content
stringlengths 190
75.1k
| score
stringlengths 1
6
| source
stringclasses 1
value | Column 4
stringlengths 33
205
⌀ |
|---|---|---|---|
How Composite Veneers are made
Dental composite veneers are made using the same type of materials that are used for cosmetic bonding and for many white fillings. Composite material incorporates a hard filler as small particles in a resin matrix in order to achieve an overall soft, malleable material that can be shaped as required and then set hard by means of a powerful light source that polymerizes the resin. Light curing is generally preferred to chemical, because the material comes ready formed and thus mixing two pastes is not necessary, and not ideal since it can introduce air and subsequent porosity in the restoration. Light cured material as one paste also allows for time to properly shape the composite material and then the ability to set it quickly on command.
Composite fillings are composed of an organic polymer resin called bisphenol-A-glycidyl methacrylate (BIS-GMA), and inorganic particles such as quartz, borosilicate glass, and lithium aluminium silicate. This type of material is tooth coloured and available in a range of shades to match the diverse colours of teeth and is able to be blended so that it becomes indistinguishable from natural tooth substance. Composite also adheres well to the surface of teeth when applied using an acid etch technique, and this means it can be used in lots of ways in building up teeth without having to remove tooth substance, to form onlays, and reshape teeth, as well as for veneers.
The etching of tooth enamel with a 30% orthophosphoric acid gel is a well-established technique to produce a slightly roughened tooth surface which will form a strong physical bond with a low viscosity resin, which then in turn bonds chemically to subsequent layers of more viscous composite applied incrementally. In this way a veneer can be constructed to cover unwanted marks or discolourations on a tooth in a relatively short time and in a completely painless way. Ideally with veneers the overall contour doesn’t want to be too obvious or bulky so the layer of composite needs to be kept thin.
Composite veneers are most often provided directly by your dentist at a single visit where the composite is applied to your tooth surface and then polished to create a smooth, glossy finish. Some time and patience is required to get a good result with composite veneers since it is a precise and exacting technique. A dentist also requires some artistic flair ideally, plus a good working knowledge of the composite material’s properties and how to mix various shades of colour to get a lifelike appearance.
Occasionally composite can be used to create veneers in the dental laboratory and these are then fitted by your dentist at a second visit using a similar bonding technique with low-viscosity light cured resins. This can produce a better result because the veneers made in the laboratory as opposed to directly in the mouth can be made harder by using a more powerful polymerizing light and/or heat to ensure maximum strength, and then a surface glaze can be applied to give a shinier appearance.
Composite resin is a very versatile material and in skilled hands can be used to build up a diminutive front tooth that hasn’t developed properly, build out a tooth that is set slightly in from the others, cover intrinsic spots or marks on a tooth, or even close up a space between front teeth by extending composite filing out from the sides of the teeth either side of the gap.
Composite is not as hard wearing as porcelain, even when laboratory hardened, and so you can expect that the life of composite veneers might not exceed five years or so before they become discoloured or worn and require replacing.
Some problems confronting the dentist such as severely eroded and abraded teeth from excessive consumption of acidic drinks or bulimia were at one time very difficult to deal with, but the bonding of resin composite can often be used to build up the height of short sensitive teeth, and restore their appearance by means of veneers on the front teeth, at least on a temporary basis until it is deemed appropriate perhaps to provide more permanent restorations
The composition of composites has changed over the years to provide harder, denser types that last better in terms of strength and resistance to staining, and it is possible that further improvements will be made. At the present time there are differences between different brands in their composition which can affect their clinical performance. A higher concentration of filler, achievable with smaller particles, gives greater strength and wear resistance but may affect the optical properties so there is some trade-off in terms of getting a good balance. Smaller particles also allow for better polishing of the surface and less likelihood of the resin content being so easily worn away leaving hard granules standing proud and a consequent roughened surface.
It is generally accepted that microfill composites have the most ideal aesthetic qualities, due to their ability to be polished to give a smooth, light-reflecting surface, and so are ideal for the purpose of making composite veneers.
- Is Tooth Bonding or composite veneers are Right For Me?
- Composite Veneers as a Sensible Cosmetic Dental Solution
To find out more about composite veneers please call 6297 1303 to make appointment with our cosmetic dentists in Queanbeyan.
|
0.7106
|
FineWeb
|
```
[
"Composite Veneers",
"Dental Composite Materials",
"Veneer Application Process"
]
```
|
Step 1: Lie down on your back, with your knees bent and arms out to your sides. Place your right foot on top of a yoga block [or a stack of books, if you don't have access to equipment] and your left foot straight up in the air. Contract your abdominals to flatten your low back into the floor.
Step 2: While maintaining this abdominal contraction, exhale and push through the right foot to bring your hips up off of the floor. As you do this, contract your glutes.
Step 3: Lower your hips back down toward the ground, while inhaling and maintaining control using the right hip.
Do 10 reps of this exercise on each leg for 1 to 3 sets.
To regress this exercise, simply omit the elevation with the yoga block, and perform the exercise with your foot flat on the floor.
|
0.6422
|
FineWeb
|
```json
[
"Exercise Instructions",
"Proper Form and Technique",
"Modifying the Exercise"
]
```
|
4 CPU must do the following things : Fetch instruction--- Read instruction from memoryInterpret instruction--- The instruction is decodedFetch data--- Read data from memory or an I/O moduleProcess data--- Perform arithmetic or logical operationWrite data--- Write data to memory or an I/O module
7 Register Organization Carlos garrido & jorge montenegro
8 Registers CPU must have some working space (temporary storage) Called registersNumber and function vary between processor designsOne of the major design decisionsTop level of memory arrangement
9 User Visible Registers General PurposeDataAddressCondition Codes
10 How Many GP Registers? Between 8 - 32 Fewer = more memory references More does not reduce memory references and takes up processor real estateSee also RISCOne cycle execution timePipeliningLarge number of registers
11 How big? Large enough to hold full address Large enough to hold full wordOften possible to combine two data registersC programmingdouble int a;long int a;
12 Condition Code Registers ADVANTAGES:Because condition codes are set by normal arithmetic and data movement instructionsConditional instructions, such as BRANCH are simplified relative to composite instructions, such as TEST AND BRANCH.Condition codes facilitate multi-way branches. For example, a TEST instruction can be followed by two branches, one on less than or equal to zero and one on greater than zero.
13 Condition Code Registers DISADVANTAGES:Condition codes add complexity, both to the hardware and software. Condition code bits are often modified in different ways by different instructions.Condition codes are irregular, they are typically not part of the main data path, so they require extra hardware connections.Often condition code machines must add special non-condition-code instructions for special situations anyway.In a pipelined implementation, condition codes require special synchronization to avoid conflicts.
14 Control and status registers Program Counter (PC): Contains the address of an instruction to be fetched.Instruction Decoding Register (IR): Contains the instruction most recently fetched.Memory Address Register (MAR): Contains the address of a location in memoryMemory Buffer Register (MBR): Contains a word of data to be written to memory or the most recently read.
15 Program status word (PSW) Sign: Contains the sign bit of the result of the last arithmetic operation.Zero: Set when the register is “0”Carry: Set if an operation resulted in a carry addition or subtraction of a higher order bitEqual: Set if a logical compare result is equality.Overflow: Used to indicated arithmetic overflow.Interrupt enable/disable: Used to enable or disable interrupts.
16 Supervisor ModeSupervisor: Indicates whether the processor is executing in supervisor mode or user modePrivilege instructionAddress spaceMemory managementProtection domain or Protection RingRingKernel
19 Section 12.3 Instruction Cycle An instruction cycle (sometimes called fetch-and- execute cycle, fetch-decode- execute cycle, or FDX) is the basic operation cycle of a computer.It is the process by which a computer retrieves a program instruction from its memory, determines what actions the instruction requires, and carries out those actions.This cycle is repeated continuously by the central processing unit (CPU), from bootup to when the computer is shut down.
20 The circuits used in the CPU during the cycle are: Program Counter (PC) –Memory Address Register (MAR) -Memory Data Register (MDR) -Instruction register (IR) –Control Unit (CU) -Arithmetic logic unit (ALU) -There are typically four stages of an instruction cycle that the CPU carries out:Fetch the instruction from memory.2) "Decode" the instruction.3) "Read the effective address" from memory if the instruction has an indirect address.4) "Execute" the instruction.
21 Fetch Indirect Cycle Interrupt Execute The instruction cycle is the time in which a single instruction is fetched from memory, decoded, and executed. THE FOUR SUB-CYCLES:FetchReads the next instruction from memory into the processor.Indirect CycleMay require memory access to fetch operands, therefore more memory accesses.InterruptSave current instruction and service the interrupt.ExecuteInterpret the opcode and perform the indicated operation.
22 There are six fundamental phases of the instruction cycle: 1.) fetch instruction (aka pre-fetch)2.) decode instruction3.) evaluate address (address generation)4.) fetch operands (read memory data)5.) execute (ALU access)6.) store result (writeback memory data)
23 DECODE EVALUATE AND FETCH Decoding the instruction?The decoder interprets what?What is being fetched from memory?What decision is made next?Based on the decision what are the options?What if decision is a direct memory operation?What if decision is an indirect memory operation?
25 Instruction Cycle with and without Indirect Cycle…
26 Sample question:Given that the instruction cycle is the time in which a single instruction is fetched from memory, decoded, and executed: A microprocessor provides an instruction capable of moving a string of bytes from one area of memory to another. The fetching and initial decoding of the instruction takes 10 clock cycles.Thereafter, it takes 15 clock cycles to transfer each byte.The microprocessor is clocked at a rate of 10 GHz. Determine the length of the instruction cycle for the case of a string of 64 bytes. ANSWER: The length of a clock cycle is 0.1 ns. The length of the instruction cycle for this case is [10 + (15 × 64)] × 0.1 = 960 ns.
27 Another example: total number of cycles required To execute the SAL instruction: add A, B, C 1.) Fetch instruction (add) from memory address PC. 2.) Increment PC to address of next instruction. 3.) Decode the instruction and operands. 4.) Load the operands B and C from memory. 5.) Execute the add operation. 6.) Store the result into memory location A. Execution Time Suppose each memory access (fetch, load, store) requires 10 clock cycles and that the PC update, instruction decode, and execution each require 1 clock cycle. The total number of cycles to execute the add instruction is: = 43 cycles/instruction. A CPU running at 100 Mhz (100,000,000 cycles/sec) can execute add instructions at a rate of 100,000,000/43 = 2,325,581 instructions/sec, or ~2.3 Mips (million instructions/sec).
31 Data Flow: Execute Cycle The execute cycle:Takes many formsthe form depends on which of the various machine instructions is in the IR.This cycle may involvetransferring data among registersread or write from memoryI/Oinvocation of the ALU
32 Instruction PipelineAdrian Suarez & Diego Arias
33 Instruction Pipelining By separating an instruction cycle into stages, multiple instructions at different stages can be worked on at the same time. For example, Stage 2 of the current instruction can be overlapped with Stage 1 of the next instruction.
34 A Two-Stage PipelineAn instruction cycle can be divided into two stages:Fetch: get an op-code from main memory and put it in a registerExecute: decode an op-code and execute the instructionThe execute stage of the current instruction would overlap with the fetch stage of the next instruction.Assuming that fetch and execute use the same number of clock cycles, this would double the speed (in reality, execute takes longer).
36 A Six-Stage PipelineFetch instruction (FI): get op-code from memory and put it in a registerDecode instruction (DI): decode op-code and determine addressing modeCalculate operand (CO): get effective address of source operandsFetch operands (FO): get operands from memory and put them in registersExecute instruction (EI): execute instruction and write result to a registerWrite operand (WO): store the result in memoryThis pipeline is more typical of modern computers, especially RISC computers (e.g. MIPS, SPARC, and DLX).Each stage occupies about the same number of clock cycles.
38 Why not a 100-Stage Pipeline? If 1 instruction per cycle can be achieved with a 5-stage pipeline, adding more stages would only increase the number registers without increasing speed (it might actually make the computer less efficient). Overlapping of instructions requires additional logic to account for dependencies between instructions (i.e. a memory read after a memory write to the same location).
39 Pipeline HazardsResource hazards: when two instructions in the pipeline need to use the same resourceData hazards: when two instructions must be executed in sequence (i.e. a memory write followed by a memory read)Branch hazards: when a conditional branch occurs and the pipeline fetches the wrong instructions
40 Resource HazardsA resource hazard occurs when two stages in the pipeline need to use the same resource at the same time. For example, two stages need to read from main memory (assuming that the data hasn’t been cached) when an operand fetch is overlapped with an instruction fetch. In this case, the two stages must be executed in series rather than in parallel, and a delay must be introduced in the pipeline.
43 Data HazardsA data hazard occurs whenever data is fetched from a location before it contains the correct value. The “correct” value is whatever value it would contain if the instructions were executed in sequence. Whenever the fetch stage must access data that hasn’t yet been written, the pipeline must be delayed at the fetch stage.
44 Data HazardsADD EAX, EBX SUB ECX, EAX ; I3 ; I4
46 Pipeline Implementation A pipeline is implemented as a series of sequential circuits, with each stage taking its input from the output of the previous stage
47 DEALING WITH BRANCHESThe most difficult part in designing an instruction pipeline is assuring a steady flow of instructions to the initial stages of the pipeline. Several approaches have been taken for dealing with conditional branches.Multiple streamsPrefetch branch targetLoop bufferBranch predictionDelayed branch.
49 Multiple streamsA pipeline has disadvantages for a branch instruction because it must choose one of two instructions to fetch the next instruction and may take the wrong choice. One way of dealing with this is to allow the pipeline to fetch both instructions, making use of both streams.With multiple pipelines there are delays for accessing register and memory.Additional branch instructions may enter the pipeline before the original branch decision is resolved.
50 Prefetch branch target The target of the branch is prefetched when a conditional branch is recognized in addition to the instruction following the branch. The target is saved until execution, if a branch is taken that means that it has already been prefetched.
51 Loop bufferA loop buffer is high speed memory that works in sequence with the instruction fetch stage of the pipeline and it contains the most recently fetched instruction.Instructions fetched in sequence will be available without the usual memory access time.If a branch occurs to be ahead of the address of the branch instruction, the target will already be in the buffer.If the loop buffer is large enough to contain all the instruction in the loop , then the instructions will only have to be fetched once.
56 Delayed branchIt’s possible to improve the performance of a pipeline be rearranging instructions within a program, so that the instructions occurs later than actually desired. This branch will not take effect until after the execution of the following instruction.
57 Intel PipeliningThe Intel implements a five stage pipeline.FetchDecode stage 1Decode stage 2ExecuteWrite back
59 Questions 1 What’s the function of internal processing bus? 2 What’s the similarity between the internal structure as a whole and the internal structure of the CPU?3. What is an instruction cycle?4. What are the four sub cycles of an instruction cycle?5. Is the fetch or execute cycle the same for all CPU?6. What is the sequence of an interrupt cycle?7. How does pipelining increase processor speed?8. What are some pipeline hazards?9. Which computers use a 5-stage pipeline?10. What are the five ways to deal with conditional branches?11. What happens in the fetch cycle inside an Intel 80486?
60 ReferencesComputer Organization and Architecture, Designing for Performance, 8/E, Stallings, William Embedded System Design: A Unified Hardware/Software Approach, Vahid, Frank, and Givargis, Tony Wikipedia, “Instruction Cycle” CIS-77 Introduction to Computer Systems
|
0.9928
|
FineWeb
|
```json
[
"CPU Instruction Cycle",
"Pipeline Architecture",
"Instruction Pipelining"
]
```
|
Indications for FLAREX:
1–2 drops 4 times daily. May increase to 2 drops every 2hrs during the initial 24–48hrs. Reevaluate after 2 weeks if no improvement.
Fungal, mycobacterial, viral (except herpes zoster), or untreated bacterial infections.
Corneal or scleral thinning. Glaucoma. Monitor for secondary infections and intraocular pressure in prolonged use. Avoid abrupt cessation. May mask or exacerbate infections. Pregnancy. Nursing mothers.
Glaucoma with optic nerve damage, visual acuity and field defects, cataract formation, secondary ocular infection, perforation of the globe, delayed wound healing.
|
0.5952
|
FineWeb
|
```json
[
"Indications for FLAREX",
"Contraindications",
"Potential Side Effects"
]
```
|
The White House Vs. Radiation Science & Health
Experts at the US National Academies of Science settled a big question in 2005, and the president’s business friends don’t like the answer. Is there a dose of radiation is so low that it is harmless? (Ionizing radiation is the alpha and beta particles, and the neutron, gamma and X-rays given off by radioactive materials in medicine, the military, industry, and reactor operations.) The NAS published its answer in “Biological Effects of Ionizing Radiation-7” (BEIR VII), where it emphatically said “no.” As they had done many times before, the NAS reported that any radiation exposure, no matter how slight carries a risk of causing cancer or other illnesses.
The NAS panel that produced BEIR-VII “could not ignore the current body of scientific studies that are now recognizing harmful and hitherto unpredicted effects at very low doses of radiation,” said Cindy Folkers at Nuclear Information & Resource Service in Takoma Park, MD.
But like the handfull of scientists who stand against the 98% and say climate change is a hoax, there are a couple of nuclear-happy quacks who say radiation exposure is good for us. The President wants us to believe them. (Time magazine: “Trump Administration Moving to Weaken EPA Radiation Regulations”)
Like scientists in the tobacco industry who conned millions and even got company CEOs to lie to congress about their knowledge of cigarette hazards, some nuclear industry-sponsored researchers claim that low doses of radiation can act like inoculations. This “hormesis” theory was explicitly rejected by the NAS panel. Dr. Peter Crane, a former Nuclear Regulatory Commission Counsel told the New York Times in 2015, “[T]he National Academies of Science, along with the rest of mainstream scientific authority, regard hormesis as wholly without merit.” A separate study published in Radiation Research in 2005 and reported in the journal Science was said to be “the latest blow to the [hormesis] notion that there is a threshold of exposure to radiation below which there is no health threat (and there might even be a benefit).”
In 2002, Roger Clark, President of the International Commission on Radiological Protection (ICRP), warned that “Some people think that too much money is being spent to achieve low levels of residual contamination.” They want, “a threshold in the dose-response relationship in order to reduce expenditure.”
As Science reported in 1999, “Billions of dollars are at stake. Stricter standards could increase the amount that agencies and industries must spend to clean up radioactive waste and protect workers.” In 2015, a landmark international study reported in The Lancet Hematology presented “strong evidence of positive associations between protracted low-dose radiation exposure and leukemia.” The journal Nature said of the study, “The finding … scuppers the popular idea that there might be a threshold dose below which radiation is harmless -- and provides scientists with some hard numbers to quantify the risks of everyday exposures.”
Now, as with climate change deniers and the tobacco hucksters, the fringe scientists are singing the de-regulation song that Trump’s industrialists wants to hear. If weakened radiation exposure limits are approved by Congress, the nuclear industry will save billions and its profit margins could grow as fast as tumors.
The public and the scientific community must fight back. There is no safe level of exposure to ionizing radiation. Even the smallest radiation exposures have cellular-level effects. The EPA website has said for decades: “Based on current scientific evidence, any exposure to radiation can be harmful (or can increase the risk of cancer)… In other words, it is assumed that no radiation exposure is completely risk free.” Every US government agency that regulates industrial releases or the medical uses of radiation makes the same warning -- based on BEIR-VII.
An often ignored fact is that internal contamination is far more dangerous than the same exposure outside the body. Dr. Chris Busby, the Scientific Secretary of the European Committee on Radiation Risk, compares the two this way: “Think of being external exposure like being warmed before a glowing fireplace. Internally, think of taking a hot coal from that fire and popping it into your mouth.”
When they are vented, dumped or leaked, radioactive materials contaminate soil, water, rainfall and food, and can then be inhaled or ingested. Some persist in the environment for centuries. Tritium (radioactive hydrogen) is released to the air and to bodies of water by reactors and nuclear wastes. It persists for 120 years. Dr. Gordon Edwards of the Canadian Coalition for Nuclear Responsibility wrote Sept. 30, “Tritium gets built right into the body’s organic molecules, including DNA molecules. Precisely because tritium is so difficult to control, and so easily dispersed into the air and the water around nuclear facilities, industry experts advocate for lax standards and permissive practices regarding release.”
Dozens of studies indicate that low doses of radiation given over long periods of time are far more dangerous than the industry and the government claim. Infant mortality rates and childhood leukemia rates both increase in areas downwind from operating reactors. By 1999, the government finally admitted that radiation exposures endured for years by nuclear weapons workers had made them sick, contrary to decades of repeated assurances that the doses were harmless. In 1989, the National Academy’s BEIR-Five quadrupled the risk of cancer from low-dose radiation exposures, and warned explicitly about “a much greater danger” of mental retardation among babies exposed in the womb to radiation.
We all have a responsibility to reject Trump’s nuclear bailout which would expose everyone to more radiation, and instead to demand a robust strengthening of radiation protection regulations particularly with respect to infants and children.
|
0.7699
|
FineWeb
|
["Radiation Science", "Health Risks", "Government Regulations"]
|
The development of modern musicianship skills necessary to enter and maintain a career in all facets of the popular and commercial music industry.
MUSI 246 extends performance and improvisational skills in the study of a repertoire taken from funk, Latin and contemporary blues music for those students intending to enter and maintain a career as freelance musicians. The aim at this level is to further develop the technical foundation on your instrument established in MUSI 146 and MUSI 156, and the paper is consequently designed to broaden your playing skills in a variety of musical contexts. The most important aim of this or any other performance paper is the question of your adaptation to teamwork, and this paper is designed to build your confidence in working in with a variety of musicians in several ensemble contexts. There is also an option to perform original material as an alternative to the range of set material.
|Paper title||Contemporary Music Performance 2|
|Teaching period||Full Year|
|Domestic Tuition Fees (NZD)||$2,118.30|
|International Tuition Fees (NZD)||$8,676.60|
- MUSI 101 and (MUSI 146 with a grade of at least C+)
- MUSI 245
- Limited to
- MusB, BPA
- (i) MUSI 156 must be passed with a grade of at least C+.
- Appropriate performance and sight-reading skills are necessary.
Enrolments for this paper require departmental permission.
View more information about departmental permission.
- More information link
- View more information on the Department of Music, Theatre and Performing Arts' website
- Teaching staff
- Paper Structure
This paper further advances performance abilities towards a professional level. Please contact the Department of Music, Theatre and Performing Arts' ([email protected]) office for a copy of the most recent paper profile.
- Teaching Arrangements
- Two hour lectures and workshops.
- Textbooks are not required for this paper.
- Graduate Attributes Emphasised
- Interdisciplinary perspective, Lifelong learning, Communication, Critical thinking,
Research, Self-motivation, Teamwork.
View more information about Otago's graduate attributes.
- Learning Outcomes
- The goals of the paper are
- To further develop a firm technical foundation on your instrument
- To develop appropriate presentation skills to perform the set repertoire
- To enable the critical evaluation of time-management skills in the context of independent practice with increasing competence and confidence
|
0.811
|
FineWeb
|
```
{
"topics": [
"Music Performance",
"Career Development in Music Industry",
"Musicianship Skills"
]
}
```
|
or a cloth badge so people would know they were Jewish and try to avoid them (Rogasky 12). The following literature reviews attempt to support this hypothesis. Although thousands of people agreed with anti-Semitism at the time he was the one who started to take his thoughts into actions. Explaining Journalists Trust in Public Institutions Across 20 Countries: Media Freedom, Corruption, and Ownership Matter Most. During this time period, Jews, gypsies, homosexuals, and bountiful of others forced by the Nazi regime to these concentration camps. In response, Dan tells her: Dont worry about. However, Auschwitz II dwarfed the total number of prisoners in any of the camps. While concentration camps were meant to work and starve prisoners to death, extermination camps, or death camps were built just for the purpose of killing large numbers of people quickly and efficiently. .
Essay paper on family dynamics, How to write a conclusion for a paper, Lined writing paper with picture space,
Research paper.Dennis Robinson English 102 MWF: 1-1:50 3/21/2015 Dean of Edinboro University Research Paper What should be done with Professor Smut? Life in the camps was horrible. . Hitler made life miserable paper for school for Jews. . Miranda Ruiz 5/16/11, the road to the creation of the Holocaust started with one man. This camp was the largest of its kind, but split into three camps. Those people might have even believed that it was completely and utterly wrong to have killed Christ. When the Jews were transferred by train, they were either taken to a concentration camp, extermination camp, labor camp, prisoner-of-war camp, or transit camp. . The children memorial was very sad because innocent of all ages were killed because they were Jewish. The World War Two was starting to slow down a little, and the soldiers were starting to ease up and help the prisoners as much as they could. .
|
0.7537
|
FineWeb
|
```
{
"topics": [
"The Holocaust",
"Concentration Camps",
"World War II"
]
}
```
|
An unforgettable wedding is what every girl is longing for because presumably you’ll have it only once in your life. The concept of “family” has a high value in the Chinese culture, and that’s probably why Chinese people are willing to spend fortunes of money on holding an extraordinary wedding. If you have a Chinese friend who is about to get married, you’ll highly likely be invited to attend their wedding as they would like you to witness this exciting moment. In this article let’s have a look at some special features of a modern Chinese wedding. What to expect at a Chinese wedding?
1. Expect a lavish meal
A modern Chinese wedding is usually held in a hotel or a restaurant. The bride and groom invite their friends and relatives to come for a big get-together. The number of guests varies from 100 to 500, and each table is served with immaculately prepared dishes. So, if you’re invited to attend a wedding in China, don’t miss your chance to try some high-quality traditional Chinese food.
2. Prepare a red envelop
In the Chinese culture, a red envelop contains a certain amount of money and people give it during Spring Festival or on special occasions such as weddings. Preparing such a monetary gift is a must for attending a Chinese wedding. If the bride or groom happens to be your colleague or just an ordinary friend, a red envelop with 500-600 RMB would be ideal. However, if this person is a close friend of yours, you have to make your red envelop look a bit thicker.
3. Write a short speech
If the bride or groom is a good friend of yours, you may need to prepare a short speech. The one, dedicated to them. You could be invited to come up to the stage and express your best wishes to the newlyweds. However, in addition to your wishes to the newlyweds, you have to prepare a speech that contains some basic information. About yourself and the relationship between you and the newlyweds.
4. Surprises await
Fun games or prize draws are often part of a modern Chinese wedding to spice it up a bit. Well, don’t be shy and join in the games as you might walk away with some fancy little things.
5. Stay till the end
A modern Chinese wedding usually lasts for 3-4 hours. It’d be good if you could stay till the end of the wedding. This is exactly what the newlyweds would like to see. However, in case you have to leave earlier due to some personal reasons, it’s customary to inform the newlyweds about this. Otherwise they would think that you came to the wedding purely because “someone invited you”.
Have you been to a Chinese wedding? Share your opinion in comments below – or tweet us at @thatsmandarin!
|
0.6605
|
FineWeb
|
["Chinese Wedding Traditions", "Attending a Chinese Wedding", "Chinese Wedding Etiquette"]
|
Cosplayer MissMina2 > Costume of Madoka Kaname from Madoka Magica
About this Costume
- Construction Details:
A separate bodice and skirt. The bodice zips under one of the sides. So the back can have the heart uninterrupted. Skirts are attached together, not including petti. Petticoat is a 7 layer petti, 9 if you include the two tutuy layers.
- Personal Thoughts:
- POOF AND RUFFLES
- Styling Notes
- 2 wigs! One long and a medium length that I cut all apart and turned into the pigtails.
Add a Comment
|
0.9487
|
FineWeb
|
["Costume Construction", "Cosplay Character", "Styling Details"]
|
The following blog post is written by Madelaine Frye. It is the fourth (be sure to catch up on week 1 , week 2 , week 3 and week 4 if you haven’t already!) in a series of 6 blogs she will be writing chronicling her experience as a Nutrition Instructor. Madelaine is teaching OFL as part of a Service Learning Class that has teamed up North Carolina State Students with the Inter Faith Food Shuttle’s OFL/Nutrition Program. Through this partnership the IFFS and NCSU hope to engage students in service learning and community nutrition while expanding the reach of its OFL program. Hello again! My name is Madelaine Frye and I am a senior Nutrition student at NC State. I have been reporting to you all on how our Side By Side classes at the Knightdale Head Start location have been progressing through our six-week healthy lifestyle adventure. Week five in the OFL Side by Side class sure was full of exciting activities, along with lots of cooking!
For week five we discussed the importance of exercising and how much fun it can be when you exercise as a family. Exercise can relieve stress, provide an overall feeling of well being, can help you achieve and maintain a healthy weight, and lower your risk for chronic diseases. Water is very important for our bodies because if we exercise often, we lose a lot of water and can become dehydrated. In class, we shared some tricks on how we can make water more fun to drink by adding fruit juice ice cubes, or slices of our favorite fruits to pitchers of water. Another healthy beverage that we made was a fruit smoothie. Everyone in the class got to pick their favorite fruits and blended them with ice and low-fat vanilla yogurt to make an amazing fruit smoothie! This is not only a great way to rehydrate yourself but can also be a fun and healthy snack packed with tons of fruit.
This week we also discussed the importance of drinking low-fat and non-fat milk products. The calcium found in low-fat dairy drinks is very important in the building of strong bones and other important body functions. It is important to drink low-fat and non-fat dairy because you can raise your blood cholesterol to unhealthy levels with saturated fats and trans-fatty acids that can be found in these and other sugary beverages. If you are lactose intolerant, items such as yogurt and hard cheeses can sometimes be easier to digest than milk. Other non-dairy foods like calcium-fortified juice can also help us get the calcium we need.
After learning so many amazing tips in class, it is always nice to sit down and enjoy a wonderful meal with your family that you made together. All of the families loved our turkey taco dinner that we created as a group from scratch. It was even tastier when combined with all of the fun and fruity drinks we had made during class. Why don’t you try this week’s recipes at your home?
serves 1, 1 smoothie per serving
- Fruit of your choice (bananas, strawberries, blueberries, pineapple, etc.)
- Liquid (juice, low-fat/non-fat milk, soy-milk, almond milk)
- Optional flavorings (Cinnamon, zest, honey, vanilla, coconut flakes)
- Thickener (ice, low-fat/non-fat yogurt, silken tofu)
- Place ½ - 1 cup of sliced or chopped of fresh or frozen fruit to the blender.
- Add ½ - 1 cup of liquid to the blender.
- Add up to ½ teaspoon of optional flavorings.
- Add up to ½ cup of thickener.
- Blend until thick and smooth.
- Use milk, tofu, or yogurt to create a creamier smoothie.
- If adding frozen fruit, use less or no ice.
- Make ice cubes out of juice instead of water to use in your smoothies.
- Freeze slices of fruits that are about to go bad and use them in smoothies.
serves 8, 2 tacos per serving
- 1 (15 ½ ounce) can pinto beans
- Non-stick cooking spray
- 1 pound ground turkey
- 1 cup tomato juice, no salt added
- 2 tablespoons tomato paste, no salt added
- 1 tablespoon chili powder
- 1 teaspoon garlic powder
- 1 teaspoon dried oregano
- ½ teaspoon salt
- ½ teaspoon ground black pepper
- 8 ounces low-fat cheddar cheese
- ¼ medium head of lettuce
- 2 large tomatoes
- 16 taco shells
- Drain and rinse pinto beans well, using a colander.
- Coat a large frying pan with non-stick cooking spray and brown turkey over medium-high heat.
- Measure and add pinto beans, tomato juice, tomato paste, chili powder, garlic powder, oregano, salt, and black pepper to the frying pan. Stir well, using a long-handled spoon.
- Reduce heat to medium and cook until thickened, about 20 minutes.
- Grate cheddar cheese.
- Rinse lettuce and tomatoes. Tear the lettuce into bite-sized pieces.
- Core and dice tomatoes.
- Place 2 tablespoons of the cooked meat mixture into each taco shell. Sprinkle with 1 tablespoon of grated cheese so that it melts into the meat.
- Measure and top each taco with 1 tablespoon shredded lettuce and 1 tablespoon diced tomatoes.
- Use any of your favorite sautéed vegetables, low-fat sour cream, hot sauce, or salsa to top the tacos.
- Substitute and type of cooked beans for the pinto beans.
- If tomatoes are not in season, use canned tomatoes without added salt.
- Try using whole-wheat tortillas in place of the taco shells, or serve over rice or corn bread.
|
0.5592
|
FineWeb
|
```
{
"topics": [
"Nutrition",
"Healthy Lifestyle",
"Exercise and Wellness"
]
}
```
|
The California Assessment of Student Performance and Progress (CAASPP) is the state academic testing program. CAASPP is intended to provide information to monitor student progress and ensure that all students leave high school ready for college and career. This year, CAASPP includes computer adaptive tests in English language arts and mathematics for grades 2 - 6 and science for grade 5 only.
To learn about the types of questions on the computer-based test, you and your child can view the practice test online at the California Department of Education (CDE) Smarter Balanced Practice Test webpage
About two months after testing, students will receive individual score reports. Student score reports will include an overall score, a description of the student’s achievement level for English–language arts and mathematics, and other information. It is important to note that these scores cannot be compared to scores that your child previously received on the CSTs because this test is based on the new Common Core State Standards and involves different types of test questions.
