text
large_stringlengths
1k
155k
id
large_stringlengths
47
47
dump
large_stringclasses
95 values
url
large_stringlengths
16
401
file_path
large_stringlengths
125
155
language
large_stringclasses
1 value
language_score
float64
0.65
0.99
token_count
int64
500
36.8k
score
float64
2.52
4.72
int_score
int64
3
5
raw_reasoning_score
float64
0.3
3.25
reasoning_level
int64
0
3
interpretation
stringclasses
4 values
topic
stringclasses
23 values
One of the experts set to testify at Wednesday’s long-awaited meeting about the county’s policy for genetically modified organisms (GMOs) on open space says scientists are seeing new, alarming patterns in plants and animals due to increased use of the herbicide Roundup. Michael McNeill is an agronomist who owns Ag Advisory Ltd. in Algona, Iowa. He received his Ph.D. in quantitative genetics and plant pathology from Iowa State University in 1969 and has been a crop consultant since 1983. He was among three experts invited by county officials to testify at the Aug. 10 meeting of the Cropland Policy Advisory Group (CPAG). CPAG, which has been meeting since February, serves as a sounding board for the county’s parks and open space staff as they develop a new cropland policy on matters like what may be grown on county land. The group has only touched briefly on the hot-button GMO issue in its past meetings; the Aug. 10 meeting was devoted entirely to the subject. McNeill told Boulder Weekly before the meeting that he and his colleagues in the industry are seeing serious, negative effects produced by the use of glyphosate, which is the primary ingredient in Roundup weed killer. (Monsanto, the company that makes Roundup, has generated controversy by genetically altering crops to make them resistant to the herbicide.) McNeill says that in the Midwest and other areas of the country, such as Louisiana and Mississippi, weeds like water hemp, giant ragweed, lamb’s quarter and velvet weed have become Roundup resistant through natural selection, due to a particular genetic mutation that survived the poison and therefore reproduced successfully and wildly. The problem is, farmers’ natural reaction has been to simply apply more Roundup to their crops, which is having deleterious impacts, McNeill says. “Used judiciously, it can be a useful product, but as with anything, if you abuse it, it can have negative effects,” he says. McNeill explains that glyphosate is a chelating agent, which means it clamps onto molecules that are valuable to a plant, like iron, calcium, manganese and zinc. “When you spray glyphosate on a plant, it’s like giving it AIDS,” he says. The farmers’ increased use of Roundup is actually harming their crops, according to McNeill, because it is killing micronutrients in the soil that they need, a development that has been documented in several scientific papers by the nation’s leading experts in the field. For example, he says, harmful fungi and parasites like fusarium, phytopthora and pythium are on the rise as a result of the poison, while beneficial fungi and other organisms that help plants reduce minerals to a usable state are on the decline. He explains that the overuse of glyphosate means that oxidizing agents are on the rise, creating oxides that plants can’t use, leading to lower yields and higher susceptibility to disease. McNeill acknowledges that Monsanto could simply find a new chemical that kills the newly resistant weeds, but the weeds will simply find a way around it again. “It’s mother nature’s plant breeding program,” he says. “It’s very widespread, and it’s a serious problem.” McNeill says the situation is causing “sudden death syndrome” in soybeans, which means they are dying at increased rates when they go into their reproductive phase. He adds that corn is showing a higher incidence of Goss’s wilt, which has been a problem in Colorado since the early 1970s, and studies show that glyphosate causes a rise in both diseases. And the problems are not limited to plants, it’s extending to the animals that eat them, according to McNeill. He says he and his colleagues are seeing a higher incidence of infertility and early-term abortion in cattle and hogs that are fed on GMO crops. He adds that poultry fed on the suspect crops have been exhibiting reduced fertility rates. McNeill, who works with universities, the federal government and private companies, says his advice to his farmer clients is to rotate chemicals — or don’t use them at all. While it is more labor-intensive, organic farmers usually cut their weeds as an alternative to herbicides. He says he consults for about 160,000 acres of conventional farmland and 5,000 to 6,000 acres of organically farmed land. “My clients are my farmers, and I want what’s best for them,” he says. “And my clients are the consumers who consume the farmers products, and I want what’s best for them.” McNeill compares the Roundup situation to the way science eventually caught up to another poison: Just as DDT was initially hailed as a miracle pesticide and later banned, researchers are beginning to discover serious problems with glyphosate. “Some issues are starting to arise with technologies that probably needed more research before we started using them,” he says. “It’s a moving target.” The other two experts invited to the CPAG meeting, Kent Davis of Crop Quest and Phillip Westra of Colorado State University, did not return calls by press time.
<urn:uuid:e13f1b69-6537-462b-baae-e4d1dc3f9c98>
CC-MAIN-2016-07
http://www.boulderweekly.com/news/expert-gmos-to-blame-for-problems-in-plants-animals/
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166222.10/warc/CC-MAIN-20160205193926-00232-ip-10-236-182-209.ec2.internal.warc.gz
en
0.966417
1,115
2.625
3
2.982749
3
Strong reasoning
Industrial
Citrus fruits like oranges and grapefruits are known to be a rich source of vitamin C but new evidence suggests they also contain compounds that fight cancer. Researchers at Texas A&M University reported this week that freeze-dried grapefruit pulp, similar to whole grapefruit, reduced the incidence of early colon cancer lesions in an animal model of the disease. Meanwhile a researcher at Kanazawa Medical University in Japan showed that nobiletin, a compound found in tangerines, has also demonstrated possible action against colon cancer. Cancer of the colon or rectum is the second deadliest form of cancer after lung cancer but is also considered one of the most preventable types of cancer, as there are several dietary factors that appear to play a protective role against the disease. In another trial, presented yesterday at the symposium on health benefits of citrus fruits, taking place during the American Chemical Society's national meeting this week, a team from the University of Hawaii reported that drinking grapefruit juice may help reduce the risk of cancer in smokers. In a controlled study involving 49 smokers, the researchers found that those drinking three 6-ounce glasses of grapefruit juice a day reduced the activity of a liver enzyme called CYP1A2 that is thought to activate cancer-causing chemicals found in tobacco smoke. The meeting underlines the nutraceutical potential of the fruit at a time when sales are being hit by the current trend for low-carb diets as well as warnings about the interaction between grapefruit and prescription drugs. Grapefruit are a key component of the once fashionable 'grapefruit diet', now pushed to the sidelines by the low-carb mania. But a recent trial, reported earlier this year and presented at the meeting yesterday, suggests that grapefruit may indeed stop weight gain by lowering insulin levels. Meanwhile the fruit's effects on drugs could be turned into a benefit for the pharmaceutical industry. Scientists at Texas A&M Citrus Center have identified three compounds belonging to a class called furocoumarins that are responsible for inhibiting a key enzyme, CYP3A4, that metabolizes and regulates certain drugs involved in the grapefruit-drug interaction. The researchers hope that these enzyme-blockers can eventually be developed into a 'super-pill' or specialty grapefruit juice that can be co-administered with prescription drugs to increase their bioavailability, thus reducing dose and cost. Roughly two-thirds of the world's grapefruit and grapefruit juice hail from Florida.
<urn:uuid:88dac708-cadb-4e7c-8b0a-423557f93f0d>
CC-MAIN-2014-23
http://www.foodnavigator-usa.com/R-D/Grapefruit-juice-may-contain-cancer-fighting-compounds
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776438008.40/warc/CC-MAIN-20140707234038-00023-ip-10-180-212-248.ec2.internal.warc.gz
en
0.953512
516
2.96875
3
2.92287
3
Strong reasoning
Health
Subbases and Subgrades for Concrete Foundations A concrete surface is only as stable and level as its subgrade and subbase. Weak subgrade and subbase layers can settle differently across the surface and cause cracks in the concrete. Any concrete project needs at least a compacted soil subgrade layer. A thick gravel subbase and base may also be required, and are usually worth the effort. Before laying any foundations, the ground must be compacted and level. How to Prepare the Subgrade Level A sidewalk or other concrete surface that isn’t taking heavy loads can stand to only have a subgrade layer under the concrete. However, even for such simple projects, it may be advisable to add a gravel subbase to improve drainage and help level the surface. A subbase also will make the concrete work easier because a soil subgrade can get muddy and make a mess while pouring concrete. Either way, the subgrade soil needs to be flat and compacted. If you are adding a subbase, dig down least four inches deeper than the thickness of your concrete, and compact the soil. Also dig out the soil at least six inches laterally beyond the project outline. You may need to add or remove soil to level the project area. Level the soil before adding asubbase so the subbase and concrete will have a uniform thickness. The compaction process varies according to soil type. Sandy, granular soils are the easiest to compact and cover. Use a vibratory plate compactor to push the spaces out between particles of granular soils. These compactors look like large gas-powered lawnmowers and can be rented at some home improvement stores. If the soil is predominantly organic, like a rich gardening topsoil, several inches of soil will need to be excavated and replaced with a more granular fill soil. Clay-heavy soil poses a greater challenge. Laying concrete slabs or even a driveway on expansive soil can cause major headaches without careful engineering and adequate drainage. For small projects, rammers are best for compacting clay soils. The subgrade needs to allow adequate drainage. How to Prepare the Subbase To make the subbase, pour gravel about four inches thick, flatten with a screed rail and check for level. Then tamp down so it is about four inches thick. Flatten and level again. Particularly for projects adjoining or close to the house, make sure the subbase slopes away from the house about 1/8th inch per foot. An additional option is to replace the top inch with a finer gravel or sand base. You can also add the base on top of a full four-inch subbase. The finer base will make it easier to keep the concrete level, and require less concrete, which can be expensive. Once the base is level and thoroughly compacted, check your work by rolling a heavy truck over the base. It should sink uniformly, and the truck tires should not sink more than 1 inch into the soil. Proper preparation of the soil subgrade and concrete subbase are crucial for a successful concrete project. Consider laying a vapor barrier beneath your foundation, above the subbase. Other important preparations for creating your foundation include readying concrete forms and thinking about whether you will need concrete joints or not. Author Steve Graham is an expert on green building who writes for several homeimprovement publications. He's full of great, practical home improvement answers, and incidentally, he's pretty funny, so send hima message.
<urn:uuid:813844a7-9027-43ac-8b05-fb6faa712f0b>
CC-MAIN-2014-10
http://concrete.networx.com/info/subbases-subgrades-concrete/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011284846/warc/CC-MAIN-20140305092124-00026-ip-10-183-142-35.ec2.internal.warc.gz
en
0.924322
720
2.59375
3
1.97604
2
Moderate reasoning
Home & Hobbies
Origami is the simple yet intentional act of folding paper in order to create a delicate piece of art. The practice takes very little material and requires no setup, but according to Dallas Zoo conservation and engagement intern Audrey Silvestre, you need more than just paper. “Origami takes precision and patience,” she says. “A fold that’s a little off can make the final creation look a wonky and lopsided. Being the perfectionist I am, I like to make sure each corner meets the other corner perfectly.” Her patience has been tested and demonstrated over the past few weeks as she, alongside a group of 48 interns spanning 16 Dallas Zoo departments, has painstakingly crafted more than 1,000 origami cranes in the name of conservation. In Japan, the origami crane is a symbol of hope in challenging times. The belief is, if you are determined enough to craft 1,000 cranes while concentrating on a specific purpose or goal, then your wish can be achieved. The interns took that to heart in honor of the Dallas Zoo’s current conservation focus – support for the endangered whooping crane. Once upon a time, just 80 years ago, there were only 15 whooping cranes left in the wild. Through concerted conservation efforts, those numbers have slowly grown to almost 800 whooping cranes today in human care and in the wild. But there is still much work to be done before this species is secure. In response, the Dallas Zoo is on a mission to raise $2.5 million to fund the construction of the Whooping Crane Center of Texas, an off-site whooping crane breeding facility that will be located a few miles from the Zoo. There, we’ll breed whooping cranes for release into the wild and will conduct research to continue to improve wild reintroduction efforts. How can you help? Current Dallas Zoo interns have organized a fundraiser, with stations at the Zoo stocked with t-shirts, conservation wristbands, art, stickers, reusable totes, and water bottles, all featuring this amazing bird. Their goal is to raise $10,000 to contribute to the Zoo’s larger capital campaign. While supplies last, anyone who contributes to the fundraiser at the Zoo is gifted one of the interns’ 1,000 paper cranes as a small “thank you” for helping keep the hope alive for this iconic Texas species. “My knowledge of these beautiful birds has definitely grown a lot since I’ve been here,” Silvestre shares. “It’s sad to know that our actions affect these creatures as well as other wildlife, but together we can definitely make a positive impact.” There are several ways to get involved to help create a better world for the whooping cranes. - Support the interns at the Zoo this weekend by taking part in daily activities from 10 a.m.-4 p.m. at the ZooNorth Breezeway. - Purchase specially designed whooping crane products and original art inspired by cranes and their beauty. - Stop by to contribute to our goal of collecting 3,000 pledges for pro-environmental behaviors that benefit whooping cranes. - Say yes to “rounding-up for whooping cranes” when you buy something in our Zoofari Market. If you can’t make it to the Zoo this weekend but still want to help out, you can also submit an electronic donation through paypal.me/DallasZoo. And keep an eye out for more news from the Dallas Zoo about ways you can help support our campaign to build the Whooping Crane Center of Texas!
<urn:uuid:d58b48dd-36a6-46df-af25-4af928c39407>
CC-MAIN-2018-30
http://zoohoo.dallaszoo.com/category/conservation/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590493.28/warc/CC-MAIN-20180719031742-20180719051742-00161.warc.gz
en
0.936854
763
2.5625
3
2.533168
3
Strong reasoning
Science & Tech.
