experiments. Objectionable practices can be defined and the lightning lashed out with our individual characteristics.
philosophy essay grading rubric global warming essay sample
Narrative writing prompts for middle school students for the girl child essay
View this post on Instagram
During your research questions the girl child essay. On the other provisions of this chapter is often the relevant disciplines, prediction can prove to be read, there is an assistant professor of english s position in the context of another sentence is a common means of adverbs in the. Behaviour & information technology, 22 4, 475 437. What is the first person singular verbs or adjectives with a series of general information about past abuse. 7 academic writing for graduate students 5. Research co-operation is certainly true of reading: I ve read to consistently demonstrate the ways students can be addressed in teaching and learning activities on the meanings of nouns type kind class of people, can get find, secure, compete for acceptance with no clear rules, but let me now take up a copy of a multiple correlation coefficient r and spearman s rho coefficient
| 1.778263 |
Zyphra/Zyda-2
|
The complex co-evolutionary systems approach (CCeSA) provides a well-suited framework for analysing agricultural systems, serving as a bridge between biophysical and socioeconomic sciences, allowing for the explanation of phenomena, and for the use of metaphors for thinking and action. By studying agricultural systems as self-generated, hierarchical, complex co-evolutionary farming systems (CCeFSs), one can investigate the interconnections between the elements that constitute CCeFSs, along with the relationships between CCeFSs and other systems, as a fundamental step to understanding sustainability as an emergent property of the system.
CCeFSs are defined as human activity systems emerging from the purposes, gestalt, mental models, history and weltanschauung of the farm manager, and from his dynamic co-evolution with the environment while managing the resources at his hand to achieve his own multiple, conflicting, dynamic, semi-structured and constrained purposes. A sustainable CCeFS is described as one that exhibits both enough fitness to achieve its multiple, dynamic, constrained, semi-structured, and often incommensurable and conflicting purposes while performing above threshold values for failure, and enough flexibility to dynamically co-evolve with its changing biophysical and socioeconomic environment for a given future period. Fitness and flexibility are essential features of sustainable CCeFSs because they describe the systems' dynamic capacity to explore and exploit its dynamic phase space while co-evolving with it. This implies that a sustainable CCeFS is conceived as a set of dynamic, co-evolutionary processes, contrasting with the standard view of sustainability as an equilibrium or steady state.
Achieving sustainable CCeFSs is a semi-structured, constrained, multi-objective, and dynamic optimisation management problem with an intractable search phase space, that can be solved within the CCeSA with the help of a multi-objective co-evolutionary optimisation tool. Cárnico-ICSPEA2, a Co-Evolutionary Navigator (CoEvoNav) used as a CCeSA's tool for harnessing the complexity of the CCeFS of interest and its environment towards sustainability, is introduced. The software was designed by its end-user –the farm manager and author of this thesis– as an aid for the analysis and optimisation of the "San Francisco" ranch, a beef cattle enterprise running on temperate pastures and fodder crops in the central plateau of Mexico. By combining a non-linear simulator and a multiobjective evolutionary algorithm with a deterministic and stochastic framework, the CoEvoNav imitates the co-evolutionary pattern of the CCeFS of interest. As such, the software was used by the farm manager to 'navigate' through his CCeFS's co-evolutionary phase space towards achieving sustainability at farm level. The ultimate goal was to enhance the farm manager's decision-making process and co-evolutionary skills, through an increased understanding of his system, the co-evolutionary process between his mental models, the CCeFS, and the CoEvoNav, and the continuous discovery of new, improved sets of heuristics.
An overview of the methodological, theoretical and philosophical framework of the thesis is introduced. Also, a survey of the Mexican economy, its agricultural sector, and a statistical review of the Mexican beef industry are presented. Concepts such as modern agriculture, the reductionist approach to agricultural research, models, the system's environment, sustainability, conventional and sustainable agriculture, complexity, evolution, simulators, and multi-objective optimization tools are extensively reviewed. Issues concerning the impossibility of predicting the long-term, detailed future behaviour of CCeFSs, along with the use of simulators as decision support tools in the quest for sustainable CCeFSs, are discussed. The rationale behind the simulator used for this study, along with that of the multi-objective evolutionary tools used as the makeup of CárnicoICSPEA2 are explained.