If you would like more information, please visit the Parent/Student tab of the CDE CAASPP webpage
. If you have any questions regarding your child’s participation, please contact Adrineh Sarkissian, Teacher Specialist at (818) 249-3187.
|
0.5803
|
FineWeb
|
```
[
"CAASPP Overview",
"Test Structure and Content",
"Student Score Reports"
]
```
|
The moon is a marvel. It pulls the tides and its phases help us track the passage of time. So let’s knit a cowl inspired by the moon. We can pretend each stitch is a tiny handcrafted crater. We’ll knit in the round, so the path of our stitches honors the moon’s orbit. This cowl is double-sided (half black and half white) so that when you wear it, you can reverse it just the right amount to match the current phase of the moon.
|
0.9921
|
FineWeb
|
["Moon Phases", "Knitting", "Cowl Design"]
|
Call for Papers
The Call for Papers is Now Open
Submissions involving case studies and student/registrar research projects are particularly encouraged in order for presenters to receive peer review from other brachytherapy specialists.
- Abstract submission closes Friday 1 December
- Abstract notification Friday 8 December
- The invitation to submit an abstract does not constitute an offer to pay travel, accommodation or registration costs associated with the meeting
- Presenters of accepted abstracts are required to register as a delegate and pay the relevant registration fee
- By submitting this abstract you grant the organisers permission to publish the abstract (and final paper) in hard copy and electronic form
- The organising committee’s decision on acceptance of proposals is final
- Presenters are expected to reserve the meeting dates in their diaries until they receive notification of submission outcomes
- Abstracts must be submitted via the online abstract submission portal
- An abstract must be no more than 400 words
- A brief biography of no more than 100 words is to be submitted with the abstract
- Use the following headings – Background and Purpose, Methods, Results, Conclusions, References (max of 2)
- Please include all authors and their affiliations, indicating which author will be presenting the paper
- Submissions which do not adhere to the above guidelines will be returned for revision
- Acknowledgement of receipt of all abstracts will be made by email
- Notification of abstract acceptance will be sent via email
- Please complete all author details requested in the online portal.
- The submitting author will be considered the principal point of contact for all communication regarding the abstract including acceptance notification.
Abstracts will be favoured at review if they incorporate original data of high quality and/or an analysis that extends existing knowledge.
In balancing the program the committee may require authors to present their work in an alternate format (eg as a poster rather than an oral presentation) particularly as limited spots are available for oral presentations.
Submit Your Abstract
Conference OfficeKey Conference Solutions Level 1, 120 Railway Avenue Ringwood East VIC 3135
Ph: +61 3 9870 2611
Fax: +61 3 9870 1723
|
0.8833
|
FineWeb
|
```json
[
"Call for Papers",
"Abstract Submission Guidelines",
"Conference Details"
]
```
|
|Touch the Sun|
In this activity, students design and build scientific instruments to study the Sun using inexpensive, everyday materials. Precision in construction and measurement are emphasized, as well as re-design to improve the quality of data. Activity theme areas include instrumentation, observation, and satellite engineering. The activities are aligned with National Science and Mathematic Education Standards.
Intended for grade levels:
Type of resource:
No specific technical requirements, just a browser required
Cost / Copyright:
Cost information is not known
Copyright and other restrictions information is unknown.
DLESE Catalog ID: NASA-ESERevSProd165
Resource contact / Creator / Publisher:
|
0.9998
|
FineWeb
|
["Scientific Instruments", "Satellite Engineering", "Solar Observation"]
|
Anthony Ferrara has written up a new post that looks beyond design patterns. He suggests that more emphasis should be put on learning proper methods for abstraction and communication between objects and structures.
Many people teach design patterns as a fundamental step to Object Oriented Programming. They are so universally seen as important that almost every single conference that I have been to has had at least one talk about them. They are quite often used as interview questions to test a candidate's OOP knowledge. However, just like inheritance, they are not needed for OOP. And just like inheritance, they are a distraction rather than a foundation. Instead of focusing on patterns, I suggest focusing on learning about abstraction and communication.
He briefly covers the three types of patterns most people are introduced to - creational, structural and behavioral - and his suggestions of other patterns that answer more of the "what the problem is" question:
- Shim patterns (Flyweight, Iterator, etc)
- Compositional patterns (Adapter, Builder, Facade, etc)
- Decompositional patterns (Bridge, Command, Mediator, etc)
He spends some time later in the post looking a bit more closely at four specific patterns, Adapter, Bridge, Facade and Proxy. He points out that they (essentially) do the same kind of thing and boils it down to a more refined set of implementation patterns and the problems they help solve.
|
0.8868
|
FineWeb
|
["Object Oriented Programming", "Design Patterns", "Abstraction and Communication"]
|
Although the Munitions of War Act of 1915 gave the government a high degree of control over labour, periodic industrial conflict continued. Following the formation of the coalition government in 1916, David Lloyd George included Labour's Arthur Henderson in the War Cabinet. He caused more tension when he appointed John Hodge and George Barnes, both with strong union affiliation, as Ministers of Labour and Pensions.
In 1917, as strikes spread, a Commission of Enquiry into Industrial Unrest was appointed. It concluded that the high price of food was a major source of discontent. The government introduced measures to reduce prices. The coalition government of 1918 was faced with the problem of re-establishing peacetime industrial relations. Clauses of the Munitions of War Act were cancelled and rates of wages agreed on for a limited period.
The Industrial Courts Act of 1919 established the Industrial Court for the settlement of disputes. Following the recommendations of the Whitley Committee on the Relations of Employers and Employed in 1917, Whitley Councils were established in individual industries for the negotiation of overall wages, conditions and problems of management.
Thanks to low unemployment, the post-war boom experienced calmer industrial relations. However, in January 1919 the Miners’ Federation demanded wage increases, a six-hour day and nationalisation of the mines. Lloyd George initiated the Sankey Commission, which included several miners' leaders, to consider wages and ownership. The Committee worked out a compromise on wages and hours, and recommended state ownership of the mines - but the government refused to accept nationalisation.
In September 1919, attempts to reduce wages in the railway industry by Sir Auckland Geddes, President of the Board of Trade, resulted in a national rail strike. However, within a week and in compliance with other unions, the Negotiating Committee of the Transport Workers made a settlement that maintained wage levels for a further year.
In the summer of 1920 the economic boom collapsed. As prices and unemployment rose further, industrial strife became more likely. The unions planned a revival of the pre-war Triple Alliance between mining, transport and railway workers. The miners began a strike for higher wages in October 1920, with railwaymen and transport workers threatening supportive action. The government passed an Emergency Powers Bill to ensure essential services and negotiated a temporary six-month increase in wages.
|
0.6405
|
FineWeb
|
```json
[
"Industrial Relations in Wartime",
"Post-War Industrial Unrest",
"Government Intervention in Labour Disputes"
]
```
|
˜”*°✹°*”˜ •*”˜✹˜”*•˜”*°✹°*”˜ ✹A Priceless Gift✹ Friendship is a priceless gift That can't be bought or sold, But its value is far greater Than a mountain made of gold.
For gold is cold and lifeless, It cannot see nor hear, And in your times of trouble, It is powerless to cheer.
It has no ears to listen, No heart to understand. It cannot bring you comfort Or reach out a helping hand.
So when you ask God for a gift, Be thankful that he sends, Not diamonds, pearls, or riches, But the love of a real, true friend. ~Helen Steiner Rice~ ˜”*°✹°*”˜ •*”˜✹˜”*•˜”*°✹°*”˜ Have A Wonderful Weekend... Hugs, Teresa 1630 days ago
❤¸.•*´*•.¸´*•.¸ ¸.•*´*•.¸∗ ¸.•*´*•.¸ Finish each day and be done with it. You have done what you could. Some blunders and absurdities no doubt crept in; forget them as soon as you can.Tomorrow is a new day; begin it well and serenely and with too high a spirit to be encumbered with your old nonsense. ~~Ralph Waldo Emerson~~ ¸.•*´*•.¸∗ ¸.•*´*•.¸ ¸.•*´¸.•*´*•.¸❤ ∗Have A Terrific Thursday!∗ ∗.·´ ❤`·.∗ Teresa 1639 days ago
.·´¯`·.¸¸✴.¸¸.•´¯`◆ Set your goals high, and don't stop till you get there. ~Bo Jackson~ ◆◆·.¸¸.·´¯`·.¸¸.·´¯`·.¸¸ Just stopping in to check on you... Make Healthy Choices This Week!!! .·´¯`·.¸¸✴.¸¸.•´¯`◆ Hugs, Teresa
Today is not a holiday It isn't even your birthday But I still thought I'd like to send A special message to my friend
You make me laugh and make me smile You ease my troubles for a while When clouds are thick and skies are gray You put some sunshine in my day
You're really thoughtful sweet and kind A friend like you is hard to find I know I've told you once or twice That I think you are very nice
But someone who's as great as you Should be told more often than I do And so I send these words with love Why did I send them?.....just because --Anonymous-- ”*°✹°*”˜˜”*°✹°*” You have brought so much joy into my life.... I am Blessed to call you friend! ”*°✹°*”˜˜”*°✹°*” Love, Teresa 1644 days ago
|
0.9925
|
FineWeb
|
```json
[
"Friendship",
"Inspirational Quotes",
"Appreciation"
]
```
|
Understanding knee anatomy, and the structures that make up the knee can help with injury prevention, as well as your injury treatment. The knee is a commonly injured joint during sports activities. From ACL tears, to meniscus tears, knee injuries can often effect your ability to participate in sports.
Not only does anatomy knowledge help you determine what kind of injury you may have, it also helps to understand how all of the different parts of the knee work together in normal function. Visit our main anatomy page for a refresher on anatomy concepts and different types of tissues. Below you will find detailed information about the knee. And don't forget to take the knee anatomy tour. I explain all of the important structures of the knee, and how they can be injured.
anatomy starts with the bones making up your knee joint. Your knee is a
hinge type joint that allows for the
movements of flexion (bending) and extension (straightening) of the
leg. The knee joint is made up of two bones, the femur
(thigh bone) and the tibia (shin bone). These two
bones touch each other and make up the tibio-femoral
joint. Injury to either of these bones usually involves a fracture. While not common, such injuries often require surgical intervention. The tibio-femoral joint is considered a weight bearing joint.
Another important joint in your knee is the patello-femoral joint. This is the articulation between the patella (knee-cap) and the femur. The patella is a small bone that is actually enclosed inside the quadriceps tendon (a sesamoid bone), and helps provide extra leverage for the quadriceps muscles when straightening the knee. Problems at the patello-femoral joint include patella femoral syndrome, patella chondromalacia, and patellar dislocations.
are connective tissue that connects bones to other bones, and are an
important part of knee anatomy. There are four
major ligaments in the knee. The medial collateral ligament (MCL),
the lateral collateral ligament (LCL), the anterior
cruciate ligament (ACL), and the posterior cruciate
and LCL are on the inside and outside of your knee, and help
to keep your knee from moving from
side to side. The ACL and PCL are inside of your knee joint, running
between the femur and the tibia. They help to keep your tibia from
out from under your femur. The ACL and PCL cross over each other inside
the joint, which is how they get there names. (cruciate = to cross).
The joint capsule is
another connective tissue structure that surrounds your knee joint. Out
of the major ligaments, the
and MCL are the most commonly injured
with sports activities.
Take the Anatomy Video Tour
Within the knee joint there are two different types of cartilage: fibrocartilage and articular cartilage. Both serve different functions, and can be injured during sports activities.
meniscus is a thick, dense connective tissue that sits between your
tibia and femur. It helps to provide shock absorption and cushion
for your tibia and femur, as well as making your knee joint more
congruent. The meniscus is made up of both a medial and lateral part. As you can see in the picture below, they form a circular shape around the top of the tibia, and help to cushion the femur. They also serve as a sort of "chock block" to keep the knee stable. Meniscus
are common sports injuries, and are often caused by twisting your knee.
Articular cartilage is a hard and very slick surface that lines the ends of the bones where they articulate, or touch each other. This helps to reduce friction between your bones during movement. Articular cartilage relies on the synovial fluid within the knee joint to get its nutrients. With abnormal pressures, parts of the cartilage may begin to deteriorate. This is common on the femoral condyles, and on the under surface of the patella.
last major area of knee
anatomy include the muscles and tendons. There are many muscles that surround your knee joint. The thigh
or quadriceps, are a group of four muscles that
start at your hip, and extend down the front of your upper leg,
into the patellar tendon on the tibia, just below your kneecap.
The quads straighten your knee out when you contract them.
The hamstrings are the muscles on the back of your thigh. They are a group of three muscles that start at your hip and extend down the back of your upper leg. They insert on both the medial and lateral sides of your leg, just below the knee joint. The hamstrings bend your knee when you contract them.
Other important knee anatomy considerations are the muscles along the inside and outside of your upper leg. These include: tensor fascia lattae, gracilis, sartorius, and the adductor group.
The knee muscles function to control the movement of the knee joint and to maintain stability in the sagittal plane. Co-contraction of the quadriceps and hamstrings helps to stabilize the knee joint. These muscles are important with any type of sports activity.
Each of the muscles attach through a tendon. Several tendons are of
importance to sports injury anatomy because they are often injured or
inflammed with activity. The
quadriceps tendon attaches the four quadriceps muscles to the patella
just above the knee. The quadriceps tendon is one
of several tendons that can be susceptible to tendonitis.
The patellar tendon attaches the patella to the tibia via the tibial tubercle. Because it runs between two bones, it is sometimes referred to as the patellar ligament. It effectively completes the attachment of the quadriceps to the lower leg. The patellar tendon is much thinner than the quadriceps tendon, averaging about 30mm wide. Patellar tendonitis is a common injury to this structure.
The illiotibial band is a very long tendon, attaching the tensor faciia latte muscle to the knee. The TFL is a hip abductior, and helps to provide some medial rotation of the tibia. The IT band attaches on both the fibula and the tibia on the lateral side of the knee. As the knee flexes and extends, the illiotibial band moves over the head of the fibula. If this knee tendon is tight, it can cause irritation and inflammation at its insertion. This knee injury is known as IT band friction syndrome.
The hamstrings are the primary knee flexors, and they run along the posterior side of the thigh. These knee tendons attach to the tibia and the fibula along the medial and lateral sides of the knee. Hamstring tendonitis is a common knee injury with sports.
All of the muscles, tendons, bones, ligaments, and cartilage work together to keep your knee functioning correctly. Understanding knee anatomy is the best start for preventing and treating knee injuries.
|
0.5701
|
FineWeb
|
["Knee Anatomy", "Knee Injuries", "Knee Structures"]
|
Used for thousands of years by North American Natives, the Ottawa River (Kitchissipi) and its tributaries became popular with explorers and coureurs des bois, and helped bring settlers to the territory. The first of these settlers found the juncture of the chute des Chaudières and the ruisseau de la Brasserie particularly conducive to economic and social activities. This became the initial hub for the industrial development of Hull in the 19th and 20th centuries.
Pioneers and developers like Philemon Wright, Ezra Butler Eddy and George Edward Hanson used the hydraulic power of these waterways to drive the economic life of Hull and turn this area into the cradle of the Outaouais. Their prosperous industries, largely built around wood, polarized the social, religious, commercial and residential structure of the community in the region's historical core.
Well-to-do Anglophone families settled to the west of the creek, shaping village d'Argentine for posterity. The only sector to be left almost unscathed by the Great Fire of 1900, it retains a unique architecture, preserved by its inhabitants, who have worked with the municipality to create the Hanson-Taylor-Wright heritage site. The Association du patrimoine du ruisseau de la Brasserie continues to protect and maintain the neighbourhood's value.Industrial buildings, opulent residences and public artwork mark different points in the origins of the city and region along this route. Over time and through successive generations, this former industrial site has acquired a cultural soul of its very own.
|
0.5095
|
FineWeb
|
["History of Hull", "Industrial Development", "Heritage Conservation"]
|
Your email address will be used for Wildy’s marketing materials only. We will never give your email address to any third party.
Special Discounts for Pupils, Newly Called & Students
Browse Secondhand Online
The latest volume in the Core Concepts in Higher Education Series explores the complexity of law in higher education and both the limits and opportunities of how law can promote inclusivity and access on campus. Through a historical and legal framework, this volume explores the histories of undergraduate students and the law as it relates to equity, race, gender, social class, and sexual orientation. Bridging research, theory, and practice, Law and Social Justice in Higher Education encourages future and current higher education and student affairs practitioners to consider how they can collaborate to further a just society.
|
0.791
|
FineWeb
|
["Law in Higher Education", "Social Justice", "Higher Education Access"]
|
Negotiating between health-based contraceptive concerns and piety : the experiences of Muslim wives in the greater Durban area.
This qualitative, empirical study was located within a feminist research paradigm employing a phenomenological research design. The purpose was to understand the „lived experiences‟ of South African Muslim women in the Greater Durban area negotiating between their health-based contraceptive concerns and their pietistic concerns to observe God‟s will through the course of being good wives. The application of both phenomenological and feminist critical theoretical frameworks was beneficial to understand the forms of analyses applied to these negotiations that occurred within the gendered space of marriage. The conscious and goal-directed decisions to use contraception and to cultivate piety prompted the use of the theory of planned behaviour as the conceptual framework. Data was produced through in-depth, face-to-face interviews guided by open ended questions. This was followed by a reading task and guided written narrative to explore the impact of the discursive construct of gender and agency in popular Islamic literature. Data was analysed within a thematic framework. The findings of this study indicate that these South African Muslim wives do not perceive themselves to be negotiating between health-based contraceptive concerns and piety. Contraception is viewed in terms of the practical considerations of health and is unrelated to their pietistic concerns to observe God‟s will. Instead, these South African Muslim women face moral conflicts by prioritising domestic responsibility and sexual availability to their spouses irrespective of personal desire. These considerations more than contraceptive concerns are determined by the need to acquire God‟s favour through the observance of divine commands. Motivated by their desire to please God, though not oblivious to the deliberate choice to comply with normative prescriptions of women‟s roles which perpetuate androcentric norms and patriarchal structures, the women negotiate and renegotiate their living conditions as an assertion of their agentic positions in the process of pietistic self-making. This continuous process is fuelled by their ultimate desire for peace in their homes, the overall objective of marriage, and their pietistic aspirations of acquiring Heaven.
|
0.8325
|
FineWeb
|
```
{
"topics": [
"Contraception and Piety",
"Muslim Women's Experiences",
"Gender and Agency in Islamic Context"
]
}
```
|
A person buries a lot of things deep inside their mind and heart. They do that because they know that if that comes out it would hurt someone. No person likes to hurt someone physically or mentally and hence, they try their best to keep their feeling to themselves. All these characteristics tell us a lot about that person. Their inner truth cannot be described in words. However, every individual has an inner truth and often they don’t know about it. Here in this visual quiz we will try to find out that truth. Just answer 6 simple questions in this visual quiz and see what result we have in store for you.
Were we right? Share it with your loved ones by clicking below.
|
0.6808
|
FineWeb
|
["Personality Insights", "Emotional Intelligence", "Inner Truth"]
|
If I think I have asthma what should I do?
If you haven’t been to your health care provider yet and you think you might have asthma, call and make an appointment as soon as possible. Getting diagnosed and treated quickly will make a big difference in the way you feel.
How is asthma diagnosed?
Only your health care provider can tell if you have asthma. He/she will ask you questions about how you are feeling in general and also specific questions about your breathing. You will be asked about your past health and your family’s health and about any medications you take and if you have any allergies. Your health care provider will likely give you a physical exam and check your nose, listen to your lungs and heart, etc. to make sure you don’t have any other problems. You might be asked to breathe into a tube (called a “peak flow meter”) that measures how much air your lungs can hold. If you are diagnosed with asthma you may be referred to a specialist.
What is exercise-induced asthma (EIA)?
Some people only have asthma symptoms when they exercise or play sports. People with EIA have airways that are overly sensitive to sudden changes in temperature and humidity, especially when breathing colder, drier air during aerobic exercise. There are some things you can do to help control exercise-induced asthma.
- Take a quick-acting prescription inhaler 15 minutes before you exercise (to open up your airways)
- Do warm up exercises for about 10-minutes before heavy physical activity
- Begin exercising slowly and work up to a faster pace-This has been found to prevent asthma symptoms during exercise
- If you have symptoms and need your Albuterol more than twice a week, you probably need a medication you can take daily to control your symptoms. This daily controller medication may come as another type of inhaler, or as a pill. SEE YOUR HEALTH CARE PROVIDER IF YOU NEED YOUR DAILY RESCUE MEDICATION (ALBUTEROL) MORE THAN TWICE A WEEK WHEN YOU ARE OTHERWISE FEELING WELL.
If you are having trouble with your asthma while you are exercising, try the following:
- IMMEDIATELY STOP any activity you are doing and stay calm. Sometimes just taking a break helps
- Get out of the cold temperature and away from dust and dirt particles such as dust from a dry soccer field
- Take your quick-relief/Albuterol inhaler (you should always carry one with you if you have asthma!)
- Slow and calm your breathing – breathing fast can make your asthma worse
- Get medical attention if you are not better
How is asthma treated?
Asthma is treated by: keeping track of how well your lungs are working (your health care provider will listen to your lungs), taking medications as directed, avoiding things that make it worse (triggers), controlling things in your environment, and learning how to manage it. Although there is currently no cure for asthma, it can be controlled extremely well.
Tips to control your asthma symptoms:
- See your health care provider regularly and talk about any concerns you might have
- Take medications as prescribed by your health care provider
- Use a spacer with all inhaled medication, unless it is a dry powder. (Your health care provider will tell you if your inhaler is a dry powder.)
- Use a “peak flow meter” if you have one, especially to check your numbers when you have a cold or flu.
- Keep a “symptom diary” that describes time, date, severity (how bad you feel) and exposure activity (what were you doing when the symptoms got worse)
- Know your asthma “triggers” and try to avoid or eliminate them
- Pay attention to your asthma so you know when it is getting worse and when to get help
- Rest if your asthma is bothering you
- Don’t smoke, or quit if you do
- Learn as much as you can about asthma because the more you know, the better you can help care for yourself and feel good most of the time
What kinds of medicines are used to treat asthma?
Some people need to take one or more types of medication daily for their asthma and others may not need to take any except when their asthma is bothersome. Your health care provider will decide what medications you need to take.
The two main components of asthma are brocho-constriction – tightening of the muscles around your airways, and inflammation or swelling inside your airways.
- Albuterol – also known as your “rescue” or “quick reliever” medicine will relax the muscles around your airways. There are 3 brands of Albuterol – ProAir®, Proventil®, and Ventolin®. They all have the same ingredients and work the same way.
- Controller medications are medicines that you need to take every day to decrease the swelling in your airways. Controller medications can be inhalers such as Flovent®, Pulmicort®, Asmanex, QVAR®, Alvesco®, Aerospan®, Advair®, Dulera®, Arnuity™, Breo® or Symbicort® or perhaps a pill such as Montelukast or Singulair. Your health care provider will teach you how and when to use your medicine.
|
0.574
|
FineWeb
|
["Asthma Diagnosis", "Asthma Treatment", "Asthma Management"]
|
How to Use advanced ACL Concepts
How to Use advanced ACL Concepts¶
The aim of this chapter is to give a more in-depth view of the ACL system, and also explain some of the design decisions behind it.
Symfony's object instance security capabilities are based on the concept of an Access Control List. Every domain object instance has its own ACL. The ACL instance holds a detailed list of Access Control Entries (ACEs) which are used to make access decisions. Symfony's ACL system focuses on two main objectives:
- providing a way to efficiently retrieve a large amount of ACLs/ACEs for your domain objects, and to modify them;
- providing a way to easily make decisions of whether a person is allowed to perform an action on a domain object or not.
As indicated by the first point, one of the main capabilities of Symfony's ACL system is a high-performance way of retrieving ACLs/ACEs. This is extremely important since each ACL might have several ACEs, and inherit from another ACL in a tree-like fashion. Therefore, no ORM is leveraged, instead the default implementation interacts with your connection directly using Doctrine's DBAL.
The ACL system is completely decoupled from your domain objects. They don't even have to be stored in the same database, or on the same server. In order to achieve this decoupling, in the ACL system your objects are represented through object identity objects. Every time you want to retrieve the ACL for a domain object, the ACL system will first create an object identity from your domain object, and then pass this object identity to the ACL provider for further processing.
This is analog to the object identity, but represents a user, or a role in your application. Each role, or user has its own security identity.
2.5For users, the security identity is based on the username. This means that,
if for any reason, a user's username was to change, you must ensure its
security identity is updated too. The
method is there to handle the update, it was introduced in Symfony 2.5.
Database Table Structure¶
The default implementation uses five database tables as listed below. The tables are ordered from least rows to most rows in a typical application:
- acl_security_identities: This table records all security identities (SID)
which hold ACEs. The default implementation ships with two security
- acl_classes: This table maps class names to a unique ID which can be referenced from other tables.
- acl_object_identities: Each row in this table represents a single domain object instance.
- acl_object_identity_ancestors: This table allows all the ancestors of an ACL to be determined in a very efficient way.
- acl_entries: This table contains all ACEs. This is typically the table with the most rows. It can contain tens of millions without significantly impacting performance.
Scope of Access Control Entries¶
Access control entries can have different scopes in which they apply. In Symfony, there are basically two different scopes:
- Class-Scope: These entries apply to all objects with the same class.
- Object-Scope: This was the scope solely used in the previous chapter, and it only applies to one specific object.
Sometimes, you will find the need to apply an ACE only to a specific field of the object. Suppose you want the ID only to be viewable by an administrator, but not by your customer service. To solve this common problem, two more sub-scopes have been added:
- Class-Field-Scope: These entries apply to all objects with the same class, but only to a specific field of the objects.
- Object-Field-Scope: These entries apply to a specific object, and only to a specific field of that object.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License .
|
0.9905
|
FineWeb
|
["ACL Concepts", "Access Control Entries", "Database Table Structure"]
|
Chief metallurgist, Schmidt & Clemens Alloy Steel Works, Lindlar,
Pages: 12 Published: Jan 1982
A new low-carbon 16Cr-5Ni stainless martensitic cast steel (S + C 4405) is presented as an advancement of CA6NM with improved corrosion resistance, excellent ductility, less susceptibility to hardening cracks, and good weldability, filling the gap between CA6NM and CF8M. The chemical composition is balanced so that a homogeneous microstructure consisting of annealed martensite with small amounts of δ-ferrite and finely dispersed austenite is obtained after hardening and tempering. Because of limited δ-ferrite, the impact values obtained correspond to CA6NM, and limited austenite still allows yield strength values comparable to those of CA6NM.
Due to its excellent ductility combined with good fabricability, the material is also suitable for cryogenic applications down to −200°C. Furthermore, favorable fatigue tests, and particularly test results in artificial seawater, show a remarkable improvement over CA6NM. Pitting- and crevice-corrosion tests by the International Nickel Co. multiple-crevice tetrafluoroethylene washer method suggest a corrosion resistance between that of CA6NM and CF8M and that this steel is suitable for seawater application in connection with cathodic protection. Stress-corrosion cracking in hydrogen sulfide-containing media was investigated according to the National Association of Corrosion Engineers Specification MR-01-75, and the resistance of 16Cr-5Ni under sour-gas conditions was found to be superior to that of CA6NM. The castability of this alloy was found to be favorable and comparable to that of CA6NM.
These characteristics are important for the following applications: offshore engineering, seawater desalination, chemical and petrochemical industries, shipbuilding, cryogenics, power generation, food industry, paper machine construction, and especially for pumps, compressors, fittings, centrifuges, waterturbines, and ship propellers.
stainless martensitic cast steel, high ductility, good weldability, low-temperature application, seawater corrosion, sour-gas service, corrosion fatigue, aceticacid test
Paper ID: STP28452S
|
0.5356
|
FineWeb
|
```json
[
"Stainless Martensitic Cast Steel",
"Corrosion Resistance",
"Industrial Applications"
]
```
|
Lean manufacturing is full of surprises. The shops I visited recently could attest to this—not just the shops in our August issue, but also the ones newly captured in video. For all of them, lean manufacturing delivered benefits and change beyond what they expected. This positive surprise is one further aspect of lean that deserves to be highlighted.
In a way, lean shouldn’t be so surprising. Lean entails a disciplined and even relentless focus on eliminating sources of waste. Lean is serious.
Yet, it’s also transformative—and those who experience a shop before and after lean get to see seemingly unchangeable aspects of the process, including some people, perform in strikingly different ways.
Start with the “clean.” Clutter is where waste hides, so a lean shop is a clean shop practically by definition. As various messes and stockpiles disappear, it can be amazing to discover just how clean it was always possible for the shop to be.
Similarly, other surprising changes are so basic that they can only be fully appreciated after they have occurred. Those changes might include any of the following:
1. Work now proceeds without meetings. “Meetings” and “manufacturing” seem to go together, given how often many shops huddle to get basic questions answered. By contrast, a lean process aims to get the right information to the right people as a matter of routine. Once this starts to happen, meetings of all sorts become dramatically less necessary and frequent.
2. Inspection isn’t a stick. The title of an article this month is, “If You Want to Improve Something, Measure It.” That becomes the motto for measurement in lean. Because the lean process is stripped of variables leading to error, measurement is no longer a pass/fail yardstick. Instead, measurement is valued for the upward pressure on quality that results whenever any indicator of performance is measured and tracked.
3. Failure is no cause for fear. When change is occasional, failure is remembered for a long time. However, when improvement is continuous, failure is just a means to progress. The lessons are soon incorporated into subsequent success.
4. Resisters become advocates. Some employees resist lean, but not necessarily because of lean itself. They resist because they have grown accustomed, rightly or wrongly, to being swept along in changes they have no power to affect. However, when these same employees are tasked with participating in 5S teams, they often find an outlet for insight and creativity that the employee or the shop never brought into play previously.
5. Productivity is actually easy. Another reason for resisting lean is the fear that employees will have more to do. It’s a valid fear; the output of a lean process is likely to increase. However, the input decreases at the same time. As a result, employees at work in a lean environment often discover just how much more satisfying and rewarding their effort can be once they are part of a process that fully values their time.
blog comments powered by Disqus
|
0.816
|
FineWeb
|
```
{
"topics": [
"Lean Manufacturing",
"Eliminating Waste",
"Transformative Changes"
]
}
```
|
It’s one thing to carry on affairs outside the home, yet another to father a child with a household employee and cover it up for a decade. The former governor’s admission raises a multitude of questions, all of which raise very hurtful issues for his family.
Did Schwarzenegger fail to identify himself as “dad” to the child he conceived? Who did the child believe was her/his father? Why did the employee agree to keep the truth quiet? Did her then-husband believe the child was his? Did Schwarzenegger assume the child’s paternity could be kept quiet for years to come, and at which point would the child be told the truth? Was the timing of the former governor’s decision to tell his wife completely dictated by his leaving office, or did other factors, such as the child’s resemblance to him, force the issue? Had Schwarzenegger told Maria Shriver about fathering the child before he announced his candidacy, would she have left him then? Would the disclosure have destroyed his candidacy? Would that series of events have been better for the child? How will the Schwarzenegger family’s four children deal with this?
Of all those affected by Schwarzenegger’s actions, I feel saddest for his children. According to Shriver’s friends, as quoted in the L. A. Times, she had emotionally checked out of the relationship a while back. The kids had no such option.
|
0.6814
|
FineWeb
|
["Schwarzenegger's Affair", "Family Implications", "Consequences of Secrecy"]
|
What the effects of the privatisation of agriculture in Russia and China in the 1980s and 1990s?
The privatisation of agriculture in Russia started on 1989 – 1990 when Gorbachev changed the Soviet legislation about the non-government enterprises. So the agricultural program reform allowed the creation of non-government corporations of agricultural products. This, has helped the movement from corporate farms to individual farms. The number of peasant farms has been increased quickly to 270.000 in 1994 and became steady, about 280.000 or less in 1995. The number of the peasant farms was not the expected one by the government. Also, when the reform began the productivity and the efficiency have declined. As far as the privatisation of agriculture in China, this issue was part of the general Chinese economic reform which was implemented from Deng Xiaoping. Deng Xiaoping, decentralised the agriculture and gave strong attention to the household – responsibility system (HRS) which separated the common lands to private. This action gave a strong push up to China’s economy increasing the agricultural production and performance. The prices of agricultural products had increased and as a result of this, the quality of living standards in China has enhanced and afterwards the rural industry had improved.
Get your grade
or your money back
using our Essay Writing Service!
As far as the search strategy I followed for this particular topic, I have to mention some deductions. As the topic is not familiar to my knowledge, I did not know in which sources I had to search. So, I typed the whole question on the University’s library search machine with the purpose to find several references and get an idea for what I was looking for. The next step was to identify the key words of the question and try to continue my search using them. The key words I used are “Agriculture in Russia”, “Agriculture in China”, “Land reform in Russia”, “Land reform in China”, “China's agricultural privatisation programme”, “Russia's agricultural privatisation programme”, “impact of agriculture privatisation in China”, “impact of agriculture privatisation in Russia”. Unfortunately, I was not able to find a proper database which includes agricultural topics, as the particular question is social – economic topic. To accomplish my search I used one of the biggest search machines, the Google. Moreover, I used the Google Scholar, which provides very useful information about everything. Thus I searched in journals, articles, PhDs thesis (but I could not find a suitable one) and educational reports from universities.