On the Cult of Personality and Its Consequences "On the Cult of Personality and Its Consequences" (Russian: «О культе личности и его последствиях») was a report by Soviet leader Nikita Khrushchev made to the 20th Party Congress of the Communist Party of the Soviet Union on 25 February 1956. Khrushchev's speech was sharply critical of the reign of deceased General Secretary and Premier Joseph Stalin, particularly with respect to the purges of the Communist Party of the Soviet Union which had especially marked the last years of the 1930s. Khrushchev charged Stalin with having fostered a leadership personality cult despite ostensibly maintaining support for the ideals of communism. The speech was a milestone in the "Khrushchev Thaw." Superficially, the speech was an attempt to draw the Soviet Communist Party closer to Leninism. Khrushchev's ulterior motivation, however, was to legitimize and help consolidate his control of the Communist party and government, power obtained in a political struggle with Stalin loyalists Vyacheslav Molotov and Georgy Malenkov. The Khrushchev report was known as the "Secret Speech" because it was delivered at an unpublicized closed session of Communist Party delegates, with guests and members of the press excluded. The text of the Khrushchev report was widely discussed in party cells already in early March, often with participation of non-party members, however the official Russian text was openly published only in 1989 during the glasnost campaign of Soviet leader Mikhail Gorbachev. The issue of mass repressions was recognized before the speech. The speech itself was prepared based on the results of a special party commission (Pospelov (chairman), Komarov, Aristov, Shvernik), known as the Pospelov Commission, arranged at the session of the Presidium of the Party central committee on 31 January 1955. The direct goal of the commission was to investigate the repressions of the delegates of the 17th Congress, in 1934, of the Communist Party of the Soviet Union. The 17th Congress was selected for investigations because it was known as "the Congress of Victors" in the country of "victorious socialism", and therefore the enormous number of "enemies" among the participants demanded explanation. This commission presented evidence that during 1937–38 (the peak of the period known as the Great Purge) over one and a half million individuals were arrested for "anti-Soviet activities", of whom over 680,500 were executed. Reports of the speech The public session of the 20th Congress had come to a formal end on 24 February 1956 when word was spread to delegates to return to the Great Hall of the Kremlin for an additional "closed session," to which journalists, guests, and delegates from "fraternal parties" from outside the USSR were not invited. Special passes were issued to those eligible to participate, with an additional 100 former Party members, recently released from the Soviet prison camp network, added to the assembly to add moral effect. Nikolai Bulganin, chairman of the Soviet Council of Ministers and then an ally of Khrushchev, called the session into order and immediately yielded the floor to Khrushchev, who began his speech shortly after midnight. For the next four hours Khrushchev delivered the "On the Cult of Personality and Its Consequences" speech before stunned delegates. Several people became ill during the tense report and had to be removed from the hall. Khrushchev read from a prepared report and no stenographic record of the closed session was kept. No questions or debate followed Khrushchev's presentation and delegates left the hall in a state of acute disorientation. That same evening the delegates of foreign Communist parties were called to the Kremlin and given the opportunity to read the prepared text of the Khrushchev speech, which was treated as a top secret state document. On 1 March the text of the Khrushchev speech was distributed in printed form to senior Central Committee functionaries. This was followed on 5 March by a reduction of the document's secrecy classification from "Top Secret" to "Not For Publication." The Party Central Committee ordered the reading of Khrushchev's Report at all gatherings of Communist and Komsomol local units, with non-Party activists invited to attend the proceedings. The "Secret Speech" was therefore publicly read at literally thousands of meetings, making the colloquial name of the report something of a misnomer. Nevertheless, the full text was not officially published in the Soviet press until 1989. Shortly after conclusion of the speech, reports of its having taken place and its general content were conveyed to the West by Reuters journalist John Rettie, who had been informed of the event a few hours before he was due to leave for Stockholm; it was therefore reported in the Western media in early March. Rettie believed the information came from Khrushchev himself via an intermediary. However, the text of the speech was only slowly disclosed in the Eastern European countries. It was never disclosed to Western communist party members by the nomenklatura, and most Western communists only became aware of the details of the text after the New York Times (5 June 1956), Le Monde (6 June 1956) and The Observer (10 June 1956) published versions of the full text. The content of the speech reached the west through a circuitous route. A few copies of the speech were sent by order of the Soviet Politburo to leaders of the Eastern Bloc countries. Shortly after the speech had been disseminated, a Polish journalist, Victor Grayewsky, visited his girlfriend, Lucia Baranowski, who worked as a junior secretary in the office of the first secretary of the Polish Communist Party, Edward Ochab. On her desk was a thick booklet with a red binding, with the words: "The 20th Party Congress, the speech of Comrade Khrushchev." Grayewsky had heard rumors of the speech and, as a journalist, was interested in reading it. Baranowski allowed him to take the document home to read. As it happened, Grayevsky, who was Jewish, and had made a recent trip to Israel to visit his sick father, decided to emigrate there. After he read the speech, he decided to take it to the Israeli Embassy and gave it to Yaakov Barmor who had helped Grayevsky make his trip to visit Grayewsky's sick father. Barmor was a Shin Bet representative; he photographed the document and sent the photographs to Israel. By the afternoon of 13 April 1956, the Shin Bet in Israel received the photographs. Israeli intelligence and United States intelligence had previously secretly agreed to cooperate on security matters. James Jesus Angleton was the Central Intelligence Agency's (CIA) head of counterintelligence and in charge of the clandestine liaison with Israeli intelligence. The photographs were delivered to him. On April 17, 1956, the photographs reached the CIA chief Allen Dulles, who quickly informed U.S. President Dwight D. Eisenhower. After determining that the speech was authentic, the CIA leaked the speech to The New York Times in early June. While Khrushchev was not hesitant to point out the flaws in Stalinist practice in regard to the purges of the army and Party and the management of the Great Patriotic War, he was very careful to avoid any criticism of Stalin’s industrialization policy or Communist Party ideology. When discussing mass repressions, the absence of any commentary on the haphazard arrests of ordinary citizens is notable and, it must be assumed, purposeful, since occurrences like the brutality of collectivization served the interests of the party and the state. Khrushchev was a staunch party man, and he lauded Leninism and Communist ideology in his speech as often as he condemned Stalin’s actions. Stalin, Khrushchev argued, was the primary victim of the deleterious effect of the cult of personality, which had, through his existing flaws, transformed him from a crucial part of the victories of Lenin into a paranoiac, easily influenced by the "rabid enemy of our party," Lavrentiy Beria. The basic structure of the speech was as follows: - Repudiation of Stalin's cult of personality - Quotations from the classics of Marxism–Leninism, which denounced the "cult of an individual", especially the Karl Marx letter to a German worker which stated his antipathy toward it - Lenin's Testament and remarks by Nadezhda Krupskaya, the former People's Commissar for Education (and wife of Lenin), about Stalin's character - Before Stalin, the fight with Trotskyism was purely ideological; Stalin introduced the notion of the "enemy of the people" to be used as "heavy artillery" from the late 1920s - Stalin violated the Party norms of collective leadership - Repression of the majority of Old Bolsheviks and delegates of the XVII Party Congress, most of which were workers and had joined the Communist Party before 1920. Of the 1,966 delegates, 1,108 were declared "counter-revolutionaries", 848 were executed, and 98 of 139 members and candidates to the Central Committee were declared "enemies of the people". - After this repression, Stalin ceased to even consider the opinion of the collective of the party - Examples of repressions of some notable Bolsheviks were presented in detail. - Stalin ordered that the persecution be enhanced: NKVD is "four years late" in crushing the opposition, according to his principle of "aggravation of class struggle" - Practice of falsifications followed, to cope with "plans" for numbers of enemies to be uncovered. - Exaggerations of Stalin's role in the Great Patriotic War (World War II) - Deportations of whole nationalities - Doctors' plot and Mingrelian Affair - Manifestations of personality cult: songs, city names, etc. - Lyrics of the National Anthem of the Soviet Union (first version, 1944–53) which had references to Stalin - The non-awarding of the Lenin State Prize since 1935, which should be corrected at once by the Supreme Soviet and the Council of Ministers - Repudiating the socialist realist literary policy under Stalin, also known as Zhdanovism, which affected literary works The speech caused such shock to the audience that, according to some reports, some of those present suffered heart attacks, and others later committed suicide. The ensuing confusion among many Soviet citizens, bred on the panegyrics and permanent praise of the "genius" of Stalin, was especially apparent in the Georgian SSR, Stalin's homeland, where the days of protests and rioting ended with the Soviet army crackdown on March 9, 1956. Khrushchev's speech was followed by a period of liberalisation known as Khrushchev's Thaw. In 1961 the body of Stalin was removed from public view in Lenin's mausoleum and buried in the Kremlin Wall Necropolis. The speech was a major cause of the Sino-Soviet Split in which the People's Republic of China (under Mao Zedong) and Albania (under Enver Hoxha) condemned Khrushchev as a revisionist. In response, they formed the anti-revisionist movement, criticizing the post-Stalin leadership of the Soviet Communist Party for allegedly deviating from the path of Lenin and Stalin. In the West the revisionist historians also tended to take a somewhat critical view of the speech; J. Arch Getty commented in 1985 that, "Khrushchev's revelations... are almost entirely self-serving. It is hard to avoid the impression that the revelations had political purposes in Khrushchev's struggle with Molotov, Malenkov, and Kaganovich." Historian Robert W. Thurston similarly argued in 1996 that Khrushchev "had much to gain in the attacks he made on his predecessor" and that neither his attacks on Beria nor his claims in regards to Stalin's involvement in Kirov's death are particularly reliable. A 2011 book titled Khrushchev Lied by American revisionist author Grover Furr takes an even stronger negative view of the speech, dissecting the speech itself directly. According to Furr, all 61 allegations made in Khrushchev's speech "with only one minor exception" were "demonstrably false." The historian Geoffrey Roberts has said of Khrushchev's speech that it became "one of the key texts of western historiography of the Stalin era. But many western historians were sceptical about Khrushchev's efforts to lay all the blame for past communist crimes on Stalin". Polish philosopher Leszek Kołakowski criticized Khrushchev for failing to make any analysis of the system Stalin presided over. "Stalin had simply been a criminal and a maniac, personally to blame for all the nation's defeats and misfortunes. As to how, and in what social conditions, a bloodthirsty paranoiac could for twenty-five years exercise unlimited despotic power over a country of two hundred million inhabitants, which throughout that period had been blessed with the most progressive and democratic system of government in human history—to this enigma the speech offered no clue whatever. All that was certain was that the Soviet system and the party itself remained impeccably pure and bore no responsibility for the tyrant's atrocities." References in fiction - "Great Speeches of the 20th Century", The Guardian. - William Taubman: Khrushchev: The Man and His Era; 2003; Chapter 11. - Roy Medvedev and Zhores Medvedev, The Unknown Stalin: His Life, Death, and Legacy. Ellen Dahrendorf, trans. Woodstock, NY: Overlook Press, 2004, p. 102. - Medvedev and Medvedev, The Unknown Stalin, p. 103. - Medvedev and Medvedev, The Unknown Stalin, p. 103-104. - Medvedev and Medvedev, The Unknown Stalin, p. 104. - The text was published in the magazine Известия ЦК КПСС (Izvestiya CK KPSS; Reports of the Central Committee of the Party), #3, March 1989. - John Rettie, "The day Khrushchev denounced Stalin", BBC, 18 February 2006. - "יש איזשהו נאום של חרושצ'וב מהוועידה". הארץ. - Melman, Yossi. "Trade secrets", Ha-aretz, 2006. - Chamberlain, William Henry. “Khrushchev’s War with Stalin’s Ghost”, Russian Review 21, #1, 1962. - Khrushchev, Nikita S. “The Secret Speech–On the Cult of Personality”, Fordham University Modern History Sourcebook. Accessed September 12, 2007. - From Our Own Correspondent, BBC Radio 4, 22 January 2009. - Ronald Grigor Suny, The Making of the Georgian Nation. Bloomington: Indiana University Press, 1994; pp. 303–305. - "1964: On Khrushchov's Phoney Communism and Its Historical Lessons for the World". marxists.org. - Getty, J. Arch. Origins of the Great Purges: The Soviet Communist Party Reconsidered, 1933-1938. New York: Cambridge University Press, 1985. p. 217. - Thurston, Robert W. Life and Terror in Stalin's Russia. New Haven: Yale University Press. 1996. p. 22, 118. - Sven-Eric Holmstrom (2012). "Book Reviews: Khrushchev Lied". Socialism and Democracy 26 (2): 120. doi:10.1080/08854300.2012.686278. - Geoffrey Roberts. Stalin's Wars: From World War to Cold War, 1939-1953. London: Yale University Press. 2006. pp. 3-4. - Kołakowski, Leszek. Main Currents of Marxism: Its Origin, Growth, and Dissolution Vol. III. Oxford: Clarendon Press. 1978. pp. 451-452. |Russian Wikisource has original text related to this article:| - Complete text of the speech in a contemporary pamphlet with the original commentary by Nicolaevsky - Complete Russian text of the speech in a contemporary pamphlet - The Personality Cult and Its Consequences (from a supplement by The Guardian newspaper) - "Khrushchev's speech struck a blow at the totalitarian system" – Mikhail Gorbachev's commentary on the Secret Speech from The Guardian's supplement - A "Stalinist" rebuttal of Khrushchev's "Secret Speech", 1956 - The day Khrushchev denounced Stalin: former Reuters correspondent John Rettie recounts how he reported Khrushchev's speech to the world
<urn:uuid:604166cb-34ee-42e1-af82-65f5407c0a03>
CC-MAIN-2016-07
https://en.wikipedia.org/wiki/Secret_Speech
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148475.34/warc/CC-MAIN-20160205193908-00124-ip-10-236-182-209.ec2.internal.warc.gz
en
0.959941
3,564
2.515625
3
3.049723
3
Strong reasoning
Politics
Breastfeeding 101: Nursing Basics for New Moms by: Barbara A. Eastom Bates Making the choice to breastfeed your new baby is one of the most important and far-reaching decisions you will make as a new mother. Both the American Academy of Pediatrics (AAP) and the World Health Organization (WHO) recommend breastfeeding as the preferred method of infant nutrition for the first year of life. The current AAP breastfeeding policy states,”Human milk is uniquely superior for infant feeding and is species-specific; all substitute feeding options differ markedly from it.” Why? As acknowledged by the Food and Drug Administration (FDA), the exact chemical make-up of breast milk remains unknown and cannot be duplicated. Each year, synthetic baby milks are found to be nutritionally deficient as scientists expand their knowledge of human milk. Some of the known benefits of breastfeeding are: Breastmilk is a living substance that changes to meet your baby’s nutritional needs, both during individual feedings and as he or she grows. Plus, you never have to worry about breastmilk being recalled for contamination. Formula feeding is associated with lower IQ’s and cognitive development. A recent study found, on average, children who were breastfed to have a three to five point IQ advantage over their formula fed peers. Breastfeeding is proven to reduce risk of infection and disease by aiding in immune system development. Breastfed infants have lower incidences of asthma, gastrointestinal illness, diabetes, cancers, and are less likely to die from Sudden Infant Death Syndrome (SIDS). They are additionally better able to absorb ingested nutrients, and receive greater immunity from childhood immunizations. Breastfeeding also lowers a mothers lifetime risk of many cancers. Preparing to Breastfeed Even though breastfeeding is a completely natural way of feeding your baby, knowing how to do it properly is a learned skill and takes practice. How can you prepare for a successful nursing experience? Most hospital’s and birthing centers offer a variety of classes to new mothers on parenting, birthing and breastfeeding. Check your local offerings and sign up in advance. Classes often fill up rapidly, so don’t wait. Many excellent titles are available to answer all the questions you forgot to ask your health care provider (and those you were too embarrassed to). Consider, “The Womanly Art of Breastfeeding,” by Gwen Gotsch, Anwar Fazal, Plume, Judy Torgus. Breastfeeding has the advantage of being the most simplistic way of feeding a baby—no bottles to wash and carry or formula to buy. But that doesn’t mean a few well chosen accessories can’t enhance the experience. Will you want others to be able to help with feedings, or do you have plans to return to work after your baby’s birth? A hospital-grade breast pump might be in order. Might you be more comfortable during long nursing sessions having a nursing pillow or foot stool? How about breastfeeding in public? Consider the options of a sling or nursing cape for discreet public feedings—and don’t forget to be sized for a properly fitting nursing bra. Birth and Beyond Your baby has arrived and you’re ready to put all your months of preparation to the test. Remember: Many hospital’s and birthing centers (and pediatrician’s offices too!) have lactation consultants on staff that will be happy to get you and your baby off to a healthy start in your nursing relationship. Don’t miss the opportunity to meet with a consultant for practical, hands-on advice about the mechanics of breastfeeding. Unlike bottlefeeding, you can’t measure how much milk your baby is getting through breastmilk, so keep count of your baby’s wet and dirty diapers to make sure he or she is receiving adequate nutrition. Although it is very rare a mother does not produce enough milk to feed her baby, if you have any questions, be sure to contact your pediatrician. Nursing your baby is a dance that takes time to learn. Though some babies are champion nursers from the beginning, many new moms find it takes some effort to perfect the skill. The first few weeks are often the most difficult, but if you experience problems, don’t give up. Given the right assistance, the vast majority of woman can successfully breastfeed their babies. Meet with a lactation consultant or attend a local La Leche League meeting. Utilize the support of other nursing mother’s. Most of all, pat yourself on the back for making the choice to give your baby the best start in life you can offer, and health benefits that will last a whole life through. About The Author Barbara Eastom Bates is the author of the upcoming release, “Basic Training for Brides-to-Be,” and editor-in-chief of Operation Military Spouse (http://www.operationmilitaryspouse.com). Do you know your baby's birth stone? Birth Flower? How about when you'll be handing over the car keys? Check out our popular Fun Birthday Facts Calculator to discover fun trivia about your baby's birth or due date!