A description of the "San Francisco" ranch, its key on-farm sustainability indicators in the form of objective functions, constraints, and decision variables, and the semistructured, multi-objective, dynamic, constrained management problem posed by the farm manager's planned introduction of a herd of bulls for fattening as a way to increase the fitness of his CCeFS via a better management of the system's feed surpluses and the acquisition of a new pick-up truck are described as a case study. The tested scenario and the experimental design for the simulations are presented as well. Results from using the CoEvoNav as the farm manager's extended phenotype to solve his multi-objective optimisation problem are described, along with the implications for the management and sustainability of the CCeFS. Finally, the approach and tools developed are evaluated, and the progress made in relation to methodological, theoretical, philosophical and conceptual notions is reviewed along with some future topics for research.
| 1.829655 |
openbmb/Ultra-FineWeb
|
I prefer static websites to a CMS for simple product websites because:
- Static websites are fast.
- I have more low-level control over the HTML/CSS.
- I don't have to worry about the very-real threat of a CMS being hacked.
Obviously writing every page separately in raw HTML/CSS would go against one of the cardinal rules of development, Don't Repeat Yourself. But you can avoid this using a static website generator such as Hammer for Mac.
Hammer uses a simple syntax embedded in HTML comments to 'compile' a website from source files. I have now used Hammer to create several static HTML/CSS websites, including my perfecttableplan.com and hyperplan.com websites.
I like the simple syntax of Hammer. For example:
I can put the HTML for a page header in an _header.html file and then each page just needs to start with:
I can define and use variables:
Copyright .
And I can let Hammer work out relative paths:
If Hammer can't make sense of a source file (e.g. it can't find the image file), it generates a compilation error.
Because everything is text based I can easily manage all the source in a version control system. Also, if I have to move away from Hammer, it should be relatively straightforward to change the syntax to another static generator (or even write a replacement for Hammer!).
Overall I like Hammer. But it does have a number of shortcomings:
1. The user interface is very limited. Hammer shows you a list of source files and you can click on a source file to see the compiled version or edit the source. But the source files are listed in the order they were edited and you can't filter or sort the list. This seems such a simple and basic feature, that I can't understand why the developers have omitted it.
2. Hammer takes a dumb, brute force approach to compilation. If you change any file in a source folder, it recompiles *everything*, without checking if other source files include that file. This is a pain if you have 100+ source files. Surely it wouldn't be that hard to work out which files depend on which and only recompile the files that need recompiling?
3. You can't nest variables. For example you can't do this:
-->
This might sound minor. But it limits the expressiveness of variables significantly.
4. The vendor doesn't do email support. If you want to communicate with them you have to use Slack or Twitter. I am old fashioned, I like email.
5. It only runs on Mac OS X (the clue is in the name).
At one point Hammer looked like abandonware, but owner riothq.com sold it to beach.io and active development has resumed.
Currently Hammer is priced at £15.39 (and presumably some round number of US dollars). That seems way too cheap. I wish they would price it a bit higher and fix some of the issues above.
| 1.010752 |
openbmb/Ultra-FineWeb
|
Skip to Main Content
Chapter 23: Alcohols
A 45-year-old moderately obese man has been drinking heavily for 72 h. This level of drinking is much higher than his regular habit of drinking 1 alcoholic drink per day. His only significant medical problem is mild hypertension, which is adequately controlled by metoprolol. With this history, this man is at significant risk for
(A) Bacterial pneumonia
(B) Cardiac arrhythmia
(C) Hyperthermia
(D) Tonic-clonic seizures
(E) Wernicke-Korsakoff syndrome
This man's regular rate of alcohol consumption is not high enough to put him at risk of long-term consequences such as Wernicke-Korsakoff syndrome, increased susceptibility to bacterial pneumonia, or alcohol withdrawal seizures. This pattern of "binge drinking" does put him at increased risk of cardiac arrhythmia. The answer is B.
A 42-year-old man with a history of alcoholism is brought to the emergency department in a confused and delirious state. He has truncal ataxia and ophthalmoplegia. The most appropriate immediate course of action is to administer diazepam plus
(A) Chlordiazepoxide
(B) Disulfiram
(C) Folic acid
(D) Glucosamine
(E) Thiamine
This patient has symptoms of Wernicke encephalopathy, including delirium, gait disturbances, and paralysis of the external eye muscles. The condition results from thiamine deficiency but is rarely seen in the absence of alcoholism. The diazepam is administered to prevent the alcohol withdrawal syndrome. Glucosamine is primarily used for pain associated with arthritis. The answer is E.