The use of carbenes to make catalysts
The use of carbenes to make catalysts is quite new in chemistry sector. Because of Carbenes are consisted of non-common carbon atoms which are usually unbalanced in nature, attaching metals to create metal complexes and finally work as very important catalysts. The majority of scientists did not believe that it would ever be possible the construction of a particular kind of Carbenes. This certain kind of carbenes is called “abnormal N-Heterocyclic carbenes”, they developed in laboratory and they are used to make catalysts. Obviously they have given great opportunities for further development in many sectors of industry, especially in pharmaceutical industry. The chemist from the University of California, Riverside, Professor Guy Bertrand accomplished to separate and create aNCHs which are metal-free and chemists can use them to make every desired complex. The synthesis of a completely different class of metal-free aNHCs can drive to new roads the area of expertise of catalysis. It can give also great prospect of innovation in drug research and manufacture as catalytic procedures can facilitate to keep costs under control. This discovery can be really helpful and contribute to solve a great variety of drawbacks as the interest about this is continuously increased as it is very friendly to environment. Another advantage of abnormal N-Heterocyclic carbenes is that they function as organometallic catalysts which enhance their eco-friendly ability.
As far as the strategy I followed for this topic, I came into conclusion about some things. Again this particular topic was completely out of my knowledge, so I had first to identify what exactly are carbenes and what is catalyst. After a general search in the library and google, I tried to focus on key words, like “carbenes”, “catalyst”. As long as I knew that the topic is about chemistry, my direction on the research led me to find journals and resources about chemistry. After finding some references from journals, I tried to search on PhD Thesis but I was not able to discover an appropriate PhD thesis which declares the carbenes and their usage on making catalysts. A very interesting thing is that during my research I recognized that catalysts are made of a particular type of carbenes which is artificial. The strengths of my research strategy are that it was feasible to find an acceptable variety of references to support my answer, as well as to make clear the definition of carbenes and their implementation. On the other hand the weaknesses of my research strategy were that obviously I could not discover a proper PhD Thesis in order to go deeper on my investigation. The reference which supports and describe in the best way my answer is “Nicolas Marion, S.D.-G.D., Steven P. Nolan Prof. Dr. (2007) 'N-Heterocyclic Carbenes as Organocatalysts'. Angewandte Chemie.”
Always on Time
Marked to Standard
Constructing flexible antenna by injecting liquid metal into elastomeric microchannels
The use of antennas is widespread with many implementations. The traditional antennas are made up from metal, especially copper. This means that antennas are too strong, even though they can break down easily. Because of the wide application antennas have, from medical to technical and military sector, users encountered a lot of problems, most significant problem was the antenna’s limitation on how far they could get curved. Thus, scientists made it possible to construct flexible antennas from liquid metal in order to overcome this limitation. They accomplished their goal injecting liquid metal into elastomeric microchannels. The liquid metal they used is EGaIn which is consisted of 75% eutectic gallium and 25% indium. So, inserting liquid metal into a layer of microchannels in an elastomeric surface it is a very simple way to construct radiating frameworks. In contrast to traditional antennas, made up from stiff metal which is not flexible, the new type of them, uses the mechanical attributes of the enclosed material and also can be flexible and strong. This flexible antenna can be used in many existing applications such as cell phones or other electronic devices but also can be used in other type of applications such as textiles. Flexible antennas can be stretched without losing of their efficiency or attributes as they have the ability to tolerate any kind of effort upon them. Moreover, the ability of liquid metal to mix up with other metals, could help the straight electrical connection and integration of antennas into surfaces with electronic parts.
As far as the search strategy I followed, I have to mention some inferences. The topic was completely unknown for me, although I understood that it is an engineering topic, so I had to focus my research on engineering sources. The key words I used are “flexible”, “antenna”, “liquid”, “metal”, “elastomeric” and “microchannel”. At first, I used them altogether as I wanted to understand what exactly is the topic. Afterwards, I used them separately or in combination. One interesting thing is that some references from google patent, which were too useful to understand the concept of flexible antenna invention. Furthermore, I found a lot of mechanical and engineering journals which depict very clearly the implementation and the construction of flexible antenna. An important problem I faced on the beginning it was that I found the same paper in many different sources and I had to dig more in the internet. The most appropriate reference I used for answering this particular topic is ” Gerard J. Hayes, J.-H.S., Amit Qusba, Michael D. Dickey, Gianluca Lazzi (2012) 'Flexible Liquid Metal Alloy (EGlan) Microstrip Patch Antenna'. IEEE Transactions on Antennas and Propagation.”
|
0.5953
|
FineWeb
|
["Agriculture in Russia and China", "The use of carbenes to make catalysts", "Constructing flexible antenna by injecting liquid metal into elastomeric microchannels"]
|
- Dowell, Earl H., Eigenmode analysis in unsteady aerodynamics: Reduced order models,
Collection of Technical Papers - AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics & Materials Conference no. 4
pp. 2545 - 2557 .
(last updated on 2007/04/10)
A conceptually novel and computationally efficient technique for computing unsteady flow about isolated airfoils, wings, and turbomachinery cascades is presented. A large, sparse eigenvalue problem is solved using the Lanczos algorithm starting with either a time or frequency domain computational fluid dynamics (CFD) analysis of unsteady aerodynamics. Then, using the resulting eigenmodes, a Reduced Order Model of the unsteady flow is constructed. With the model, quick and accurate prediction of unsteady aerodynamic response of the system over a wide range of reduced frequencies can be obtained.
Wings;Airfoils;Unsteady flow;Cascades (fluid mechanics);Computational fluid dynamics;Eigenvalues and eigenfunctions;Frequency domain analysis;Time domain analysis;Mathematical models;Dynamic response;Algorithms;
|
0.7891
|
FineWeb
|
["Unsteady Aerodynamics", "Computational Fluid Dynamics", "Reduced Order Models"]
|
The comparability of linear and nonlinear latent variable analyses of skewed dichotomous items
Factor-analytic methods founded on the multivariate linear model are often employed to scale behavior rating instruments. When items are scored as dichotomies and endorsements are skewed, the data violate the assumption of a multivariate normal distribution (MND). While the mathematical ramifications of such have been widely characterized, an empirical evaluation of MND- and non MND-based latent variable solution concordance has not been reported. This research investigated whether MND-based latent variable models employing previously-reported latent dimension extraction and item retention restrictions yielded a solution which was supported by two methods which do not assume a MND: (a) bi-factor analysis, and (b) latent class analysis. Standardization data of the Bristol Social Adjustment Guides, an instrument which evaluates social adjustment in school, were randomly divided into scaling (N = 1,505) and confirmatory (N = 1,000) samples. Scaling methods included: (a) first-order principal component analysis (PCA) and common factor analysis (CFA), (b) second-order CFA, and (c) confirmatory, oblique, principal-component cluster analysis. Bi-factor and latent class models evaluated the goodness-of-fit of confirmatory sample data to the item structure and behavior styles indicated via MND-based linear scaling. One solution comprising four first-order and two second-order latent dimensions, overactivity (OVER) and underactivity (UNDER), was derived and supported by both confirmatory methods. The bi-factor model was superior to simple structure for OVER and UNDER items, $X\sp2$ difference: OVER (39, N = 1,000) = 67, $p < .005$; and UNDER (33, N = 1,000) = 100, $p < .005$. A three-dimensional (over-, under-, and normoactivity) confirmatory latent class model was fitted, $X\sp2$ (4, N = 1,000) = 1.29, $p > .80$, while alternative one- and two-class models were rejected at the $<$.01 alpha level. PCA and CFA yield concordant solutions with dichotomous, skewed, item data under accepted extraction and retention criteria. Latent structures identified through MND-based linear factoring are, under these circumstances, supported by models which do not assume a MND. ^
Education, Tests and Measurements|Statistics|Psychology, Psychometrics
Irene Debra Feurer,
"The comparability of linear and nonlinear latent variable analyses of skewed dichotomous items"
(January 1, 1997).
Dissertations available from ProQuest.
|
0.8156
|
FineWeb
|
```json
[
"Statistics",
"Psychology",
"Education"
]
```
|
Tsaroth writes "Just in time for everyone's Halloween fantasy, a horde of undead minions to collect candy for you; HowStuffWorks.com has just put up a new article about How Zombies Work. From Haitian zombies, to Dawn of the Dead it's more fun with corpses than you've ever had, hopefully." Ewww. From the article: "It happens in just about every zombie movie -- a throng of reanimated corpses lumbers toward the farmhouse, shopping mall, pub or army base where the heroes have barricaded themselves. The zombies aren't dead, but they should be. They're relentless and oblivious to pain, and they continue to attack even after losing limbs. Usually, anyone the zombies kill returns as a zombie, so they quickly evolve from a nuisance to a plague."
|
0.6793
|
FineWeb
|
["Zombies", "Halloween", "Undead Minions"]
|
AAA is an access control framework. The three As stand for Authentication, Authorization and Accounting.
Authentication verifies the person's (or machine's) identity: that is, confirms that the entity seeking access is who or what it claims to be.
Authorization involves a set of rules that defines what the authenticated entity is able to do once access is granted.
Accounting produces a record of the resources used and the actions taken by the identity after access.
|
0.7166
|
FineWeb
|
["Authentication", "Authorization", "Accounting"]
|
What is Certified Organic?
When something is “certified organic”, it means that it has been produced according to a specific organic standard. This is assurance that the product has been produced to specific standards to ensure its organic quality.
All our sheets, doona covers and pillowslips are all certified to the GOTS standard. GOTS stands for the Global Organic Textile Standard and is the leading worldwide textile standard for organic fibers.
So, why do we have our sheet sets and doona cover sets certified by GOTS? Well, we want to be assured that our kids and yours are sleeping in soft, organic cotton fabric that is free from nasty chemical residues. We also want to assure that the people making our sheets and doona covers are treated fairly and with respect.
The GOTS standard has a strict set of criteria that must be adhered to in order for a factory/company to sell GOTS certified products. These standards mirror our belief system and what is important to us, both environmentally and socially:
- GOTS have strict standards to ensure the organic status of the fabric.
- The use of toxic heavy metals, formaldehyde, aromatic solvents, functional nano particles, GMO and their enzymes are all prohibited under the GOTS standard.
- All chemicals such as dyes and process chemicals must be evaluated as meeting requirements on toxicity and biodegradability/eliminability.
- AZO dyes that release carcinogenic amine compounds are prohibited.
- Printing methods using phthalates and PVC are prohibited.
- Trims must not contain PVC, nickel or chrome.
- Bleaches must be based on oxygen rather than chlorine bleach.
- There must be an active environmental policy and procedures in place to minimize waste and discharges. Wastewater from printing and dyeing processes etc. must be treated in a functional wastewater treatment plant.
- Fabrics must meet stringent limits regarding unwanted residues.
- Any paper or cardboard used for swing tickets, cardboard boxes for shipping etc must be recycled or certified according to FSC or PEFC.
- Factories must meet minimum social criteria. Employment must be chosen freely, so seeing a GOTS certification is your assurance that no slave or child labour has been used.
- Fair wages must be paid and the working hours must not be excessive.
- The working conditions must be safe and hygienic.
- Harsh and inhumane treatment is prohibited. No discrimination is practiced.
For more information on the GOTS standard please visit the GOTS website: http://www.global-standard.org/about-us
|
0.7621
|
FineWeb
|
["What is Certified Organic?", "GOTS Standard", "Benefits of Certified Organic Products"]
|
Virginia Beach, Virginia – ZiggityZoom just announced the release of a new educational iOS game app WORD Cat for the iPhone and iPad. WORD Cat is a fun and educational, early learning, spelling-based app for preschool and kindergarten children. Players can play two different levels, making 3 letter words, using the vowel “a”, or spelling the spoken three letter words. Safari Animal stickers, with sounds, are awarded for every five correct words and then the kids can play with their animals in a safari setting. Verbal encouragements are spoken by the Cat as kids progress in the game.
WORD Cat is one of 5 apps in the Word Animals suite of apps. Each app in the suite will address three letter words using a different vowel. WORD Pig, with letter “i”, is already available in the app store. “These apps are perfect for helping kids with word recognition and formation and to practice spelling for beginning readers. It’s an app suited to the preschool classroom or for use at home,” said Kristin Fitch, CEO of ZiggityZoom. WORD Cat is suited to children with Special Needs, as they only need to select a beginning and ending letter to make words.
Additional apps are in the pipeline for ZiggityZoom, including children’s book apps and educational apps. Previously released apps are WORD Pig and the award-winning Feed the Monster game.
* iPhone 3GS, iPhone 4, iPhone 4S, 3/4G iPod touch and iPad
* Requires iOS 4.0 or later
* 15.6 MB
Pricing and Availability:
WORD Cat 1.0 is only $0.99 USD (or equivalent amount in other currencies) and available worldwide exclusively through the App Store in the Education category.
ZiggityZoom is an internationally recognized creator of educational children’s games that are featured on their website. Copyright (C) 2012 ZiggityZoom. All Rights Reserved. Apple, the Apple logo, iPhone, iPod and iPad are registered trademarks of Apple Inc. in the U.S. and/or other countries.
|
0.6132
|
FineWeb
|
["Educational Apps", "iOS Games", "Children's Learning"]
|
Medical Subject Headings
Bibliotherapy; History, 19th Century; Mental Disorders/therapy
Analytical, Diagnostic and Therapeutic Techniques and Equipment | Library and Information Science | Mental and Social Health | Psychiatry and Psychology | Rehabilitation and Therapy
Introduction: Hospital libraries, including ones designed for patient use, share a common history with hospitals in the evolution of health care delivery 1. The library as a component of the early “insane asylum” in the United States is well documented, and many had been established by the mid-nineteenth century. While these libraries certainly existed as a means of recreation for asylum patients, this historical communication will demonstrate they also served as a center for “bibliotherapy,” the use of reading as a means of healing.
Levin, Len L. and Gildea, Ruthann, "Bibliotherapy: tracing the roots of a moral therapy movement in the United States from the early nineteenth century to the present" (2013). University of Massachusetts Medical School. Library Publications and Presentations. Paper 143.
Analytical, Diagnostic and Therapeutic Techniques and Equipment Commons, Library and Information Science Commons, Mental and Social Health Commons, Psychiatry and Psychology Commons, Rehabilitation and Therapy Commons
|
0.6884
|
FineWeb
|
["Bibliotherapy", "Mental Disorders/therapy", "History of Hospital Libraries"]
|
Climate Cover-Up: The Crusade to Deny Global Warming
, 2009 - Nature
- 240 pages
Talk of global warming is nearly inescapable these days - but there are some who believe the concept of climate change is an elaborate hoax. Despite the input of the world's leading climate scientists, the urgings of politicians, and the outcry of many grassroots activists, many Americans continue to ignore the warning signs of severe climate shifts. How did this happen? Climate Cover-up seeks to answer this question, describing the pollsters and public faces who have crafted careful language to refute the findings of environmental scientists. Exploring the PR techniques, phony "think tanks," and funding used to pervert scientific fact, this book serves as a wake-up call to those who still wish to deny the inconvenient truth.
|
0.7779
|
FineWeb
|
["Climate Change", "Global Warming", "Environmental Science"]
|
Select the layer to load:
Typology: Building Age By Wall Type
SA = Small Area
ED = Electoral Division
PC = Postal Code
* = Indicates that pies will draw for that layer
Please pan in to see the pies as pies are only displayed at a certain zoom level.
Click to get a printable version of the current map
|
0.7547
|
FineWeb
|
["Typology", "Map Layers", "Interactive Map Features"]
|
Every province has a civilization level. Provinces with no civilization (a level of zero) are considered wilderness. Civilization levels for provinces are shown in the turn report:
The civilization level is shown for every province appearing in the turn report:
Mountain [cq24], mountain, in Lesser Atnos, civ-1 Forest [ac35], forest, in Torba Bacor, wilderness
The civilization level of a province is determined by the presence of cities and buildings, or half of the maximum civilization level of its surrounding provinces, whichever is higher.
feature contribution ------- ------------ safe haven 2 castle 1.5 city 1 tower 1 temple 1 inn 0.5 mine 0.5
Any fractional remainder is dropped after the contributions are summed.
The maximum civilization level a province may have is civ-6.
|
0.843
|
FineWeb
|
```json
[
"Civilization Levels",
"Province Features",
"Civilization Level Determination"
]
```
|
The effective movement of air, water, steam,
fuel or process fluids within the confines of a building or complex requires a
thorough understanding of the proposed facility's use. It is only through
this understanding that mechanical systems can be designed to operate
efficiently and effectively.
Meeting present and future electrical needs is a challenge faced
by owners of existing facilities and those developing new ones. Successful
businesses are continually updating electrical, instrumentation and control
systems to increase productivity, capacity and profitability.
Environmental regulation compliance touches all of us. A
thorough knowledge of environmental regulations, as well as treatment disposal
technologies, is essential for implementing an effective treatment compliance
|
0.7184
|
FineWeb
|
["Mechanical Systems", "Electrical Systems", "Environmental Regulation"]
|
It's one of the signs of summer -- thin, glowing clouds that appear high in the sky in the hours after sunset for spots in the higher latitudes.
According to the very cool website Spaceweather.com:
"Every summer since the late 19th century, Earth's polar skies have lit up with gossamer, electric-blue clouds, twisting and rippling in the twilight sky. They're called noctilucent ('night-shining') because they can be seen after dark. The origin of the clouds, which hover at the very top of Earth's atmosphere in close proximity to space itself, is uncertain. They have been linked to causes as varied as meteoroids, climate change, and the icy exhaust of the space shuttle."
Here is some time lapse video taken from Norway on Wednesday morning. Aside from watching the glowing clouds form and drift, watch the stars march across the sky. Also of note: it's in the initial stages of "White Nights" as you still see some sunlight through the night, and how the sky begins to get brighter around 3 a.m:
While they are more common in the far northern latitudes, we can see them around here sometimes. Here is a photo of the clouds taken by Reid Wolcott last summer:
|
0.985
|
FineWeb
|
["Noctilucent Clouds", "Summer Phenomena", "Atmospheric Conditions"]
|
This native perennial plant is up to 5' tall and unbranched. The central stem is fairly stout, with numerous small longitudinal ridges. It is usually covered with scattered white hairs. The leaves near the base of the plant are up to 10" long and ½" wide, but become progressively smaller as they ascend the stem. They are linear, and quite numerous as they alternate around the stem. Their margins are smooth, and each leaf has a prominent central vein. The underside of the leaves and the central stem are sometimes whitish green in appearance. The central stem terminates in an inflorescence that consists of a long spike of sessile flowerheads. The flowerheads individually have 5-10 pink to purplish pink flowers. Each flowerhead is about ¼½" across and subtended by green or reddish bracts whose tips recurve sharply outward. Each small flower has 5 lobes that spread outward from the corolla tube, from which emerges 2 long curly styles. There is no floral scent. The blooming period occurs during late summer and lasts about a month. Afterwards, achenes form with light brown tufts of hair, which are distributed by the wind. The root system consists of corms, which occasionally form offsets near the mother plant.
|
0.9054
|
FineWeb
|
["Plant Description", "Growth and Blooming", "Root System"]
|
I’ve been painting and sketching native oysters, Ostrea edulis. I buy them from oyster fishermen at Mylor in Cornwall near Falmouth. It was bitterly cold then and it’s pretty cold now.
It takes a long time to establish a native oyster bed. They were a major source of cheap food. In 1851, for example, a round 500 million oysters were sold through Billingsgate. Our oyster beds were destroyed by a series of cold winters, surely not the first though, in the mid 20th Century, and then pollution, the parasite, Bonnania Ostrea, the beastly slipper limpets and oyster drills which drill holes into them and eat it contents, they are a big threat for commercial oyster farms.
Now they can only be collected under license in Scotland.
Oysters change back and forth from female to male according to the temperature of the water. You get in the bath nice and hot, go to sleep, and wake up in cold water, surprisingly different. Well, surprising the first time, but native oysters can live for 20 years so they may get used to it.
You can see my work in London at the The Flying Colours Gallery and at Oliver Contemporary
All photographs by James Forshall
|
0.5861
|
FineWeb
|
```
{
"topics": [
"Native Oysters",
"Oyster Conservation",
"Artistic Representation"
]
}
```
|
STEM Kit Program Evaluation Process
After completing at least six hours of STEM Kit instruction and implementation, please do the following:
- Print STEM Kit certificates for each participant. Click for fillable STEM Kit Certificates.
- Survey the youth involved in the program to determine level of interest in associated STEM careers.
- Click for STEM Kit Evaluation Link on eServices, the same location where you submitted your CAP STEM Kit application. (Go to the Aerospace Education link - and then the CAP STEM Kit link- on the left side of eServices menu.)
- Include in your online evaluation, one or more digital photos of youth involved in the STEM Kit program (only include photos of youth with permission to have photos used by CAP for STEM program promotion) to [email protected]. Submission of photos assures CAP that there is permission to use such photos in any STEM program promotions
If interested, submit another STEM Kit application after the completion of the evaluation in the same eServices link. Additional STEM Kits will be considered for distribution to applicants until funds are depleted.
|
0.8927
|
FineWeb
|
```json
[
"STEM Kit Program Evaluation",
"STEM Kit Certificate Process",
"STEM Kit Application Submission"
]
```
|
Wizards, Witches and Beings: I
Inigo=Medieval Spanish form of Ignatius; the name of a famous seventeenth
century British architect. Ignatius is derived from 'Ignis,' the Latin word
Imago=Latin for image, likeness (i.e.:, a picture, statue, mask, an apparition, ghost, phantom).
Norwegian poet of the 1400s whose verse includes references to Quidditch (QA8).
Most likely a witch, since her surname has a feminine ending in a a part of the world where surnames are modified by gender.
|
0.9246
|
FineWeb
|
["Medieval Names", "Latin Words", "Witches and Wizards"]
|
FREE offers are often time-sensitive. Although they are FREE at the time of posting, please be sure to verify the offer is still free before claiming or purchasing it. (We are not responsible for price changes.) Thank you!
This freebie provides a full day of STEAM activities from knowledge of the numbers 1 through 120 in a pioneer journal. This free resource will help your homeschool take a pioneer style journey, 120 years back in time. Your homeschool can explore life as a pioneer on the Oregon Trail and develop diagram on the Western Expansion. The journal will explore topics like the science behind gold, what would be in a Pioneer’s Wagon, nonstandard measurement using nuggets and more.
DK Readers L2: Journey of a PioneerAmerican Pioneers And PatriotsGone West: Bold Adventures of American Explorers and PioneersPioneer Children Sang as They WalkedIf You Traveled West In A Covered WagonThe Little House (9 Volumes Set)Western Pioneers Coloring Book (Dover History Coloring Book)Prairie Primer
|
0.7486
|
FineWeb
|
["Pioneer Life", "STEAM Activities", "Western Expansion"]
|
The freshly harvested algae is dried at low temperature(below 42°C), which ensures that heat sensitive vitamins and carotenoids are well preserved.
- Protein - Spirulina has the highest protein content of any natural food. Our Spirulina contains between 65 and 70% protein. This is 270% more protein than fish, 334% more than beef and 556% more than tofu. Spirulina provides all the essential amino acids and is therefore considered a complete protein. With regards to usable protein (as a percentage of the food’s composition), Spirulina is second only to whole, dried eggs. Furthermore, protein from Spirulina is easily digestible due to the organism’s cell wall being free from cellulose and 85 – 95% digestible. This is especially beneficial to those individuals who have difficulty digesting complex proteins and those that suffer from intestinal malabsorption.
- Vitamins - Spirulina contains both water and fat soluble vitamins and is a rich source of Vitamin B12, containing 118% more than raw beef liver. The Vitamin-B complex consists of the following vitamins: B1, B2, B3, B5, B6, B7, B9 and B12, all present in the Spirulina matrix. Most of these vitamins play a vital role in releasing energy from food and maintaining a healthy nervous system.
- Minerals - Superfood’s Spirulina contains various trace minerals and provides 475% more calcium than whole milk and 5756% more iron than spinach. Spirulina is the best natural iron supplement available and has been shown to correct anaemia, increase blood haemoglobin content and increase iron reserves. Iron from Spirulina is more than twice as absorbable as the form of iron found in most meats and vegetables.
- Healing Pigments - Chlorophyll is the green pigment in Spirulina, and aids in cleansing and detoxifying the body. It is referred to as “Green Blood” due to its striking resemblance to human
haemoglobin. Our Spirulina provides 30 mg Chlorophyll per daily dosage of 3 grams.
Phycocyanin is a naturally occurring, brilliant blue pigment in Spirulina, and stimulates blood production which in turn strengthens the immune system. It is also a potent antioxidant, protecting the body against DNA damage and premature aging. Our Spirulina provides 345 mg of Phycocyanin per daily dose of 3 grams.
- Essential fatty acids - Gamma-linolenic acid (GLA) is an essential fatty acid, part of the Omega-6
group, which can only be obtained by consumption of vegetarian foods like Spirulina. GLA promotes
cholesterol normalization. Spirulina is concentrated in GLA. A daily dose of 3 grams Spirulina
provides 55 mg of essential fatty acids, 30 mg in the form of Linoleic acid and 25 mg in the form of GLA. Other dietary sources of GLA include Mother’s milk and oil extracts of black current, borage seeds and evening primrose. GLA comprises up to 20% of the lipid fraction of Spirulina, compared to 9% for evening primrose oil.
- Polysaccharides - Calcium-Spirulan is a water-soluble polysaccharide unique to Spirulina. This
polymerized sugar molecule contains both sulphur and calcium. Calcium-Spirulan has been shown to inhibit the replication of life-threatening viruses such as HIV-1. By inhibiting viral penetration of the cell it renders the virus vulnerable to the host’s immune system leaving it unable to replicate.
- Superoxide Dismutase - The enzyme Superoxide Dismutase (SOD) is a true natural antioxidant which removes excess superoxide free radicals, known to be responsible for cell oxidation which leads to DNA damage, cancer and premature aging. Our Spirulina contains large quantities of SOD, providing 10605 units per daily dose of 3 grams.
- Antioxidants - Spirulina contains a powerful combination antioxidants. Its ORAC value of 61900 makes it one of the highest of any food!
The Scientific Research
There are various peer reviewed scientific studies regarding Spirulina’s ability to strengthen the immune
system, inhibit viral replication and cause regression of cancers. These results highlight the potential of Spirulina as a therapeutic supplement in the modern diet. Spirulina has also been shown to play a role in lowering cholesterol levels, building blood cells and reversing anaemia. It has been effectively used to reverse malnutrition and reduce urine radioactivity levels of children at the Institute of Radiation Medicine in Minsk, Belarus.
Unlike blue-green algae harvested from uncontrolled lakes, our Spirulina is cultivated under carefully controlled conditions.
The freshly harvested algae is rapidly dewatered before drying it in specially designed drying chambers, which ensures that heat sensitive vitamins and carotenoids are well preserved. The dry product is then granulated using a specially designed low-temperature milling process.
Superfoods Spirulina is grown and processed under the stricktest quality control standards(SABS 9001:2000 HACCP) and is free from pesticides, herbicides, preservatives, GMO’s and additives, and is processed RAW.
Our Spirulina is available in powder and tablet form through selected health shops or directly from our webshop.
Each tablet contains 300mg of 100% pure Spirulina - no binders or fillers are used.
How to use Spirulina
Spirulina has a unique, strong, salty taste, which some find
unpleasant.The powder is therefore best mixed with your favourite smoothie or fresh juice. Start with 1/2 a teaspoon and gradually build up to 1-2 teaspoons of Spirulina powder daily.
Tablets can be taken at any time during the day with water.
A recommended minimum dose is 3g and should be eaten daily for maintenance.
|
0.5258
|
FineWeb
|
```json
[
"Nutritional Content",
"Health Benefits",
"Usage and Production"
]
```
|
Let us know what you think of the survey as it relates to your travel or moving experiences. For example, did your pets pick up on the recent East Coast snowstorm that disrupted pet travel? When it comes to pet relocation, do your furry friends start to act differently even before you bring out the travel crates and suitcases? Share your pet stories with us here or on Facebook!
Our guess is that cats, dogs, birds and other companions are aware of much more than we often give them credit for, and it's clear that they are affected by our own energy and anxiety. This means we'd be wise to set a good example for our pets by staying calm throughout the process of an international journey, a big move, or whatever challenges we face. Pets improve our health and add fun to our lives, so let's keep trying to understand their surprisingly complex behavior!
|
0.5141
|
FineWeb
|
["Pet Relocation", "Pet Behavior", "Travel Experiences"]
|
Together with our partners, TechnoServe is helping to grow strong markets that create opportunities for enterprising people in the developing world.
- Where We Work
- Burkina Faso
- Côte d’Ivoire
- El Salvador
- Latin America and the Caribbean
- South Africa
- South Sudan
TechnoServe serves as the manager of the Technical Assistance Facility (TAF), which supports the African Agriculture Fund, a private equity fund, to address food security challenges across Africa. TAF provides technical assistance to small and growing businesses (SGBs) invested in by the African Agriculture Fund, and improves linkages between enterprises and smallholder outgrowers.
Staple crops like maize, soy and bean can provide much more than just subsistence for smallholders, they can also increase income, create jobs and improve food security. The Storage and Proper Post-Harvest Improvements for Resource Efficiency (SAPPHIRE) program, funded by the DFID, worked to capitalize on the potential of maize and increase incomes for farmers through increasing productivity and improved aggregation.
|
0.6727
|
FineWeb
|
["Where We Work", "Food Security", "TechnoServe Partnerships"]
|
According to the American Bar Association's 2008 Legal Technology Survey, laptop use among lawyers has risen from 69% to 83% within the last year. As lawyers become increasingly mobile in their work habits, thieves have access to more devices full of confidential client information. IT should protect all of the firm's notebook PCs and removable storage through data encryption.
Levels of Encryption: Disk, Folder, or File
Encryption tools typically provide one or more of the following three encryption types:
- Full-disk. Everything but the master boot record is encrypted. This encryption level is the most secure, because it leaves the thief with no access to any usable data.
- Folder-based. This form of encryption designates a folder as a protected container. All files and subfolders therein are encrypted until authentication is completed. In most cases, authentication for decryption is tied to system login, so no additional passwords are required.
- File-based. These systems encrypt individual files, providing the most granular level of protection. Each file can be protected with its own password, which increases the risk of password confusion or loss.
|
0.7925
|
FineWeb
|
["Laptop Security", "Encryption Types", "Data Protection"]
|
Bad behavior in a child stems from a variety of environmental, emotional and biological issues in a child’s life. All children exhibit bad behavior from time to time due to the stresses of daily life. The Colorado State University Extension Service suggests that tantrums, one of the most common forms of bad child behavior, occur in 23 to 83 percent of all 2- to 4-year-olds. When negative behaviors continue or escalate, however, CSU suggests parents seek help.
Video of the Day
Children thrive on routine. When life changes occur--including a new sibling, starting or changing schools, death of a relative or even the addition of a new pet--children may display negative behaviors. An inability to verbalize their emotions or a fear of the unknown may cause children to make poor choices. A child may become loud, aggressive, defiant or noncompliant.
Bullying or Abuse
A bullied or abused child may be too scared to tell a parent or other trusted adult what is happening. Instead, the child may act out in verbally or physically assertive ways. Alternatively, he may become withdrawn and sullen or display his fears through sneaky, manipulative, passive-aggressive ways. Some behaviors, such as destructive behavior, insecurity and withdrawal, may be signs of emotional maltreatment, warns the American Humane Association.
A child may struggle to read, comprehend math or understand directions without anyone realizing there is a learning disability causing the challenges. Until the disability is noticed and diagnosed, the child may act out because of feelings of inadequacy and ineptitude. A child might be defiant and non-compliant about completing schoolwork or chores.
Mental Health Issues
Children suffering from bipolar, ADHD or depression may exhibit a variety of bad behaviors, including tantrums, lack of focus, aggression and defiance. Due to a combination of genetic or environmental issues, a child may develop mental health problems that affect her ability to function appropriately within her family, school and neighborhood. For example, during a bipolar manic phase, a child may appear agitated, need very little sleep and show unusually poor judgment, according to the American Academy of Child & Adolescent Psychiatry.
Parents, who through lack of knowledge or the stresses of life, struggle to implement consistent rules and consequences, may create misbehaving children. According to Colorado State University, some of the parenting issues that create temper tantrums in children include inconsistent discipline, criticizing too much, parents being too protective or neglectful and a child not having enough love and attention from his mother and father.
|
0.5213
|
FineWeb
|
["Causes of Bad Behavior in Children", "Environmental and Emotional Issues", "Mental Health Issues"]
|
'You shall hear the nightingale sing on as if in pain': The Philomena myth as metaphor of transformation and resistance in the works of Susan Glaspell and Alice Walker
Morris, Wesley A.