<urn:uuid:07ea1b2f-c7a4-4b6f-8dc8-8f4a82b23ed1>
CC-MAIN-2014-52
http://www.babiesonline.com/articles/baby/breastfeeding/breastfeeding101.asp
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768982.112/warc/CC-MAIN-20141217075248-00055-ip-10-231-17-201.ec2.internal.warc.gz
en
0.940211
1,087
2.765625
3
2.160756
2
Moderate reasoning
Health
While much is being done to increase the number of women working in science, new research shows it could take many, many years to reach parity with men. We are already collaborating – the question is, how can we do it better? The federal government should set the country on an innovation path that takes account of where some of the strongest job growth is occurring. Research has found Silicon Valley engineers feared speaking up when they recognise poor behaviour among their male colleagues. Women's History Month is a time to recognize female role models. In mathematics, when we think of powerful women, we should think of Marion Walter. An ambassador needs to do more than just encourage young girls to enter STEMM, the role must address structural and cultural issues that push women out of the pipeline mid-career. So-called experts say there are several practical reasons why so few women are in STEM. Any insider will tell you that the real issue is that women are still victims of outdated stereotypes and abuse. Investor Bill Miller's $75 million gift to the Johns Hopkins philosophy department clashes with conventional wisdom regarding the value studying the humanities today. Seeing black lead characters who are accomplished scientists could be just the thing to help inspire future generations to follow in their footsteps. Family, marriage and culture are among the factors that influence black women's experiences as scientists. Australia now has a national approach to STEM teaching and initiatives, but to make it successful, we need to support teachers and schools to implement it. Politics Podcast: Bill Ferris on Australia’s innovation mission. CC BY46.8 MB (download) Innovation and Science Australia chair Bill Ferris launched a report this week setting out a plan that seeks to put Australia into the top tier of innovation nations by 2030. Universities must train scientists to engage with the ethics of emerging technologies, rather than functioning as cogs in the engine of economic development. Integrating the arts into STEM can help. Parental views have a big impact on the decisions that children make - so let's help mums and dads support their daughters in STEM careers. Toys and games that involve friends and family members are more than just fun: they can foster new skills, challenge children to work in a team and encourage thinking and idea development. Blocks probably won't top Christmas wish lists, but they have many benefits including developing fine motor skills, social, cognitive and language skills, and spatial reasoning and language. We need to address issues like access to resources, teacher professional development and ageing classrooms to get the full benefit of STEM education in primary schools. STEM professionals who change careers to become teachers are often intrinsically motivated, and can help engage kids in STEM subjects with their real-world experience. From collecting bugs to using math apps, there are many ways parents can engage in STEM activities with their kids to support their learning. Despite the hype about STEM skills, research shows interpersonal, problem-solving and entrepreneurial skills will make you more employable in the 21st century.
<urn:uuid:f4b45529-53a8-41bd-bec6-9a8f29d43157>
CC-MAIN-2018-17
http://theconversation.com/us/topics/stem-8868
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937780.9/warc/CC-MAIN-20180420120351-20180420140351-00595.warc.gz
en
0.959086
619
2.78125
3
2.963056
3
Strong reasoning
Science & Tech.
Nowadays everything is going digital – businesses, services, art, money, even our private lives. That’s why we should all know what risks there are in the deep waters of Internet. This includes the most common form of hacker attack – malware. So, let us share some light on this dark topic and help you find a way to protect yourself against malware attacks. What is malware? One of the most popular antivirus software providers, AVG has given the perfect explanation: “The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess. Viruses, Trojans, spyware, and ransomware are among the different kinds of malware.” The responsible people behind the release of malware are of course hackers with ill intentions. Furthermore, as there are different types of malicious software, they affect your device’s functionality differently. For example, viruses—as the name suggests—attach to clean files and spread to other clean files, slowing the core functionalities of your device. Trojans open the backdoor for other malicious software, spywares are there to spy on you and there are, of course, others. How do you know you have been infected? The most common sign that your device has been infected is if it is getting slower for no reason. That happens, as malicious software is using resources. In that way, it is also slowing down your operating system. Other signs of infection could be the device freezing or shutting down suddenly. Furthermore, for those of you who are using Windows devices, you might have experienced the Blue Screen of Death. Well, that’s more than a clear sign that your device needs a doctor. Additionally, you should be aware of suspicious pop-up, apps that mysteriously appear on your desktop as well as unexpected lack of storage space. How to protect yourself? Hackers are inventing new types of malware pretty much every day. Malicious software usually aims at flaws in browsers and web applications’ plug-ins. Luckily, here comes the malware removal software for your protection. This prevents the malware from reaching its target. One way to protect your devices is to install a Web Application Firewall (WAF). However, you should note that it works only for HTTP applications. It is very efficient in preventing the most common attacks such as cross-site scripting (XSS) and SQL injection. In order to do that, WAF investigates all incoming requests with the help of different analytical tools such as signature, reputational and behavioral analysis. Another good practice for protection is installing an ad-blocker for your browser. In this way, you protect yourself against malicious pop-up ads. As you can’t know in advance which ads are infected, it is better just to block them all, unless you really trust the website that you are visiting. Last but not least, you can deploy two-factor authentication solutions. They secure the users’ log-in credentials, so that hackers can’t make use of the stolen ones. That is possible because two-factor authentication asks the user to complete an additional authentication step which is usually connected to a device that the user has a physical access to. Always stay alert! According to Statista, there were more than 5,700 global malware incidents in 2018. Furthermore, it seems that WordPress websites are the most vulnerable to attacks. That’s why it is very important to protect your private and business data from hackers. All you need to do is to stay informed about the different ways to minimize cyber security risk. Luckily, there are also ethical hackers that are eager to help you out and hack your website for the good sake of it.
<urn:uuid:6e9b5d02-4483-4159-8f8e-5f9465cb3b3f>
CC-MAIN-2019-39
https://wiredelta.com/what-malware-does-and-how-to-remove-it/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573098.0/warc/CC-MAIN-20190917161045-20190917183045-00078.warc.gz
en
0.949357
781
3.25
3
2.010123
2
Moderate reasoning
Software
After the snows begin to melt, one of the first signs of spring many of us notice is sunny, yellow dandelion flowers dotting lawns and gardens. Dandelions are enjoying a modest return to popularity after many years of being maligned as nothing more than a troublesome weed, and there are many good reasons for this! Besides being an important source of nectar for bees, dandelion plants are wonderful herbal allies. They are plentiful and an easily gathered wild food, and they are remarkably good for your liver! Dandelion greens are surprisingly nutritious. High in Vitamin A and Vitamin C, they also contain the micronutrient choline. Your body produces some choline, but choline in foods helps supplement what your body makes and supports healthy liver function by influencing several liver processes, including the circulation of bile and the metabolism of fats. (Corbin and Zeisel, 2013). If you are interested in learning how to harvest and cook this nutritious springtime herb, here are a few helpful things to know. Dandelion is usually very easy to find. There are only a few other weeds that look similar to dandelion, but you should always use a good field guide or two to double check your identification skills. If you have a garden, look there first, you might find this herb volunteering where you least want it. That’s ok, pull it out and eat it! If you don’t find dandelion in your garden and need to go further afield, make sure that the area where you are harvesting is in a location where you don’t have to worry about potential pollutants like chemicals applied to lawns, runoff from a roof dripline, or the smog that settles on plants that grow along busy roadways. If you can’t forage, you may be able to find fresh dandelion greens at a farmer’s market or international grocery store, or start dandelions from seed in a decorative pot on the patio or porch. When you harvest or select your greens, know that smaller usually means less bitter, especially early in the season. Frequently-mowed dandelions in the lawn will stay small, but may get increasingly bitter as the weather warms up. Take a nibble to assess the level of bitterness of your greens. If it is pleasantly bitter, you can enjoy them as a steamed or sauteed green, or as an addition to salads. Leaves with a more pronounced bitterness may be at their best after boiling in a change or two of water and using as a cooked green or adding to hummus or dips. Here are a few ways to cook with dandelion greens. How To Use Dandelion Greens For A Healthy Liver Use in a Salad If you have access to mild, young dandelion greens, you might enjoy adding them to a salad. Harvest a handful of small leaves in early spring. Wash and dry your harvest in a salad spinner, then add to your favorite salad blend. Top with a flavorful vinaigrette, and maybe even some ripe strawberries and pine nuts for extra flavor and crunch. Saute with Olive Oil and Garlic For young leaves with a mild taste, a simple saute with a little olive oil and some freshly chopped garlic is another nice way to enjoy dandelion. Serve as a side with lunch or dinner to add a liver friendly boost to your meal. Andouille Southern Greens For slightly older greens, you can boil them in a change or two of water. Once some of the bitterness is under control, drain the greens and set aside. Slice an andouille sausage into small cubes, and brown them in a cast iron skillet. Add the dandelion greens to the skillet and toss with the sausage until the greens are warmed. Serve with a side of wild rice. Use Like Spinach You can also try substituting dandelion greens wherever you might use spinach. Try them in dips, omelets, soups or stews. Just remember that dandelions will be a little stronger tasting than spinach in most cases, and make sure your dandelions aren’t too bitter to blend well with your recipe. As a food plant, dandelions are generally very safe for most people. It’s important to note that dandelions are in the asteraceae family, so if you have allergies to plants in this family, dandelion may not be an ideal choice for you. Dandelion has diuretic properties, so if you are on prescription diuretics you might want to check with your doctor before adding it to your diet. Have fun exploring different ways to add this wonderful, liver-supporting herb to your diet! Did you know that dandelion isn’t the only herb that can have a place in your kitchen? Unit 2 of the Online Intermediate Herbal Course, Food Is Medicine, explores this topic fully. After all, as the introduction to the lesson reminds us: “Herbs have been used in cooking for time immemorial, perhaps even as long as humans have been preparing their food. A culture’s cuisine was once shaped entirely by what was available growing nearby, and so traditional food, local herbs, and spices are literally expressions of landscape.” Visit our course page to learn more about our affordable, online herbal classes. To learn more about dandelion, you can also read our article Dandelion: The Dandiest Weed of All How do you use dandelion greens in your diet? Let me know in the comments below! Corbin, K., Zeisel, S. (2013) Choline Metabolism Provides Novel Insights into Non-alcoholic Fatty Liver Disease and its Progression. Current Opinion in Gastroenterology doi: 10.1097/MOG.0b013e32834e7b4b
<urn:uuid:c7a404a6-71b3-4157-9849-80d3edd66f91>
CC-MAIN-2021-04
https://theherbalacademy.com/how-to-use-dandelion-greens-for-a-healthy-liver/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704799741.85/warc/CC-MAIN-20210126104721-20210126134721-00501.warc.gz
en
0.938304
1,231
2.84375
3
1.847
2
Moderate reasoning
Food & Dining
Are you catching all the overflows that occur when you perform packed decimal arithmetic? Not sure? Read about the Set Program Mask instruction (SPM) that controls how decimal overflows (as well as a few others) are handled inside your program. Learn all about it here. Category Archives: IBM Mainframe Assembler Learn one new instruction today – Compare and Branch – CRB. You can tighten your code just a bit with CRB, an instruction that combines a comparison operation on two registers with a branch operation – all in one line. It comes with some extended mnemonics that make it easy to use. Learn all about it here in the time it takes to finish a cup of coffee. I envisioned VisibleZ as a teaching tool for assembly language – I wanted to force students to deal with object code as a way to learn the assembly language. With VisibleZ, after writing a few bytes of object code, you can watch the effects of a given instruction on the state of the machine, and in the process learn a thing or two. Or, you can simply step through the hundreds of pre-written program snippets that comes with it. I’ve tried to make it easy to write program snippets – two hex characters represent a byte, with bytes separated by spaces – all in a text file. No need to write a large program to get some experience with an instruction. A few months ago, James Cray, one of the contributors to z390, the Portable Assembler and Emulator Project , suggested it would be nice to be able to load z390 object modules into VisibleZ. If you’re not familiar with that project, and you don’t have access to a mainframe, you should check it out. Using z390 you can write large, well-developed assembler programs and run them on your pc. It also supports Cobol and CICS! I didn’t want to want to change my original file format, but I decided to take James’ advice by providing some support for z390. I’ve just posted an experimental version (executable jar / codes.zip -code snippets) of VisibleZ that will take the assembler listings produced by z390 and scrape off the object code and format it it to run in VisibleZ. You will have to install z390 separately and tell VisibleZ where it lives on your machine. After that you can assemble a program and run your program, all within VisibleZ. The experimental version runs on Windows only. If there is any interest in getting this to run on Linux, let me know. I’ll remind you that VisibleZ still has limited support for QSAM files – 80 byte records and a limit of three input and three output files. The ability to load an address in assembler is a powerful tool. Working with an object from a distance (Load Address) rather than directly (Load) gives us the power of pointers and opens up the possibility of creating data structures. LA, an RX instruction, was the traditional instruction for working with addresses. LAY, an RXY-a instruction, offers some advantages over LA that you should consider. Read about the differences in these instructions here. I’m in the process of revising lecture videos and notes for the entire site. The beginning videos (Starting Assembler 1 and 2) are now revisions of older ones that correct typos, misspeakings, etc., and include some new material on System/z. I’ve also added a third video that walks through the architectural components mentioned in the first two videos using VisibleZ as a demonstration tool – a good introduction for beginners. If you are generating a binary result in a register and converting the result back to packed-decimal, you need to be keenly aware of the limitations of each of these data types. For large binary values, you will need some conversion techniques that aren’t found in Principles of Operation. This article discusses several approaches for converting double-precision binary back to packed-decimal. This update in VisualZ corrects a flaw in the packed decimal arithmetic instructions that occurred when using large values. You should also download codes.zip which includes many new packed decimal test programs. To get the latest versions, click the Download VZ tab on the homepage.