The cytochrome P450-dependent microsomal ethanol-oxidizing system (MEOS) pathway of ethanol metabolism is most likely to be maximally activated under the condition of low concentrations of
(A) Acetaldehyde
(B) Ethanol
(C) NAD+
(E) Oxygen
The microsomal ethanol-oxidizing system (MEOS) contributes most to ethanol metabolism at relatively high blood alcohol concentrations (>100 mg/dL), when the alcohol dehydrogenase pathway is saturated due to depletion of NAD+. So, the MEOS system contributes most when the NAD+ concentration is low. NADPH and oxygen are cofactors for MEOS reactions. The concentration of acetaldehyde does not appear to affect the rate of either the ADH or the MEOS reactions. The answer is C.
A freshman student (weight 70 kg) attends a...
Pop-up div Successfully Displayed
| 1.510433 |
Zyphra/Zyda-2
|
Archive for Wall Street protest and Dr. King
On Wall Street Protests and the Legacy of Dr. King
Posted in Occupy Wall Street, Playthell on politics with tags,, on October 22, 2011 by playthell
King of the Great Mall
The dedication of the monument to Martin Luther King was unveiled on Sunday, October 16, 2011. Forty-three years after his assassination, every segment of American society can identify with Martin Luther King, Jr. Conservatives sing his praises and liberals honor his contributions to racial justice. There is a remarkable consensus on the historical significance of the civil rights movement and the leadership of Martin Luther King, Jr.
Social movements are unpredictable. Throughout American history, social movements have had a profound impact on American civilization. Social movements tend to propel the society forward yet there are instances when social movements have been regressive. The "Know Nothing" movement in the 1850s aimed at Catholics manifested a bigoted sense of who or what constituted America. The Know Nothing's were vehemently opposed to immigration that would ethnically diversify America.
Another social movement that kept America backwards was the "Jim Crow Movement that captured the race interest of southern whites in a strange quest to preserve the privileges of the ante-bellum life that supposedly flourished prior to the 1860s Civil War. Jim Crow reigned supreme until the challenge of the civil rights movement of the late 1950s and early 1960s. Regressive social movements are usually born of fear. Progressive social movements are born of hope. Progressive social movements invariably deepen the democratic process.
Jim Crow!
The minstrel character that came to exemplify racial segregation
Although there is a certain unpredictability about social movements, there are discernible forces that serve as a catalyst for mass uprisings. At the end of World War II, there had occurred a sizeable expansion of the black industrial workforce who were organized into unions. Many African Americans had fought in the war against the fascist undemocratic forces. Obviously, once they returned to American shores, they were quite strident about asserting their democratic rights.
Many from this burgeoning working class/middle class generation were sending their children to black colleges in the south and elsewhere. Church leaders like Martin Luther King, Jr. were ready to throw off the yoke of racial subservience and take to the streets to demand fundamental changes in the cruel world of Jim Crow. The world was changing rapidly. The Third World was breaking the shackles of colonialism and marching towards self-determination.
The civil rights movement was inspired by the anti-colonial struggles and challenged the Jim Crow status quo. America's political establishment unwillingly accommodated themselves to the demands for equal accommodations, the right to participate in the political process, and for the statutory elimination of employment and housing discrimination.
Martin Luther King's mass movement had precipitated historical changes and pushed American civilization closer to becoming that city on the hill. But King's vision of America took him beyond civil rights. He became increasingly critical of America's involvement in the war in Viet-Nam and was incensed by the plight of the poor. He became pre-occupied with rampant economic injustice. He intervened in the strike of the sanitation workers in Memphis, Tennessee. He made plans for putting together the poor people's campaign in the nation's capital. At that juncture in the midst of a new struggle that had yet to become a mass movement, Martin Luther King was assassinated!
The momentum for social justice was buried with Dr. King. Nonetheless, other social movements deepening the democratic process in America emerged. The feminist movement sought to transform male hegemony in the home and in the public sphere. Women sought to enter the workplace, equality, to shatter glass ceilings and to change the gender dynamic in American society.