Doctor of Philosophy
The story of Philomela and Procne has long been a figure of violence in literature. However, male mythologizers write Philomela out of existence, whereas women writers use the myth as a metaphor for female oppression and silencing. This paper examines the mutually exclusive strategies of Philomela's male and female mythographers. Chapters one through three explore how classical and medieval poets rewrote the myth to sublimate their fear which the story's themes represent. Rendered speechless, hence powerless within a masculine construct, Philomela creates a new idiom and reconstitutes her identity in weaving. Recognizing the immanent consequence of this feminine poetic, male mythologizers, epitomized by Coleridge in the nineteenth century, seek to silence Philomela once and for all. Nevertheless, the Philomela/Procne myth resonates throughout the texts of women. Chapter four analyzes Trifles and "A Jury of Her Peers", by Susan Glaspell, revealing the life of a frontier woman domineered by an unyielding husband she finally kills. The male investigators overlook evidence they deem "trifles" because it lies in woman's work. The neighbor women, on the other hand, deduce the truth of Minnie's existence, and unite to subvert the law and establish a new form of justice based on the caring and connectedness of women, not the abstract principles of men. Chapter five illustrates Alice Walker's utilization of the myth to expose the worldwide oppression of women. In The Color Purple and Possessing the Secret of Joy, Celie and Tashi find meaning for their existence in a confederacy of women who bond to repudiate the tyranny of culture and redefine themselves as worthy and whole. Philomela raped, mutilated and silenced is a familiar image for women. The strength in an otherwise horrific tale lies in Philomela's ability to subvert the patriarchy that would subjugate her by usurping the power of language into a call to sisterhood and an affirmation of such power in that bond.
Women's studies; American literature; Comparative literature; Classical literature; Medieval literature
|
0.9641
|
FineWeb
|
["Women's studies", "American literature", "Classical literature"]
|
First 656 words of the document:
Risk factors in the development of addiction
Everyday stress NIDA, 1999: people report that they drink, smoke, use drugs, gamble etc. as a form of relieving
stress and thereby coping with daily hassles. Such stressors may contribute to the continuation of an addiction, and
increase relapse rates, as daily hassles change from day to day and are never `gone' as such.
Hajek et al, 2010: smoking has actually been found to increase stress, so stress may be a risk factor for
smoking but doesn't actually relieve stress. Paradoxically, once a smoker has become addicted, they may
become more stressed as the desire to have another cigarette is stressful, and therefore when they have
one, stress is reduced
Traumatic Stress People exposed to severe stress are more vulnerable to addictions, in particular children who
have experienced loss or abuse.
Driessen et al, 2008: 30% of drug addicts and 15% of alcoholics also suffered from PTSD
Clongier, 1987: stress may create vulnerability in some but not all people. Some individuals may drink to
reduce tension whereas others may drink to relieve boredom.
Eiser et al, 1991: smokers befriend smokers, non-smokers befriend non-smokers
McAlister et al, 1984: increased levels of smoking are linked to peers' encouragement and approval
Social Learning Theory Bandura, 1990: Behaviours are learned through observation of others and subsequent
modelling of this behaviour, therefore young people are most likely to imitate the behaviour of those with whom
they have the most social contact, which can be used to explain why some people smoke.
However, this would also mean that smokers who socialise with non-smokers may feel the need to stop, and
so SLT can be seen as contradictory in a case such as this, where all individuals are friends around the same
Duncan et al, 1995: exposure to peer models increases the likelihood that teenagers will begin smoking
Eiser et al, 1989: perceived rewards (such as popularity and social status) are a large reason as to why
teenagers take up, and continue, smoking
Social Identity Theory Abrams and Hogg, 1990: assumes group members adopt norms and behaviours that are
central to the social identity of the group; in groups where `smoker' or `non-smoker' is central to the social identity of
the group, individuals are likely to be similar to one another in their smoking habits.
More likely than SLT as it also explains why many peer groups don't have addictions
Brown et al, 1997: in adolescence the social crowd (peers) might have a greater impact on smoking,
whereas later on in life, the best friend or romantic partner plays a greater role
Research from 2012: reviewed more than 2,300 patients aged from 17 to 86 years, found that some
personality traits associated with age are risk factors in different stages of life. Younger patients (from 17 to
35 years) are more likely to be impulsive and seek new sensations that act as precipitating factors of
Research is only correlational; whilst certain personality traits may be common amongst addicts, this does not
mean they predict addictive behaviour
Teeson et al, 2002: it is difficult to determine the aetiology; it is unclear whether personality traits affect
addiction risk or if addiction affects personality traits
Belin et al, 2008: evidence in rats: placed them in a device that allows them to self-administer doses of
cocaine; whilst pleasure-seekers started taking large doses, impulsive rats started on smaller doses but were
the ones to become addicted; animal research cannot be applied to a wider population; methods were
Weintraub et al, 2010: found evidence in humans. Addiction is linked to dopamine, and the study suggests
that high levels of dopamine lead to impulsivity, which may cause addiction there is an indirect effect from
Other pages in this set
Here's a taster:
Neuroticism and psychoticism Eysneck, 1967: proposed a biological theory of personality based on three
dimensions: extraversion-introversion, neuroticism and psychoticism.
Francis, 1996: found a link between addiction and high scores on both neuroticism and psychoticism
Tri-dimensional theory of addictive behaviour Clongier, 1987: proposed three personality traits that
predispose individuals towards substance dependence: novelty seeking, harm avoidance and reward dependence.…read more
|
0.9005
|
FineWeb
|
```json
[
"Risk Factors",
"Social Learning Theory",
"Personality Traits"
]
```
|
Prep 20 mins
Cook 40 mins
A different banana cake than my nana made. You will need 2 large over-ripe bananas to make 1 cup of mashed banana.
- 1 cup caster sugar
- 1 cup water
- 2 medium bananas, sliced thinly (400g)
- 2 eggs, beaten lightly
- 2⁄3 cup vegetable oil
- 3⁄4 cup firmly packed brown sugar
- 1 teaspoon vanilla extract
- 2⁄3 cup plain flour
- 1⁄3 cup wholemeal self-rising flour
- 2 teaspoons mixed spice
- 1 teaspoon bicarbonate of soda
- 1 cup mashed over-ripe banana
- Preheat oven to moderate (180°C/160°C fan-forced).
- Grease deep 22cm-round cake pan; line base with baking paper.
- Stir caster sugar and the water in medium saucepan over heat, without boiling, until sugar dissolves; bring to a boil.
- Boil, uncovered, without stirring, about 10 minutes or until caramel in colour.
- Pour toffee into pan; top with sliced banana.
- Combine egg, oil, brown sugar and extract in medium bowl.
- Stir in sifted dry ingredients, then mashed banana; pour mixture into pan.
- Bake, uncovered, about 40 minutes.
- Turn onto wire rack, peel off baking paper.
- Serve cake warm or at room temperature.
|
0.5296
|
FineWeb
|
```
{
"topics": [
"Ingredients",
"Instructions",
"Cooking"
]
}
```
|
This venue has two concert halls in one space. One of them is called The Ballroom, which has a capacity of 1500 and the other is The Studio, which can hold 150 people. Both have separate bars and restrooms, stages, sound, and lighting systems. The 1920's come alive in this Warehouse with leather sofas and strategically placed antique pieces. A lot of non-metered street parking is close by.
- Type: Concerts
- Accept Credit Card: visa, mastercard, amex
|
0.5879
|
FineWeb
|
```json
[
"Venue Description",
"Concert Halls",
"Payment Options"
]
```
|
Nanoprinter Could Mass-Produce Nano-devices
CAMBRIDGE, Mass. – Just as the printing press revolutionized the creation of reading matter, a “nano-printing” technique developed at MIT could enable the mass production of nano-devices currently built one at a time.
The most immediate candidate for this innovation is the DNA microarray, a nano-device used to diagnose and understand genetic illnesses such as Alzheimer’s, viral illnesses such as AIDS, and certain types of cancer. The ability to mass produce these complex devices would make DNA analysis as common and inexpensive as blood testing, and thus greatly accelerate efforts to discover the origins of disease.
The demand for ever-shrinking devices of ever-increasing complexity in areas from biomedicine to information technology has spurred several research efforts toward high-resolution, high-throughput nano-printing techniques. Now researchers led by Professor Francesco Stellacci of the Department of Materials Science and Engineering have developed a printing method that is unmatched in both information content per printing cycle and resolution. They achieved the latter using what Arum Amy Yu, an MSE graduate student and member of the research team, calls “nature’s most efficient printing technique: the DNA/RNA information transfer.”
A paper on the work was published in May in the ASAP online section of the journal Nano Letters. Stellacci and Yu’s coauthors are Professor Henry Smith and Tim Savas from MIT’s Department of Electrical Engineering and Computer Science and Research Laboratory of Electronics, and G. Scott Taylor and Anthony Guiseppe-Elie from Virginia Commonwealth University.
In the new printing method, called Supramolecular Nano-Stamping (SuNS), single strands of DNA essentially self-assemble upon a surface to duplicate a nano-scale pattern made of their complementary DNA strands. The duplicates are identical to the master and can thus be used as masters themselves. This increases print output exponentially while enabling the reproduction of very complex nano-scale patterns.
One such pattern is found on a DNA microarray, a silicon or glass chip printed with up to 500,000 tiny dots. Each dot comprises multiple DNA molecules of known sequence, i.e. a piece of an individual’s genetic code. Scientists use DNA microarrays to discover and analyze a person’s DNA or messenger-RNA genetic code. This allows for, say, the early diagnosis of liver cancer, or the prediction of the chances that a couple will produce a child with a genetic disease.
Frequent, widespread use of these devices is hindered by the fact that producing them is a painstaking process that involves at least 400 printing steps and costs approximately $500 per microarray.
MIT’s nano-printing method requires only three steps and could reduce the cost of each microarray to under $50. “This would completely revolutionize diagnostics,” said Stellacci. With the ability to mass produce these devices and thus make DNA analysis routine, “we could know years in advance of cancer, hepatitis, or Alzheimer’s.”
Another benefit would be large-scale diagnostics that could provide useful information about disease. Take diabetes. “We don’t know if it’s genetic. The only way to find out is to test a lot of people,” said Stellacci. “The more we test with microarrays, the more we know about illnesses, and the more we can detect them.”
SuNS has applications beyond DNA microarrays. Materials both organic and inorganic (metal nanoparticles, for example) can be made to assemble along a pattern composed of DNA strands. This makes SuNS a versatile technology that could be used to produce other complex nano-devices currently manufactured slowly and expensively: micro- and nano-fluidics channels, single-electron transistors, optical biosensors and metallic wires, to name a few.
On the Web:
|
0.9422
|
FineWeb
|
["Nanoprinting", "DNA Microarrays", "Nano-devices"]
|
The proliferation signal inhibitors (PSIs)-sirolimus, everolimus, and temsirolimus-have been associated with a noninfectious pneumonitis characterized by lymphocytic alveolitis and bronciolitis obliterans with organizing pneumonia (BOOP). This condition usually occurs within the first year. Herein we presented a case of a deceased donor renal transplant with interstitial pneumonitis developing 6 years after a switch from tacrolimus to sirolimus due to chronic graft dysfunction. After the addition of intravenous pentamidine due to the suspicion of Pneumocystis pneumonia, there was marked clinical deterioration requiring intubation. Open lung biopsy revealed sirolimus-induced pulmonary toxicity (BOOP) with the additional finding of a drug-induced phospholipidosis (DIPL) that we ascribe to pentamidine treatment. After cessation of both drugs and application of corticosteroid therapy, there was only partial improvement. Eight months later the residual interstitial fibrosis demands supplemental home oxygen. We review the literature on PSI-induced pneumonitis and discuss the pathophysiology of a potential interaction with pentamidine. We caution against its use in the setting of PSI-induced pneumonitis. It is currently unknown whether these concerns also apply to prescription of other more commonly used medications associated with DIPL, eg, amiodarone and aminoglycosides.
Recommended CitationFilippone, E J; Carson, J M; Beckford, R A; Jaffe, B C; Newman, E; Awsare, B K; Doria, C; and Farber, J L, "Sirolimus-induced Pneumonitis Complicated by Pentamidine-induced Phospholipidosis in a Renal Transplant Recipient: A Case Report." (2011). Department of Medicine Faculty Papers. Paper 63.
|
0.6303
|
FineWeb
|
```json
[
"Proliferation Signal Inhibitors (PSIs) and Pneumonitis",
"Sirolimus-induced Pulmonary Toxicity",
"Drug-induced Phospholipidosis (DIPL)"
]
```
|
Different types of telescope
Choosing a telescope can seem a challenging task for the newcomer to astronomy. There is a bewildering number on the market, with many different names, types, sizes and descriptions.
Essentially, however, they all do the same thing. They act like a large eye to collect lots of light from the distant object being observed and then they magnify it.
There are other instruments that observe different forms of radiation from the universe, such as radio waves, but the observing tools that we are interested in are optical telescopes.
Despite the vast choice in the marketplace today, such telescopes come in two basic types – the refractor and the reflector. Variations of the basic forms include hybrids that combine elements from both.
In a simple refractor, or refracting telescope, the light-collecting part of the instrument is a large curved lens called an objective.
As parallel rays of light from an object deep in space pass through this lens, they are refracted, or bent, along the telescope tube towards a point where they converge, forming an image. The distance of this point from the lens determines the focal length that you may see mentioned in its description.
The second vital element of the refractor is the eyepiece, which is simply a magnifying lens, or set of lenses, that is used to enlarge the image produced by the main lens. Astronomers normally use a range of eyepieces so that they can magnify their observing targets by different amounts to suit different situations.
The basic reflector, or reflecting telescope, uses a curved mirror rather than an objective lens, to collect light from whatever is being observed. It was invented by Sir Isaac Newton and is sometimes also known as the Newtonian reflector.
You could look at it as a rather sophisticated version of the shaving mirror. Light travels into the telescope tube and travels the length of the tube before hitting this mirror, known as the primary.
It is then reflected back up the tube to a much smaller flat mirror, positioned at a 45-degree angle, called the secondary. This sends the light out through a hole in the of the side of the tube, where the rays converge to form an image.
As with the refracting telescope, the eyepiece is then placed at this position to magnify the image produced.
Why size matters
Whether you choose a refractor or a reflector, the size of your objective lens or primary mirror will determine how much light you collect from the object you are observing. As a rule, the more light you receive, the more you will be able to magnify it.
Which telescope type should I choose?
Both main types of telescope have their fans. Refractors are especially convenient as smaller, portable telescopes. The smallest useful size is usually considered to have an objective lens 60mm in diamater.
You can find both sorts of telescope from reputable manufacturers via the Skymania shops which are powered by Amazon. US visitors should click here to find suitable models and UK visitors should click here for their store.
Reflectors are cheaper to build when it comes to larger instruments and some amateurs are today working with mirrors 20 inches or more in diameter, although six or eight inches is a much more common size.
Refractors suffer an effect where light passing through the objective gets refracted to slightly different points depending on its colour. This is called chromatic aberration and leads to objects being observed showing colourful fringes around them.
Telescope manufacturers attempt to counter this failing by using a combination of lenses rather than one alone to form the objective. The most successful, and expensive, are called apochromatic refractors which show little if any signs of fringes. The problem does not affect reflecting telescopes.
Don’t forget that binoculars are good-value telescopes too! Celestron offer a SkyMaster 15×70 model that makes a useful addition to the armoury of any astronomer!
The photos are of popular Sky-Watcher brand telescopes and are courtesy of Optical-Vision.
|
0.6274
|
FineWeb
|
```
[
"Types of Telescopes",
"Refractor Telescopes",
"Reflector Telescopes"
]
```
|
PHP Operators Step By Step Tutorial – Part 8: PHP support one operator control error with the sign of at (@). If enhanced at one particular expression of PHP, hence mistake information yielded by the expression will be disregarded. If track_errors fitur is in enable, hence mistake information yielded by the expression will be kept in the global variable $ php_errormsg. This variable content will always be changed with the new mistake information of each re-evaluation. For that, check before the re-evaluation is done first if we would like to use the existing information in it.
Pay attention to the example of using Error control operator at script as following:
File name: errorcontroloperator.php
<title>Using Error Control Operator</title>
<h1>The example forusing error control operator</h1>
$myfile= @file ('errorcontroloperator.ph') or
die("failed opening file:error was '$php_errormsg'");
The result of executing errorcontroloperator.php:
Note: Operator @ is only work in the expression. For the simple order as if you take a value from something, you can add operator @ to its. For example, you earn enhancing it for the intake of variable, function, and include(), konstanta, etc. You cannot enhance it to the function of definition or class, or conditional structure of like and if of foreach, etc.
|
0.9659
|
FineWeb
|
```json
[
"PHP Error Control Operator",
"Error Handling in PHP",
"Using the @ Operator in PHP"
]
```
|
Inside: We share the earth with a number of unique creatures. On land and in sea, our world has unique organisms. Check out some weird animals who share our earth.
Now that technology is progressing at a mind numbing pace, scientists are able to explore depths of the ocean before inaccessible. New species are being discovered in many hard to explore ocean habitats. Many new sea species seem to defy evolutionary logic. Some of them defy even weird. Click To Tweet Sea horses that look like sea weed, octopuses that look like they swam out of a Disney cartoon and fish that look like a big pile of glop. Look at and read about the following weird animals. Feast your eyes on these wonders of evolution as your brain tries to wrap itself around the weird combinations of characteristics that nature has found adaptable to life!
The Leafy Seadragon or Phycodurus eques, is camoflaged to look like sea weed. It is a relative of the sea-horse.
Octopuses from the Grimpoteuthis genus are deep-sea animals. They have eyes on the sides of their “head” and two ear-like fins that they use to propel themselves.
The blob fish, Psychrolutes marcidusrom, is another deep-sea fish living in waters off the coasts of Australia, New Zealand and Tasmania. Its body is a gelatinous mass with a density just greater than water which allows it to float just above the sea floor. It lacks developed muscles and relies on eating food matter that passes in front of it. On land, its body collapses and it looks like a very ugly Jabba the Hut from Star Wars fame.
The Proboscis monkey, Nasalis larvatus, lives only on the island of Borneo and is an endangered species due to deforestation. It only eats unripe fruit because the sugars in ripe fruit can have a deadly bloating effect. Their weird proboscis creates a unique howling the males use to attract mates.
The Yeti crab, Kiwa hirsuta, was discovered in 2005, at a depth of 2200 meters, south of Easter Island in the South Pacific. It has colonies of filamentous bacteria growing in the downy-looking yellow “hair” that covers its front claws. It is not known if the bacteria are eaten by the crab or used in some sort of symbiotic relationship. The crab is known to eat green algae and small shrimp. Due to the lack sunlight at that depth, this crab has poorly developed eyes and is thought to be blind.
The maned wolf, Chrysocyon brachyurus, is the largest canid of South America. It has extremely long legs which are probably adaptive to its long grassland habitat. It produces a scent like that of a skunk. It does not hunt in packs like other dogs but is a solitary hunter feeding on small or medium-sized prey.
The Gerenuk, Litocranius walleri, also known as the giraffe-necked antelope is the only known species of the genus Litocranius. Its head is proportionally tiny but it has large eyes and ears. Its long legs and very long neck make this animal suitable for browsing leaves off of trees like the giraffe.
The Coconut Crab, Birgus latro, is a very large species of land hermit crab. It uses empty shells for habitat while it is a juvenile but develops a strong exoskeleton as an adult. It has incredible strength and has been rumored to have killed sleeping humans by crushing their skulls.
Native to the forests of the Americas, the Crystal frog gets its name from the transparent abdomen through which organs, including a beating heart, can be viewed.
The hummingbird hawk-moth, Macroglossum stellatarum, is a bizarre combination of insect and bird. It can hover and make the humming noise like its name-sake bird . But it is a moth belonging to the insect group. It provides an example of convergent evolution – two unrelated species developing similar adaptive characteristics in a similar niche. It flies during the day, night and even in the rain. It is a strong flier that finds permanent residence in warmer climates.
Mother nature, it seems, often has a sense of humor. Characteristics which seem bizarre or ill-suited often find success in a very specific niche. Were you familiar with any of these weird animals? Do you have any of your own discoveries to share? I would love to hear from you!
|
0.7323
|
FineWeb
|
["Weird Animals", "Evolutionary Wonders", "Unique Ocean Creatures"]
|
UNO is accredited by the Commission on Institutions of Higher Education of the North Central Association of Colleges and Schools. The commission can be contacted at:
- 30 North LaSalle St. Suite 2400
- Chicago, IL 60602-2504
- Telephone: 1-800-621-7440
UNO also has programs which are accredited or approved by the:
- National Council for Accreditation of Teacher Education
- Council on Social Work Education
- Engineers Council for Professional Development
- Technology Accreditation Commission/Accreditation Board for Engineering and Technology
- National Association for Industrial Technology
- American Home Economics Association (for undergraduate programs)
- American Dietetic Association
- American Assembly of Collegiate Schools of Business
- National Association of Schools of Music
- National Association of Schools of Public Affairs and Administration
- Educational Standards Board of the Boards of Examiners in Speech-Language Pathology and Audiology
- National Recreation and Park Association/American Association for Leisure and Recreation
- American Chemical Society
- American Library Association
Its courses are accepted for purposes of teacher certification by the Nebraska State Department of Education.
The School and Community Counseling programs are accredited by the Council for the Accreditation of Counseling and Related Educational Programs (CACREP), the national accrediting agency for Counselor Education programs.
Course credits from UNO are accepted by other member colleges and universities of the North Central Association and by member institutions of other regional accrediting agencies.
|
0.5193
|
FineWeb
|
["Accreditation", "Programs", "Certification"]
|
This graphic compares the RCS chronologies from the two slightly different data sets: red – the RCS chronology calculated from the CRU archive (with the 12 picked cores); black – the RCS chronology calculated using the Schweingruber Yamal sample of living trees instead of the 12 picked trees used in the CRU archive. The difference is breathtaking. Source Steve McIntire.
Most of us are familiar with the story of Piltdown man, sometimes called the man who never was. In 1912 a series of skull fragments and a jawbone were unearthed at Piltdown, a village in England. While the discovery was always regarded as controversial, it was not exposed as a fraud until 1943, consisting of the skull of a modern human and the jawbone of an ape. During those 40 years this hoax seriously impacted on the study of human evolution.
We can all remember the infamous hockey stick graph, made known to all of us in Al Gores “An inconvenient truth,” the one where the predicted temperature was to imminently go through the roof. Though widely discredited over the ensuing years it has continued to be used as a scare tactic in the quest for government action on global warming, the appeal for its promoters being profits in Gores case, and power over all over our activities and massive taxation in the case of governments. We would never consent to this other than in an emergency, so one has been manufactured for us.
I have maintained for some time now that GW is a scam having read numerous articles disputing the findings of the IPCC who maintain in an unscientific manner that the debate is closed. Now it appears that the basic information going into the hockey stick is shaky at best, and is most likely fraudulent.
In the following I have used Bishop Hill for the easy reading, the full article is recommended. For more information and ready reference to Steve McIntyre's posts go to “Watts Up With That?” “Quote of the week #20 – ding dong the stick is dead”
From “Bishop Hill”: l
The story of Michael Mann's Hockey Stick reconstruction, its statistical bias and the influence of the bristlecone pines is well known. McIntyre's research into the other reconstructions has received less publicity, however. The story of the Yamal chronology may change that.
… Back at the start of McIntyre's research into the area of paleoclimate, one of the most significant of these was called Polar Urals, a chronology first published by Keith Briffa of the Climate Research Unit (CRU) at the University of East Anglia. At the time, it was used in pretty much every temperature reconstruction around. In his paper, Briffa made the startling claim that the coldest year of the millennium was AD 1032, a statement that, if true, would have completely overturned the idea of the Medieval Warm Period. It is not hard to see why paleoclimatologists found the series so alluring.
……. In typical climate science fashion, just scratching at the surface of the Briffa archive raised as many questions as it answered. Why did Briffa only have half the number of cores covering the Medieval Warm Period that the Russian had reported? And why were there so few cores in Briffa's twentieth century? By 1988 there were only 12 cores used, an amazingly small number in what should have been the part of the record when it was easiest to obtain data. By 1990 the count was only ten, dropping still further to just five in 1995.
The reasoning behind Briffa's subsample selection may have been a mystery, but with the other information McIntyre had gleaned, it was still possible to perform some tests on its validity. This could be done by performing a simple sensitivity test, replacing the twelve cores that Briffa had used for the modern sections of Yamal with some of the other available data. Sure enough, there was a suitable Schweingruber series called Khadyta River close by to Yamal, and with 34 cores, it represented a much more reliable basis for reconstructing temperatures.
McIntyre therefore prepared a revised dataset, replacing Briffa's selected 12 cores with the 34 from Khadyta River. The revised chronology was simply staggering. The sharp uptick in the series at the end of the twentieth century had vanished, leaving a twentieth century apparently without a significant trend. The blade of the Yamal hockey stick, used in so many of those temperature reconstructions that the IPCC said validated Michael Mann's work, was gone.
|
0.5068
|
FineWeb
|
["Climate Change", "Scientific Fraud", "Global Warming"]
|
Until the advent of the Christian missionaries, most Bantu languages were unwritten languages and it is only in the recent years [1920s] that the task of reducing them to writing has been undertaken. However, the Roman alphabet (which was used for this end) has its limitations, and one must realize the difficulties of adapting such a limited number of symbols to the varieties of sounds which present themselves in the Bantu languages, which posses their own wonderfully exact set of phonetical laws.
In fact, I believe that any serious study of the Bantu languages can only be successful, if one prioritises its phonetic aspects, a task which will automatically lead to a greater knowledge of its grammar. It will also give us a new handle on the proper writing of Zulu, which is not the one we might prefer to write, but the one that is correct to write. It will give us the true Zulu division into words and sentences and it will give us the true spoken punctuation of sentences, quite apart from the influence of European modes of thought and European grammatical structure (adapted from the Introduction)
The Zulu Language: The Vowels, The Plain Consonants, The Explosives, The Bi-Labial Implosive, The Nasals, The Fricatives, The Laterals, The Afficates, The Semi Vowels, The Click Consonants, Phonetics in Relation to Morphology (Prepalatization, Contraction), Length, Stress and Sound-Groups, Tone in Zulu, Tonal Nuclei, Tonal Morphology, Zulu Phonetic Texts, Orthography, A New View of Grammar for Zulu
Re-edition. Originally published in Johannesburg in 1926.
|
0.8135
|
FineWeb
|
["Introduction to Bantu Languages", "Phonetics of the Zulu Language", "Zulu Grammar and Orthography"]
|
Ever since the appearance of Rolf Hochhuth’s play The Deputy in 1963, the role of Pope Pius XII during the WWII has been a subject of heated controversy, a controversy that has intensified in recent years as the Vatican proceeds with the investigation that may eventually lead to his beatification. Rychlak (Law/Univ. of Mississippi) here presents a defense of the pontiff.
The first third of the book offers a look at the early careers of Pius XII and Hitler, the situation of the Catholic church in the postwar world, the uneasy relations between the papacy and the governments of a united Italy that culminated in the Lateran Treaty, the rise of Nazism, and the negotiations that led to the 1933 concordat between Germany and the Vatican. The remaining two-thirds is largely made up of a review of the events of the war years, the statements and actions of the pope, and the reactions to them by the Allies, the Axis, and Jewish and humanitarian organizations. The last chapter considers questions frequently asked about Pius and his behavior during the war. Was he an anti-Semite? Would a statement from Pius have diminished Jewish suffering? Should he have excommunicated Hitler? An epilogue contains a detailed refutation of John Cornwell’s controversial study Hitler’s Pope (1999, not reviewed). On every count, Rychlak finds the case against Pius wanting. Rychlak says that “to evaluate [Pius’s] performance, one must begin by looking at all of the evidence in context,” and so he has surrounded Pius’s story with details that will be familiar to many readers and are of arguable relevance to a judgment on Pius. Even in the context Rychlak provides, some of the more serious charges (such as Pius’s reaction to the Nazi roundup of Jews of Rome in October 1943) remain disturbing; others (like the alleged assistance the church gave to fugitive war criminals) are disposed of in passing.
Readers who are looking for an answer to Cornwell may find this book helpful; those who have followed the controversy about Pius XII will find little new here.
|
0.6083
|
FineWeb
|
```
{
"topics": [
"Pope Pius XII's role during WWII",
"The controversy surrounding Pope Pius XII's actions",
"Defenses and criticisms of Pope Pius XII's behavior"
]
}
```
|
Aquarium of the Pacific - Online Learning Center - Species Print Sheet
Conservation Status: Safe for Now
Killdeer are “true” shorebirds, although they range far from shores. They have some of the most common characteristics of these birds such as long legs and a long bill, but unlike many wading birds, Killdeer have short necks.
At the Aquarium
This bird is no longer on exhibit at the Aquarium. The information provided is for educational purposes.
Breeding: throughout North America from western Alaska through northern Chile. Year-round: southern US. Northern populations migrate north in summer and south in winter, and may also migrate to parts of Western Europe.
Killdeer make use of both saltwater and freshwater habitats, often living far from the coast but most always near water of some sort. They frequent mudflats and beaches, but also favor golf courses, meadows, pastures, dry uplands, agricultural areas, parks, lawns, and even graveled parking lots and roofs. Unlike most shorebirds, they often live close to humans.
Males and female Killdeer look alike. The upper back and most of the head is brownish. White patches mark the eyes, chin, and belly. Adults have two black bars across the breast while juveniles have only one stripe. The eyes are dark and surrounded by a black band. The tail feathers usually have a black border and are often orange-tan in color. Beaks are black and the long slender legs are pink or flesh-colored.
They are medium sized shorebirds. They have a body length of 20 to 28 cm (8 to 11 in) and a wingspan of 46 to 48 cm (18 to 19 in). They weigh between 75 g (2.7 oz) and 128 g (4.5 oz). Males and females are approximately the same size.
These birds feed along water edges, on shorelines, mudflats, and in closely mowed pastures. They often follow plows to catch worms and insects exposed in the plowed soil. Their diet consists mainly of terrestrial invertebrates: earthworms, grasshoppers, and beetles. Occasionally they also use their pointed beaks to catch crayfish and mollusks, and to pick up seeds.
Killdeer probe the ground and muddy shallows with one foot using a quivering motion to expose their prey. In terrestrial environments, they search for prey by alternately running quickly, stopping, waiting as though to listen or look, then running again.
Breeding occurs during the summer except in the Caribbean where nesting is year-round. Males have a greater tendency to return annually to the same breeding sites than females do. Migratory Killdeer are generally seasonally monogamous, but resident birds commonly mate for life.
Males and females construct the nest in sand, grass, or gravel by scraping the ground with their feet to make a shallow depression. The nest is sometimes lined with pebbles or soft vegetation such as grasses and weed stalks. Clutches can consist of three to six eggs but the usual number is four. The eggs are gray-brown and spotted or scrawled with dark blotches, which allow them to blend in with the small stones often surrounding the nest.
Killdeer crouch over their eggs with wings extended to protect them from the sun. When the temperature gets high, the parent birds utilize ‘belly soaking’ as a cooling technique. The parent seeks out a water source to wet its breast feathers and then hovers over the eggs to cool them. Both parents incubate the eggs for 20- to 31 days.
Chicks hatch with downy feathers that are mottled brown, buff, and black on the back and white on the belly and chest. They have a single breast band (unlike adults that have two) and no obvious rump feather coloration. They are precocial, able to run after their parents and find food on their own within hours after hatching. When only a day old, the chicks make distress calls if they become isolated from their parents. The young fledge about 25 days after hatching.
Local Southern California areas include Seal Beach National Wildlife Refuge and Bolsa Chica Ecological Reserve. The birds that migrate do so both during the day and at night in flocks of 6 to 30 birds. When resting or foraging, individuals aggressively maintain distances from each other of 4-6 m (13.1 to 19.7 ft).
Killdeer react to human or other intruders by bobbing their bodies up and down while looking at the intruder. During the breeding season, they are famous for their “broken-wing act” or distraction display. If a predator, (or even a curious human), approaches the nest, the parent will twitter distress cries, fan its tail, and stumble away from its offspring. To enhance the effect, the parent will usually drag one or both wings against the ground. Often while one parent is displaying, the other takes over the nest. Once the threat is lead away from the nest, the defending bird will run or fly away, screaming to further distract the menace.
If ambient temperatures approach 40 o C (110o F) while a Killdeer is incubating eggs, the adult will open its mouth and begin to pant, much as a dog does to cool off. If the temperature continues to increase, the bird will stand over its eggs with mouth open, often dripping water from its bill.
Because Killdeer are migratory, they are protected under the Migratory Bird Treaty Act, a treaty of the US, Canadian, and Mexican governments.
Once the target of market hunters that resulted in serious declines in the population, Killdeer have recovered to become a very common shorebird. However, bird counts indicate that populations are declining in western states. Their wide range and willingness to nest near human activity allow them to survive in a variety of places where human activities expose them to pollutants such as pesticides and oil.
The common name, Killdeer, comes from the noise these birds make when alarmed—a distinct kill-deer cry. Their scientific species name, vociferous, is Latin for noisy. About two days before hatching, Killdeer chicks start making soft audible peeps. Some scientists believe that this may result in hatching of all the eggs at the same time.
Precocial chicks such as Killdeer are well developed when they hatch and require little to no parental care. In contrast, altricial chicks are blind, naked, helpless at hatching, and dependent on adult care for survival. A Killdeer chick stays in the egg two weeks longer than an altricial bird of the same size such as an American Robin so on hatching, it is two weeks older than a one day old Robin. In addition Killdeer eggs are twice as large as a Robin’s and contain more nourishment to sustain the embryo for the longer time it is in the shell.
|
0.9147
|
FineWeb
|
```json
[
"Killdeer Characteristics",
"Habitat and Behavior",
"Breeding and Conservation"
]
```
|
7MS #155: Million Dollar Pentest Idea, Notepad Tricks and LL Bean Jackets for Dogs
Things discussed today:
- We could make $1M if we made a tool that could correlate data from all the popular pentesting tools.
- The differences in vuln descriptions between AppSpider and Nexpose really grind my gears!