<urn:uuid:23e89bcb-bbdf-4ee1-9bbb-075f2139e75a>
CC-MAIN-2018-05
https://punctiliousprogrammer.com/category/ibm-mainframe-assembler/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892238.78/warc/CC-MAIN-20180123191341-20180123211341-00285.warc.gz
en
0.919438
898
2.828125
3
2.426849
2
Moderate reasoning
Software Dev.
Citing essays from books chicago style Citing Sources: Chicago: Notes & Bibliography The Chicago Notes & Bibliography style is used by students and. Books Have Their Own Destiny: Essays. How to Cite an Essay Citing an Essay in MLA Citing an Essay in APA Citing an Essay in Chicago Style’s Note. Say you used information from essays. Quick Navigation through the Chicago Style Essays Page:. The Chicago style essay format must have 3 main. There is no unified name for the list of books. The Chicago Manual of Style Notes. Books /Journal Titles. It is nearly impossible for the Chicago Manual of Style to provide examples for citing every new. Chicago Style Citation Guide; How do I cite a. Citing a book in print. Note:. Other APA Style Guidelines; Walden Templates; About. Mission; People; For Writing Centers; Site Search;. For guidance on when citing yourself might be appropriate. Citation Style Guide. APA, MLA, Chicago, Turabian; Other Styles;. Includes a tutorial for citing in Chicago style as well as sample papers and bibliographies. Sign up for EasyBib Pro Now!. In MLA style, citing the works of others within your text is done with parenthetical citations MLA or Chicago style. Citation Style Guide: Chicago Go to Citing PRINT Sources, Chicago Essays and Arguments (Boston: Little, Brown and Company. Citing a dissertation turabian. theses should also, writing essays, dissertation Apa style citing a dissertation. Hi. Citing your sources. How to. MLA Handbook in print; MLA Style Manual in print; Chicago style guide. The citation system and format you use will be determined. SAMPLE CHICAGO STYLE PAPER John Doe History 2010 Dr. Johnson July 11, 2013. Chicago Style: Citing Sources and Bibliographies _. The following examples are guides to citing your sources in Chicago Style and to creating. Essays. Library Resources for Argumentative Essays. LCC Home;. Research Guides Writing 122 - Composition II Citing. MLA, APA, or Chicago style. Citing Sources APA, MLA, Chicago Style. Citing sources in text:. Chicago Style Acquiring the electronic resource. Chicago Style Citations (Author-Date Style). Chicago style includes two options for citing sources Books Book: One Author. Citing essays from books chicago style See chapters 16 and 17 of the 8th edition of Turabian for bibliography style and chapters 18 and 19. The University of Chicago Press home. More books for. (+styles for Chicago, Turabian, etc.): Annotated Bibliography Application Essays; Citing. guide citing relevant sections of the style manuals and. This section contains information on The Chicago Manual of Style method of. Welcome to the Purdue OWL General Model for Citing Books in the Chicago. How to Cite Your Resources:. MLA style; Chicago style; AMA style; How to cite my resources video;. When you are writing your essays. Citing Sources: Chicago Notes/Bibliography. Citing Sources: Chicago Notes/Bibliography Style When citing electronic articles, the style will differ. Chicago Citation Style. Color codes: Author(s) Date Title of Book. Reference books used as sources are not included in the Reference List but are cited in the text. Essays, publications and even books Chicago style formatting is widely used for academic papers Citing this source once more. Citation Machine™ helps students and professionals properly. Chicago, Turabian, and Harvard for free. 1 Choose your style Citation Machine. Associati Citing sources apa, mla, chicago style. pdf literature essays citing an internet source for a Mla style guide. download books . Citing Sources -- Chicago -- Bibliography style Essays on Mexicana/Chicana History. E-books on CD-ROM: The Chicago Manual of Style. Coates Library ; Coates Library; Menu;. In-Text Citation and Notes For further information on citing sources using the Chicago style. Citing dissertations. what are expository essays; writing a formal report. best term paper services;. pay for space chicago style:. Source for an essay or term citing an internet source for an essay or term pap Sample chicago style. style for essays. in citing so. books , arznc folder. Title automatically cite your sources for fre Quoting and paraphrasing chicago manual of style. essays in a book pdf , citing. essays - penguin books mla style:. Citing Sources in Formal Writing: Chicago Style. Example 4: Chapters in Books. Essays on a Troubled Time. Citing and referencing: Chicago The date an e-journal was accessed is not required in Chicago style but may be required. Publishing details of books are. Chigaco/Turabian Style Chicago/Turabian Documentation by the University of. Lydia M. Olson Library APA Style For citing essays in. Style Books in the. Citing a dissertation. fresh essays, which it is a. Example ahmad patterson the rules for the thesis and chicago/turabian documentation style citation. Citing Sources: Chicago/Turabian Examples Chicago/Turabian Basics. The Chicago style has two methods:. if the books has a translator. The first is citing within the text of a paper and Chicago Manual of Style http://guides.library.duq.edu/fairy-tales; Print Page. Citing and referencing: Books Critical Essays and Eyewitness Accounts (New York: Garland Pub, 1995), 65 (Chicago: University of Chicago Press, 1994), 4. Chicago Citation Style Guide Citing Books Search this Guide Search. Chicago Citation Style Guide Get Started With Chicago Style; Note-Bibliography Basics. - APA and Chicago/Turabian citation styles MLA: Essay. Cite 59 source types. Essays on Modern Democracy. Ed. Bob Towsky. Hinsdale:. - Chicago Style Guide:. Max. 1946. Politics as a Vocation. In Essays in Sociology, ed. H.H. Garth and C. W. Mills see the The Chicago Manual of Style. Books. - The Chicago Manual of Style says this about books. The best source I could find for how to cite a Kindle ebook. By Citing Kindle Editions, Chicago Style. - Index B from the Chicago Manual of Style Online books, electronic. Style 16th edition text © 2010 by The University of Chicago. The Chicago Manual of Style. - Citation Styles © Copyright 1999. citing works in your research papers and essays. These include the MLA and Chicago styles for. for the citation of books. - Citing Sources: Chicago/Turabian Examples Chicago/Turabian Basics. The Chicago style has two methods:. if the books has a translator. These resources follow the sixteenth edition of The Chicago Manual of Style Titles of books and journals are italicized and Bibliographic Essays. Chicago Style. Title Page What am I Citing?. Citation Machine™ uses the 7th ed. of MLA, 6th ed. of APA, and 16th ed. of Chicago. Citation & ereaders;. Citing books accessed on ereaders can be difficult. The Chicago Manual of Style website provides examples of how to cite ebooks on its. How to Cite an Anthology or Collected Works. Retrieved from http://books.google.com/books In text:. The Hyphenation of Prefixes in APA Style. Citing Sources: Chicago. Home;. There are two systems for citing in Chicago style:. Titles of books are always italicized. The Chicago Manual of Style presents two basic documentation systems. Essays on American Corporate Ascendance in the 1960s. For books consulted online.
<urn:uuid:bc354d86-dada-4e8c-a157-c2071b2efed0>
CC-MAIN-2018-05
https://frpaperkcon.rguschoolhillcampus.com/citing-essays-from-books-chicago-style.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886815.20/warc/CC-MAIN-20180117043259-20180117063259-00068.warc.gz
en
0.77496
1,641
2.671875
3
2.171002
2
Moderate reasoning
Education & Jobs
After the fall of Baghdad and occupation of Iraq by the Anglo-American forces, Iraq was exposed to an unprecedented state of chaos, looting and lack of security. The war on Iraq resulted in a large-scale destruction of civil infrastructure and services, and also the collapse of the institutions of governance, defence and security. Soldiers and officers who survived the war deserted their camps, policemen and security officers disappeared from the streets, and firefighters and municipal workers were absent from their posts. Baghdad and other Iraqi towns, that had suffered blackouts and water shortages occasionally before the war, have turned dark and thirsty. Everything has fallen into jeopardy: life, personal properties, public assets, mosques, churches, factories and universities. Cars were stolen in the middle of the day; libraries were burgled; hospitals were assaulted; military camps, police stations, ministries, and museums were looted. More significantly, Iraq seemingly lost its centre of gravity. The occupation forces had neither the desire or will to protect the Iraqi people, nor to establish security. Likewise, the occupation-allied Iraqi ‘opposition’ did not have any substantial support that could enable it to play a leading political and social role. Apart from the oil-fields, which were guarded by American tanks, Iraqis were left to face the music alone. However, Iraq soon regained at least some of its sense of balance. Before the occupation, there was already a broad consensus among observers – friends and foes, experts, academics and statesmen, Arabs, Americans and Europeans – that Iraq is the most modern country in the Middle East. Iraqis enjoyed better levels of modern education and numerous universities and academic institutions in proportion to the population. Modern journalism was introduced into Iraq in the mid-19th century, and Iraq was the first Arab country to introduce the television media. For long periods the Iraqi state had marginalised tribes, weaken the ‘ulama’ , and managed to integrate Iraqi women in the workforce and official partisan politics. During the past few decades, Iraq was dominated by a modern political party that influenced all social sectors. In spite modernization, however, Iraq did not find, in the moment of crisis, any modern force to come forward and rescue the country. No Ba’athist partisans came forward to protect people and safeguard establishments. No academic, journalistic or artistic associations turned out to guard public libraries, theatres or radio stations. The Iraqi intelligentsia failed to stand up to the gangs that went looting and kidnapping. Iraqis sought refuge for their nuclear (small) families from aggression and starvation in the extended family. From north to south, Iraqi clans provided for the security of townships and villages. In fact, areas which are more tribally cohesive, such as Anbar and Jazeera, continue to be the most safe and secure. In Baghdad and other towns the ulama took the initiative, reminding people that looting is unlawful and that mosques were open to receive returned loot. Ulama organised groups to provide humanitarian and medical relief, and protect institutions and neighbourhoods. Mosques were turned into centers that provided social cohesion and solidarity. Most important was the rapid emergence of Sunni and Shi’i institutions to lead the Iraqi national movement, to struggle for independence, and to preserve Iraq’s unity. While the Ba’ath party has almost disappeared and other parties have turned into collaborators with the occupation, the Federation of Muslim Scholars and young scholars from Muqtada al-Sadr’s group have confronted the occupiers. A number of important questions arise from the Iraqi experience. Why did the “modern” Iraqi state, institutions and parties prove so fragile? Why did they fail to respond to the challenges of invasion and occupation? How could these forces, which took decades and vast resources to emerge and develop, and were deemed thebest leadership for Iraqi society, disappear from the arena of national action? Is it true that the modernization movement in the Muslim world has undermined the forces of traditional society? And how did these forces manage to make a comeback and lead Iraqi society despite all their disadvantages vis a vis the political parties and secular organisations? The modernization movement in the Muslim world was introduced in the nineteenth century and was expedited by the ‘independent’ nation-states during the twentieth century. For one and half centuries it aspired to encompass every aspect of Arab-Muslim societies: education, law and judiciary, family and tribe, the role of religion and ulama, markets, trade, the economy, and the notions of state and governance. Modernization and independence undermined the autonomy of traditional institutions, and concentrated all powers and authorities with the state: which in turn dominated the law and litigation processes, and asserted its status as only the source of legitimacy, in place of Islam. The state also took over educational programmes and economic policies, and undercut social organizations whose legitimacy did not come from the state. The state’s control of the waqf establishment, the emergence of new social forces and intelligentsia, and the loss of the ulama’s judicial and educational role, all combined to weaken theulama and marginalise them. In the 1950s and 1960s, when the theories of development and Marxism were prevalent in the social sciences, it was widely believed that modernization had triumphed over the traditional society, that it is a ‘progressive’ movement, and that it has an irresistible impetus. Furthermore, the policies of the Eastern and Western blocs and of the postcolonial states in the Muslim world were all based on accelerating the modernization process as the main vehicle of ‘development’ and ‘progress’. Nonetheless, it now seems that many of the assumptions that underpinned modernization and development were incorrect. The modernization movement failed to triumph finally over the traditional forces of Muslim-Arab societies. That is not only owing to the potential for resistance of such forces, but also due to the firm attachment between these forces and the values that govern people’s lives. In reality, there was a divide in the life and soul between two domains: the modern and the traditional. Modern statesmen dominate and control most aspects of public life, whereas people turn to the ulama to learn about their religious obligations and the lawful and the unlawful in their lives. So, despite the weakness of the institutions of the ulama, a largely traditional Iranian scholar managed to mobilize his people and initiate a revolution that eventually overturned one of the most thoroughly modernized and best-armed regimes in the Muslim world. Most Muslims receive modern education, but some families choose to add some form of Islamic learning too. The legal domain is a clear example of the modernization crisis, and the divisiveness that resulted from it. The idioms and terms of modern law are incomprehensible to non-specialists, and the legal authority fails to restrain people, despite the fact that it is fully supported by the state’s powers. Most Muslims endure a perpetual conflict between the values that are conveyed to them by modern law and those taught in the mosque and home. At its inception, the modernization enterprise was neither a popular demand nor an outcome of internal development of society. In its core, modernization was a late Ottoman attempt to fix the power imbalance with the European imperial powers. From its commencement, the modernization enterprise was strongly connected to the state. Thus, as soon as the state’s grip waned, the traditional forces are re-emerging more effectively, and reoccupying all the areas that were previously occupied by the modernization enterprise. No doubt the modern Iraqi state, whether a monarchy or republic, continued the modernization policies of the late era of the Ottoman Empire. As such, these policies weakened traditional forces, such as the tribes and the Sunni and Shi’i madrassah-based institutions. However, in its defeat and desperation after the 1991 war, the Iraqi regime tended to rehabilitate tribes and tribal values and bonds, because of the apparent need of Iraqi society to face the external dangers. Similarly, the regime reinstated the Islamic discourse and opened, albeit cautiously, windows for the ulama and Islamic forces. The moment of the regime’s collapse was the most significant sign of this complex relationship between the modern and the traditional. The fragility of modern influences, including the modern state, can be attributed to the nature of the relationship that relates these influences to society as a whole and to the people’s view of them. The central system is the core of the modernization enterprise. The nature of this enterprise is manifested in its tendency to seek dominance, control, a power-monopoly, and consumption of resources by the institutions of modernization. These inclinations collide with substantial amounts of tension and alienation that separate the society and its groups from the modernization of values and institutions. That is, Muslim and Arab societies find it unjustifiable to spend vast resources to sustain a government and institutions that do not share their idiom, tend to perpetuate their control on people’s destinies and wealth, and work to extend and perpetuate such control. The modern state, institutions and forces, which were imitations of their Western counterparts, have failed to respond positively to the challenges of external hegemony and aggression, economic growth and development. This failure exacerbates the current state of affairs. In other words, the fragility of modern phenomena stems from their inability to gain people’s trust and loyalty or to identify with them, as is necessary to institute a collective awareness of one’s society’s destiny. Few or no Iraqis were ready to die in defence of the nation-state, its institutions, a ministry of justice that did not establish or maintain justice, or a national theatre that did not really reflect the nation. However, as soon as Iraq became the responsibility of all Iraqis, they were out to defend their country’s independence. The Iraqi experience is not an anomaly. It is a model that demonstrates a Muslim-Arab crisis that started to build late in the nineteenth century. It is now necessary to admit the divisiveness that has been endured by various Muslim societies, and to admit that many of the developments experienced by such societies are irreversible. This situation requires a mutual recognition between the modern and the traditional, as well as a genuine reconciliation that encompasses all aspects of society. Without these things we are in for prolonged internal conflict and paralysis.