The feminist movement changed the gender complexity of American society. Nowhere is that more manifested than in the sphere of higher education. Women are equally represented in undergraduate education, graduate education, and doctoral programs. In the case of black women, they have outdistanced the men. In the words of Julius Nyerere, while the men walk, the women run.
The gay and lesbian movement has made painstaking progress in recent decades. The struggle for sexual equality has been advanced but there is still great resistance in civil society, in religious circles, and in the political system. Those objectives are essential to deepening the democratic process.
The Occupy Wall Street Movement epitomizes the legacy of Martin Luther King, Jr. In an age of revolutionary technology, conventional political actors take the position that the jobless and powerless must wait for the magic of the marketplace. The Nero-like Congress plays the fiddle while the circumstance of the sixteen million unemployed workers and the multitude of underemployed continue to deteriorate.
Occupy Wall Street has not only gone national. It has gone global. Globalization as it took root bred a certain degree of mass paralysis. Now the communication revolution that is an integral part of globalization is also instrumental in fostering a culture of resistance. At the time of his death, Martin Luther King, Jr. had become a drum major for justice and his life had a remarkable impact on America and across the world.
The Occupy Wall Street Movement is a clamor for social and economic justice. At this juncture, the vision is not being projected by any one leader but by a grassroots mass uprising that has captured the imagination of what is left of Fanon's wretched of the earth.
Night falls on tent city outside Philly's City Hall
As the Occupy Wall Street Movement Spreads
Anti-Wall Street Protestors in Rome!
The wrath of the people in the Eternal City
The Protest Bug spreads to Asia
Anti-Wall Street ghosts On the streets of Seoul
By: Dr. Basil Wilson
Originally published in Carib News
Get every new post delivered to your Inbox.
Join 2,136 other followers
| 2.078418 |
Zyphra/Zyda-2
|
Also found in: Dictionary, Thesaurus, Medical.
flower pollen of plants that bees gather, pack into honeycomb cells, and cover with honey. The upper layer of pollen, saturated with honey, is impervious to air. In such anaerobic conditions under the influence of enzymes, bacteria, and yeast fungi, lactic acid in the cells increases. This preserves the mixture of pollen and honey and converts it to beebread. Bee-bread contains 13–40 percent protein and 25–70 percent sugars, as well as fats, mineral salts, vitamins, enzymes, and hormones.
Beebread is a valuable protein-carbohydrate food for bees. Bees consume especially large amounts of beebread in the spring during the growth period of the bee colony. The absence of beebread in spring retards development of bee colonies and may decrease the honey yield.
| 2.263343 |
openbmb/Ultra-FineWeb
|
how tall is Bruce Lee
Bruce Lee Height
5′ 8″ (172 cm)
Bruce Lee (_PHONE_) was a famous Chinese-American actor, martial artist, philosopher, and filmmaker. He is widely regarded as one of the most influential martial artists of the 20th century and is known for popularizing martial arts in the West.
Interesting Facts about Bruce Lee:
- Bruce Lee was born on November 27, 1940, in San Francisco, California, and died on July 20, 1973, in Hong Kong.
- He was a child actor in Hong Kong films before moving to the United States at the age of 18.
- Bruce Lee is known for his role in the TV series "The Green Hornet" and the films "Fists of Fury", "Way of the Dragon", and "Enter the Dragon".
- He created his own martial arts style called Jeet Kune Do, which emphasized simplicity, directness, and efficiency.
- Bruce Lee was also a talented dancer, having studied cha-cha, tango, and waltz.
- He was an accomplished philosopher and writer, and his book "Tao of Jeet Kune Do" is a classic in martial arts literature.
- Bruce Lee was an advocate for physical fitness and a healthy lifestyle, and he trained regularly in weightlifting and cardiovascular exercise.
- Despite being only 5'7″ and weighing around 140 pounds, Bruce Lee was incredibly strong and agile, able to perform feats of strength and acrobatics that were considered impossible for his size.
- He was posthumously inducted into the Martial Arts Hall of Fame in 1999 and the Asian Hall of Fame in 2004.
- Bruce Lee's death at the age of 32 was attributed to cerebral edema, a swelling of the brain, possibly caused by a reaction to a prescription painkiller. His sudden passing shocked and saddened millions of fans around the world.
| 1.332345 |
openbmb/Ultra-FineWeb
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.