- My parents' dog wears a $50 LL Bean jacket - wha?
If you have a URL list with lots of junk characters before/after the address (like I do when I copy/paste from AppSpider) here's how you can clean that up in Notepad++:
- Copy/paste the list of URLs into Notepad++.
- Do a Ctrl+F, click Replace, and search for Regular Expression of Root Cause.* and then Replace All with nothing.
- Click Replace All and everything at the end of the URLs will be nuked.
- Do the Replace All again, but this time with URL:. as the regular expression.
- Then everything before the URL will be nuked and you'll have a nice clean list of URLs to work with!
|
0.9357
|
FineWeb
|
```json
[
"Pentesting Tools",
"Notepad Tricks",
"Miscellaneous Topics"
]
```
|
Was the League of Nations a paper tiger?
The League of Nations was an international organization, headquartered in Geneva, Switzerland, created after the First World War to provide a forum for resolving international disputes and promoting the idea of collective security. It was first proposed by President Woodrow Wilson as part of his Fourteen Points plan for an equitable peace in Europe.
In 1920s, the League had ever settled a number of disputes between small nations. It settled a dispute between Sweden and Finland over some nearby islands. It also settled the boundary problems between Poland and Germany, and between Yugoslavia and Albania. It also stopped Greece from attacking Bulgaria. By imposing economic sanctions, the League successfully settled these international disputes.
Moreover, the special commissions and agencies of the League did help solve a number of social and Economics of the world. For example, the League helped the refugees from the First World War rebuild their home, and provided assistance in issues such as protection of ethnic Minorities, drugs, and education.
Superficially, the League had done a lot for encouraging international cooperation and improving people's lives. However, it was unable to stop and check the aggressive actions of powerful countries in the inter-war period. Its failure had encouraged the outbreak of the
Second World War.
The League failed to stop the spread of Fascism and Nazism. When facing the aggression of great powers, the League could do nothing as lack of armed force. For example, the League failed to stop the invasion of Italy in Abyssinia and the invasion of Japan in China. Furthermore, the League had no achievement in reducing armaments in the World Disarmament Conference.
So, it can be said the League was a paper tiger with only symbolic and superficial power and ineffectual to withstand challenge in achieving its aims.
Please join StudyMode to read the full document
|
0.5811
|
FineWeb
|
```json
[
"History of the League of Nations",
"Failures of the League of Nations",
"International Cooperation and Collective Security"
]
```
|
||It has been suggested that Deer stalking be merged into this article. (Discuss) Proposed since May 2015.|
New Zealand has had 10 species of deer (Cervidae) introduced. From the 1850s Red deer were liberated, followed by Fallow, Sambar, Wapiti, Sika, Rusa, and White-tail. The introduced herds of Axis and Moose failed to grow, and have become extinct. In the absence of predators to control populations, deer were thought to be a pest due to their effect on native vegetation. From the 1950s the government employed professional hunters to cull the deer population. Deer hunting is now a recreational activity, organised and advocated for at the national level by the New Zealand Deerstalkers' Association.
The deer most sought after in North America, east of the Rocky Mountains, is the white-tailed deer. West of the Rockies, the mule deer is the dominant deer species. Blacktail deer are dominant along the west coast (west of the Cascade Range) from Northern California to Southeast Alaska, with introduced populations in Prince William Sound and the Kodiak Archipelago. The most notable differences between these deer, other than distribution, are the differences in ears, tail, antler shape (the way they each fork), and body size. The mule deer's ears are proportionally longer than the ears of a white-tailed deer, they also have different color skin and brighter faces and resemble that of a mule. Mule deer have a black-tipped tail which is proportionally smaller than that of the white-tailed deer. Buck deer of both species sprout antlers; the antlers of the mule deer branch and rebranch forming a series of Y shapes, while white-tailed bucks typically have one main beam with several tines sprouting from it. White-tailed bucks are slightly smaller than mule deer bucks. Both of the species lose their antlers in January, and regrow the antlers during the following summer beginning in June. Velvet from the antlers are shed in August and September. Each buck normally gets larger each year as long as good food sources are present. Antler growth depends on food sources. If food is not good one year, antlers will be smaller. Many deer do not reach their full potential due to getting hit by automobiles, also known as road kills.
In Hawaii, axis deer were introduced into the environment in the 1950s. Having no predators their numbers quickly grew and they are considered an "invasive species" especially on the islands of Lanai and Maui. Recently there have been sightings of axis deer on the big island of Hawaii. Most of the deer hunting on Maui is on privately held lands.
Moose and elk are also popular game animals that are technically species of deer. However, hunting them is not usually referred to as deer hunting, it is called big game hunting. They are considerably larger than mule deer or white-tailed deer, and hunting techniques are rather different.
Deer hunting seasons vary across the United States; some seasons in Florida and Kentucky start as early as September and can go all the way until February like in Texas. The government agency such as the DFW (Department of Fish and Wildlife) regulate the durations of these hunting seasons. The length of the season is often based on the health and population of the deer herd, in addition to the number of hunters expected to be participating in the deer hunt. The durations of deer hunting seasons vary from state to state, and can even be different on a county basis within a specific state (as is the case in Kentucky). The DFW will also create specific time frames within the season where the number of hunters able to hunt is limited; this is known as a controlled hunt. The DFW will also create different time periods where you are only allowed to use a specified type of weapon: bows only (compound, recurve and crossbows), modern firearms (rifles and shotguns) or muzzleloaders. For example, during a bows-only season, in many areas you would be limited to the use of a bow and the use of any firearm would be prohibited until that specific season opens. Similarly, during a muzzleloader season, use of modern firearms is almost always prohibited. However, in many states, the archery season completely overlaps all firearms seasons; in those locations, bowhunters may take deer during a firearms season. Some states also have restrictions on hunting of antlered or antlerless deer. For example, Kentucky allows the taking of antlerless deer during any deer season in most of the state, but in certain areas allows only antlered deer to be taken during parts of deer season.
There are six species of deer in the UK : red deer, roe deer, fallow deer, Sika deer, Reeves muntjac deer, and Chinese water deer, as well as hybrids of these deer. All are hunted to a degree reflecting their relative population either as sport or for the purposes of culling. Closed seasons for deer vary by species. The practice of declaring a closed season in England dates back to medieval times, when it was called fence month and commonly lasted from June 9 to July 9, though the actual dates varied. It is illegal to use bows to hunt any wild animal in the UK under the Wildlife and Countryside Act 1981.
UK deer stalkers, if supplying venison (in fur) to game dealers, butchers and restaurants, need to hold a Lantra level 2 large game meat hygiene certificate. Courses are run by organisations such as Basc (British association for shooting and conservation) and this qualification is also included within the Level 1 deer stalking certificate. If supplying venison for public consumption (meat), you need to have a fully functioning and clean larder that meets FSA standards and to register as a food business with your local authority.
"Deer stalking" is widely used among British and Irish sportsmen to signify almost all forms of sporting deer shooting, but classically refers to hunting red deer, usually accompanied by a ghillie who knows the estate. This can involve long stretches of crawling across coverlesss moorland to get close enough to the nervous deer to use a rifle. Owners of estates can derive good incomes from charging for the right to hunt and providing a ghillie, especially in the Scottish Highlands. In Europe deer are more often hunted in forests, and payment to the owners is often required. In North American sporting usage "deer hunting" is the term used, and typically involves a small group of hunters in wooded country, without payment. In Britain and Ireland "deer hunting" has historically been reserved exclusively for the sporting pursuit of deer with scent-seeking hounds ("stag hounds"), with unarmed followers typically on horseback.
Deer were first introduced to Australia between 1800 and 1803. All states and territories have populations of deer including many coastal islands. Deer hunting in Australia is mostly practised on the eastern side of the country. Hunting access varies from state-to-state with varying classifications from pest species to game animal with some species afforded the protection of hunting seasons and a requirement for a Game Hunting permit or licence. In New South Wales, the licensing system was previously regulated by the statutory authority Game Council NSW however it is now suspended in that state pending the creation of a new agency. In the states of Queensland and South Australia deer hunting is completely legal with no licence required as deer are classified as a pest species.
The sport is aided by the Australian Deer Association, which handles hunter education, lobbying on behalf of the industry, and maintains the Australian Antlered Trophy Register.
Hunting Methods and Seasons
There are five common methods of hunting. The first method is stand hunting. This is generally the most common method, depending on the terrain. This is done by waiting where deer are likely to travel. Stand hunting is commonly done in an elevated tree stand, but it can be done in a blind on the ground, although hunting blinds are generally on the ground they are often more common to use because it allows more cover for the hunter. Blinds allow the hunter to get away with more movement, as well as blocking the hunter's scent from contaminating the air and alerting the deer. Tree stands are usually placed 8 to 30 feet above the ground. The stands are made of metal or wood. Stands are often placed at the edge of fields of crops such as corn, wheat, buckwheat, alfalfa, clover, soybeans, cotton and many others. Often, hunters plant crops in strategic locations solely for the purpose of attracting deer. Food plots are very effective while hunting deer because deer spend the majority of their time eating getting the nutrients and the fats that they need to survive the winter. without good feeding ground the deer will travel for miles if needed to find good feeding sources. which is why planting food plots for the deer work so well. it keeps the deer close by and improves your chances on harvesting quality deer. This is known as a food plot. Stands are also placed in the woods on the edge of trails that the deer travel on. Some states allow bait to be placed near these stands to attract the deer. This is different from planting a crop. The most common bait is corn.
The second method is commonly known as still hunting: walking along through the woods or along the edge of a field and looking for a deer. The hunter often stops and waits for a few minutes, then moves on and repeats this cycle.
The third method is a deer drive, which consists of flushing deer toward a line of hunters. Hunters form a line and walk through fields or brush towards another line, hoping for a shot or driving the deer toward the other line of hunters. Hunters in the second line may be in tree stands or on the ground. Hunters in lines are a hundred yards to one hundred and fifty yards apart.
The fourth method is known as spot and stalk hunting, which consists of spotting and then stalking in close enough to shoot the deer. Spot and stalk hunting is generally a method of hunting used in places where there are large visible areas, such as mountainous terrain or rolling hills.
The fifth method is known as dog hunting. This method uses dogs to chase the deer. A group of hunters draw numbers out of a hat to determine what "stand" they are going to. The hunter then goes to the number he drew, and hopes the dogs will chase the deer by him. This method of hunting uses shotguns with Buckshot. However, in some states such as Wisconsin, it is illegal to use this method to hunt whitetail deer.
A sixth method, often used by bow hunters, and some gun hunters, during breeding seasons, is to use scents and decoys to draw bucks into range for a successful shot. This can be very effective during the "rut". Hunters use doe in esterous scent to pique a buck's interest and decoys to fix the visual interest of the buck away from the hunter, who is often concealed in a blind or tree stand.
There are other things involved in deer hunting that will result in a successful hunt: A healthy deer herd is one of the most important factors contributing to a successful hunting season. Preparation is important; a hunter will scout areas they plan to hunt several months before the season opens. One way a hunter may scout is by placing a remote camera, commonly referred to as a trail camera or game camera, in locations that show recent deer activity. These cameras, using infrared radiation, take photos when triggered by heat or pre-determined time intervals, and give hunter an idea of what deer may be in the area. Hunters then view camera photos individually or use trail camera photo software to help them pattern specific bucks and decide where to hunt.
They will also plant food plots to bring deer to the area or bait the area with corn or oats. They will build tree stands or make ground blinds. They will sight in rifles to make sure the guns shoot straight. They will make sure they have lures, food, water, and all equipment necessary for hunting. Hunting cabins will be stocked with food and water.
Another method used for hunting which is very important is camouflage. It is designed to break up your human outline so you will not be spotted easily by the animal you may be hunting. For instance deer, deer are color blind and all they see is black, white, and grey colors. using camouflage which has greens, blacks, grays, light brown, dark brown, and all sorts of different shades are made to make you blend in to your surroundings. Breaking up the human outline and blending in will give you that much more of an advantage on not being spotted by deer which will help you be more successful while hunting.
Methods of pursuing game and corresponding seasons are subject to government regulations, which are determined by each state.
United Kingdom and Republic of Ireland
The vast majority of deer hunted in the UK are stalked. The phrase deer hunting is used to refer (in England and Wales) to the traditional practice of chasing deer with packs of hounds, currently illegal under the Hunting Act 2004.
In the late nineteenth and twentieth centuries, there were several packs of staghounds hunting "carted deer" in England and Ireland. Carted deer were red deer kept in captivity for the sole purpose of being hunted and recaptured alive. More recently, there were three packs of staghounds hunting wild red deer of both sexes on or around Exmoor and the New Forest Buckhounds hunting fallow deer bucks in the New Forest, the latter disbanding in 1997. The practice of hunting with hounds, other than using two hounds to flush deer to be shot by waiting marksmen, has been banned in the UK since 2005; to date, two people have been convicted of breaking the law.
Most of the deer hunting in Scandinavia is by hunters driving the game towards other hunters posted in strategic locations in the terrain, though there is also a fair bit of stalking.
Prehistoric cave painting of a deer in Cueva de La Pasiega, Spain
An example of a Goguryeo tomb mural of hunting, Korea
Goddess Diana as hunter
(Peter Rubens )
Archery season usually opens before the gun season and may continue for after the gun season has ended. Modern compound bows and recurve bows are used, as well as some longbows. Bows usually have a draw of 35 pounds (15.9 kg) or more. Most hunters use sixty pound (27.2 kg) draw weight with aluminum or carbon fiber arrows although wooden arrows are still used. Crossbows were once more used by disabled hunters who wanted an opportunity to still hunt during archery season. However, in the recent years many states have legalized the use of crossbows for all hunters and thus invite new enthusiasts to take part in the market.
Rifles, shotguns, and pistols are all commonly used for hunting deer. Most regions place limits on the minimum caliber or gauge to be used. Most states require centerfire rifles which is of a caliber larger than .229 in diameter. States that allow shotguns, the minimum gauge is twenty gauge or larger, which includes 16 gauge, 12 gauge and 10 gauge. When hunting with a shotgun, a bullet is used, which is called a shotgun slug. A shotgun slug is a round piece of lead or copper that may or may not have a pointed tip. Its compacted in a paper or plastic shell. Pistols are centerfire which include .357 or .44 magnum. Rimfire rifles of .22 caliber are often prohibited due to the inability of the caliber to kill a deer effectively which brings about ethical concerns.
Muzzleloader hunting is becoming a popular way of hunting with the introduction of many new muzzleloaders that use more practical techniques of reloading shots and appeal to a more broad range of hunters. Most states require that the muzzleloader be a .45 caliber or larger, with .50 caliber being a very popular caliber by means of availability. Muzzleloader hunting has broken itself down into two categories with the use of traditional muzzleloaders and the use of modern muzzleloaders. Traditional involves the use of open sighted rifles, probably with the use of a side locking mechanism that either hammers a cap to ignite the charge or a sparking mechanism known as a flint-lock that sparks and ignites the charge inside the barrel. Ammunition among traditionalists include whole lead shot which may be a ball but bullet shapes have become popular for their accuracy. Powder is measured and poured when doing traditional hunting. Modern muzzleloaders have become advanced in that they are able to perform well alongside some cartridge rifles. CNC machining allows for more accurate barrels. Magnified scopes are normally seen mounted if the state the hunter is in allows the use of scopes on muzzleloaders. Another recent change is that some hunters now use high-pressure smokeless powder in specially-built muzzleloaders instead of low-pressure black powder, requiring less powder to be used and getting a more powerful and accurate shot. Available ammunition now includes saboted rounds consisting of a small-diameter bullet surrounded by a large-diameter sabot which drops away from the bullet as it exits the muzzle. Saboted rounds are usually a copper-jacketed bullet (much like what is used to load cartridge ammunition) encased with a plastic sleeve that seals the barrel for a more powerful and consistent shot than traditional muzzleloader ammunition.
Hunting deer with edged weapons, such as the lance or sword, is still practiced in continental Europe. In such hunts, the hunters are mounted on horseback, and use packs of deerhound or greyhound dogs to track and drive deer.
Hunters employ many tools including camouflage clothing, tree stands or blinds of wood or metal, axes, knives, vehicles, chainsaws, deer calls, lures, walkie talkies, cell phones, and handheld GPS units.
Regulations often limit the type of weapons that may be used, as well as accessories and communications devices. For instance, in many cases only calibers beyond a certain size and power may be used, to reduce the chance that the animal will be wounded but not quickly killed. Similarly, hunting with lights, night-vision devices, and radio communications is often restricted. The regulations may vary from season to season and depending on the jurisdiction.
- Bayou Bucks (documentary)
- Big Buck Hunter
- Deer Act 1980 (in the UK)
- Deer farm
- Deer horn
- Deer Hunter - video game
- Deer Avenger - video game
- Deerskin trade
- Reindeer hunting in Greenland
- James Jordan Buck
- Hole in the Horn Buck
- http://www.teara.govt.nz/en/hunting/3 Hunting today - Te Ara Encyclopedia of New Zealand
- "Deer Hunting Zones and Seasons". Kentucky Department of Fish & Wildlife Resources. Retrieved January 23, 2015.
- Naturenet: Shooting, Hunting and Angling Seasons. Naturenet - Countryside Management & Nature Conservation.
- Forests and Chases of England and Wales: A Glossary. St John's College, Oxford.
- Game Council NSW
- Bentley, A (1967), An Introduction to the Deer of Australia.
- "Hunting blind".
- Gegelman, Andrew, Spot and Stalk Hunting - The Lost Art. Nodak Outdoors.
- 1hafc Deer Hunting Advice. Hunting And Fishing In Colorado.
- "DeerLab". DeerLab Trail Camera Photo Software. October 1, 2013.
- "Hunting duo appeal is turned down". BBC News. 2007-10-19. Retrieved 2010-05-01.
- Cassidy, Martin (2005-02-08). "Frustrations of hunter and hunted". BBC News. Retrieved 2010-05-01.
- [dead link]
|
0.5031
|
FineWeb
|
```json
[
"Deer Hunting Methods",
"Deer Species and Habitats",
"Deer Hunting Regulations"
]
```
|
Services on Demand
Revista Brasileira de Zoologia
Print version ISSN 0101-8175
CINTRA, Renato and CANCELLI, Jessica. Effects of forest heterogeneity on occurrence and abundance of the scale-backed antbird, Hylophylax poecilinotus (Aves: Thamnophilidae), in the Amazon forest. Rev. Bras. Zool. [online]. 2008, vol.25, n.4, pp. 630-639. ISSN 0101-8175. http://dx.doi.org/10.1590/S0101-81752008000400008.
Recently, a significant number of studies on neotropical forest bird communities have focused on factors influencing their richness, abundance, and habitat selection. However, few of them have considered populations or individual species, and how habitat structure affects their distribution and abundance. In this study, we investigated how the combined effects of some forest structure components affect the occurrence and abundance of a resident bird species, the scale-backed antbird Hylophylax poecilinotus (Cabanis, 1847). We tested the null hypothesis of no difference between the variation in forest structure components at locations where birds occurred and at locations where they did not. In a pristine Terra Firme forest at the Ducke Reserve, Manaus, we recorded bird occurrence and abundance using mist nets in 56 transects (1 km long each) within a 9 x 9 km trail grid covering 6400 ha. Also in the same 56 transects, we set 50 x 50 m plots and recorded the following seven components of forest structure and landscape: 1) canopy opening, 2) leaf litter, 3) tree abundance, 4) logs, 5) snags, 6) streams, and 7) elevation. We evaluated their effects on avian occurrence and abundance by using models of Multiple Logistic Regression (for bird occurrence) and Multiple Linear Regression (for bird abundance). The results suggested that H. poecilinotus occurred significantly more often in lowland areas, in areas located farther away from streams, and in areas bearing thicker leaf litter. Hylophylax poecilinotus was also more abundant in lowland areas and in areas located further away from streams. Overall, the results indicated that environmental heterogeneity produced by variation in forest structure components affects habitat use by this bird species in the Amazon forest.
Keywords : Birds; micro-habitat structure; Terra Firme Forest.
|
0.7351
|
FineWeb
|
["Birds", "Forest Structure", "Habitat Selection"]
|
Some subsurface animals burrow and dig tunnels. Others, in sandy environments like the deserts of Arizona or the Sahara, wiggle along under the surface in a way that looks like swimming.
And it is, according to Daniel I. Goldman, a physicist at Georgia Tech, because granular substances like sand have the properties of solids and fluids. For this kind of swimming, he and a group of colleagues have shown that long and skinny is a very good shape. And they have also shown some surprising reasons for that.
Dr. Goldman and his colleagues had done a lot of research on a lizard called the sandfish. They used something called resistance force theory, developed decades ago to explain how some micro-organisms move.
The theory involves treating a moving body as many independent small bits and analyzing each separately. The theory predicted that although the somewhat stubby sandfish was good at sand-swimming, something long and slender was likely to be better.
The shovel-nosed snake seemed like a good animal to test.
Dr. Goldman, Sarah S. Sharpe, then also at Georgia Tech, and other researchers at Harvard and Zoo Atlanta captured the snakes in their native Arizona and took them to Georgia Tech, where they used high-speed X-ray video to track their movement. The scientists published their results in The Journal of Experimental Biology.
“We were interested in how they move in the sand — nobody actually knew that — and how they compared to the lizard we’ve studied extensively,” Dr. Goldman said. The first answer was that long and thin did work better. The snake body was quicker and more efficient than the lizard shape.
It might seem that streamlining — having to push less sand aside — would be the reason, but it wasn’t. Instead, the length and flexibility of the snake’s body allowed it to move with all the twists and turns necessary as waves moved down its body from head to tail.
In sand-swimming, Dr. Goldman said, the animals produce what could be thought of as a kind of puddle in the tube they are moving through — not of real liquid, but of sand grains that behave as a liquid. And the theory also predicted that the snake’s skin should produce a lot less friction than the skin of the lizard. That was also proved true, at least on the snake’s belly.
The snake and lizard each use motions that are most economical for their body shapes, Dr. Goldman said, but over all, the long, slick snake is the more efficient sand swimmer.
That may be because it seems to spend more time underground than the lizard, which also runs along the surface. So the conclusion is that evolution has more finely honed the snake’s body for swimming.
ScienceTake combines cutting-edge research from the world of science with stunning footage of the natural world in action.
- Trump Unleashes on Kavanaugh Accuser as Key Republican Wavers
- Kavanaugh’s Yearbook Page Is ‘Horrible, Hurtful’ to a Woman It Named
- Opinion: Padma Lakshmi: I Was Raped at 16 and I Kept Silent
- Bill Cosby, Once a Model of Fatherhood, Is Sent to Prison for Sexual Assault
- Mormon Women’s Group Calls for Probe of Allegations Against Kavanaugh
- Trump Boasts and Scorns Globalism to Skeptical U.N. Crowd
- Opinion: Trump to China: ‘I Own You.’ Guess Again.
- Opinion: President Trump Addresses the United Nations (laughter)
- He Took Home Documents to Catch Up on Work at the N.S.A. He Got 5½ Years in Prison.
- Opinion: Pigs All the Way Down
|
0.5381
|
FineWeb
|
```json
[
"Sand-swimming animals",
"Subsurface movement",
"Sandfish and snake research"
]
```
|
This collection of classroom video segments help tell the fascinating story of the Kentucky's Governor's Mansion. Included are segments from the Michael Breeding Media documentary Kentucky’s Governor’s Mansion: A Century of Reflection. Narrated by Diane Sawyer, the documentary explores the architectural, political, and social history of the mansion, from the events that led to its construction in 1914 to its continuing unique role in the 21st century.
Also included are the mansion’s story told through the perspective of Kentucky Children and a storytelling performance from the KET series In Performance at the Governor’s Mansion.
Watch the complete Kentucky Governor’s Mansion: A Century of Reflection documentary.
|
0.5835
|
FineWeb
|
["History of the Kentucky Governor's Mansion", "Architectural Significance", "Documentary and Media Coverage"]
|
I’ve written before about the “Mosaic Theory” some courts have recently employed to conclude that certain forms of government surveillance may trigger Fourth Amendment protection in the aggregate, even if the surveillance can be broken down into components that don’t fall under the traditional definition of a Fourth Amendment “search.” This has been applied specifically to high-tech forms of location tracking, where several judges have concluded that a person may have a privacy interest in the totality of their public movements over a long period of time, even though observing a person at any particular public place in a specific instance is not an intrusion on privacy. I’ve explained in that previous post why I find this reasoning compelling. Legal scholar Orin Kerr, however, remains unmoved, and suggests that divergent decisions applying the Mosaic Theory to government acquisition of stored cell phone location records effectively serve as a reductio of that theory:
To my mind, this opinion reveals the absurdity of Maynard’s mosaic theory. The analysis is all “look ma, no hands.” No one knows where the line is, or even what the line is. Sure, you could just count days of surveillance: perhaps 30 days triggers a warrant but 29 days doesn’t. But there is no reason the access to records has to be continuous. The government can skip around days, or get records from a few days here and a few days there. Who can tell how much is enough? No one knows what is revealing, because what is revealing depends on what the records actually say — and no one but the phone companies know what they say. So Judge Orenstein has to wing it, announcing that “he cannot assume” that the information would be revealing because it has breaks in time. But it’s not clear to me why the break in time matters: It’s the same net amount of data collected, so I don’t know why it matters if it was collected all at once or over several discrete periods. And how much of a break matters? If 21 days is too long, is 21 days with a one-day break enough? How about a 3-day break? One week? No one knows, it seems, not even the judge himself. [….]
There are some readers who will say that the cause of justice sometimes requires hard decisions, and that if judges need to make arbitrary calls like that, then that is what we pay them to do in order to enforce the Constitution. But as I see it, the oddity of the inquiries called for by the Maynard mosaic theory shows why it is not part of the Constitution at all. In Fourth Amendment law, the lawfulness of government conduct has always been viewed discretely: Each government act is either a search or it is not a search. Under Maynard, conduct can be a non-search if viewed in isolation but a search if viewed in context — but there is no guide to tell how much context is proper. If you want to say that certain conduct is a search, then just be direct and say it’s a search. That’s fine. But a mosaic theory, in which non-searches become searches if grouped a particular way, has no proper place in Fourth Amendment law.
Orin’s point about the seeming arbitrariness of these determinations—and the difficulties it presents to police officers who need a rule to rely on—is certainly well taken. The problem is, the government is always going to have substantial control over how any particular effort at information gathering is broken into “acts” that the courts are bound to view “discretely.” If technology makes it easy to synthesize distinct pieces of information, and Fourth Amendment scrutiny is concerned exclusively with whether each particular “act” of information acquisition constitutes a search, the government ends up with substantial ability to game the system by structuring its information gathering as a series of acquisitions, each individually below the threshold.
Let’s consider a concrete case involving location monitoring. Under the Supreme Court’s ruling in United States v. Karo, technological location monitoring does count as a Fourth Amendment search requiring a warrant when it reveals information about where the tracking device is located within a private place, such as a home. On this theory, if the police want to be able to pinpoint a target’s location with sufficient precision to be able to tell when he goes from the garage on one side of the house to the bedroom at the other end, they’ll need a full blown search warrant. If they just want to know the general area the target is in—which cellular tower the phone is closest to, for instance—a subpoena or another less demanding form of court order might be sufficient.
There are, however, several methods of determining a phone’s precise location by triangulation, using data from multiple cell towers—and many cell networks use these methods to provide location services. The records from any one cell tower only yield a very general radius within which each phone registered at that tower can be presumed to be located. Combine the records from the three nearest towers, however, along with some measurements of signal strength and timing, and in an urban area where towers are relatively densely packed, you can often pinpoint the phone within a few meters.
Let’s suppose, then, that existing doctrine would require a warrant if police plan to go to the phone company and say: “We want you to triangulate the precise location of this phone for us over the past month, including at times when our suspect was at home.” What a hassle! They’ve got an out, though: They can issue separate requests for the records from each tower, then combine the data and do the triangulation themselves. As long as each request “viewed discretely” doesn’t yield enough information to pinpoint the phone within the home, there’s no search!
I don’t mean to suggest that, in practice, police are likely to use this particular method to circumvent the warrant requirement—though I wouldn’t be shocked either. But I think the example illustrates a problem with Orin’s categorical insistence on making the binary search/no-search determination only with respect to isolated “acts” of government, when the government itself controls how its monitoring is distributed across discrete acts.
Here’s another example, and one where I think there is a very real possibility that investigators are able, in practice, to game the standards governing electronic surveillance. According to the Justice Department’s U.S. Attorneys Manual, a “pen register” (which can be obtained much more easily than a search warrant) can be used to obtain general information about the domains or IP addresses a target is visiting, but not what particular pages somebody is reading. The idea is that there’s a sharp Fourth Amendment distinction between the “content” of a communication—its “meaning or purport”—and the non-content transactional information, such as the phone number or IP address, which tells you something about who is communicating, but not what is communicated. But there’s a loophole:
This policy does not apply to applications for pen register orders that would merely authorize collection of Internet Protocol (IP) addresses, even if such IP addresses can be readily translated into URLs or portions of URLs. Similarly, this policy does not apply to the collection, at a web server, of tracing information indicating the source of requests to view a particular URL using a trap and trace order.
Emphasis added. Roughly translated, this means that the government can obtain records showing that I accessed (say) the IP address of a particular political Web site, but not which specific articles I was reading. However, they may be able to separately go to that site and request the transactional logs for each article, then search through those to determine which articles were sent to me.
It seems very likely that technology will increasingly permit this kind of multi-step searching, perhaps in ways we can’t yet predict. For all that Orin is right to worry about the practical difficulty of determining how to group discrete acts of information gathering, the consequences of dogmatically insisting on evaluating each “act” in isolation seem equally absurd if it implies that the government will have the practical ability to transform a Fourth Amendment “search” into an unregulated (or much less regulated) “non-search” just by breaking it into smaller pieces.
|
0.675
|
FineWeb
|
["Fourth Amendment", "Mosaic Theory", "Government Surveillance"]
|
Compost Teacher Resources
Find Compost educational lesson plans and worksheets
Showing 1 - 24 of 815 resources
Reduce Our Carbon Footprint, Let’s Compost!
Roll up your sleeves and get a little dirty with this elementary and middle school compost lesson. All you need is a large plastic container, a couple old newspapers, some organic waste, and a few hundred worms and you're ready to start...
4th - 8th CCSS: Adaptable
|
0.5783
|
FineWeb
|
["Compost Educational Resources", "Compost Lesson Plans", "Elementary Compost Lessons"]
|
This site was formally the site of the Association of Formulation Chemists. The site hosted details of an international symposium on formulation chemistry that occurred in Las Vegas 1997.
Formulation chemists, or formulators, are responsible for providing chemicals that have a commercial use. The ability of chemists to formulate raw materials and chemicals into products such as medicines, cosmetics and agricultural chemicals is very valuable.
December 21, 2010 | Speed readingComments Off
You wish you were smart and capable of speed reading, right? Not a problem, there are just few techniques that you need to master in order to reap the remuneration of speed reading. In the very first stage, you must be aware of your reading speed. This will help you to know where you stand and the amount of practice that you should put in to move to the next higher level. Apart from reading with speed, you must also be able to comprehend the meaning of the passages that you are reading. Here we shall discuss about the reimbursement of speed reading that will keep you motivated throughout the learning process.
- Speed reading saves considerable amount of your time
- The vigor of the reader also does not go into waste
- As you can save your energy and time, you are capable of reading twice as much. Your mental horizon and knowledge increases this way. You are able to develop a strong foothold on the various topics and current affairs as well. This certainly helps those who are working as researchers.
- You can gain considerable amount of success in life as you continue the practice of speed reading.
If you think that these are some benefits that are worth considering, make sure that you are striving hard to attain that level of perfection. Rating your present speed is very important and for this you can log into the individual websites that offer tests to rate your speed. This is one of the best ways to develop insight about the kind of speed you have and the scopes of improvements that you have.
People with good speed reading qualities can read about 1000 words in a minute. They also have good comprehensible qualities and are capable of grasping about 85% of what they read. However, this category is constituted by only 1% of the total readers. Most of the readers are not capable of reading more than 200 words in a minute and can comprehend only 60% of the matter.
There are different ways you can make progress in your reading speeds. Attending speed reading seminars and getting in touch with the experts can help you to sharpen your reading skills. Little bit of commitment and patience is required for reaching the position you dream of. There are different online speed-reading programs that can be extremely helpful in this case. You can learn your lessons much better reading online rather than flipping through the pages of books every time you practice speed reading.
With so many pet owners within the UK there is a large market for looking after peoples pets whilst they are away on holiday. There are of course many different methods how this can happen. The cheapest is probably to buy a self-feeding device that allows cats to eat a meal at given intervals that have been set by the owner. This method is only really acceptable for cats that can still get outside through a cat flap. Although a great method and highly convenient this should only be used for a short period of time such as 24hours.
Another cheap method is to ask a friend or neighbour to give regular visits or even better to look after the pet at their house. One of the main drawbacks of this method is the possibility of lost cats and dogs. Without exception lost pets is an occurrence that no one wishes to tell their friend or neighbour about when they return from their holiday. A more expensive method is a cattery or kennels. Although more costly the pressure and responsibility of friends and family is far less intrusive.
Chemistry is a physical science that is concerned with the properties and characteristics of physical matter and the changes and processes that happen when different substances are mixed. Chemistry is often called the “central science” because it links the other natural sciences together.