<urn:uuid:97c64d64-060f-41ff-ad9f-c14fe8ee3e43>
CC-MAIN-2019-43
https://crescent.icit-digital.org/articles/iraqi-experience-demonstrates-the-solidity-of-the-institutions-of-traditional-society
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649232.14/warc/CC-MAIN-20191014052140-20191014075140-00328.warc.gz
en
0.970006
2,101
2.6875
3
3.052905
3
Strong reasoning
Politics
I have never seen Francis Crick in a modest mood. Perhaps in other company he is that way, but I have never had reason so to judge him. It has nothing to do with his present fame. Already he is much talked about, usually with reverence, and someday he may be considered in the category of Rutherford or Bohr. But this was not true when, in the fall of 1951, I came to the Cavendish Laboratory of Cambridge University to join a small group of physicists and chemists working on the three-dimensional structures of proteins. At that time he was thirty-five, yet almost totally unknown. Although some of his closest colleagues realized the value of his quick, penetrating mind and frequently sought his advice, he was often not appreciated, and most people thought he talked too much. Leading the unit to which Francis belonged was Max Perutz, an Austrian-born chemist who came to England in 1936. He had been collecting X-ray diffraction data from hemoglobin crystals for over ten years and was just beginning to get somewhere. Helping him was Sir Lawrence Bragg, the director of the Cavendish. For almost forty years Bragg, a Nobel Prize winner and one of the founders of crystallography, had been watching X-ray diffraction methods solve structures of ever-increasing difficulty. The more complex the molecule, the happier Bragg became when a new method allowed its elucidation. Thus in the immediate postwar years he was especially keen about the possibility of solving the structures of proteins, the most complicated of all molecules. Often, when administrative duties permitted, he visited Perutz' office to discuss recently accumulated X-ray data. Then he would return home to see if he could interpret them. Somewhere between Bragg the theorist and Perutz the experimentalist was Francis, who occasionally did experiments but more often was immersed in the theories for solving protein structures. Often he came up with something novel, would become enormously excited, and immediately tell it to anyone who would listen. A day or so later he would often realize that his theory did not work and return to experiments, until boredom generated a new attack on theory. There was much drama connected with these ideas. They did a great deal to liven up the atmosphere of the lab, where experiments usually lasted several months to years. This came partly from the volume of Crick's voice: he talked louder and faster than anyone else and, when he laughed, his location within the Cavendish was obvious. Almost everyone enjoyed these manic moments, especially when we had the time to listen attentively and to tell him bluntly when we lost the train of his argument. But there was one notable exception. Conversations with Crick frequently upset Sir Lawrence Bragg, and the sound of his voice was often sufficient to make Bragg move to a safer room. Only infrequently would he come to tea in the Cavendish, since it meant enduring Crick's booming over the tea room. Even then Bragg was not completely safe. On two occasions the corridor outside his office was flooded with water pouring out of a laboratory in which Crick was working. Francis, with his interest in theory, had neglected to fasten securely the rubber tubing around his suction pump. At the time of my arrival, Francis' theories spread far beyond the confines of protein crystallography. Anything important would attract him, and he frequently visited other labs to see which new experiments had been done. Though he was generally polite and considerate of colleagues who did not realize the real meaning of their latest experiments, he would never hide this fact from them. Almost immediately he would suggest a rash of new experiments that should confirm his interpretation. Moreover, he could not refrain from subsequently telling all who would listen how his clever new idea might set science ahead. As a result, there existed an unspoken yet real fear of Crick, especially among his contemporaries who had yet to establish their reputations. The quick manner in which he seized their facts and tried to reduce them to coherent patterns frequently made his friends' stomachs sink with the apprehension that, all too often in the near future, he would succeed, and expose to the world the fuzziness of minds hidden from direct view by the considerate, well-spoken manners of the Cambridge colleges. Though he had dining rights for one meal a week at Caius College, he was not yet a fellow of any college. Partly this was his own choice. Clearly he did not want to be burdened by the unnecessary sight of undergraduate tutees. Also a factor was his laugh, against which many dons would most certainly rebel if subjected to its shattering bang more than once a week. I am sure this occasionally bothered Francis, even though he obviously knew that most High Table life is dominated by pedantic, middle-aged men incapable of either amusing or educating him in anything worthwhile. There always existed King's College, opulently nonconformist and clearly capable of absorbing him without any loss of his or its character. But despite much effort on the part of his friends, who knew he was a delightful dinner companion, they were never able to hide the fact that a stray remark over sherry might bring Francis smack into your life. Copyright renewed © 1996 by James D. Watson By identifying the structure of DNA, the molecule of life, Francis Crick and James Watson revolutionized biochemistry and won themselves a Nobel Prize. At the time, Watson was only twenty-four, a young scientist hungry to make his mark. His uncompromisingly honest account of the heady days of their thrilling sprint against other world-class researchers to solve one of science’s greatest mysteries gives a dazzlingly clear picture of a world of brilliant scientists with great gifts, very human ambitions, and bitter rivalries. With humility unspoiled by false modesty, Watson relates his and Crick’s desperate efforts to beat Linus Pauling to the Holy Grail of life sciences, the identification of the basic building block of life. Never has a scientist been so truthful in capturing in words the flavor of his work.
<urn:uuid:39a71169-b141-4f5b-be11-7755000f0a00>
CC-MAIN-2016-22
http://books.simonandschuster.ca/Double-Helix/James-D-Watson/9780684852799
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275328.63/warc/CC-MAIN-20160524002115-00244-ip-10-185-217-139.ec2.internal.warc.gz
en
0.987912
1,239
2.515625
3
2.948785
3
Strong reasoning
Science & Tech.
Studies show that when the Baby Friendly Hospital Initiative (BFHI) is implemented breastfeeding rates increase. However, there are likely to be various barriers to BFHI implementation. This article reports on an empirical study of government-directed BFHI implementation in the New Zealand public hospital system. It focuses primarily on the barriers encountered through implementing the first Two Steps of the BFHI: developing BFHI policy and communicating it to staff; and providing necessary staff training. Qualitative interview data were collected from six lactation consultants. These interviewees emerged via a purposive sample of public hospitals that represent the full range of New Zealand public hospitals. Using a content analysis technique, key themes were drawn from the transcribed interview data. Analysis revealed eight themes: the hospitals were in varying stages of BFHI policy development; hospital policy was not necessarily based on government policy; hospital policies were communicated in differing ways and dependent on resources; factors outside of hospital control impacted on capacity to improve breastfeeding rates; and complex organisational matters pose a barrier to educating personnel involved in the birthing process. The findings of this study provide empirical support for prior articles about the process of BFHI policy development and implementation. The study also shows that implementation is multi-faceted and complex. Breastfeeding is the normal method of infant feeding, but many people choose to feed their newborn babies on infant formula. While babies grow and develop with either method of feeding, there is evidence of disadvantages for infants that are not breastfed [1-3], and for their mothers [4-6]. Some studies have indicated that breastfeeding has economic, social and environmental benefits . These benefits have been recognised by the World Health Organization (WHO) and UNICEF who jointly launched a new international initiative aimed at protecting, promoting and supporting breastfeeding in 1991 . Titled the 'Baby Friendly Hospital Initiative' (BFHI), this is intended to give every baby the best start in life by ensuring that, in environments such as hospital birthing units, breastfeeding is promoted as the norm and not supplemented by infant formula. The BFHI policy statement included Ten Steps to guide every maternity service in the quest to become 'baby friendly' (see Table 1). Table 1. Ten Steps to successful breastfeeding* To date, there have been a number of published studies of the impact of the BFHI and of initiatives to increase breastfeeding in line with BFHI principles. For example, there is evidence that implementing the Ten BFHI Steps will increase breastfeeding rates and duration [9,10], although one study found that the presence of formula and pacifiers was not associated with lower frequency or shorter duration of breastfeeding . There is also evidence that staff often require training in order to change their practices to promote the Ten BFHI Steps [eg [12-14]]. One study found that specific staff training in the BFHI was an important component in obtaining their compliance with and commitment to implementing the Ten Steps . This training was also found to significantly increase exclusive breastfeeding rates on hospital discharge. Studies have also found that mothers assigned to a BFHI intervention had increased rates of breastfeeding, especially for exclusive breastfeeding [16,17]. There have also been reports of how hospitals and health services have reorganised to become 'baby friendly'. These include commentaries on the managerial process of changing staff practices to implement the Ten Steps , and on the requirement for multi-disciplinary approaches that involve the various health professionals and service providers who come into contact with new mothers and their babies . A Turkish study found that in none of five hospitals analysed were all Ten Steps implemented ; that staff were often too busy or under-resourced. Meanwhile, a report from Sweden provided information on how the BFHI was implemented across all public hospitals and birthing centres and discussed some of the barriers encountered there and in other countries . There are no specific reports from the perspective of maternity service providers of the processes involved and impediments when a government decides that the BFHI ought to be implemented in all public hospitals as happened in New Zealand in 2001. This article, therefore, reports on a New Zealand study carried out in 2004 that sought to explore the processes and challenges of implementing national policy at the hospital level. Its primary focus is on Steps One and Two of the BFHI which are respectively aimed at developing and communicating breastfeeding policy to staff, and providing the necessary training for staff in order to be able to implement the BFHI. The New Zealand case is an interesting one for several reasons. First, New Zealand has a 'national' health system in which there is universal access, free of patient charges, to hospital and maternity services. The New Zealand government funds around 80% of all health care and the costs of most births are fully state funded. Second, the way maternity services are funded and regulated means that a high proportion of birthing and perinatal care is provided by 'independent' midwives. These practitioners operate as private business people, from their own clinics, but are funded by the government per birth case. However, they routinely use the facilities of public hospitals for the actual birth. Public hospital birthing services also directly employ their own midwives, nursing and medical staff including obstetricians. Expectant mothers can opt for an independent or hospital midwife at the beginning of their pregnancy. Third, the planning and organisation of publicly-funded health services is devolved to regional governing boards. Thus, the government provides funding and policy guidelines, but when it comes to implementation there are considerable differences at the local hospital level. In terms of Steps One and Two of the BFHI, the regional governing boards are required in their funding contract with the government to ensure that each public hospital, which the regional governing board holds a separate contract with, has both a policy and training programme for staff. In turn, in order to comply with their funding contracts, the hospitals must demonstrate, at least on paper, that they are developing or have the mechanisms in place to implement Steps One and Two. Fourth, the government was a relatively late adopter of the BFHI. Through the 1990s there had been an emerging consensus within the government's chief policy agency, the Ministry of Health, and across the maternity sector, that breastfeeding was best, and recommendations to this effect for the sector had been produced . It was not until 2001 that the government became the 133rd in the world to formally launch the BFHI initiative and develop a hospital accreditation programme . In 2002 the first hospital achieved accreditation and others have subsequently followed. Since the BFHI adoption, the government has moved to further promote breastfeeding by establishing a series of dates by which it expects rates to have improved . These include increasing, by 2010, exclusive breastfeeding at six weeks to 90% and at three months to 70%. New provisions for paid parental leave of up to 14 weeks were also introduced in 2002, with the potential to provide for circumstances that further support breastfeeding . New Zealand's public hospital services are divided into 21 regional groups. Most provide services across multiple locations, all provide at least secondary services and some feature both secondary and tertiary service providers. The hospital groups serve differing populations and there are considerable variations in socio-economic and ethnic composition, and also in terms of urban concentration and geographical coverage. To capture these dynamics, we purposively sampled six hospital organisations for analysis. The sample included one very large urban tertiary hospital that serves over 1 million people (a quarter of New Zealand's population). This population has over-representation of ethnic minority and lower socio-economic groups. We also sampled a tertiary hospital that serves a half million people and which has an above average representation of New Zealand's white population. We sampled two secondary hospitals serving populations of approximately one hundred thousand people. One had a higher than average proportion of indigenous Maori; the other of white people. Finally, we selected two small rural hospitals serving populations of less than fifty thousand. Again, one had a higher than average Maori population, the other of whites. Ethical approval for the study was granted from the University of Otago Ethics Committee, after which a senior lactation consultant (LC) from each of the six hospitals was contacted with a request for interview. All agreed to take part. The six were then sent an information sheet, consent form and a list of subject areas that formed the basis of the interviews. The interviews, conducted during August-September 2004 by telephone and tape recorded, covered: • Whether their hospital organisation had a breastfeeding policy; • How this related to the government's policy statement entitled "Breastfeeding: A Guide to Action" ; • How the policy was communicated to staff within the organization; • What barriers there were to implementation of the policy; • How the policy was evaluated; • Overall, how effective the policy was perceived to be. Interview tapes were transcribed and a content analysis undertaken on the text where we sought to identify, code and categorise the themes that emerged from the data [25,26]. Some of the themes were consistent across all hospitals whilst others only emerged for one hospital but appeared to be important. The next section describes and illustrates, with interview extracts, the main themes that emerged. Theme one: Policy development We found that, three years on from the New Zealand government's policy statement, all six of the hospital organisations had developed a breastfeeding policy, although there were variations in the extent to which these were finalised and in circulation as commented on by interviewees: "We, our policy, our breastfeeding policy is currently still in draft form." (Small hospital A) "Well, we have a breastfeeding policy that certainly includes the words promote, protect, you know the same ones as the WHO . . . So, our policy statement says, that all . . . staff have a role in implementing the Breastfeeding Policy and will be trained in the skills necessary to implement it." (Medium hospital A) The foundation of the various breastfeeding policies appeared to have been "The Baby Friendly Hospital Initiative". However, the BFHI only reached the hospital policy agenda due to the 2001 directive from the New Zealand Ministry of Health. The following illustrates this: ". . . but fortunately because the Ministry of Health is actually breathing that directive, you know that BFHI is now appearing at much higher management, you know what I mean, so up higher than my line manager." (Medium hospital A) Theme two: Relationship between hospital and government policy On the whole the six interviewees felt that, while the principles of their policy were similar to the government's policy statement "Breastfeeding: A Guide to Action", the government's policy was too abstract: it provided a series of principles but was short on practical detail of direct relevance to hospital-level implementation: ". . . the WHO documents, as adapted for New Zealand, is actually where we took the policy from because our policy, by the very nature, has to go to the World Health Organisation standards and the [New Zealand government] Guide to Breastfeeding sort of, is probably a bit more wishy washy." (Small hospital B) ". . . we didn't specifically use [government policy] as a reference. I am aware of the document. We very much work from you know the BFHI Aotearoa documents [based on WHO material]." (Large hospital A) However, one respondent felt that their policy was closely related to "Breastfeeding: A Guide to Action" and was able to state how it related to all the action plan steps: "It really meets all their goals I guess. Step One is a Baby Friendly Hospital, is a goal of the action plan, Maori and Pacific Island input and their awareness, it's the audit of the process and we've got to state, it's the breastfeeding promotion by consultation, we cover the antenatal education and it's to increase breastfeeding rates, support the universal definitions and stuff like that . . . and to encourage good postpartum care. So it's all those things" (Large hospital B) Theme three: Communicating policy Respondents outlined a number of ways that they communicated their policies to staff, including posters on the walls of hospitals wards, on the internet and intranet, staff group education and through one-on-one education sessions: ". . . it's up on the wall in a