The focus of chemistry is to study and understand the interactions that take place between chemical substances which are called chemical reactions. These reactions can occur at the atomic level and the resultant changes in matter and energy are what chemical scientists are keen to document and understand.
Modern chemistry is the natural progression of a much older practice of alchemy. Alchemy had much more of a philosophical and spiritual outlook, although practitioners were fascinated by the various transformations of substances when they were mixed in the correct way. The most famous of these pursuits was the quest to turn base metals into gold.
The study of chemistry requires an understanding of the fundamental building blocks of matter, and how these combine to form substances. The basic unit of all chemistry is the atom that consists of a nucleus of protons and neutrons with a number of electrons. Atoms can be grouped as elements, according to the number of the protons they contain.
A molecule is a collection of atoms that are held together by bonds and is the smallest indivisible portion of any substance (apart from an atom) that contains the exact chemical specification of that substance.
Each element has its own unique physical configuration, although certain elements that have similar characteristics to each other will often behave in a similar manner. This was observed by a Russian chemist called Dmitri Mendeleev who came up with a way to classify and organise these elements. This method is known as the periodic table.
Chemistry has helped to define many of the chemical reactions that take place in the natural world and has greatly furthered our understanding of the world around us. In the modern world chemistry is a fundamental process in our daily lives.
|
0.6849
|
FineWeb
|
["Chemistry", "Speed Reading", "Pet Care"]
|
From Mechanical Engineering to Particle Accelerators: Hexapods and Their Fields of Application
Today, many automation technology sectors require highly precise positioning systems. For multi-axis solutions, parallel-kinematic systems often are the perfect choice. Hexapods are a good example for this, where the travel ranges go from only a few to several hundred millimeters.
Even major loads can be positioned accurately to the micrometer using Hexapods. Their advantages compared with serial, i.e. stacked systems, are that they have much better path accuracy, repeatability and flatness. In addition, the moved mass is low, enabling better dynamic performance, which is the same for all motion axes. Moreover, cable management is no longer an issue, because cables are not moved, and, last but not least, the system features a much more compact design. These characteristics can be used in a wide range of applications, from mechanical engineering and robotics to medical technology and research, as we will show in the applications described in the following.
The product range of PI (Physik Instrumente) includes powerful six-axis parallel-kinematic systems in numerous versions. They are suitable for different loads, come with different types of drives and are designed for all kinds of ambient conditions. On request, they can also be ordered to communicate directly with a master control system (Figure 1).
Integrated in the Automation Line, with or without PLC
Due to a direct connection to the master control, Hexapods can be integrated basically in any automated production line in mechanical and plant engineering. A synchronized clock with other automated components can easily be achieved, for example, for automated supply systems. Consequently, there are numerous areas of application for Hexapod systems, from metal cutting to complex alignment processes. Hexapods can be protected against adverse ambient conditions, for example by bellows. In this case, they even resist the rough ambient conditions in automatic machining units, where coolants are used for metal cutting processes.
In such applications, the PLC or CNC can communicate with the Hexapod system over a standardized real-time Ethernet interface (Figure 2). The PLC acts as master and defines the target position in Cartesian coordinates and the trajectories; in return, it gets the actual positions also over the fieldbus interface.
All other calculations required to command the parallel-kinematic six-axis system are done by the Hexapod controller, i.e. transforming the target positions from Cartesian coordinates into drive commands for the individual drives. In this case, the controller acts just like an intelligent drive.
Adaptable and Flexible
Of course, the Hexapod controller can also act as master for position control. In this case the PLC only issues a position command. During the run, the motion cannot be synchronized with other drive axes, measuring systems, etc. If there is no parent PLC or if synchronizing with other system components is not required, the Hexapod controller can also control the trajectories based on G-code according to DIN 66025/ISO 6983 using linear interpolation. With this method, the Hexapod system can move the tool smoothly with highest precision during the machining process without causing an oscillation of the mechanical structure.
Hexapods from PI come in many different designs. A modular concept allows them to be customized within a short time. The Hexapod struts are designed so that their length can be easily scaled. They include the required electronics for reference point switch, limit switch, position sensor and – depending on the motor – electronic commutation. Their standardized joints allow them to be combined with almost any type of geometry for base plate and top. To find a suitable solution for a certain task is quite easy, since Hexapods can readily position and move even major loads of up to several tons with the high precision that is typical of them.
Precise Positioning with Six Degrees of Freedom in Measurement Setups
Quite demanding tasks can be solved with Hexapods: A good example of this is the following medical research application. In this example, an experimental setup is used to test how close orthodontic FE models are to reality and to modify them if necessary. This numerically controlled experimental setup was developed by scientists of the University of Ulm to find out how the tooth, that is embedded elastically in the jawbone, behaves under stress. The setup can measure the clinically relevant forces acting on the moving tooth.
The biomechanical structure of the simulation system (Figure 3) is based on a Hexapod with a very compact size of only 348 mm in diameter and 328 mm in height. At a repeatability of ±1 µm (Z axis) and ±2 µm (X and Y axes) and thanks to the high stiffness of the overall system, this system turns out to be the ideal solution for simulating the small motions of a tooth in the jawbone. In addition to that, its pivot point inside and outside the tooth root can be freely defined, a necessary prerequisite for biomechanical simulation.
The standardized elastic behavior of the periodontal ligament is simulated by means of a program especially developed for this purpose. The forces and torques generated by the orthodontic apparatus to be studied act on the phantom tooth via the orthodontic bracket and can be evaluated by scientists.
Sample Manipulation on Synchrotron Beamlines
Synchrotron beamlines are challenging potential applications for Hexapods. In such beamlines, X-ray diffraction and reflections of the synchrotron radiation can be used to investigate the structural properties of thin films as part of modern material research under high-vacuum conditions. For the direct use of such a beamline, the company SURFACE, leading manufacturer of Pulsed Laser Deposition systems, has developed an all-in-one system that can be used for different types of tests.
For this purpose, the sample manipulator (Figure 4) holds the 10 × 10 mm² substrates. The Hexapod, designed by PI for use in high vacuum, positions the sample, relative to the incident X-rays. This allows the sample to be tilted by ±5° around the X and Y axes at a resolution of 0.001°. In addition, to compensate for different layer thicknesses, it can be moved in the direction of the Z axis, i.e., vertically to the sample surface, by up to 3 mm. Motions of ±6 mm in the X and Y directions allow scans at different positions of the sample surface. The compact Hexapod, that measures 130 mm in diameter and 115 mm in height, is mounted to a rotary stage and can perform positioning tasks if required.
Heavy Duty Hexapods in Material Research
In synchrotron beamlines, also much larger Hexapods are in use, for example at the DESY research center (German Electron Synchrotron) in the city of Hamburg, Germany. This heavy-duty Hexapod (figure 5) is implemented in a beamline for material research. As the “heart” of the experimental setup, the Hexapod allows for the measurement of material characteristics, that occur e.g. during material modelling and in consequence give information on material aging and expectable useful life and lifetime. Here effects can be proven down to the level of domain or crystal structures. With its high load capacity of up to one ton, the Hexapod carries the entire setup including the structure where mechanical forces are applied. Here the Hexapod positions heavy loads, such as cylinder block, turbine parts, sintering furnaces or cryogenic chambers as well as welding apparatuses or other machining tools, over travel ranges of 400 mm with an ±1 µm accuracy.
With these examples of application, Hexapods prove their versatility, and there are many more fields of application where these precise positioning systems will display their potential, ranging from automation technology and robotics to space telescopes or the particle accelerators described.
|
0.8884
|
FineWeb
|
```
{
"topics": [
"Hexapod Systems",
"Precision Positioning",
"Industrial Applications"
]
}
```
|
Did You Know?
Many railroads, particularly Eastern roads, used anthracite coal for locomotive fuel during the early steam era. During World War I, the US Navy and the Allied Forces used anthracite coal to power the steam boilers of warships such as Admiral Dewey's USS Olympia, which is berthed at the Independence Seaport Museum in Philadelphia. Burning anthracite resulted in low-smoke emissions from steamship boilers and gave the Allies a strategic opportunity to close-in on the enemy in a battle. With anthracite coal diverted to the war effort, locomotive builders adapted to using bituminous coal in their future designs.
|
0.7187
|
FineWeb
|
["Anthracite Coal", "Steam Locomotives", "World War I"]
|
פורסם בתאריך 29/05/2012.
אנו שמחים לפרסם את הכתבה השנייה מתוך שבע- בנושא " הערכת היד -בסלאמים " (המקור: mrbridge).
המכניקה של הכרזות סלאם אינה במה שאנחנו מתמקדים כאן, מה שיותר חשוב בשלב זה הוא האופן שבו התפתחות המכרז יכולה להשפיע על הערכת היד שלך.
נתחיל עם כמה מכרזים ארוכים ונראה איך הם יכולים להוביל אותנו לסלאם (ידי מערב זהות בשתי החלוקות):
הכתבה היא בשפת המקור=אנגלית. בהמשך אעלה את התרגום בעברית וכתבות נוספות. לקריאת הכתבה לחצו כאן
HAND EVALUATION 47
Hand Evaluation in Slams
Part 2 of 7
by Bernard Magee
We begin with some long auctions and see how they can lead us to slam (the West hands are identical in the two layouts):
Both auctions start in the same way, with West opening 1 and both Easts responding 1NT because they do not have quite enough strength to bid 2. Now the West hand rebids 2 showing its strength – a reverse bid promising 17 or more high-card points. Both Easts now show their long diamond suit, about which West is quite excited! Counting his losers, he finds he has just 5, including three aces. He also has a good five-card suit, so he raises to 4 with one eye on a slam. This is where the auctions begin to differ.
The most important element of both auctions is to picture West's hand: he has shown five hearts and four spades and is now supporting diamonds. That does not leave much room for clubs; in fact, he is very unlikely to hold more than one club. Bearing this in mind, the two Easts can judge what they think of their hand.
In Layout 1, East is very happy indeed: nothing wasted opposite partner's club shortage and each of his isolated honours are in partner's suits; with just 7 losers in his hand (the lack of aces is balanced by the six-card trump holding) he should harbour hopes of a slam. Rather than simply raising to 5, he shows a control on the way by bidding 4. It is not so much what the 4 bid shows that matters; the important fact is that it is a slam try. West will be happy to accept the try because he was hoping for slam himself. He bids Key-card Blackwood and finds that partner does have one key-card (the K) which is enough for West to bid 6.
In Layout 2, East is less enamoured of his hand: his queen of hearts is all right since it is in his partner's suit, but his queen of clubs is distinctly weak and, opposite a singleton, will carry no weight at all. He should evaluate his hand at 8 losers and should be happy to settle for 5. With no hint of a slam try, West would pass too.
The mechanics of slam bidding are not what we are focusing on here; what is more important at this stage is the way in which the development of the auction can affect your evaluation of your hand. East in Layout 1 starts with a relatively poor collection of cards, but with every bid from partner his hand grows and grows in stature. 1 enhances his queen of hearts, 2 enhances his king of spades and, when partner supports his diamonds, the transformation is complete.
|
0.5101
|
FineWeb
|
["Hand Evaluation in Slams", "Slam Bidding Mechanics", "Bridge Auction Strategies"]
|
In a study that included more than 600,000 individuals born in Sweden between 1973-1979, those born preterm (less than 37 weeks gestation) had a higher risk of death during early childhood and young adulthood than persons born at term, according to a study in the September 21 issue of JAMA.
Preterm birth is the leading cause of perinatal (pertaining to the period immediately before and after birth) illness and death in developed countries. "Although the early effects of preterm birth are well documented, less is known about the longer-term outcomes in adulthood. These outcomes have a growing clinical and public health importance because of the high prevalence of preterm birth and improved early survival," the authors write. In the past 3 decades, the prevalence of preterm birth in the United States has increased to more than 12 percent. "As a result, large numbers of individuals who were born preterm are now surviving to adulthood. A comprehensive understanding of their outcomes in adulthood is needed to enable earlier prevention, detection, and treatment of the long-term health sequelae."
Casey Crump, M.D., Ph.D., of Stanford University, Stanford, Calif., and colleagues conducted a study to examine the association between gestational age at birth and mortality in young adulthood. The study included a national cohort of 674,820 individuals born in Sweden in 1973 through 1979 who survived to age 1 year, including 27,979 (4.1 percent) born preterm, followed up to 2008. A total of 7,095 deaths occurred in follow-up from age 1 year to the maximum attained ages of 29 to 36 years.
The researchers found a strong inverse association between gestational age at birth and mortality in early childhood (ages 1-5 years), no association was observed in late childhood (ages 6-12 years) or adolescence (ages 13-17 years), and an inverse association reappeared in young adulthood (ages 18-36 years). In early childhood as well as young adulthood, preterm birth was associated with increased mortality even among individuals born late preterm (34-36 weeks), relative to those born full-term.
"In young adulthood, gestational age at birth had the strongest inverse association with mortality from congenital anomalies and respiratory, endocrine, and cardiovascular disorders and was not associated with mortality from neurological disorders, cancer, or injury," the authors write.
The researchers write that, to their knowledge, this is the first study to report the specific contribution of gestational age at birth on mortality in adulthood. "The underlying mechanisms are still largely unknown but may involve a complex interplay of fetal and postnatal nutritional abnormalities; other intrauterine exposures, including glucocorticoid [a steroid hormone] and sex hormone alterations; and common genetic factors."
"Although most survivors have a high level of function and self-reported quality of life in young adulthood, our previous and current findings demonstrate the increased long-term morbidities and mortality that may also be expected. Clinicians will increasingly encounter the health sequelae of preterm birth throughout the life course and will need to be aware of the long-term effects on the survivors, their families, and society."
Cite This Page:
|
0.9842
|
FineWeb
|
```json
[
"Preterm Birth",
"Mortality Risk",
"Long-term Health Outcomes"
]
```
|
The Thief's Game
300 years ago the noble houses of the great city Talon’s Reach nearly destroyed themselves in a House War. To stop further bloodshed the king of Talon’s Reach called together a court to be held to put an end to the war. The five surviving houses eventually agreed to a truce.
Inside the peace treaty was a clause however, commonly called “The Sliver Lining.” While direct confrontation between the houses was outlawed, the houses would use the still young Thieves guild to carry out their intrigue. Such Contracts became the norm, and even remotely successful thieves became celebrities. Today the Peace Treaty continues to exist, as people from all over the Talon’s Reach come to the local guild to play the Thief’s Game.
|
0.9711
|
FineWeb
|
["History of Talon's Reach", "The Thief's Game", "The Peace Treaty"]
|
Role of fatty acids and micronutrients in healthy ageing: a systematic review of randomised controlled trials set in the context of European dietary surveys of older adults
Ruxton et al., JHND Early View
Ageing is a multifaceted and inevitable process involving a decline in health and well-being that could be ameliorated by dietary modification. We review and discuss the evidence for nutritional interventions that may support healthy ageing.
The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were used to identify randomised controlled trials investigating the role(s) of fatty acids and micronutrients in relation to markers of healthy ageing.
European dietary surveys suggest that diets in elderly people are generally high in saturated fat, whereas intakes of vitamin D, magnesium, potassium, zinc and copper are below recommended levels. Thirty-four studies meeting the criteria were found, with 12 of these investigating the role of fatty acids and 22 considering intakes of micronutrients in relation to healthy ageing. Overall, these studies suggested that certain nutrients were consistent with healthy ageing; for example, omega-3 fatty acids were helpful for cognitive health, whereas combinations of calcium, vitamin D and K were linked with better bone health.
Vitamin, mineral and fatty acid intakes are in need of improvement to help elderly populations achieve optimal diet quality and support healthy ageing. This could involve the judicious use of supplements alongside dietary advice. Additional research is needed to determine optimal nutrient doses, combinations and forms in relation to desired health outcomes.
|
0.9259
|
FineWeb
|
```
{
"topics": [
"Role of Fatty Acids in Healthy Ageing",
"Micronutrients and Healthy Ageing",
"Dietary Modification for Healthy Ageing"
]
}
```
|
10. HTML Attributes
Finally, traits can also be very useful when using L20n for localization of more complex UI elements, such as HTML components.
Those elements often contain multiple translatable messages per one
widget. For example, an HTML form input may have a value, but also a
aria-label attribute and
Another example would be a Web Component confirm window with
cancel button and a message.
|
0.98
|
FineWeb
|
["HTML Attributes", "L20n Localization", "UI Elements"]
|
- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
BioMed Research International
Volume 2013 (2013), Article ID 168581, 8 pages
Recovery of Stored Aerobic Granular Sludge and Its Contaminants Removal Efficiency under Different Operation Conditions
1State Key Laboratory of Urban Water Resource and Environment, Harbin Institute of Technology, Harbin 150090, China
2School of Environment and Civil Engineering, Jiangnan University, Wuxi 214122, China
Received 17 May 2013; Accepted 27 June 2013
Academic Editor: José Manuel Domínguez González
Copyright © 2013 Zhiwei Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The quick recovery process of contaminants removal of aerobic granular sludge (AGS) is complex, and the influencing factors are still not clear. The effects of dissolved oxygen (DO, air intensive aeration rate), organic loading rate (OLR), and C/N on contaminants removal characteristics of AGS and subsequently long-term operation of AGS bioreactor were investigated in this study. DO had a major impact on the recovery of AGS. The granules reactivated at air intensive aeration rate of 100 L/h achieved better settling property and contaminants removal efficiency. Moreover, protein content in extracellular polymeric substance (EPS) was almost unchanged, which demonstrated that an aeration rate of 100 L/h was more suitable for maintaining the biomass and the structure of AGS. Higher OLR caused polysaccharides content increase in EPS, and unstable C/N resulted in the overgrowth of filamentous bacteria, which presented worse NH4+-N and PO43−-P removal. Correspondingly, quick recovery of contaminants removal was accomplished in 12 days at the optimized operation conditions of aeration rate 100 L/h, OLR 4 g/L·d, and C/N 100 : 10, with COD, NH4+-N, and PO43−-P removal efficiencies of 87.2%, 86.9%, and 86.5%, respectively. The renovation of AGS could be successfully utilized as the seed sludge for the rapid start-up of AGS bioreactor.
Aerobic granular sludge (AGS) was considered to be a special kind of biofilm structure composing of self-immobilized cells [1, 2]. With regular shape, smooth surface, and compact and strong microbial structure, AGS has the advantages of better settling property, lower consuming, higher biomass retention, and treatment efficiency than normal activated sludge [3, 4]. Therefore, AGS has been proposed as a promising technology which could be widely applied in the treatment of high organic wastewater and wastewater with toxic components as well as wastewater with toxicity and heavy metal [7, 8]. AGS technology possesses the ability to contribute to and improve the biological treatment of wastewater. Compared to normal wastewater treatment plants, similar efficiencies at lower costs could be achieved with the compact AGS technology .
Microbial forces by extracellular polymeric substances (EPS) were regarded as the significant factor in the formation process of AGS . Protein content in EPS, rather than polysaccharides, was enriched in AGS [11, 12] which was known as the key component of EPS. It is believed that high protein content and relatively high PN/PS (the ratio of protein content and polysaccharides content in EPS) ratio would be a good situation to keep stable internal microstructure and high biomass retention. Enrichment of EPS assisted granulation, enhanced granules stability, which is important during the operation of AGS bioreactor, and reduced the loss of granules in storage .
However, AGS would lose its microbial activity under extended idle conditions or after long-term storage, which is one of the main problems hindering the practical application of AGS technology . In addition, the cultivation of AGS, quick start-up, and stable operation of AGS bioreactor restricted the development of AGS technology, from lab scale to pilot scale as well . Consequently, the long-term storage and quick recovery of contaminants removal of AGS are remarkably important for its full-scale application. The storage of AGS, including the bioactivity preservation and physical characteristics maintenance, was influenced by DO, OLR, and C/N [1, 14]. Moreover, the rapid recovery of contaminants removal and subsequent quick start-up of AGS bioreactor were also controlled by such factors.
In order to improve the flexibility and enhance the practicability of AGS technology, this study investigated the effects of DO, OLR, and C/N on the settling property, EPS, and microbial activity of AGS, and further to explore optimal operation conditions on contaminants removal.
2. Materials and Methods
2.1. Aerobic Granular Sludge Cultivation
The experiment was carried out in a sequencing batch airlift reactor (SBAR). The working volume of the reactor is 5.4 L, with a height of 100 cm and an internal diameter of 10 cm. The internal riser pipeline was 70 cm in height, 6 cm in internal diameter, and 2 cm leaving the bottom. Compressed air was supplied via a diffuser at the bottom of the reactor with a flux of 120 L/h. Effluent was discharged from the middle port of the reactor with a volumetric exchange ratio of 50%. The operating cycle time was 6 h, including 30 min for idle, 30 min for static feeding, 5 min for settling, 5 min for effluent discharge, and the rest of the time for aeration. Accordingly, the temperature of the mixed liquid was kept at ambient temperature, and influent pH and solids retention time (SRT) were adjusted to 7.0–7.2 (by 1 mol/L HCl and 1 mol/L NaOH) and 30 days, respectively.
2.2. Synthetic Wastewater and Seed Sludge
The components and concentrations in synthetic wastewater were listed as (mg/L) NaAc 830.0, CaCl2 60.0, MgSO4 42.0, NH4Cl 240.0, EDTA 42.0, NaHCO3 250.0, and K2HPO4 58.0, KH2PO4 24.0 , in element solution 1 mL, which gave a total COD concentration of 1200 mg/L; the concentration of -N was 60 mg/L, and the concentration of -P with 16 mg/L. Trace element solution contained the following components (g/L): FeCl3·6H2O 1.5, H3BO3 0.15, CuSO4·5H2O 0.03, KI 0.03, MnCl2·4H2O 0.12, Na2MoO4·2H2O 0.06, ZnSO4·7H2O 0.12, and CoCl2·6H2O 0.15 . The seed activated sludge was taken from the aerobic tank of Wenchang wastewater treatment plant (WWTP in Harbin, China) with an anoxic/oxic process (A/O process).
2.3. Storage and Recovery of Aerobic Granular Sludge
The inoculated AGS had been stored at a 4°C refrigerator for more than 6 months and then regained in the previously mentioned SBAR after washing by distilled water for 3 times, with the same operation conditions and synthetic wastewater components in different reactors. The temperature of the mixed liquid was kept at ambient temperature, and influent pH was adjusted to 7.0–7.2. DO (Do concentration was represented by air intensive aeration rate, 50, 100, 150, and 200 L/h), OLR (2, 4, 8 and 16 g/L·d), and C/N (100 : 5, 100 : 10, and 100 : 20) were regulated and controlled to investigate the recovery on contaminants removal characteristics.
2.4. Analysis Methods
COD, -N, -N, -N, -P, mixed liquor suspended solids (MLSS), and mixed liquor volatile suspended solids (MLVSS) were analyzed according to the Standard Method . Granules size and wet density were determined according to the methods by Laguna et al. and Schwarzenbeck et al. [17, 18]. The microstructure and morphology of the AGS were observed by scanning electron microscope (SEM, S-4800N, Japan). Sludge volume index (SVI) was determined according to the settled bed volume after 30 min settling and the dry biomass weight . The extraction of EPS was performed by the usage of ultrasound-formamide-NaOH method . Total polysaccharides (PS) and total protein (PN) contents in EPS were quantified by Dubois et al. and Lowry et al. [19, 20].
3. Results and Discussion
3.1. Storage of Aerobic Granular Sludge
Mature AGS cultivated in the SBAR was kept at a 4°C refrigerator, and pH was adjusted to 7.0–7.2; especially, the feed liquid was replaced every two weeks. The morphology and integrity of AGS were both in good condition after 6 months of storage. The physical parameters were listed in Table 1. Granules size and wet density were basically unchanged after storage; however, AGS had apparent variation in its biomass and settling property. Biomass retention decreased from 7.73 to 7.25 mg/L, probably due to the release of soluble organic material and cell hydrolysis as reported by Tay et al. . After 6 months of storage, its settling property deteriorated as shown from the values of SVI. SVI obviously increased from 49.3 to 64.1 mL/g, indicating that granules cannot maintain better settling property after long-term storage.
3.2. Recovery of Contaminants Removal Efficiency
AGS after the 6-month storage was utilized as the seed sludge for the quick start-up of the SBAR. Before the seeding, the granules taken from the 4°C refrigerator should be washed for three times to remove the fermentation products and the residual nutrient substances.
3.2.1. DO (Air Intensive Aeration Rate)
Effects of DO on the Settling Property. As shown in Figure 1, AGS had good settling property in the reactivation process. SVI of the granules decreased obviously in the first 8 days, and the granules had faster decline rate at the air intensive aeration rates of 100, 150 and 200 L/h than 50 L/h. The SVI of AGS decreased to 57.5, 48.4, 49.7, and 50.3 mL/g at the 8th day; then, it was maintained at a low level indicating their excellent settling ability. The granules revived under different air intensive aeration rates (100, 150, and 200 L/h) obtained quick recovery on its settle capacity. The SVI of granules reactivated at air intensive aeration rate of 100 L/h varied from 84.9 to 46.1 mL/g, which demonstrated that he granules had better settling property. In addition, relatively low air intensive aeration rate could be more economic and conductive for large-scale production and practical application. Therefore, 100 L/h aeration rate is good in the recovery of settling property.
Effects of DO on Granules Structure. Bacterium can secrete sticky materials called EPS constituting proteins (PN), polysaccharides (PS), humic acids, and lipids, which could assist cell adhesion; thereby, it should be helpful to initiate the aerobic granulation process (Schmidt et al., 2004). Protein and polysaccharides contents in EPS of AGS before the 6 months of storage were visually the same as those after the storage, with PN content of 80.3 mg/gMLSS and PS content of 27.0 mg/gMLSS. The ratio of PN/PS was 3.0. As illustrated in Figure 2(a), protein content was basically unchanged, implying the stable internal structure of AGS. PN content in EPS of the granules was 78.4, 82.5, 80.3, and 82.4 mg/gMLSS under different air intensive aeration rates (50, 100, 150, and 200 L/h). However, PS content under different air intensive aeration rates changed a lot (Figure 2(b)). PS content in EPS declined from 27.0 to 14.3 mg/gMLSS at air intensive aeration rate of 50 L/h, while it declined to 37.9 and 43.1 mg/gMLSS at air intensive aeration rate of 150 and 200 L/h. The variation of PS content caused unsteady PN/PS ratio and resulted in the fast disintegration of granules . High PN content could be the cross-linked network by attraction of organic and inorganic materials and the bridge of microbial cells once aerobic granules formed, which was consistent with the results of Adav et al. and Wang et al. [23, 24]. The present findings indicate that the induction of coaggregation and intracellular interaction by EPS played a significant role in the formation and maintenance of AGS.
Effects of DO on Contaminants Removal. DO was an important factor influencing nitrification and denitrification, which also expressed the key effect on the phosphorus release in anaerobic phase and the phosphorus uptake in aerobic phase . Therefore, -N, and -P removal efficiency would be greatly impacted by DO. Before the storage, AGS possessed good COD, -N and -P removal performance, with COD, -N, and -P removal efficiency of 90.2%, 93.5%, and 94.2%, respectively. However, the granules bioactivity to remove contaminants decreased after the storage. Microbial activity of aerobic granules began to revive, and -N removal ability was enhanced with the recovery progress (Figure 3(a)). As can be seen in the figure, -N removal rates were kept increasing in the first 8 days, especially for the air intensive aeration rates of 100 and 150 L/h. While for the air intensive aeration rate of 200 L/h, the story was somehow different, -N removal rate increased in the first 4 days and then decreased after 20 days. After 20 days reactivation, -N removal accomplished high removal efficiency of 77.4%, 85.7%, and 89.7% under aeration rates of 50, 100, and 150 L/h, which indicated that the granules gained better -N removal recovery performance. However, -N removal rate declined to 55.4% at the aeration rate of 200 L/h, probably because the sufficient oxygen supply led to the low bioactivity and slow specific growth rate of autotrophic bacteria including ammonia oxidized bacteria (AOB) and nitrite oxidized bacteria (NOB) [25, 26].
As displayed in Figure 3(b), the variations of -P removal were basically the same and presented a good correlation with -N removal. -P removal efficiency of the granules that recovered at aeration rate of 100 and 150 L/h increased up to 80% after activation for 16 days, which is higher than other recovery conditions. The granules had the characteristic of phosphorus accumulating potential with concomitant uptake of soluble organic carbon and release of phosphorus in the anaerobic stage, followed by rapid phosphorus uptake in the aerobic stage . However, -P removal of the granules that revived at an aeration rate of 200 L/h reached its maximum and then obviously declined to 47.2%. The result indicated that the sufficient oxygen supply might decrease the anaerobic zone inside AGS, which hindered the microbial activity of phosphorus accumulating organisms (PAO) and inhibited the phosphorus release and uptake process.
It is believed that the microstructure of the granules could be sustained and microbial activity retained good performance. The results showed that DO had a major impact on the settling property and contaminants removal efficiency of AGS. In addition, protein content in EPS was almost unchanged, which demonstrated that air intensive aeration rate of 100 L/h was more suitable for maintaining biomass and the structure of AGS.
Effects of OLR on Granules Structure. It is believed that high protein content and relatively high PN/PS ratio would be good in keeping stable internal microstructure and high biomass retention [11, 12]. The variations of PN/PS ratio under different OLRs were illustrated in Figure 4. In the recovery process of AGS, PN and PS contents in EPS reactivated at 2 and 4 g/L·d were almost unchanged which possessed the stable structure of the granules. However, high OLR had a great impact on the PN/PS ratio. The variations of PN/PS revived at 8 and 16 g/L·d of OLR showed similar trend. PN content in EPS of AGS was stable, but PS content increased obviously, which were as high as 43.7 and 50.6 mg/gMLSS, resulting in the PN/PS ratio remaining at the low level of 1.5. Hence, relatively high PS content in EPS could reduce the integration and stability of the granules; however, Costerton et al. and Tay et al. discovered that high PS content was noted to facilitate cell-to-cell adhesion and strengthen the structure of granules through a polymeric matrix [28, 29].
Effects of OLR on Contaminants Removal. AGS did not lose all the contaminants removal abilities after the 6-month storage. The concentrations of contaminants in the effluent of the SBAR and contaminants removal efficiency after 31 days reactivation were listed in Table 2. COD removal efficiency reached about 80% under different organic loading rates in the first 8 days; then, COD removal was obtained at high efficiency of 89.2%, 89.4%, 90.5%, and 94.4%, respectively, which demonstrated good COD removal efficiency. Nonetheless, -N and -P removal was quite different; relatively high OLR conditions resulted in lower -N and -P removal as a result of the disintegration and deterioration of AGS [13, 30]. The granules revived under OLR of 4 g/L·d gained good -N and -P removal efficiency of 90.5% and 80.7%.
The granules reactivated at OLR of 4 g/L·d could maintain good structural integrity and high contaminants removal efficiency. Meanwhile along the recovery process, PS content in EPS was progressively increased which led to the disintegration of AGS and worse -N and -P removal efficiency under higher OLR conditions. Therefore, AGS revived at OLR of 4 g/L·d was more suitable for the long-term stable operation of AGS.
Effects of C/N Ratio on the Settling Property of AGS. It is apparent in Figure 5 that low C/N caused good settling property in the recovery process. SVI values were 47.8 and 57.2 mL/g at C/N of 100 : 10 and 100 : 20, respectively. The SVI of the granules that revived at C/N of 100 : 10 decreased significantly faster than that of the granules revived at C/N of 100 : 20. However, the SVI of AGS reactivated at C/N of 100 : 5 obviously increased up to 110.5 mL/g and then was retained at a high level that presented worse settling ability. The finding revealed that the compact AGS grew in size but gradually lost the stability corresponding with the outgrowth of filamentous bacteria. Therefore, unstable C/N resulted in the overgrowth of filamentous bacteria, which presented worse contaminants removal efficiency [14, 31].
Effects of C/N on Contaminants Removal Efficiency. Effluent contaminants and contaminants removal efficiency after 31 days reactivation were listed in Table 2. Along with restoration, COD removal efficiency under different C/N conditions gained higher removal efficiency of 87.9%, 88.2%, and 89.6%, respectively, indicating excellent COD removal efficiency. Nevertheless, -N and -P removal was quite distinct. -N removal efficiency at C/N of 100 : 5 was 62.4% because heterotrophic bacteria, whose growth rate was faster than those in a lower C/N, would be in a competitive advantage in inhibiting the activity of nitrifying bacteria and autotrophic bacteria . Furthermore, -P removal efficiency at C/N of 100 : 20 was 64.6% because of the competition of soluble organic carbon between PAOs and denitrifiers that hindered the microbial activity of PAOs . The granules reactivated under C/N of 100 : 10 achieved both good -N and -P removal efficiencies of 88.2% and 89.1%.
In this study, different C/N conditions had significant impacts on the settling property of AGS during the reactivation process. High C/N rate resulted in the overgrowth of filamentous bacteria, which presented worse -N and -P removal efficiency. Hence, the granules that recovered at C/N of 100 : 10 were most stable with little variation on SVI and good -N as well as -P removal efficiency after 12 days of reactivation.