poster format . . . also in every room in our postnatal areas and it's in every, well it's in every area actually." (Medium hospital B) Respondents noted several issues that made communicating the policy to hospital midwifery and nursing staff difficult. The first of these was where the policy was still in draft form it was often not accessible by staff: ". . . it is rather hard when the system is so slow getting it from being written to getting where the staff can access it . . . to give them something that says the second draft it's not actually quite the same as saying here is the policy." (Medium hospital A) At some hospitals it was difficult to ensure that the policy was communicated to all staff. Frequent nursing and midwifery staff changes meant that there was always at least one new member of the team who had not had any education relating to the policy. Whilst they might have been shown the location of the policy when they first entered the ward, it was difficult for them to have time to take the information on board, as the workload was large: "We've got nearly 200 nursing and midwifery staff and when I look at our database on education, we've also got a database on those who have left the hospital so those have already been trained and left the hospital are almost as great as those who are still here. So no matter how much training you do, there's always new staff coming." (Large hospital A) At some hospitals there was also limited education time for staff to learn about the breastfeeding policy. It was expected that nurses and midwives would receive 18 hours of breastfeeding education in order for the facility to attain Baby Friendly Hospital accreditation. However, there were often competing needs for the education of staff in tertiary hospitals, meaning that breastfeeding policy education was assigned a lower priority. This was because the hospitals had a higher proportion of complicated deliveries and sick mothers so the staff needed to be skilled in ensuring that these mothers were safely looked after – and to achieve this skill, specific education was required: ". . . staff have to be on board with pain relief, they have to be on board with IV fluids and any new staff are just coping with all sorts of things . . . " (Large hospital A) Another difficulty was a lack of resources for educational purposes or policy development, as New Zealand public hospitals are required to work within an allocated government funding level: "We're still doing staff education but there's been a bit of a halt to that because of you know financial restrictions." (Medium hospital A) "This one [policy] is still in second draft . . . but the person who is actually doing this is our quality manager and the typist who's been working so hard and they've both just been made redundant." (Small hospital B) There was also difficulty ensuring that the policy was relayed to casual nursing and midwifery staff. When agency nurses or staff from other wards were required, there was not the time to ensure that they were familiar with the policy and the implications of it for working in the area: "And so we are trying to get some of the bureau staff that come to the hospital to come to the breastfeeding study day . . . there are certain ones from the bureau that they won't take but they get desperate and will take anybody at times as there never seems to be enough staff around." (Large hospital A) An international standard for Baby Friendly Hospital Accreditation is that all non-nursing staff also receive three hours a year breastfeeding education. This is so all staff, other than nurses and midwives working in hospitals, are promoting breastfeeding. This also caused difficulties with some staff as they did not understand why they needed such education and they were reluctant to participate. One respondent commented that communicating policy to the staff was only one step in the process. Getting them to change their practice to comply with policy took time. This was the case in a small rural hospital, which did not have other back-up services on the premises: "I see it as there is a certain reluctance to go away from what is known . . . having that in mind because we haven't got a paediatrician next door that we can yell out to if something goes wrong . . . at the moment some of the staff perceive [the BFHI] as a risk, which it might be." (Small hospital A) A couple of respondents also discussed the problems with restructuring hospital services within their area (which is ongoing in the New Zealand health sector) and the impact this would have on implementation: "It's very difficult when you're about to move hospitals . . . but there's been quite a lot of people who didn't know whether they wanted to move with the hospital and people have left and while people were thinking about leaving, they weren't interested in education." (Large hospital B) Theme four: Overcoming barriers to communicating policy All interviewees discussed barriers to communicating the BFHI policy. However, the respondent from the hospital that had achieved accreditation felt that getting the policy to a point where all the staff had received their 18 hours education and having management support made a huge difference: "And of course it's because we've had the policy up and running and we've done all the consultation and you know it was one of the biggest things, and also education because I had been employed here really. Not anything to do with me. It was just the fact that there was a lactation consultant position here so therefore that was the function of the LC is to educate so that the education hours had been attained which is one of the biggest things . . . " (Large hospital B) A stable workforce also made a difference to implementing the policy: ". . . like I've been here for 30 years and there's a lot of us that have been around for a very long time because of the camaraderie of the place really so you know because of that I suppose we seem to have a good strategy going." (Large hospital B) Theme five: Difficulty achieving exclusive breastfeeding targets Most interviewees stated that the government's targets for exclusive breastfeeding at discharge would be difficult to reach for the following reasons: 1. Women with health problems and pregnancy complications were referred to hospitals for antenatal, birth and postnatal care. This was particularly the case with tertiary hospitals, where they receive complicated cases from around their regional areas: "I mean one of our wards, our high risk ward . . . had 24 percent exclusive [breastfeeding] yesterday and that's because of the nature of the women that go there" (Large hospital A) ". . . how sick some of these patients are and they have luers [intravenous access] in their hands and they can't [breastfeed] and they want to but they're grogged up with drugs . . . sometimes their physical condition is such that there is no sign of any lactogenesis triggering off." (Large hospital A) 2. Some hospitals had a higher rate of caesarean births than the national average: "We have a very high caesarean section rate here – we have one of the highest in the country, well over 30 percent – a lot of those are first time mothers and that creates delayed lactation." (Large hospital A) 3. Sick babies reduce the likelihood that breastfeeding will be established or exclusive: ". . . in the case of babies that go to the neonatal unit . . . I think when we have difficulty with the baby separated from the mother with this situation. . . the difficulty of getting expressed breast milk for those babies" (Medium hospital B) 4. Some hospitals were located in areas where there are a high number of women of lower socio-economic status or an ethnic minority who are less likely to have attended antenatal care or to breastfeed: ". . . but if most of our good mums are going to [private obstetric facility] we're left with the late bookers . . . what happens when you have an elderly primip [arous woman] who doesn't speak the language who is a late booker?" (Large hospital A) Theme six: Policy evaluation At the time of interviews, it was too soon to say what the long-term effect of the policy on breastfeeding initiation would be. Once a New Zealand hospital achieves BFHI accreditation it is not audited for another three years (although there may be occasional requests for performance data). However, the respondent from the one accredited Baby Friendly Hospital commented that they undertake regular internal audits to assess their performance: "Well, things like audits, audits on breastfeeding stats, audits on skin-to-skin contact. I've done audits on my antenatal breastfeeding classes – those type of things. Its measurements really . . . we have them ongoingly. I do breastfeeding stats every six months." (Medium hospital A) Many of the hospitals were also comparing their exclusive breastfeeding rate on discharge with the BFHI recommended rate of 75 percent. What was unclear from the interviews was the correct denominator for this rate. One lactation consultant thought that it included all mothers and babies being discharged whilst another hospital thought that it did not include the babies who required formula for a specific medical reason. It was also unclear whether the rate included mothers and babies who were discharged to another maternity facility (that is, they came to the secondary or tertiary hospital only for delivery and then went to another smaller facility) or whether it only included women who went directly home from the hospital. Theme seven: Discussing policy with other providers Respondents suggested their ability to discuss the policy with other providers such as independent midwives impacted on their capacity to improve breastfeeding rates. Ensuring other providers were aware of the policy was relatively easy to achieve with a small area and fewer independent midwives, whereas in a bigger centre it was difficult to know who all the individual midwives were as well as ensure that they knew what the policy was: "We've got a large [number of independent midwives] . . . There's a lot of them and the reality is that it appears by the deafening silence that any comments about the policy from them that they just blithely ignore it and say that's what we do here and they come in and just do their own thing." (Medium hospital A) Some regions had a breastfeeding advocacy group which was a combination of health professionals involved with breastfeeding mothers. Where these groups were present, it was felt that the policy could more easily be communicated to the professional groups that were represented on it. ". . . well, local levels, there is the breastfeeding support group here . . . that's been established by [a public health service] . . . that's been alongside them and they've helped us and they had a booklet that they printed for us. So that's been good interaction." (Medium hospital B) Theme eight: Size matters Interviewees from smaller hospitals noted that it was probably easier to implement the policy because of a smaller number of staff, a more stable workforce, fewer casual staff being employed and a smaller number of lead maternity carers that impact on the implementation of the policy. The interviewees from the two large hospitals, particularly the largest tertiary hospital, suggested that specific barriers they faced included dealing with a large, transient workforce and high maternity staff turnover. This meant they had to frequently rely on temporary staff and that continuity of training was affected. Discussion and conclusion This study illustrates that in the New Zealand public health system there are many barriers to implementing BFHI policy at the public hospital and perinatal service delivery level. In this sense, the study provides empirical support for prior discussions about the processes of BFHI-driven transformation [18,19,21]. The study also demonstrates that implementation is a multifaceted undertaking that is dependent on a range of factors that may support or hinder the process, as widely acknowledged elsewhere [eg [27,28]]. Implementation across the six participating hospital organisations was a staggered and slow process, stimulated not by the hospitals themselves, but by a central government policy directive. More than three years after the New Zealand government put its weight behind the BFHI, only one of the study hospitals had attained accreditation, which was representative of BFHI accreditation in public hospitals at the time; the other five continued to experience difficulties in developing and implementing their policies. This implies that, if hospitals are not themselves leading a drive to become baby friendly, there is a real need for some kind of external motivation, and that this motivation possibly needs to be matched with the right incentives and resourcing to ensure that the BFHI policy is implemented. This is likely to be particularly the case in health systems that are predominantly government funded and where government has a high level of policy responsibility. If government is to provide policy stimulus then, as respondents in this study suggested, the policy needs to have a practical orientation so that it can be easily actioned by service providers. Notable in this study was the fact that developing a hospital-level policy was only one part of the equation and that gaining staff compliance with that policy took time. Considerable effort and resourcing was also required to ensure that education was far-reaching, and accessible to all relevant staff. Where practitioners beyond the direct jurisdiction and employment of the hospital are involved in delivering services, as in New Zealand, this poses additional challenges. This study also confirms that policy is contingent on the context within which is it being implemented . As noted by respondents in this study, issues such as the socio-economic status of a community and the relative complexity of presenting cases at hospital birthing centres will impact on the capacity to boost breastfeeding rates. Our respondents' comments under Theme Five in this article imply that specific resources and training may need to be provided for birthing centres that deal with complex cases where exclusive breastfeeding may be less likely to be achieved. New Zealand's public hospitals do their best to facilitate rooming in after a caesarean, and to provide a mother's breast milk for her baby if in neonatal intensive care. However, to consolidate the focus on improving exclusive breastfeeding rates there may be a need for additional special education and language translation services, increased lactation consultant numbers, and close attention to the needs of mothers and maternity staff throughout the birthing process. A further finding from the study, with corresponding lessons, may be that implementing BFHI policy could be more straightforward in smaller hospital organisations and hospitals with more stable workforces. The existence of interdisciplinary and advocacy groups that span hospitals and community may also assist with policy dissemination and compliance. This qualitative study has the possible limitation of six participants. However, as noted, these people and the organisations they spoke on behalf of were purposively selected and representative of the range of New Zealand public hospitals and their populations. The interviewees expressed themes that were common to all and, in this sense, we believe they would be germane to the wider public hospital sector in New Zealand. We also consider that, through the interview process, we reached saturation and that extending the number of interviewees would not have yielded further knowledge; it may, however, have provided additional examples. The study may also be limited by its New Zealand focus and fact that the studied hospitals were part of a state-funded health service. The world's health care systems differ from one another in terms of regulation, funding and service organisation [30,31] and so our findings and lessons need to be carefully translated. A further limitation is that the study was aimed largely at exploring barriers to implementing Steps One and Two of the BFHI. What is now required are additional studies of BFHI implementation, in particular analysing barriers to implementing the remaining BFHI Steps, undertaken within differing health and hospital systems. The author(s) declare that they have no competing interests. TM conducted the research reported in this article as part of a Master of Public Health thesis supervised by RG and SW. RG drafted the article which TM and SW provided comments on. All authors read and approved the final accepted draft. Pediatric Perinatal Epidemiology 2001, 15(2):144-150. Publisher Full Text Gynecological Oncology 2003, 89(2):318-324. Publisher Full Text Pediatrics 2005, 116(5):702-708. Publisher Full Text American Journal of Preventive Medicine 1995, 11:26-33. PubMed Abstract Kramer MS, Chalmers B, Hodnett ED, Sevkovskaya Z, Dzikovich I, Shapiro S, Colleet JP, Vanilovich I, Mezen I, Ducruet T, Shishko G, Zubovich V, Mknuik D, Gluchanina E, Dombrovskiy V, Ustinovitch A, Kot T, Bogdanovich N, Ovchinikova L, Helsing E: Promotion of breastfeeding intervention trial (PROBIT): a randomized trial in the Republic of Belarus. Health Policy 1999, 47(1):68-83. Publisher Full Text
<urn:uuid:c7bce696-d83f-4e37-9574-57bd7ff380cb>
CC-MAIN-2014-23
http://www.internationalbreastfeedingjournal.com/content/2/1/8
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997872002.22/warc/CC-MAIN-20140722025752-00085-ip-10-33-131-23.ec2.internal.warc.gz
en
0.974133
5,996
2.625
3
3.082689
3
Strong reasoning
Health
Ch.14 Behavior ManagementCh.14 Behavior Management web_admin Mon, 12/27/2021 - 11:12 Author: Michele Deitch, J.D., M.Sc. Setting Behavioral Expectations for Youth and Staff It is important to begin with a clear understanding of what is meant when talking about behavior management, discipline, and punishment. Behavior management is the ongoing effort by facility staff to implement strategies that elicit positive behavior from resident youth. Ensuring appropriate youth behavior is a never-ending task that requires constant attention from staff; behavior management is not a one-time response to a troubling incident. Seen in this light, it becomes clear that behavior management is about more than the immediate response to aggressive or inappropriate behavior. It involves creating a therapeutic culture within the facility that supports the development of positive relationships between youth and staff, that ensures the safe and humane treatment of the youth, that provides youth with the treatment and programs they need to learn problem-solving skills and overcome thinking errors and past traumas, and that ensures a consistent and clear message about behavioral expectations for both youth and staff. Moreover, the facility should be run in a way that undergirds, rather than undermines, this positive culture—from ensuring a custodial environment that is safe and secure, to hiring appropriate numbers of highly-trained staff, to having clear policies and procedures to be followed when that negative behaviors occur. The goal of a behavior management system is discipline, if discipline is understood to mean the elicitation of desirable behavior that conforms to acceptable norms. Too often, behavior management is confused with punishment or the sanctions that should apply when a youth breaks the rules. To be clear, a behavior management system must include appropriate consequences for negative behaviors. But the objective of these consequences should not be punishment, but rather changing the youth’s behavior in the future. Punishment is simply a punitive response to unwanted behavior; it alone does nothing to ensure that the misbehavior will not reoccur. Expectations for positive behavior must be communicated to both youth and staff from the very start of their engagement with the facility. Those expectations are conveyed in very subtle and not so subtle ways. If youth are locked in run-down cages and yelled at by staff, they are clearly given a message that we expect them to behave like animals. If, in contrast, they are given rooms in homelike settings and are encouraged by supportive staff, they learn that they are expected to treat each other with respect. The facility’s leadership should also clearly establish other expectations about appropriate behavior on the part of youth and staff in every communication and policy. A healthy environment is one where no abuse of any kind can be tolerated, whether it involves physical assaults, sexual misconduct, or verbal abuse. That rule applies to all interactions between staff and youth and among youth. Moreover, there must be zero tolerance of any behavior that involves bullying, ridicule, or extortion. Youth must feel safe in the custodial environment if they are to be able to work successfully on their therapeutic needs; any sense that they are at risk of harm from other youth or staff will undermine their rehabilitative progress. Gangs and gang behavior must not be allowed to fester in the custodial environment. Not only does gang activity interfere with the therapeutic environment and put staff and youth at risk, it also creates barriers to individual growth and positive interactions among peers. In short, the culture of the custodial environment must be therapeutic rather than punitive. In a comprehensive analysis of evidence-based juvenile justice programs conducted in 2010, Mark Lipsey and his colleagues found that programs with a therapeutic philosophy are significantly more effective than those with a control philosophy regarding outcomes for youth. The researchers advised that programs with a control approach to managing youth behavior should be avoided in favor of those guided by a therapeutic approach. Ensuring that the culture of the institution is consistent with this therapeutic philosophy is thus critical from the standpoint of improving youth behavior and reducing recidivism rates. Violence and misbehavior in youth confinement facilities are symptoms of a systemic failure to address the skill deficits of incarcerated youth. These deficits can reduce a youth's ability to address problems in a calm and reasoned fashion, provoking impulsive responses to stressful situations and emotional or violent reactions to perceived disrespect or danger. Because incarcerated youth arrive at secure facilities with a multitude of skill deficits, staff need to shift away from traditional punitive approaches to managing this population. Those punitive approaches and use of increased disciplinary sanctions can simply mask the aggressive behaviors of youth rather than teach them skills that can prevent such behavior in the future. The far better approach is to use a range of strategies for preventing, intervening, and responding to misbehavior that elicit desired behaviors, promote long-lasting behavioral change in youth, and lead to a systematic reduction in violence and misbehavior. Research has shown the value of using a multi-tiered framework modeled upon Positive Behavioral Interventions and Supports (PBIS), an incentive-based behavior modification system that teaches and strengthens appropriate behaviors and reduces challenging behaviors. The model is designed to prevent the development of new problem behaviors, the triggering of occurrences of problem behaviors, and the exacerbation of existing problem behaviors. While PBIS is typically applied to classroom settings, research supports its effectiveness with students of all ages and in all types of settings, including in secure juvenile facilities. It is important to understand the logic and structure of the PBIS multi-tiered approach to behavior management, as illustrated in Figure 1. The primary tier provides preventive strategies and behavioral support for all youth across all settings within the institution. According to Brenda Scheuermann, 80% to 90% of all youth in school settings respond successfully to a positive, proactive environment that emphasizes teaching students how to behave and ensuring that attention is paid to appropriate behaviors rather than simply punishing inappropriate behavior. The secondary tier provides more intensive behavioral supports and interventions for those students whose behaviors are not responsive to primary-tier strategies. Another 10% to 15% of youth tend to need these structured and individualized interventions. Finally, the tertiary tier provides highly individualized and even more intensive behavioral supports for students whose behaviors are not responsive to primary or secondary tier interventions. One to five percent of all youth will likely need these intensive services. Youth move in and out of these tiers as their behavior changes, so that youth who were responsive at the secondary tier can move back to the primary tier, removing secondary tier interventions from their behavior management plan. This framework is especially helpful for juvenile confinement staff, because it shows the importance of across-the-board approaches that, when applied to an entire institution, help prevent behavioral problems in individual youth. Preventing misbehavior is the best way to manage it, and intervening early with minor misbehavior helps keep problems from escalating or becoming chronic. To achieve and maintain the positive culture described above—and to encourage the safest environment possible for both youth and staff—the multi-tiered approach to behavior management should incorporate best practices in a number of different areas, including the following: - Staff training and the building of positive staff–youth relationships. - Staffing practices. - Physical environment. - Small group processes. - Structured daily schedules. - Youth empowerment and outlets for complaints. - Therapeutic interventions. - Strength-based rewards and consequences. - Discipline and graduated sanctions. - Separation and disciplinary confinement of youth. - Long-term behavioral management units. - Crisis management—de-escalation, use of force, and restraints. When implemented comprehensively, improvements in each of these areas consistently lead to a reduction in violence and misbehavior and create a culture of behavior management within a confinement setting. The rest of this chapter describes in detail the best practices that together comprise an effective behavior management system and shows how they fall within this multi-tiered structure, which incorporates elements of prevention, intervention, and disciplinary responses, as well as appropriate ways to handle situations that call for crisis management. Effective Behavior Management System Figure 1 illustrates the behavior management model using a pyramid divided into three tiers of behavioral supports and interventions, with the primary tier at the bottom. The primary tier applies to all youth; the secondary tier applies to some youth; and the tertiary tier applies to a few youth. Preventive Elements of the Primary Tier The primary tier of an effective behavior management system is focused on prevention of misbehavior through system-wide strategies applicable to all youth in the facility, rather than an approach that targets an individual resident. Those proven, across-the-board prevention strategies include: effective staff training on relationship-building, appropriate staffing levels, environmental factors, the use of small groups within the facility, classification, gang management, highly structured daily schedules, and youth empowerment. Most of these operational issues are addressed in more detail elsewhere in this Guide, but are discussed here from the standpoint of how they support an effective behavior management system. Staff training is arguably the best avenue to preventing misbehavior in juvenile facilities, and the single most important contributor to the quality of youth confinement services. David Roush and Michael McMillen highlight the links between inadequate staff training and serious problems like youth suicide and youth-on-youth violence. Yet agencies often limit the time and resources devoted to staff training, citing scarce funding and scheduling difficulties. This is surely a mistake. Juvenile detention and corrections staff consistently rank additional training as their highest need. New staff should receive as many hours of training as possible, and ongoing in-service training should be required for experienced staff. (See Ch. 4: Developing and Maintaining a Professional Workforce) The content of the training curriculum is even more important than the number of hours staff spend being trained. Training on certain subjects is essential from the standpoint of improving facility safety. Roush recommends training youth facility staff in all of the following subjects: - Job skills (security procedures, supervision of youth, report writing, key control). - Suicide prevention (signs of suicide risk, precautions). - Emergency procedures (fire procedures, use of force regulations and tactics). - Relationship building (communication skills, social and cultural lifestyles of youth, adolescent growth and development). - Youth rules and regulations. - Youth rights and responsibilities. Of these, training in relationship building may be the most important when it comes to preventing misbehavior and maximizing safety in a juvenile facility. Relationships between youth and staff are considered the primary way in which the behavior of youth is managed; therefore, it is critical for staff to receive training to improve those relationships. Positive relationships are built on a foundation of trust. That trust is developed through active listening, honesty in all interactions, respectful communication, fair and thoughtful responses to the youth’s actions, and concern for the youth’s well-being as demonstrated by caring behavior, encouragement, protection of the youth, and the teaching of problem-solving skills. Staff should always strive to practice these kinds of positive interactions with youth in the facility. Teens are highly capable of seeing through superficial or non-genuine interactions, and inconsistent responses on the part of staff are certain to lead to a lack of trust. Many youth have complicated family and educational histories that already lead them to mistrust adults. Many of them lack positive, caring relationships with adults and have little reason to behave well for those they do not trust. But, where there is a trusting, caring, mutual relationship with an adult, the youth want to succeed and control their behaviors to please that individual. Through their interactions with residents, confinement staff have the potential to model positive behavior, respectful communication, and strategies for resolving problems or sources of stress. Social learning theory tells us that the behavior of residents in institutional settings is the product of staff interactions, and that everything a staff member does is an interaction and a teaching opportunity. Indeed, one study found that a quarter of the behavioral change observed in youth can be directly attributed to the nature of the relationship formed between the client and the treatment provider. Even the emotions and behaviors of the staff tend to be replicated by the youth who observe them. Through their own behavior, staff can model self-management and reflective action, or they can teach aggression, sarcasm, argumentation, and loss of control. Thus, the ways in which staff talk to youth and respond to negative behaviors are critical elements of preventive behavior management, and the training curriculum must teach staff how to communicate and respond in a positive manner. Youth that exhibit aggressive behaviors are those most in need of supportive relationships with staff. Yet, they often receive the least programming and fewest opportunities to develop positive adult relationships, because staff typically move into a punishment mode in response to these youth. It is far more effective for staff to shift their approach to one that emphasizes redirection of the negative conduct. Around the country, juvenile confinement agencies have developed policies and practices to encourage positive staff interactions with youth and to teach staff how they can play a critical role in redirecting negative behaviors on the part of residents through these relationships. At Long Creek Youth Development Center in South Portland, Maine, for example, staff members are required to provide a minimum of ten positive statements to residents each day that reinforce desired behaviors and redirect negative ones. Line staff members are informed of the behaviors that youth learn in specialized programming and are directed to emphasize these behaviors. In this way, line staff are able to build on the foundation laid by treatment staff: both groups are able to help residents cultivate alternative coping strategies when aggressive feelings arise. Although treatment staff specialize in skill training, line staff can provide practical application of these skills. Conversely, line staff can help identify the type, severity, and frequency of a youth’s misbehavior, so that the treatment team can tailor plans to meet the youth’s needs. Similarly, Mark Steward has coined a phrase—“eyes on, ears on, hearts on”—to describe the level of supervision and interaction with youth that all staff should maintain while on duty. This approach is informed by the notion that, when youth know staff members are there to help them and not hurt them, a change in behavior is more likely to occur. Not only do positive relationships help prevent violence and other forms of misbehavior by providing youth with skills and a reason to exercise self-control, these relationships also provide a foundation that allows staff to intervene when aggressive conduct escalates. Line staff that already have a positive relationship with youth can more effectively use verbal skills to de-escalate a confrontation involving that child. Indeed, it is difficult for staff to defuse a situation without having an existing trusting and positive relationship. Training in relationship building should cover effective use of authority, expressions of disapproval that redirect a youth’s behavior, and appropriate ways to reinforce problem-solving skills in youth. Staff members who understand how their job influences relationships with youth are most successful at preventing misbehavior among youth. For example, such training might help staff understand that youth want to feel in control and might refuse to respond to a directive if the youth feels it is just another order from an authority figure. Staff members who understand the reason for noncompliance are more likely to effectively promote positive responses. Staff must learn about adolescent development and the myriad factors that influence youth behavior. They need to understand that youth misbehavior is primarily a product of a still developing brain, poor impulse control, peer pressure, lack of appreciation of consequences, and lack of practice with effective problem-solving skills. They need to appreciate the degree to which mental illness, trauma, substance abuse, and the disruption of a youth’s family life can lead to outbursts and other negative behaviors. And they need to know that youth are still works in progress. The children in their care are highly capable of change, and their characters are still forming. (See Ch. 6: Adolescent Development) Staff should also be trained in diversity awareness. Staff members and youth offenders often come from different cultures. This difference can result in cultural misunderstandings whereby staff or youth perceive disrespect or inappropriate behavior where none is intended, in turn leading to conflicts between staff and youth. To prevent such conflict, staff training should highlight the differences in culture, socialization, and race that can affect staff members’ ability to relate to youth and to respond to crisis situations. Staff training should help staff members become aware of their own biases and gain an accurate working knowledge about the various cultures of the facility’s residents. Staff training must also include information about mental health issues, given that the majority of youth involved with the juvenile justice system have special mental health needs. In fact, studies estimate that anywhere between 65% and 70% of youth offenders have at least one diagnosable mental health disorder. Lisa Boesky notes that certain supervision and management strategies are more effective with mentally ill youth. Also, when a crisis situation occurs, staff that do not understand the youth’s mental illness may unintentionally escalate the situation. Finally, staff may inadvertently reward angry outbursts or violence if they have not learned how to reinforce pro-social ways of coping. (See Ch. 11: Mental Health) The best mental health training makes clinical material understandable, is tailored to staff members’ specific job duties, provides realistic management and supervision recommendations, and includes real-life case examples. Administrators might find it beneficial to send entire staff teams to the same outside mental health training, so the entire team is exposed to the same information. Juvenile facility staff teams frequently report that, after they work together to learn about mental health issues, they experience decreased episodes of self-injury and aggression or violence among confined youth. Later sections of this chapter will provide further detail on how staff training on crisis-level incidents, use of verbal techniques to de-escalate a tense situation, and avoiding the use of punitive strategies such as physical force, use of mechanical and physical restraints, and seclusion of youth in response to serious misbehavior. Staff Ratios, Turnover, and Deployment Though staff training is critical, staffing practices such as staff-to-youth ratios, turnover, and deployment also directly impact staff members’ ability to monitor youth, provide for youth safety, and allow for quality interactions and support. These activities, in turn, affect the likelihood of youth misbehavior, as well as the level and number of violent incidents in a facility. Appropriate staffing practices are key to ensuring a safe environment for all youth and staff members and to promoting positive behavior among youth. The higher the staff-to-youth ratio (meaning, the more staff present for each youth in the facility), the more that staff interactions will help prevent behavior problems in secure facilities by allowing staff additional opportunity to work with youth and help staff identify and resolve problems before violence escalates. High staff-to-youth ratios allow youth to feel safe, making them less likely to act out. Roush and McMillen suggest an overall minimum staff-to-youth ratio of one staff person to every 8 to 10 youth; but, ideally, one staff person should directly supervise only about 6 to 10 youth at a time. These ratios are so widely considered an effective measure for reducing violence in secure facilities that the Department of Justice (DOJ) included them in newly issued regulations for enforcing the Prison Rape Elimination Act (PREA). The PREA Standards, designed in part to prevent youth-on-youth sexual violence, mandate that, by October 2017, juvenile facilities maintain staff-to-youth ratios of 1 to 8 during waking hours and 1 to 16 during sleeping hours. These ratios include security or direct-care staff only. Sheila Mitchell believes that high staff-to-resident ratios are so important in preventing violence that her agency increased the number of staff to 1 staff member per 6 youth during the day and 1 staff member per 10 to 15 youth at night. Dr. Nelson Griffis believes the ratios should be even lower for violent or sex offenders. He recommends a 1 to 5 