3.3. Quick Recovery of Contaminants Removal
As displayed in Figure 6(a), the bioactivity of AGS progressively revived along with the recovery process under optimized operation conditions. According to the defined conditions previously mentioned, the optimal conditions were as follows: air intensive aeration rate 100 L/h, OLR 4 g/L·d, and C/N 100 : 10. Initially COD, -N, and -P removal was low; however, with the reactivation progress, COD, -N, and -P removal kept increasing. After 12 days of reactivation, AGS achieved the best recovery performance on microbial activity; COD, -N, and -P removal efficiency could be quickly recovered to 87.2%, 86.9%, and 86.5%, respectively.
It is noticeable in Figure 6(b) that COD, -N, and -P in effluent were 73.5, 5.1, and 1.1 mg/L in the stable cycle during the reactivation process, and the respective COD, -N, and -P efficiencies were 86.4%, 90.2%, and 93.1%. Moreover, the nitrification and denitrification coefficiency was 75.2%, and the simultaneous nitrification and denitrification rate was 0.41 mmol/L·h. The results demonstrated that the granules revived under optimal operation conditions gained overall recovery performance. Furthermore, AGS technology could deal with a large number of conversion processes including COD-oxidation, ammonium oxidation, and biological phosphorus removal. The renovation of AGS in store could be successfully utilized as the seed sludge for the rapid start-up of AGS bioreactor.
The morphology and integrity of AGS were both in good condition after 6 months of storage. Dissolved oxygen had significant impacts on the recovery of the granules, and OLR and C/N had comparatively slight influence.
The microstructure of the granules could be sustained; the microbial activity retained good performance; and protein content in EPS was almost unchanged, which demonstrated that air intensive aeration rate of 100 L/h was more suitable for maintaining its biomass and the structure of AGS. The granules reactivated at OLR of 4 g/L·d could maintain good structural integrity and high contaminants removal efficiency. PS content in EPS was progressively increased which led to the disintegration and worse -N and -P removal efficiency under higher OLR conditions. Different C/N conditions had significant impacts on the settling property of AGS during the reactivation process. High C/N resulted in the overgrowth of filamentous bacteria, which presented worse -N and -P removal efficiency.
Correspondingly, quick recovery of contaminants removal was accomplished in 12 days at the optimal operation conditions of air intensive aeration rate 100 L/h, OLR 4 g/L·d, and C/N 100 : 10, in which COD, -N, and -P removal efficiencies were 87.2%, 86.9% and 86.5%, respectively. The renovation of AGS in store could be successfully utilized as the seed sludge for simplifying the start-up and enhancing the long-term stable operation of AGS bioreactor.
The authors gratefully acknowledge the financial support provided by the State Key Laboratory of Urban Water Resource and Environment (HIT, Grant no. 2013DX12), International Cooperation Program (Grant no. 2010DFA92460), Major Science and Technology Program for Water Pollution Control and Treatment (Grant no. 2012ZX07408001), and National Science Foundation (Grant no. 50978068).
- S. S. Adav, D. J. Lee, K. Y. Show, and J. H. Tay, “Aerobic granular sludge: recent advances,” Biotechnology Advances, vol. 26, no. 5, pp. 411–423, 2008.
- T. Seviour, Z. G. Yuan, M. C. M. van Loosdrecht, and Y. M. Lin, “Aerobic sludge granulation: a tale of two polysaccharides,” Water Research, vol. 46, no. 15, pp. 4803–4813, 2012.
- M. K. de Kreuk, J. J. Heijnen, and M. C. M. van Loosdrecht, “Simultaneous COD, nitrogen, and phosphate removal by aerobic granular sludge,” Biotechnology and Bioengineering, vol. 90, no. 6, pp. 761–769, 2005.
- L. L. Liu, Z. P. Wang, J. Yao, X. J. Sun, and W. M. Cai, “Investigation on the properties and kinetics of glucose-fed aerobic granular sludge,” Enzyme and Microbial Technology, vol. 36, no. 2-3, pp. 307–313, 2005.
- B. Y. P. Moy, J. H. Tay, S. K. Toh, et al., “High organic loading influences the physical characteristics of aerobic sludge granules,” Letters in Applied Microbiology, vol. 34, no. 6, pp. 407–412, 2002.
- H. L. Jiang, S. T. L. Tay, and J. H. Tay, “Changes in structure, activity and metabolism of aerobic granules as a microbial response to high phenol loading,” Applied Microbiology and Biotechnology, vol. 63, no. 5, pp. 602–608, 2004.
- X. F. Sun, C. Y. Liu, Y. Ma, et al., “Enhanced Cu(II) and Cr(VI) biosorption capacity on poly(ethylenimine) grafted aerobic granular sludge,” Colloids and Surfaces B, vol. 82, no. 2, pp. 456–462, 2011.
- H. Xu, Y. Liu, and J. H. Tay, “Effect of pH on nickel biosorption by aerobic granular sludge,” Bioresource Technology, vol. 97, no. 3, pp. 359–363, 2006.
- L. M. M. de Bruin, M. K. de Kreuk, H. F. R. van der Roest, et al., “Aerobic granular sludge technology: an alternative to activated sludge?” Water Science and Technology, vol. 49, no. 11-12, pp. 1–9, 2004.
- Y. Liu and J. H. Tay, “The essential role of hydrodynamic shear force in the formation of biofilm and granular sludge,” Water Research, vol. 36, no. 7, pp. 1653–1665, 2002.
- B. S. McSwain, R. L. Irvine, M. Hausner, and P. A. Wilderer, “Composition and distribution of extracellular polymeric substances in aerobic flocs and granular sludge,” Applied and Environmental Microbiology, vol. 71, no. 2, pp. 1051–1057, 2005.
- S. Wang, W. X. Shi, S. L. Yu, et al., “Formation of aerobic granules by Mg2+ and Al3+ augmentation in sequencing batch airlift reactor at low temperature,” Bioprocess and Biosystems Engineering, vol. 35, no. 7, pp. 1049–1055, 2012.
- D. W. Gao, X. J. Yuan, and H. Liang, “Reactivation performance of aerobic granules under different storage strategies,” Water Research, vol. 46, no. 10, pp. 3315–3322, 2012.
- R. L. Bao, S. L. Yu, W. X. Shi, X. Zhang, and Y. Wang, “Aerobic granules formation and nutrients removal characteristics in sequencing batch airlift reactor (SBAR) at low temperature,” Journal of Hazardous Materials, vol. 168, no. 2-3, pp. 1334–1340, 2009.
- G. J. F. Smolders, J. M. Klop, M. C. M. van Loosdrecht, and J. J. Heijnen, “A metabolic model of the biological phosphorus removal process. I. Effect of the sludge retention time,” Biotechnology and Bioengineering, vol. 48, no. 3, pp. 222–233, 1995.
- APHA, Standard Methods for the Examination of Water and Wastewater, American Public Health Association, Washington, DC, USA, 20th edition, 1998.
- A. Laguna, A. Ouattara, R. O. Gonzalez et al., “A simple and low cost technique for determining the granulometry of upflow anaerobic sludge blanket reactor sludge,” Water Science and Technology, vol. 40, no. 8, pp. 1–8, 1999.
- N. Schwarzenbeck, R. Erley, and P. A. Wilderer, “Aerobic granular sludge in an SBR-system treating wastewater rich in particulate matter,” Water Science and Technology, vol. 49, no. 11-12, pp. 41–46, 2004.
- M. Dubois, K. A. Gilles, J. K. Hamilton, P. A. Rebers, and F. Smith, “Colorimetric method for determination of sugars and related substances,” Analytical Chemistry, vol. 28, no. 3, pp. 350–356, 1956.
- O. H. Lowry, N. J. Rosebrough, A. L. Farr, and R. J. Randall, “Protein measurement with the folin phenol reagent,” The Journal of Biological Chemistry, vol. 193, no. 1, pp. 265–275, 1951.
- S. T. L. Tay, V. Ivanov, S. Yi, W. Q. Zhuang, and J. H. Tay, “Presence of anaerobic Bacteroides in aerobically grown microbial granules,” Microbial Ecology, vol. 44, no. 3, pp. 278–285, 2002.
- Y. Q. Liu, Y. Liu, and J. H. Tay, “The effects of extracellular polymeric substances on the formation and stability of biogranules,” Applied Microbiology and Biotechnology, vol. 65, no. 2, pp. 143–148, 2004.
- S. S. Adav, D. J. Lee, and J. Y. Lai, “Effects of aeration intensity on formation of phenol-fed aerobic granules and extracellular polymeric substances,” Applied Microbiology and Biotechnology, vol. 77, no. 1, pp. 175–182, 2007.
- S. Wang, W. X. Shi, S. L. Yu, and X. S. Yi, “Rapid cultivation of aerobic granular sludge by bone glue augmentation and contaminant removal characteristics,” Water Science and Technology, vol. 67, no. 7, pp. 1627–1633, 2013.
- L. Tijhuis, M. C. M. van Loosdrecht, and J. J. Heijnen, “Formation and growth of heterotrophic aerobic biofilms on small suspended particles in airlift reactors,” Biotechnology and Bioengineering, vol. 44, no. 5, pp. 595–608, 1994.
- A. Mosquera-Corral, M. K. de Kreuk, J. J. Heijnen, and M. C. M. van Loosdrecht, “Effects of oxygen concentration on N-removal in an aerobic granular sludge reactor,” Water Research, vol. 39, no. 12, pp. 2676–2686, 2005.
- Y. M. Lin, Y. Liu, and J. H. Tay, “Development and characteristics of phosphorus-accumulating microbial granules in sequencing batch reactors,” Applied Microbiology and Biotechnology, vol. 62, no. 4, pp. 430–435, 2003.
- J. W. Costerton, R. T. Irvin, and K. J. Cheng, “The bacterial glycocalyx in nature and disease,” Annual Review of Microbiology, vol. 35, pp. 299–324, 1981.
- J. H. Tay, Q. S. Liu, and Y. Liu, “The role of cellular polysaccharides in the formation and stability of aerobic granules,” Letters in Applied Microbiology, vol. 33, no. 3, pp. 222–226, 2001.
- M. K. de Kreuk, M. Pronk, and M. C. M. van Loosdrecht, “Formation of aerobic granules and conversion processes in an aerobic granular sludge reactor at moderate and low temperatures,” Water Research, vol. 39, no. 18, pp. 4476–4484, 2005.
- Y. M. Zheng, H. Q. Yu, S. J. Liu, and X. Z. Liu, “Formation and instability of aerobic granules under high organic loading conditions,” Chemosphere, vol. 63, no. 10, pp. 1791–1800, 2006.
- C. M. López Vázquez, C. M. Hooijmans, D. Brdjanovic, H. J. Gijzen, and M. C. M. van Loosdrecht, “Factors affecting the microbial populations at full-scale enhanced biological phosphorus removal (EBPR) wastewater treatment plants in The Netherlands,” Water Research, vol. 42, no. 10-11, pp. 2349–2360, 2008.
|
0.5203
|
FineWeb
|
["Aerobic Granular Sludge", "Contaminants Removal Efficiency", "Operation Conditions"]
|
The question of the origin of life may soon be answered and the answer may be that it came from elsewhere. Shreds of DNA building material have been found on meteorites pointing to a possibility of Earth being seeded with life from elsewhere.
Scientists, from different institutes, found that not only were traces of compounds like ammonia and cyanide present, which could build complex organic molecules, even nucleobases (a group of nitrogen-rich organic compounds that are needed to build nucleotides, which can make RNA or DNA – the basis of all terrestrial life) were seen. This is not the first time nucleobases were being seen in meteorites, however. As Jim Cleaves, a chemist at the Carnegie Institute of Washington said to Space.com
People have been finding nucleobases in meteorites for about 50 years now, and have been trying to figure out if they are of biological origin or not.
The hardest part of the study was confirming that the meteorites were not contaminated with organic material lying around. The study found a huge number of different nucleobases in organic-rich meteorites called carbonaceous chondrites, out of which three were extremely rare on Earth. This gives credence to the idea that life may have been planted from elsewhere.
The hypothesis that states that life was seeded on Earth from extra-terrestrial sources is called Panspermia’. It has had its share of strong supporters and equally vociferous deniers, but this does seem a point in its favour. Experiments in chemistry labs have repeatedly shown that building complex organic compounds, like nucleobases, from compounds such as cyanide and ammonia, in the presence of water, isn’t too difficult. This was first shown by the Urey-Miller experiment in 1952 (the same year as the discovery of the DNA double helix by Watson and Crick). They could produce amino acids, the building blocks of protein, by passing electricity through a flask containing gaseous ammonia, hydrogen sulphide, carbon dioxide, cyanide and sulphur dioxide, along with water. It is surmised that the step from amino acids to actual proteins may not be very tough.
These findings say that it might have been even easier. Specifically, different molecules belonging to the citric acid cycle have been found. The citric acid cycle is one of the oldest biological cycles and plays a crucial role in respiration of all living forms.
The studies were published in the Proceedings of the National Academy of Sciences.
|
0.9284
|
FineWeb
|
["Origin of Life", "Panspermia", "Meteorites and Organic Compounds"]
|
Nei Choru or Ghee rice is popular in kerala, in northern part. The taste of ghee and spices in this rice is equally enjoyed by kids and adults.
- Basmati rice - 2 cups
- Sliced Onions - 1 small
- Cloves -4
- Cardamom -4
- Cinnamon -2 inch long
- Ghee - 4 tbsp
- Cashewnut - 12 nos
- Raisins - 2 tbsp
- Thinly sliced Onion - 1 small(for garnishing)
- Salt to taste
- Water- 4 cups
- Wash the rice and drain it.
- Heat 1 tbsp ghee in a pan
- Fry cashews and raisins and keep it aside.
- Add 1 tbsp Ghee and fry the thinly sliced onions(for garnishing) until golden brown and remove it.
- Add the remaining Ghee in the same pan and saute all the spices for 2 minutes.
- Add sliced onions and saute the onion until translucent.
- Add the drained rice to the pan .
- Stir continuously and fry for 3-4 minutes.
- Add water and salt to the pan.
- Cover the pan with a lid and let it cook.
- Remove from the fire when the rice is cooked and all water has been absorbed .
- Garnish the rice with fried Onion, Cashewnut and raisins.
Recommended Combination: Serve hot with Chicken Curry / pickle.
|
0.6994
|
FineWeb
|
["Ingredients", "Instructions", "Serving Suggestions"]
|
One of the mysteries of the English language finally explained.
The nonresistive component of impedance in an AC circuit, arising from the effect of inductance or capacitance or both and causing the current to be out of phase with the electromotive force causing it.
- ‘A radiating structure involving very low resistance and very high reactance is the definition of a high Q circuit, and such circuits have very narrow bandwidth.’
- ‘It may be expressed as IX, where X, the reactance, is the imaginary part of the impedance.’
- ‘The short answer is - impedance includes reactance, and reactance includes effects which vary with frequency due to inductance and capacitance.’
- ‘This can be caused by many contributors such as loaded cables acting as a lowpass filters, and other influences of inductive and capacitive reactance.’
- ‘Because such a structure will be inherently inductive there will be some inductive reactance opposing current flow.’
In this article we explore how to impress employers with a spot-on CV.
|
0.9952
|
FineWeb
|
```json
[
"Electrical Impedance and Reactance",
"AC Circuits and Components",
"Job Search and Resume Building"
]
```
|
A condition in which blood glucose (sugar) is not well controlled.
- Type 1 Diabetics make no insulin. Without some hormonal escort to bring nutrients into cells, they can starve to death even if they consume any quantity of food. Type 1 diabetics require insulin supplementation, usually via injection.
- Type-2 Diabetics are characterized by an overproduction of insulin and the inability of the target cells to respond to insulin (insulin resistance). By controlling insulin release through dietary measures, type-2 diabetics can help bring balance back to their hormonal systems.
|
0.9993
|
FineWeb
|
["Type 1 Diabetes", "Type 2 Diabetes", "Insulin Resistance"]
|
ADDRESSING TOBACCO THROUGH ORGANIZATIONAL CHANGE (ATTOC) APPROACH
The Addressing Tobacco Through Organizational Change (ATTOC) Approach is guided by seven core strategies and a 10-step process designed to help an agency systematically improve their tobacco addiction treatment for patients/clients and change their culture to better address tobacco. The ATTOC Approach is intended to be flexible to the unique needs, resources, and goals of any organization. Each organization begins at their own starting point based on what they have already accomplished and the resources available for this initiative.
Each organization determines their own Patient/Client, Staff, and Environmental goals and how to align these goals with their mission and other work. Examples of possible agency goals in each of the three areas include:
Patient/Client goals – reduce rates of tobacco addiction through improved treatment planning, referral, and treatment on site.
Staff goals – reduce rates of tobacco addiction among staff; provide staff with training and support to achieve patient/client goals.
Environmental goals – initially restrict tobacco use on campus to reduce Environmental Tobacco Smoke, improve health for all, and reduce triggers for those trying to quit, with a longer-term goal for a tobacco-free campus.
The ATTOC Approach includes 7 Core Strategies:
The 7 Core Strategies are used by the UMass ATTOC Consultation Team in conjunction with the agency’s Tobacco Leadership team and Champion(s) in order to prepare the agency to begin the intervention and to support them in accomplishing the 10 Steps:
Meetings and activities to prepare for the start of the intervention.
On-site consultation at the agency, including Environmental Scan and training.
Formation of the agency’s Addressing Tobacco Leadership Group.
Formation of work groups to implement the agency’s change plan and achieve their Patient/Client, Staff, and Environmental goals through specific strategies and tactics.
Identification and coaching of a Tobacco Treatment Specialist(s) at the local agency.
Ongoing phone consultations and emails to provide ongoing technical assistance.
- Web-based supports.
The ATTOC 10 Steps occur in 3 Phases:
Phase One (includes Steps 1 through 5) focuses on planning for change. In this phase, the organization establishes a solid foundation for addressing tobacco addiction by identifying the leadership team and work groups that will guide it through the change process, developing goals, and adopting strategies for communicating these goals to stakeholders.
In Phase Two (Steps 6-8), the organization implements the planned changes to achieve the Patient/Client, Staff, and Environmental goals through a range of strategies and tactics.
In Phase Three (Steps 9-10), the agency integrates and sustains change by ensuring the infrastructure exists to maintain the agency’s progress over time, including developing policies and standard operating procedures to support long term change.
OVERVIEW OF THE 10 STEPS BY PHASE
1. Planning Phase (Steps 1 – 5) - Prepare and Organize
Step 1: Establish a Sense of Urgency and Preliminary Organizational Goals
Step 2: Establish a Leadership group and Prepare for Change
Step 3: Assess Organizational Readiness and do Environmental Scan
Step 4: Develop Written Change Plan and Realistic Time-Line
Step 5: Develop Written Communication Plan and Materials to Disseminate
2. Implementing Phase (Steps 6 – 8) - Change, Integrate, and Adapt
Step 6: Implement Patient/Clients Goals: Assessment, Treatment, and Empowerment
Step 7: Implement Staff Goals: Training and Staff Recovery
Step 8: Implement Environmental Goals: End or Restrict Tobacco Use
3. Sustaining Phase (Steps 9 – 10) - Document, Monitor, and Sustain
Step 9: Document Changes in Policies and Standard Operating Procedures
Step 10: Support, Encourage, and Sustain Organizational Change
|
0.9101
|
FineWeb
|
```json
[
"ATTOC Approach",
"10-Step Process",
"Core Strategies"
]
```
|
hi, i have mdi format and two child form in vb
my problem is at runtime, Mdi run and also rum form1 and form2
Means two child form run.
Then form2 textbox value insert and when i click on button then
form2 textbox value move to form1 textbox.
Hear problem is when form1 is not run then form1 is load and value pass form1 texbox. But when form1 is alredy run then i click on form2 button then value not pass into form1 textbox.
plz help me early as posible...
|
0.7248
|
FineWeb
|
["MDI Forms", "Child Form Communication", "Form Data Transfer"]
|
We would like you to try a sample of the activities we offer, a free no obligation home tutor taster pack is available, select a year group above.
Home Tutor Worksheets
All Literacy and Maths packs and worksheets are tailored to your child’s particular year group. They contain four units of work. Each unit is intended to be worked on over the course of one week. We suggest that this be in four 20 minute sessions, however, your child could also do three 25 minute sessions, or two 40 minute sessions. The Literacy and maths worksheets are designed to be flexible so that they can fit in easily with busy lifestyles. Each unit lays out clear learning objectives. This is the particular knowledge and skills that the unit intends to teach. There are detailed home tutoring parents notes, followed by four activities and worksheets.
In summary each monthly home tutor pack contains:
- 4 units of work
- Clear learning objectives
- Detailed home tutoring parent notes
- 16 Activities/worksheets
Our full home tutor teacher support enables you to contact a teacher with any questions you have or to discuss your child’s ongoing developement.
Literacy and Maths Resources Included
Included with your home tutor membership you will have available our free printable home tutor EBook ‘How to Teach Your Child’ which includes hints and tips on tutoring your child in Literacy and Maths. The literacy packs will include a list of the High Frequency words that your child should be learning to spell at their particular stage of development and a recommended fiction reading list. The Maths home tutor Packs up to year 3 will include a 100 square and a number track to support the units of work.
- Free printable EBook ‘How to Teach Your Child’
- List of High Frequency Words
- Recommended fiction reading list
- 100 square
- Number track
|
0.9437
|
FineWeb
|
["Home Tutor Worksheets", "Literacy and Maths Resources", "Home Tutor Membership"]
|
Angstron Materials, Inc., headquartered in Dayton, Ohio, is the worlds largest producer of nano graphene platelet materials with a 300 metric ton annual production capacity. One of the earliest graphene manufacturing companies, Angstron leverages a world-class team of scientists, researchers, and industry experts to provide graphene based solutions to customers worldwide.
With production and research focuses ranging from raw graphene and graphene oxide materials to a multitude of value-added applications and products, Angstron Materials is able to identify the optimal graphene for a variety of end-users.
- Few layer graphene
- Nano graphene platelets
- Graphene Dispersions
- Graphene Oxide Dispersions
- Graphene Based Thermal Management Solutions
- Graphene Enhanced Energy Storage Materials
- Custom Graphene Materials and Solutions
|
0.6423
|
FineWeb
|
```
{
"topics": [
"Graphene Materials",
"Graphene Production",
"Graphene Applications"
]
}
```
|
The blood-brain barrier (BBB) is a membranic structure that acts primarily to protect the brain from chemicals in the blood, while still allowing essential metabolic function. It is composed of endothelial cells, which are packed very tightly in brain capillaries. This higher density restricts passage of substances from the bloodstream much more than endothelial cells in capillaries elsewhere in the body. Astrocyte cell projections called astrocytic feet (also known as "glial limitans") surround the endothelial cells of the BBB, providing biochemical support to those cells. The BBB is distinct from the similar blood-cerebrospinal fluid barrier, a function of the choroidal cells of the choroid plexus.
The existence of such a barrier was first noticed in experiments by Paul Ehrlich in the late-19th century. Ehrlich was a bacteriologist who was studying staining, used for many studies to make fine structures visible. When injected, some of these dyes (notably the aniline dyes that were then popular) would stain all of the organs of an animal except the brain. At the time, Ehrlich attributed this to the brain simply not picking up as much of the dye.
However, in a later experiment in 1913, Edwin Goldmann (one of Ehrlich's students) injected the dye into the spinal fluid of the brain directly. He found that in this case the brain would become dyed, but the rest of the body would not. This clearly demonstrated the existence of some sort of barrier between the two. At the time, it was thought that the blood vessels themselves were responsible for the barrier, as no obvious membrane could be found. The concept of the blood-brain barrier (then termed hematoencephalic barrier) was proposed by Lina Stern in 1921. It was not until the introduction of the scanning electron microscope to the medical research fields in the 1960s that the actual membrane could be demonstrated.
It was once believed that astrocytes rather than epithelial cells were the basis of the blood-brain barrier because of the densely packed astrocyte processes that surround the epithelial cells of the BBB.
In the rest of the body outside the brain, the walls of the capillaries (the smallest of the blood vessels) are made up of endothelial cells which are fenestrated, meaning they have small gaps called fenestrations. Soluble chemicals can pass through these gaps, from blood to tissues or from tissues into blood. However in the brain endothelial cells are packed together more tightly with what are called tight junctions. This makes the blood-brain barrier block the movement of all molecules except those that cross cell membranes by means of lipid solubility (such as oxygen, carbon dioxide, ethanol, and steroid hormones) and those that are allowed in by specific transport systems (such as sugars and some amino acids). Substances with a molecular weight higher than 500 daltons (500 u) generally cannot cross the blood-brain barrier, while smaller molecules often can. In addition, the endothelial cells metabolize certain molecules to prevent their entry into the central nervous system. For example, L-DOPA, the precursor to dopamine, can cross the BBB, whereas dopamine itself cannot. (As a result, L-DOPA is administered for dopamine deficiences (e.g., Parkinson's disease) rather than dopamine).
In addition to tight junctions acting to prevent transport in between endothelial cells, there are two mechanisms to prevent passive diffusion through the cell membranes. Glial cells surrounding capillaries in the brain pose a secondary hindrance to hydrophilic molecules, and the low concentration of interstitial proteins in the brain prevent access by hydrophilic molecules.
The blood-brain barrier protects the brain from the many chemicals flowing within the blood. However, many bodily functions are controlled by hormones in the blood, and while the secretion of many hormones is controlled by the brain, these hormones generally do not penetrate the brain from the blood. This would prevent the brain from directly monitoring hormone levels. In order to control the rate of hormone secretion effectively, there exist specialised sites where neurons can "sample" the composition of the circulating blood. At these sites, the blood-brain barrier is 'leaky'; these sites include three important 'circumventricular organs', the subfornical organ, the area postrema and the organum vasculosum of the lamina terminalis (OVLT).
The blood-brain barrier acts very effectively to protect the brain from many common infections. Thus, infections of the brain are very rare. However, since antibodies are too large to cross the blood-brain barrier, infections of the brain which do occur are often very serious and difficult to treat.
Drugs targeting the brain
Overcoming the difficulty of delivering therapeutic agents to specific regions of the brain presents a major challenge to treatment of most brain disorders. In its neuroprotective role, the blood-brain barrier functions to hinder the delivery of many potentially important diagnostic and therapeutic agents to the brain. Therapeutic molecules and genes that might otherwise be effective in diagnosis and therapy do not cross the BBB in adequate amounts.
Mechanisms for drug targeting in the brain involve going either "through" or "behind" the BBB. Modalities for drug delivery through the BBB entail its disruption by osmotic means, biochemically by the use of vasoactive substances such as bradykinin, or even by localized exposure to high intensity focused ultrasound (HIFU). Other strategies to go through the BBB may entail the use of endogenous transport systems, including carrier-mediated transporters such as glucose and amino acid carriers; receptor-mediated transcytosis for insulin or transferrin; and blocking of active efflux transporters such as p-glycoprotein. Strategies for drug delivery behind the BBB include intracerebral implantation and convection-enhanced distribution.
Nanotechnology may also help in the transfer of drugs across the BBB. Recently, researchers have been trying to build nanoparticles loaded with liposomes to gain access through the BBB. More research is needed to determine which strategies will be most effective and how they can be improved for patients with brain tumors. The potential for using BBB opening to target specific agents to brain tumors has just begun to be explored.
Delivering drugs across the blood brain barrier is one of the most promising applications of nanotechnology in clinical neuroscience. Nanoparticles could potentially carry out multiple tasks in a predefined sequence, which is very important in the delivery of drugs across the blood brain barrier.
A significant amount of research in this area has been spent exploring methods of nanoparticle mediated delivery of antineoplastic drugs to tumors in the central nervous system. For example, radiolabeled polyethylene glycol coated hexadecylcyanoacrylate nanospheres targeted and accumulated in a rat gliosarcoma. However, this method is not yet ready for clinical trials due to the accumulation of the nanospheres in surrounding healthy tissue. Another, recent effort with the nanoparticle mediated delivery of doxorubicin to a rat glioblastoma has shown significant remission as well as low toxicity. Not only is this result very encouraging, but it could lead to clinical trials.
Not only are nanoparticles being utilized for drug delivery to central nervous system ailments, but they are also being investigated as possible agents in imaging. The use of solid lipid nanoparticles consisting of microemulsions of solidified oil nanodrops loaded with iron oxide could increase in MRI imaging because of the ability of these nanoparticles to effectively cross the blood brain barrier.
While it is known that the above methods do indeed allow the passage of nanoparticles across the blood brain barrier, little is known about how this crossing occurs. Not only that, but not much is known about the potential side effects of nanoparticle use. Therefore, before this technology may be widely utilized, more research must be done on the potentially harmful effects of nanoparticle use as well as proper handling protocols. Should such steps be taken, nanoparticle mediated drug delivery across the blood brain barrier could be one of the highest impact contributions of nanotechnology to clinical neuroscience.
It should be noted that vascular endothelial cells and associated pericytes are often abnormal in tumors and that the blood-brain barrier may not always be intact in brain tumors. Also, the basement membrane is sometimes incomplete. Other factors, such as astrocytes, may contribute to the resistance of brain tumors to therapy.
Meningitis is inflammation of the membranes which surround the brain and spinal cord (these membranes are also known as meninges). Meningitis is most commonly caused by infections with various pathogens, examples of which are Staph aureus and Haemophilus influenzae. When the meninges are inflamed, the blood-brain barrier may be disrupted. This disruption may increase the penetration of various substances (including antibiotics) into the brain. Antibiotics used to treat meningitis may aggravate the inflammatory response of the CNS by releasing neurotoxins from the cell walls of bacteria like lipopolysaccharide (LPS) Treatment with third generation or fourth generation cephalosporin is usually preferred.
Multiple sclerosis (MS)
Multiple sclerosis (MS) is considered an auto-immune disorder in which the immune system attacks the myelin protecting the nerves in the central nervous system. Normally, a person's nervous system would be inaccessible for the white blood cells due to the blood-brain barrier. However, it has been shown using Magnetic Resonance Imaging that, when a person is undergoing an MS "attack," the blood-brain barrier has broken down in a section of the brain or spinal cord, allowing white blood cells called T lymphocytes to cross over and destroy the myelin. It has been suggested that, rather than being a disease of the immune system, MS is a disease of the blood-brain barrier. However, current scientific evidence is inconclusive.
There are currently active investigations into treatments for a compromised blood-brain barrier. It is believed that oxidative stress plays an important role into the breakdown of the barrier; anti-oxidants such as lipoic acid may be able to stabilize a weakening blood-brain barrier.
Neuromyelitis optica, also known as Devic's disease, is similar to and often confused with multiple sclerosis. Among other differences from MS, the target of the autoimmune response has been identified. Patients with neuromyelitis optica have high levels of antibodies against a protein called aquaporin 4 (a component of the astrocytic foot processes in the blood-brain barrier).
Late-stage neurological trypanosomiasis (Sleeping sickness)
Late-stage neurological trypanosomiasis, or sleeping sickness, is a condition in which trypanosoma protozoa are found in brain tissue. It is not yet known how the parasites infect the brain from the blood, but it is suspected that they cross through the choroid plexus, a circumventricular organ.
Progressive multifocal leukoencephalopathy (PML)
Progressive multifocal leukoencephalopathy (PML) is a demyelinating disease of the central nervous system caused by reactivation of a latent papovavirus (the JC polyomavirus) infection, that can cross the BBB. It affects immune-compromised patients and is usually seen with patients having AIDS.
De Vivo disease
De Vivo disease (also known as GLUT1 deficiency syndrome) is a rare condition caused by inadequate transport of glucose across the barrier, resulting in mental retardation and other neurological problems. Genetic defects in glucose transporter type 1 (GLUT1) appears to be the main cause of De Vivo disease.
New evidence indicates that disrupton of the blood brain barrier in AD patients allows blood plasma containing amyloid beta (Aβ) to enter the brain where the Aβ adheres preferentially to the surface of astrocytes. These findings have led to the hypotheses that (1) breakdown of the blood-brain barrier allows access of neuron-binding autoantibodies and soluble exogenous Aβ42 to brain neurons and (2) binding of these autoantibodies to neurons triggers and/or facilitates the internalization and accumulation of cell surface-bound Aβ42 in vulnerable neurons through their natural tendency to clear surface-bound autoantibodies via endocytosis. Eventually the astrocyte is overwhelmed, dies, ruptures, and disintegrates, leaving behind the insoluble Aβ42 plaque. Thus, in some patients, Alzheimer’s disease may be caused (or more likely, aggravated) by a breakdown in the blood brain barrier.
It is believed that HIV can cross the blood-brain barrier inside circulating monocytes in the bloodstream ("Trojan horse theory"). Once inside, these monocytes become activated and are transformed into macrophages. Activated monocytes release virions into the brain tissue proximate to brain microvessels. These viral particles likely attract the attention of sentinal brain microglia and initiate an inflammatory cascade that may cause tissue damage to the BBB. This inflammation is HIV encephalitis (HIVE). Instances of HIVE probably occur throughout the course of AIDS and is a precursor for HIV-associated dementia (HAD). The premier model for studying HIV and HIV encephalitis is the simian model.
- ↑ Lina Stern: Science and fate by A.A. Vein. Department of Neurology, Leiden University Medical Centre, Leiden, The Netherlands
- ↑ Amdur, Doull, Klaassen (1991) Casarett and Doull's Toxicology; The Basic Science of Poisons 4th ed
- ↑ Vugler A, Lawrence J, Walsh J, et al (2007). Embryonic stem cells and retinal repair.
- ↑ Hamilton RD, Foss AJ, Leach L (2007). Establishment of a human in vitro model of the outer blood-retinal barrier.
- ↑ Brigger I, Morizet J, Aubert G, Chacun H, Terrier-Lacombe MJ, Couvreur P, Vassal G. Poly(ethylene glycol)-coated hexadecylcyanoacrylate nanospheres display a combined effect for brain tumor targeting. J Pharmacol Exp Ther 2002;303:928-36
- ↑ Silva, Gabriel. "Nanotechnology approaches for drug and small molecule delivery across the blood brain barrier." Surgical Neurology 67(2007): 113-116.
- ↑ Hashizume, H, Baluk P, Morikawa S, McLean JW, Thurston G, Roberge S, Jain RK, McDonald DM (April 2000). Openings between defective endothelial cells explain tumor vessel leakiness. American Journal of Pathology 156 (4): 1363-1380. PMID 10751361.
- ↑ Schneider, SW, Ludwig T, Tatenhorst L, Braune S, Oberleithner H, Senner V, Paulus W (March 2004). Glioblastoma cells release factors that disrupt blood-brain barrier features. Acta Neuropathologica 107 (3): 272-276. PMID 14730455.
- ↑ Beam, TR Jr., Allen, JC (December 1977). Blood, brain, and cerebrospinal fluid concentrations of several antibiotics in rabbits with intact and inflamed meninges. Antimicrobial agents and chemotherapy 12 (6): 710-6. PMID 931369.
- ↑ Lipoic acid affects cellular migration into the central nervous system and stabilizes blood-brain barrier integrity
- ↑ The NMO-IgG autoantibody links to the aquaporin 4 channel
- ↑ Pascual, JM, Wang D, Lecumberri B, Yang H, Mao X, Yang R, De Vivo DC (May 2004). GLUT1 deficiency and other glucose transporter diseases. European journal of endocrinology 150 (5): 627-33. PMID 15132717.
- ↑ Klepper, J, Voit T (June 2002). Facilitated glucose transporter protein type 1 (GLUT1) deficiency syndrome: impaired glucose transport into brain-- a review. European journal of pediatrics 161 (6): 295-304. PMID 12029447.
|
0.9063
|
FineWeb
|
["Blood-Brain Barrier", "Nanotechnology and Drug Delivery", "Neurological Disorders"]
|
The morphology of liquid crystalline polymers and their blends
Abstract (Summary)Nematic liquid crystals polymers (LCPs) encompass a large class of macromolecules exhibiting orientational order when in the melt or solution state. The intrinsic local orientation of these materials yields processing advantages due to lower viscosities than related isotropic (flexible coil) polymers of comparable molecular weight. Highly directional moduli and strengths in the solid state are further benefits of the ease of obtaining high orientations during processing in the melt or solution. Blending and composite fabrication with other materials are the practical methods that must be developed to use LCPs for structural applications. A nematic liquid crystal polymer such as poly(p-phenylene benzobisthiazole) (PBZT) is a rigid rod macromolecule with its length being essentially the mesogenic unit. Such rigid rod polymers are usually lyotropic liquid crystals and are infusible in the pure state so that any fabrication with other materials must be done in the solid or solution state. Thermotropic liquid crystalline polymers have molecular architecture usually consisting of shorter mesogenic units connected with flexible spacers that allow the mobility needed for the existence of flow at higher temperatures. The melt state allows the possibility of melt blending with other polymers using the liquid crystal as a processing aid or a reinforcement that forms in-situ. The purpose of this thesis is to characterize the morphology on various length scales of polymer composite materials obtained by these disparate methods of fabrication. The principle techniques utilized are optical, transmission electron, scanning electron microscopy, and X-ray diffraction. This work consists of an introductory and three subsequent chapters. Chapter 2 describes the morphology of composite films fabricated by attempting to infiltrate isotropic materials (glass or epoxy) into an existing nano-scale fibrillar network that naturally forms when PBZT is coagulated. The PBZT film that was formed by extrusion through a counter-rotating die. In Chapter 3, the morphology of fibers formed from spinning dopes composed of mechanically mixed PBZT and flexible polymer solutions is discussed. In Chapter 4 the morphology of a melt blended thermotropic liquid crystal polymer is compared with mechanical data.
School Location:USA - Massachusetts
Source Type:Master's Thesis
Date of Publication:01/01/1993
|
0.9641
|
FineWeb
|
```json
[
"Liquid Crystalline Polymers",
"Polymer Composite Materials",
"Morphology Characterization"
]
```
|
The Nuclear Weapons Complex stores radioactive nuclear materials known as "pits". At the Pantex Plant in Amarillo, Texas, several stockpile inspection, evaluation, and maintenance programs require the handling and measurement of pits from a wide variety of weapons systems. These measurements are performed to ensure stockpile integrity. Historically, pit-handling operations were performed manually, resulting in accumulations of radiation doses for workers. With the Weigh and Leak Check System (WALS), that is no longer the case.
WALS was a joint effort by Intelligent Systems, Robotics, & Cybernetics (ISRC) who developed the robotic automation system and by Pantex who developed the weigh and leak check stations. Pantex is currently using WALS to perform remote weigh and leak check operations on its nuclear weapon pits. WALS is the first robot system ever to handle such stockpile pits.
The handling of stockpile pits is a high-consequence task as any system failure could result in significant and catastrophic consequences. Having a robot system that has the necessary capabilities to safely, precisely, and gently handle the pits is critical. In addition, having a robotic system that is not only designed to be robust to a wide variety of potential failure modes, but is also able to fail in a safe manner in the event of a failure is extremely critical. Finally the system has to be at least as efficient and effective as the current standard process to ensure there are no negative impacts to current and future operations.
WALS uses a 6-axis robotic arm on a 25 ft. linear track. The robotic arm is programmed to move pits to custom tooling and automation stations, where the pits are unpacked from their containers, removed from their shipping fixtures, weighed, leak-checked, and repacked. WALS also has a suite of sensors and safety features necessary to operate the robot safely and reliably. Other features include:
- Computer vision to determine the position of objects in the workcell, eliminating the need for large numbers of precise fixtures.
- Force feedback control allows the robot system to sense forces on the payload, thereby protecting the payload and providing an automated means to precisely and gently place pits in the workcell.
- Mechanical locks and sensors that ensure a sequence of events occurs before a pit can be moved.
- A redundant computer to independently monitor forces on the pit during robot motion.
As an upgrade, Sandia has also modified the robot’s pit-handling tools so the system can accommodate new sealed insert (SI) containers, in addition to the several containers already used in the WALS system.
The primary benefit was a significant reduction in operator exposure to radiation by eliminating manual handling of pits. Another important ergonomic benefit is the elimination of many of the manual lifting tasks that are required for unpacking and repacking the pits. Furthermore, the automation process enforces qualified, validated procedures, that will be executed the same each time ensuring a high quality operation. This sequence of performed operations automatically generates a log that can be retained and audited, thus improving overall quality.
The automation technologies developed for WALS can be employed in a wide variety of areas where pits are handled. This will dramatically extend the scope of these technologies well beyond their original use in the weigh and leak check facility.
|
0.9484
|
FineWeb
|
["Nuclear Weapons Complex", "Weigh and Leak Check System (WALS)", "Robotic Automation"]
|
Ark of Taste
Wild Gulf Coast Shrimp
The wild gulf coast shrimp are wild-caught – or free-range – from the Gulf Coast of the US, where they naturally exist. They can be distinguished into white shrimp, brown and pink shrimp. These shrimp are all warm water species recognized for their sweet taste, firm texture, crunchy meat. Aside from their color, the different varieties of the Wild Gulf Coast shrimp are very similar. The white shrimp have grayish-white shells that turn pink when cooked; the brown shrimp have light brown or tan shells that turn coral when cooked and the pink shrimp have light pink shells with a pearl-like texture that turn a deeper shade of pink when cooked.
when new Ark of Taste items are added
|
0.6666
|
FineWeb
|
```
[
"Ark of Taste",
"Wild Gulf Coast Shrimp",
"Shrimp Varieties"
]
```
|
Regina Barzilay, 34
Teaching computers to read and write
For her doctoral dissertation at Columbia University, computer scientist Regina Barzilay led the development of Newsblaster, which does what no computer program could do before: recognize stories from different news services as being about the same basic subject, and then paraphrase elements from all of the stories to create a summary. Though humans can easily divine the meaning of a word from its context, computers cannot. Barzilay uses statistical machine-learning software to teach computers to make educated guesses. A computer is fed pairs of text samples that it is told are equivalent -- two translations of the same sentence from Madame Bovary, say. The computer then derives its own set of rules for recognizing matches. Once trained, it can tackle new sentences, computing "syntactic trees" that parse out their structural elements in different ways and determining the probability that each interpretation is correct. Then it statistically compares the most likely trees from two sentences to see if they match. The Newsblaster software recognizes matches about 80 percent of the time. The software works best with news stories, because they exhibit some regularity; "the problem is more constrained," says Barzilay, now an MIT assistant professor of electrical engineering and computer science. Shes working on a variation of Newsblaster for spoken language, which could yield applications that range from summarizing recorded lectures to handling airline reservation calls.
|
0.9592
|
FineWeb
|
```json
[
"Natural Language Processing",
"Machine Learning",
"Artificial Intelligence"
]
```
|
Mataram Kingdom was established in 1582, the centrum of the kingdom was located on the south east of Yogyakarta, Kotagede. In Islam history, Mataram Islam KIngdom had a pivotal role in Islam kingdoms in Indonesia. Ullema were involved as well in developing culture with Islam value in Java. Mataram Islam dynasty was initially from farmer family, as written in babad Tanah Jawi. On the bank of Opak river, currently Yogyakarta. Oneday, there was a farmer, his name was Ki Ageng Giring. When he hacked the soil in his fam land, suddenly there was a young coconut fell and there was a mysterious sound said ‘ whoever drank water of this coconut, his descendant will be the rulers of Java’. People belief that the coconut water was the word of Sunan Kalijaga. Ki Ageng Giring brought the coconut home and but he did not drink the water, as he was fasting that day. He went to river to clean himself. Not long after his friend, Ki Gede Pemanahan visited his empty house. Seeing the coconut, he drank the water till the last drop. Ki Ageng Giring came home and home and saw his coconut water was drank by his friend. He asked Gede Pemanahan that after his 7 generation, his descendant will be the ruler of Java.
There are other versions about the establishment of Mataram according to myth and legend. Generally, those versions were related to previous kingdoms sucha s Demak and Pajang. According to one of the versions, after Demak sat back, the capital was moved to pajang and Pajang functioned as a kingdom. The kingdom then expanded to East Java and involved in a family conflict with ARya Penangsang from Jipang Panolan regency. After conquering Aryo Penangsang, Sultan Hadiwijaya (1550-1582), king of Pajang gave award to 2 men who served him in that project, they were Ki Ageng Pemanahan and Ki Penjawi. Ki Ageng Penjawi was awarded with Mentaok forest and Ki Penjawi was awarded with a land in Pati. Pemanahan opened Mentaok forest and became a prosperous village, and gradually became small kingdom and was ready for rivalry with Pajang as the main Kingdom. Pemanahan died in 1575 and replaced by his son, Danang Sutawijaya or known as Pengeran Ngabehi Loring Pasar. Sutawijaya then rebelled Pajang. After Sultan Hadiwijaya passed away in 1582, Sutawijaya promoted himself as the king of Mataram with title Panembahan Senopati. Pajang then became part of Mataram, and the capital of Mataram was in Kotagede.
After Demak Kingdom fell, Pajang Kingdom was the olny kingdom in Central Java. But king of Pajang had strong enemies tried to ruin the kingdom, he is Aryo Penangsang. The king then made a contest that whoever could defeat of kill Aryo Penangsang would be rewarded with land in Pati and Mataram. Ke Ageng pemanahan and Ki Penjawi were two soldiers of Pajang who were intended to participate in the contest. In the end of the war, finally Danang Sutawijaya could defeat and kill Arya Penangsang. Sutawijaya was the son of Ki Pemanahan and the foster son of Pajang king. As Sutawijaya was the foster son of Sultan, so it was impossible for Ki Pemanahan to tell Sultan Adiwijaya. Kyai Juru Martani then suggested Ke Pemanahan and Ki penjawi to tel Sultan that they both who killed Arya Penangsang. Ki Ageng Pemanahan was rewarded with Mentaok forest and Ki Penjawi was rewarded with land in Pati.
After panembahan Senopati died, he was replaced by his son, Mas Jolang or Panembahan Seda Krapyak, who only reigned for 12 years (1601-1603) as written in his govt, and he built Danalaya garden on the west of Kraton. He died when he hunt at Krapyak forest. He was replaced by Mas Rangsang, known as Sultan Agung Hanyakrakusuma. He ruled from 1631-1645 and Mataram reached its glorious day. The capital, Kotagede was then moved to Kraton Plered. Sultan Agung also conquered littoral regions so they would not harm Mataram. Sultan Agung fought VOC that ruled over Batavia. Sultan Agung masterpiece was Grebeg Pasa and Grebeg Maulud Ritual. Sultan Agung died in 1645. He was replaced by Amangkurat I. Amangkurat I did not inherited his father nature. There were lots of killing and cruelty during his period. Mataram capital was moved to Kerta. In 1674 Trunajaya war broke. Trunajaya was supported by ullema and noble class a. nd even the royal prince. Kerta fell and Amangkurat I (with his son that finally on his side), escaped to get help from VOC. Arriving at Tegal Arum (nearby Tegal, Central Java), Amangkurat I fell sick and died. He was replaced by his son, Amangkurat II or known as Sunan Amral. Sunan Amangkurat II reigned from 1677-1703, and he was obedient to VOC to maintain his throne. Finally Trunojoyo could kill AMangkurat II by favor of VOC and as compensation VOC wanted an agreement that Mataram should hypothecate Semarang Port and Mataram should bear war cost.
After the death of Amangkurat II in 1703, he was replaced by his son, Sunan Mas (Sunan Amangkurat III). He was also against VOC, that VOC did not agree Sunan Amangkurat III was promoted as sultan and VOC promoted Paku Buwono I (Pangeran Puger). Civil was could not be avoided, between Amangkurat III and Paku Buwana I, Amangkurat III lost and he was exiled to Sailan by VOC. Paku Buwono I died in 1719 and then replaced by Amangkurat IV (1719-1727). During his period particians rebelled and VOC was implicated. Therefore, throne fight II broke in 1719-1723. Sunan Prabu or Sunan Amangkurat IV died in 1727 and replaced by Paku Buwana II (1727-1749). In his period, Chinese rebelled against VOC.
Paku Buwana II was on side of Chinese and helped to destroy VOC fortress in Kartasura. VOC was supported by Panembahan Cakraningrat of Madura and could finish Chinese rebellion. Paku Buwana was worried and then he change to side VOC> THis caused Raden Mas Garendi rebellion who fought with Chinese to attack Keraton, that Paku Buwana II escaped to Ponorogo. Kraton could be regained by the assistance of VOC in 1743, as kraton was damaged badly, then kraton was moved to Surakarta in 1744. Another rebellion was led by Raden Mas Said. Paku Buwono assigned Mangkubumi to silence the rebellion and promised Sukowati (currently Sragen). Although Mangkubumi could finish his call, Paku Buwono denied his promise and finally Mangkubumi was on Mas Said side. They both rebelled in Throne Fight III (1747-1755)
Paku Buwono II could not fight both forces and he fell sick and died in 1749. VOC promoted Paku Buwono II. Mangkubumi kept his action and he could reign Jogja, bagelen, and Pekalongan. But in that period there was a conflict between Mangkubumi and Mas Said. VOC was very keen knowing this. VOC sent an arabic messenger from batavia to asked Mangkubumi to reconcile. Mangkubuni accepted and there was a Pailhan Nagari or Giyanti Agreement in 1755. Giyanti Agreement content was splitting Mataram into two. The west was given to Mangkubumi entitled as Hamengkubuwono I and the palace was in Yogyakarta. The east was given to Paku Buwono. Since then, Mataram was divided into two, Kasultanan Yogyakarta with the king was Sri Sultan Hamengkubuwono I and Kasunanan Surakarta reigned by Sri Susuhunan Paku Buwana III.
Kings of Mataram Islam:
1. Panembahan Senopati (1584-1601 M)
2. Mas Jolang atau Seda Ing Krapyak (1601- 1613 M)
3. Mas Rangsang / Sultan Agung Hanyakrakusuma (1613-1646 M)
4. Amangkurat I (1646- 1676 M)
5. Amangkurat II / Sunan Amral (1677- 1703 M)
6. Sunan Mas / Amangkurat III in 1703 M
7. Pangeran Puger / Paku Buwana I (1703-1719 M)
8. Amangkurat IV / Sunan Prabu (1719-1727 M)
9. Paku Buwana II (1727-1749 M)
10. Paku Buwana III 1749 M promoted by VOC.
11. Sultan Agung
Pajang and Mataram Islam Kingdom was very limited. The source was part of chronicle text, or oral tradition. The source was also from Portuguese in 16th and beginning of 17th century and only partly touch events on littoral areas, whether trading or about kingdoms. Therefore, mostly Mataram history source was only based on domestic source.
|
0.5219
|
FineWeb
|
```json
[
"Mataram Kingdom History",
"Islam Kingdoms in Indonesia",
"Mataram Dynasty Rulers"
]
```
|
I was driving to work one morning, when the Holy Ghost of God started to fill my heart with joy from pondering the day when Christ comes in the clouds to catch His church away, the blessed rapture of the church. I scribbled down some thoughts and wrote them out in song fashion.
O’ Come Quickly, King Jesus,
O’ Come Quickly, Precious Lord.
O’ Come Quickly to catch your church away,
for we are looking for that resurrection day.
Well, the Church is watching the sky patiently,
Looking for that day from this ol’ world set free,
Gazing toward heaven listening for a shout
On that day the graves will open and the saints come out
In just a moment, in the twinkling of an eye,
Our body will be changed, we’ll be headed for the sky,
Where in the clouds, we’ll meet you face to face,
and begin to sing for eternity the praises of your Grace!
Some people say, it’s all one big lie,
Why I believe in you, they can’t understand why,
But through the Spirit and your holy word,
My faith in you can never be deterred.
|
0.6607
|
FineWeb
|
```
[
"The Rapture of the Church",
"Faith and Spirituality",
"The Second Coming of Christ"
]
```
|
Definition of gaberdines
plural of gaberdine 1
The word "gaberdines" uses 10 letters: A B D E E G I N R S.
No direct anagrams for gaberdines found in this word list.
Words formed by adding one letter before or after gaberdines (in bold), or to abdeeginrs in any order:
p - bespreading
Words within gaberdines
not shown as it has more than seven letters.
List all words starting with gaberdines, words containing gaberdines or words ending with gaberdines
All words formed from gaberdines by changing one letter
Other words with the same letter pairs: ga ab be er rd di in ne es
Browse words starting with gaberdines by next letter
Previous word in list: gaberdine
Next word in list: gabfest
Some random words: huarache
|
0.9291
|
FineWeb
|
["Definition of gaberdines", "Words formed by or within gaberdines", "Related words and anagrams"]
|
PROGRESSIVE STRUCTURAL COLLAPSE
This is a form of "domino effect" failure that can occur in a reinforced concrete structure whereby a failure starting in a particular component rapidly propagates to other components precipitating a major or even a total collapse. The three most common occurrences of this type of collapse are as follows:
Recently, two more types of construction have joined this group: lift-slab and hung ceiling systems.
The most well known failures in these categories are the Commonwealth Avenue collapse in Boston, the Bailey's Crossroads collapse in Virginia, and the Ronan Point explosion-collapse in London.
The Ronan Point failure occurred in May 1968. A natural gas explosion in a kitchen located in one of the four corners of the 23-storey precast building triggered a progressive collapse of all the corner units above and below that unit. The spectacular nature of the collapse created an enormous impact on the philosophy of structural design and resulted in important revisions of design codes. The Ronan Point report of the Court of Inquiry stated:
"It is the common aim of structural engineers so to design their structures that if one or two component parts or members fail due to any cause, the remaining structure shall be able to provide alternative paths to resist the loads previously borne by the failed parts."
The Ronan Point failure resulted in the addition of an amendment to the British Building Regulations of 1970, later developing into BS Cp 110-1972, which made it mandatory in Britain for buildings of five or more stories to be designed for the possibility of progressive collapse. This amendment applies to all structures of more than five stories and is not limited to designs using precast panels. It follows the alternate path theory and requires, in essence, that every building be designed using either of the following alternatives:
The designer shall ensure that the removal of any of the structural components essential to the stability of the building does not produce the total collapse of the structure and that any resulting "local" damage or collapse be restricted to the stories above and below the one at which the removal of the component was made.
Structural members shall not collapse if subjected to the combined dead and imposed loads acting simultaneously with a pressure of 5 psi (34.48 kPa) in any direction and any extra loads transmitted from adjacent parts of the structure subjected to this 5 psi pressure.
The need to safeguard against progressive collapse was beginning to be recognized, though not formalized in design codes, even prior to the Ronan Point collapse. The Comite European du Beton produced and published in March 1967 a comprehensive code covering the design and construction of systems buildings. This Code drew attention to the danger of progressive collapse in the following words:
"One can hardly overemphasize the absolute necessity of effectively joining the various components of the structure together in order to obviate any possible tendency for it to behave like a "house of cards" "
In North America the first provisions to deal with progressive collapse were those in the BOCA (Building Officials and Code Administrators) 1981 Code. However, it was not until 1989 that the ACI - 318 Code made a first mention of the problem and not until the issuance of the 1995 Code that provisions comparable to those of BS-CP 110: 1972 were adopted.
The Canadian Standard CSA - A23.3-94 for the design of concrete structures now recognizes structural integrity as a separate limit state. The Standard includes several provisions to enhance structural integrity especially in precast and tilt-up structures, mixed or unusual structural systems and structures subjected to severe loads such as vehicle impact or chemical explosions.
The Ronan Point case stands as one of the few landmark failures that have had a sustained impact on structural thinking, an impact that affected even institutions that traditionally tend to resist change such as the ACI.
|The information contained in this web site is intended for marketing purposes only. It is not all-inclusive, and does not fully describe the many and varied services that the company provides, nor does it completely describe the education, training, skills, or expertise of our staff.|
Walters Forensic Engineering | 277 Wellington
Street West, Suite 800 | Toronto, ON M5V 3H2
|
0.744
|
FineWeb
|
["Progressive Structural Collapse", "Structural Design Codes", "Building Regulations"]
|
Talking to your children about sex can help prevent sexual abuse because they will be better equipped to understand setting boundaries and respecting those boundaries in themselves and others. Researchers say that conversations about sexuality also lead to less risky sexual behavior, should teenagers choose to engage in sex. Now that you’re prepared to talk with your kids, take action by making sure you know how you’ll approach the conversations as you guide them into the topics.
In order to have honest and insightful conversations with your children about healthy sexuality, first educate yourself so you can answer appropriately the inevitable string of questions they will have.
- Learn about the various methods for pregnancy prevention and their respective rate of effectiveness
- Learn how STDs are transmitted, how to detect them, and how to prevent them
- Learn more about how to have a healthy relationship with one’s own body and sexuality in a way that reflects your values.
It’s worth it to take the time to learn about the different aspects of healthy sexuality so that your children do not walk away with myths or misinformation. See this page for resources on how to further your personal education.
Share your knowledge
Think about ways to impart your knowledge, formally or informally. Prepare yourself to recognize seemingly innocuous moments that open the door to educate your children about healthy sexuality. For example, if your child comes home from school and tells you that school officials made some classmates change their clothes because their attires were inappropriate, you can ask for your child’s thoughts about the school officials’ actions, and how those actions tie to a person’s sexuality.
Alternatively, you can talk with your children about healthy sexuality through “formal” time set aside to sit down and discuss it. Some parents find it easier to go into the conversation when both they and their children are expecting what the conversation will entail.
Take a step
If you were to consider running a marathon, you would first think about what you need to do – what kind of training schedule you will follow, what type of shoes will maximize your speed, how you will track progress, and how you will hold yourself accountable to accomplish your goal. The same concept applies when you prepare to talk with your children about healthy sexuality. For example, before you explain to your daughter the importance of scheduling an appointment each year with a gynecologist, you should first talk with her about her vagina. Taking the first step in conversations about healthy sexuality may mean practicing in the mirror or talking to your partner about it. The point is simply taking that first step.
Take the first step: Be prepared to answer these questions in the following bystander scenarios, developed by NO MORE.
You think someone in your family is in an abusive or unhealthy relationship. What do you do?
Once you recognize the warning signs that a situation might be abusive, you can then identify how to respond in a way that feels appropriate and comfortable.
Talk privately with the victim, and express concern by saying you’ve been worried about them. Listen without judgment and if they don’t want to talk, then let them know that you’ll be there for them if they ever do want to talk.
TIP: Allow the victim/survivor to make their own decision. Personal style, culture, and context of the survivor’s life may affect their reactions. A victim/survivor may not be comfortable identifying as a victim or with naming their experience as abuse or assault, and it is important to respect each person’s choices and style of coping with this traumatic event.
Listening without judgment may make them feel comfortable opening up, and if they do disclose abuse, let them know you believe them. You can reassure them that they are not alone, this is not their fault and that you are here to help. Some useful things to say might be, “No one deserves to be treated this way,” “You are not to blame,” or simply, “What’s happening is not your fault.”
TIP: Remember that although you may be having a strong reaction to what happened, it’s important to focus on the feelings and reactions of the survivor rather than your own. Try not to outwardly judge or confront the abuser as it may make the situation worse or more dangerous for the victim, and could put you in danger, too.
Offer options by letting them know free, confidential resources are available and that you are here to support them in whatever choices they make. National hotline services include the National Domestic Violence Hotline 1.800.799.7233 (www.thehotline.org) and loveisrespect 1.866.331.9474 (www.loveisrespect.org or text ‘loveis’ to 22522) – both can offer you guidance and point you to local resources in your area that will help keep them (and any children that may be present in the home) safe.
Tip : Offer to let them use your phone or computer to look up local resources or contact someone that can help them and any children involved.
Your friend tells you that he/she thinks they were raped. What do you do?
The support survivors of sexual assault receive from the people they love and trust can be invaluable to their ability to cope with and heal from sexual assault. Following are some helpful suggestions (via The Rape Crisis Center).
Allow your friend to talk about what happened and control the direction of the conversation. Do not ask a lot of questions or focus on the attack itself, but rather on how he or she is handling the trauma.
Listen Without Giving Advice or Trying to “Fix” Things
When we care for someone, we often try to give advice, solve their problems or fix things for them. While it comes from a place of caring, our instinct to try to problem-solve or give advice can sometimes leave a survivor feeling as though their emotions are being dismissed. Sometimes, the issues a survivor is having will not feel fixable to them or to you, and it’s much more helpful to just be there to listen to whatever a survivor wants to share with you.
Let the Survivor Have Control
Allow survivors to make decisions for themselves and assure them that their decisions are supported. You don’t have to agree with their decisions but it is important to give them the authority to decide how they will handle things.
It is important that the survivor knows you believe what happened.
Normalize A Survivor’s Feelings
Every survivor will react to their experience differently. Survivors may experience many upsetting, conflicting, confusing feelings after an assault. Survivors often re-experience the event through flashbacks, may feel on-edge all the time, or may be prone to sudden outbursts, which can feel especially upsetting and leave a survivor feeling even more disempowered. Some survivors may blame themselves for and feel frustrated by these intense feelings, and it’s important to remind a survivor these feelings and responses are out of their control and are the body’s way of responding to a traumatic event. Something helpful you could say would be, “You are having a normal response to an abnormal situation.”
Provide Unconditional Support
It will help your friend to hear that they are not to blame for the assault. Regardless of an individual’s choices prior to the attack, no one ever asks to be or deserves to be raped or sexually assaulted.
Healing takes time, and every survivor copes with trauma differently. Don’t pressure or rush your friend to be “normal” or to “just move on.” Instead, reassure your friend that support will be available throughout the healing process, however long it may take.
Let The Survivor Know that Help is Available
If they are interested and open to receiving assistance, tell them about the National Sexual Assault Hotline, or offer to help find local services for them.
Some helpful statements include:
- I believe you.
- This is not your fault.
- I am so sorry that this happened.
- You did not deserve this.
- I am happy that you are safe and that you are here to talk with me.
- Thank you for being brave/comfortable enough to talk with me.
- How can I help you right now?
Supporting A Survivor
Supporting a survivor can feel challenging for a number of reasons: you may be worried about upsetting the survivor, you may have other personal experience with this issue, or you may feel you don’t know what to say at all. The most important things you can do for a survivor are to listen, validate, ask how you can help, know where to refer a survivor for further help, listen without judgment, and care for yourself.
Make Sure You Are Getting the Support You Need
Watching a friend or loved one work through the aftermath of a sexual assault can be an extremely difficult and painful experience. Common feelings of those supporting someone who has been assaulted include helplessness, frustration, anger and guilt. It can be helpful to talk with someone other than the survivor about these feelings.
You understandably may be experiencing discomfort, shock or uncertainty, and have a lot of questions. To respect the survivor’s discomfort and give yourself the space you need to process your own feelings, wait until you’re away from the survivor and call the National Sexual Assault Hotline for free, confidential support.
Your male friend tells you that he had an unwanted sexual experience when he was younger with someone he looked up to. He questions if it was sexual assault because he was sexually aroused during the interaction. What do you do?
Some possible options (depending on your comfort and his openness to further discussion) include:
- Offer encouragement for his willingness to consider a challenging question.
- Listen neutrally. Ask him what factors make him think it might have been abusive. Avoid defining what happened for him.
- Explore whether he feels there was a power imbalance in the relationship.
- Offer to help him find resources to learn more about unwanted and abusive sexual experiences for males and why it might be difficult, but important for a man to address it.
- Do a safety check. See if he has healthy strategies to manage negative feelings when he starts thinking about this question. If not, help him find a hotline or local crisis service should he start to feel overwhelmed.
You are in the lunchroom with your friends and a group of students nearby start making sexual gestures and comments to one of your friends that’s sitting with you. Though trying to ignore the comments, you see that your friend is upset. What do you do?
- You can tell the group making the comments to stop their sexually harassing behavior, or ask them to imagine how they’d feel if someone made that comment about one of their family members or someone else they cared about.
- You could ask your friend if they want to leave and talk to a teacher or counselor.
Whatever you choose in the moment, you should tell an authority figure about the harassment and ask them to intervene. While it’s not physical violence, these types of harassing behaviors help foster an environment that condones domestic and sexual violence in our society.
A co-worker starts talking about a recent high-profile rape or domestic violence case and blames the victim for what happened. What do you do?
- Tell them that regardless of what they think happened that it’s never the victim’s fault.
- Give them resources that explain the realities of domestic and sexual violence.
- Contact your human resources representative or immediate supervisor and ask that the staff receive training on these issues.
A teen in your life tells you their boy/girlfriend is hurting them, harassing them and/or forcing them into sexual situations. What do you do?
- Assure the person that what is happening to them is not right, it’s not their fault and everyone deserves a healthy, respectful relationship.
- Offer to help them look for local resources to keep them safe.
- Ask them if there is an adult at their school, like a teacher, counselor or principal or a parent they can talk with to help them stay safe.
- Check in with them to see if they are safe and offer to help them involve individuals or resources to help make the abuse stop.
The guys on your team are constantly making lewd, rude or degrading comments about women and girls or calling each other names that imply they are “weak like girls.” What do you do?
- Speak up that their comments are degrading to their teammates and to women in general and it’s not cool with you.
- Talk to teammates individually about the situation and ask that they not join in those behaviors.
- Ask the coach to talk to the team, or individual, about how harassment and the degradation of women and girls is not okay.
|
0.6192
|
FineWeb
|
["Talking to Children about Sex", "Responding to Sexual Abuse", "Supporting Survivors of Sexual Assault"]
|
January 31, 2011
For stalking are many. They include the desire for contact and control, obsession, jealousy, and anger and stem from the real or imagined relationship between the victim and the stalker. The stalker may feel intense attraction or extreme hatred. Many stalkers stop their activity when confronted by police intervention, but some do not. The more troublesome stalker may exhibit a personality disorder, such as obsessive-compulsive behavior, which leads him to devote an inordinate amount of time to writing notes and letters to the intended target, tracking the victim’s movements, or traveling in an attempt to achieve an encounter.
The potentially dangerous consequences and the terrifying helplessness victims experienced led to calls for legislation criminalizing stalking. California enacted the first anti-stalking law in 1990. Eventually, all 50 states and the District of Columbia passed legislation that addresses the problem of stalking. Initially these laws varied widely, containing provisions that made the laws virtually unenforceable due to ambiguities and the dual requirements to show specific criminal intent and a credible threat. Many states have amended these stalking statutes to broaden definitions, refine wording, stiffen penalties, and emphasize the suspect’s pattern of activity.
In most states, to charge and convict a defendant of stalking, several elements must be proved Beyond a Reasonable Doubt. These elements include a course of conduct or behavior, the presence of threats, and the criminal intent to cause fear in the victim.
A course of conduct is a series of acts that, viewed collectively, present a pattern of behavior. Some states stipulate the requisite number of acts, with several requiring the stalker to commit two or more acts. States designate as stalking a variety of acts, ranging from specifically defined actions, such as nonconsensual communication or lying in wait, to more general types of action, such as harassment.
|
0.8547
|
FineWeb
|
["Stalking Motivations", "Stalking Laws", "Stalking Conviction Elements"]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.