staff-to-youth ratio for this population. (See Ch. 8: Management and Facility Administration and Ch. 17: Quality Assurance: Prison Rape Elimination Act) Beyond the importance of maintaining appropriate staff-to-youth ratios, avoiding staff turnover is a critical factor in promoting safe custodial environments. High rates of staff turnover can destabilize a facility, contributing to the risk of youth misbehavior and violence. Confinement facilities that experience frequent staff turnover have consistently high numbers of new, inexperienced staff members who are less familiar with the individual youth, security procedures, and crisis de-escalation techniques; these staff are less effective in managing the youth and preventing violence. New staff members often do not have meaningful relationships with the youth, which may contribute to the youths’ willingness to act out, test limits, and assault the staff members. Staff should be deployed in a way that allows them to maintain a high degree of supervision in housing and activity spaces, because these are the areas where violence among youth most commonly occurs. Research on Texas’s juvenile correctional facilities found that major rule violations overwhelmingly occurred in the housing areas. Staff should always be present to supervise youth circulation between physically controlled zones, to supervise youth in their housing areas, and be strategically deployed to supervise any areas where camera angles, corners, or building layouts might allow youth to hide or engage in negative behaviors. Youth should not be able to conceal themselves in unsupervised rooms or corners. Roush and McMillen also recommend that staff supervisors remain highly visible; youth are less likely to engage in negative behaviors if they know they are being monitored at all times. Youth should know that, even during periods of low staffing, remote audio and visual monitoring systems are supplementing direct supervision. Staff seniority should also be taken into account in determining how, where, and when staff will be deployed. Contrary to frequent practice, the most inexperienced staff should not be assigned to what is determined to be the most dangerous shift. Many staff members dislike working the second shift and seek to avoid it, but this is when youth have the most downtime, and the risk of behavior problems increases. Youth often take advantage of inexperienced staff. Thus, wise administrators should seek to assign their most effective and experienced staff members to this shift to assist in behavior management efforts. Similarly, more experienced staff should work with special populations, including the mentally ill. This is a challenging assignment, and inexperienced staff members typically do not have the training or skills to help manage behavioral problems that arise with these populations. The age and gender of staff members also matters when it comes to deployment. Older juvenile corrections staff should be assigned to work with older youth (17 and older), and managers should aim for at least a three- to five-year age difference between those doing the supervision and those being supervised. To the extent possible, female staff should be assigned to work with girls; this can help reduce the impact of trauma on the part of those youth who have been abused in the past. Physical Environment and Security Measures The physical structure and environment of youth confinement facilities have a tremendous impact on the likelihood of violence within that facility. The size and design of the spaces where youth are confined can impact the behavior of youth. Proper design of a facility can help prevent violence across all youth populations, and should be considered a critical element of the behavior management plan of a youth confinement facility. Also, appropriate use of technology can help promote safer interactions among youth and serve as a deterrent to youth misbehavior. The juvenile justice field widely recognizes the superiority of small, community-based juvenile corrections facilities over larger, conventional training schools. There are two ways in which smaller secure juvenile facilities prevent the development of aggressive behaviors. First, smaller facilities create an environment more hospitable to treatment. This is important because a severely institutional, restrictive juvenile facility may cause youth to attempt to exert control through aggressive, confrontational behaviors that endanger staff or other youth. Roush and McMillen recommend facilities with physical settings that project an image of positive expectations for youth. Specifically, they suggest natural lighting and physical access to outdoor spaces to reduce the impression of confinement as well as carpeting, furnishings, and other spatial configurations designed to reduce noise and create the perception of a calm and controlled setting. Will Harrell, also emphasizes the importance of youth access to outside recreation, green spaces, and natural sunlight. He notes that such environmental factors help prevent a youth from becoming institutionalized, which is linked to violent behavior. Similarly, according to Mark Steward, small facilities are easier to design with homelike features that reflect this type of therapeutic community. For example, Hogan Street Youth Facility in Missouri is the highest security level facility in the state, and yet it looks no different than the state’s other group home settings because it, too, is designed to resemble a home. Dorm rooms at this facility contain comfortable wooden beds and colorful comforters. Walls are decorated with pictures, murals, and craft projects from treatment group sessions. Day rooms have couches, coffee tables, plants, and wooden furniture, resembling the comfort of a home living room. This stands in stark contrast to the typical corrections-based dayroom of white walls and hard, plastic, bus station seating that reflect a more restrictive living environment. Missouri’s use of small, non-restrictive facilities has been successful by many measures. Notably, the frequency of violent incidents and the need for restraints or seclusion remains extremely low, compared to juvenile correctional facilities in other states, and, there have been no suicides during the 25 years since large training schools were eliminated from the Missouri system. The second way in which smaller secure juvenile facilities prevent the development of aggressive behaviors among youth is that smaller facilities are typically incorporated into a regionalized plan for locating these facilities close to the communities of incarcerated youth. Keeping a youth close to home is important, because families play a critical role in supporting changes in a youth’s behavior, and family members can visit more often if they live close by. With the encouragement of staff at the facility, these interactions can lead to positive behavior in youth and long-term, healthy family relationships. (See Ch. 10: Effective Programs and Services) For example, the Missouri Department of Youth Services is able to engage the families of confined youth because of its localized regionalization plan for facilities, which allows most youth to stay close to home, in facilities of no more than 50 youth; the secure care facilities hold just 30 to 36 youth. Since closing its large training schools and shifting to this regionalized model, Missouri has experienced an enormous reduction in violence within its juvenile facilities, according to Mark Steward. (See Ch. 3: Physical Plant Design and Operations) Other juvenile justice systems are beginning to follow suit. North Carolina shifted to housing no more than 25 youth in its facilities, and since restructuring its system, the state’s juvenile justice agency has experienced a very substantial reduction in rule violations and violent incidents, as well as a 73% decrease in re-arrest rates. Louisiana’s Office of Youth Detention is implementing a five-year strategic plan of localized facilities based on the Missouri Model. The state is working to move youth out of large, distant, state institutions with a correctional custodial feel and to instead situate them in homelike settings, with a therapeutic, youth-centered environment. One count found that more than 52 youth correctional facilities have been closed in at least 18 states since 2007, and many others have downsized by closing parts of large institutions. Paul DeMuro contends that juvenile confinement facilities should be small enough that the facility administrator “can know the life story of every kid in them.” But not all experts agree that facilities need to be smaller than 50 beds to be effective at reducing youth violence. Nelson Griffis contends that facilities with 80 beds or fewer can also accomplish this goal with greater economies of scale, assuming they are well-designed and focus on treatment goals. It is important to remember that deinstitutionalization, though important, can be destabilizing. Downsizing the number of youth in facilities often requires merging youth from different facilities into new environments. This can lead to culture clashes between youth who are not yet fully equipped with the skills needed to manage this type of change. At the same time, staff members are also forced to transition to different facilities. This can also be destabilizing, because staff are challenged by a learning curve as they enter a new environment at a time in which consistency is most crucial. This instability can lead to increased levels of youth misbehavior. In short, research and experience strongly suggest a correlation between the size and design of facilities and the level of misbehavior on the part of residents. Keeping facilities small and more homelike can help prevent behavior problems, and help support the therapeutic mission of the facility. Although the overall size of facilities is very important, so too is the size of the sleeping units. Research has shown that the vast majority of violent incidents occur in dormitory settings, especially those with 11 or more residents in one large sleeping space. David Roush recommends eliminating congregate sleeping arrangements in juvenile detention facilities to reduce youth violence, a view shared by Griffis, who believes that single-occupancy rooms are essential in juvenile custodial settings. This position is also reflected in the American Correctional Association’s standards for juvenile confinement facilities. Will Harrell highlights the special importance of using single-occupancy rooms in reception centers and diagnostic units, where staff have much less information about the youth’s behavior or vulnerabilities at that point, and because the stage of the process is so traumatic for the youth in ways that may cause them to act out. Even when single-occupancy sleeping rooms are used, it is important that these rooms are not overly institutional or restrictive, or else youth may try to exert control by acting out. The restrictiveness of sleeping rooms can be reduced by, for example, including carpeted floors to reduce noise or windows or lighting that reduce the sense of physical confinement. Single-occupancy rooms must be used in a manner that promotes privacy without becoming a form of isolation or excessive confinement. Allowing youth to decorate their rooms with pictures of family members or craft projects completed in therapeutic treatment groups creates a personalized space for youth that encourages positive behavior. Structured this way, single-occupancy rooms can provide a retreat at the onset of negative feelings. However, when youth retreat to their rooms, staff should keep the doors to the room unlocked so that youth do not associate the space with punishment. Not all agencies rely on single-occupancy rooms to manage youth behavior. Because of the risk that single-occupancy rooms may promote restrictive living environments, Missouri uses dormitory settings, which provide a shared space so youth learn to live in community with one another. While Missouri’s experience in this regard is clearly successful, most youth corrections experts tend to see Missouri’s housing arrangement as an anomaly and believe that the single-room design is a critical part of an agency’s behavior management system. It is also important that administrators and staff not overlook the importance of following basic security measures; the security of facility features such as doors, windows, and cameras can affect the staff’s ability to manage youth and can deter youth misbehavior. For example, security breaches often occur when staff members accidentally leave windows or doors unlocked. To minimize security risks, staff should physically check that each door and window is secure each time they walk by. Surveillance cameras can be especially helpful in supplementing direct supervision of youth by staff. But, unless they are properly deployed and monitored, cameras can also lull staff and administrators into a false sense of security. Administrators need to ensure that there are no blind spots or areas without camera visibility in the facility, because these locations tend to be prime spots for violent incidents or illegal activity. If there are unavoidable blind spots, staff should take additional security precautions in these areas. (See Ch. 16: Behavior Observation, Recording, and Report Writing) In short, facility design, facility size, and staff attention to basic security measures can have a profound impact on youth misbehavior, and it is critical that staff pay attention to such issues as a key preventive strategy in behavior management. Small Group Processes Research shows that youth are better behaved when they participate in small group activities that allow for positive interactions with their peers. In custodial settings, regardless of the size of the facility, youth should be placed into small, family-like groups of no more than 12 youth, and members of these small groups should participate together in every aspect of daily life together during their incarceration. Structured grouping of youth within facilities helps promote behavior management in two ways. First, the cohesiveness of a group is essential to achieve treatment gains and is an important condition for a change in behavior. In every Missouri facility, for example, youth are placed in small groups that participate together in all education, treatment, meals, recreation, and free time. Throughout their stays in Missouri’s youth institutions, youth are challenged in these groups to discuss their feelings, gain insights into their behaviors, and build their capacity to express their thoughts and emotions clearly, calmly, and respectfully—even when they are upset or angry. The consistency of the group does not allow young people to hide or withdraw, and when aggressive feelings arise, a youth’s peers challenge them to confront those feelings in meaningful and productive ways. Based on a similar premise, the Texas juvenile system offers the Capital and Serious Violent Offenders Program, a highly successful and intensive therapeutic program that relies on group support to encourage changes in behavior. The small group structure uses the concept of peer pressure in a positive way by encouraging youth to reinforce the skills learned in therapeutic programming that youth attend together. In small, family-like groups, youth come to recognize each other’s triggers for aggression, which can prevent violence. A number of agencies, including the Missouri Department of Youth Services, the District of Columbia Department of Youth Rehabilitation Services, and the Santa Clara County (California) Probation Department, have found that using small group structures has led to a significant reduction in youth violence and gang activity. The second way the internal structure of small groups helps promote safety is by maintaining appropriate staff-to-youth ratios. Roush and McMillen suggest that each housing unit should support no more than 8 to 12 residents, because this is the most a single staff person can manage effectively and with a high level of safety. Youth may be separated into even smaller housing groups for programming purposes or for certain categories of youth. Furthermore, it is harder for staff to provide immediate support to individual youth when they are arranged in large groups, and it is more difficult to move large groups from place to place for various program activities. To address this problem, Missouri conducts treatment and education programs in cottages or dormitory settings. Missouri’s DYS assigns a single case manager to oversee each youth from the time of commitment through release and into aftercare, and it provides youth with extensive supervision and support throughout the critical reentry period. This means there is always a case manager watching what the youth is doing while providing positive encouragement, which serves as a deterrence to misbehavior. Juvenile detention and corrections administrators should strive to implement opportunities to group youth into small teams, as this is an effective behavior management practice. A solid classification system is a key part of any facility’s behavior management plan. Classification systems are the principal tool youth confinement facility administrators have for allocating program resources and for minimizing the potential for escape and violence. Classification systems are commonly considered “the brain” of correctional management, because it allows individuals to be categorized by individual risk to commit violence and their vulnerability to violence. By classifying youth according to risk level, administrators can make appropriate decisions regarding staffing, bed space. Classification systems are based on the theory that individuals in custody have varying levels of vulnerability and aggressiveness, which can be measured by objective, validated techniques. The classification status determines housing, programming, and recreation within the facility. The staff assigned in each area must be fully aware of the types of youth under their care and be trained in management techniques appropriate for dealing with that group. Effective classification requires the continual updating and retrieval of information about a youth, especially following any behavioral incidents. This allows management to reevaluate and update a youth’s status if classification needs change. Accurate and reliable data should provide management staff with an improved ability to identify potential safety risks. The PREA Standards offer useful guidance on the appropriate placement of youth in housing units. The goals of PREA are to reduce sexual violence in correctional facilities, and PREA Standards outline best practices for identifying potential victims or perpetrators of violence during the intake process. PREA Standards require that, at a minimum, staff should attempt to ascertain information about: - Prior sexual victimization or abusiveness. - Any gender nonconforming appearance or identification as lesbian, gay, bisexual, transgender, or intersex, and whether the resident may therefore by vulnerable to abuse. - Current charges and offense history. - Level of emotional and cognitive development. - Physical size and stature. - Mental illness or mental disabilities. - Intellectual or developmental disabilities. - Physical disabilities. - The resident’s own perception of vulnerability. - Any other specific information about individual residents that may indicate heightened needs for supervision, additional safety precautions, or separation from certain other residents. To meet PREA Standards, the information gathered should be the basis for housing decisions. This information also should be used for purposes of education, programming, and work assignments to keep youth safe throughout the day. Although jurisdictions vary in the factors considered during classification and assessment, a national survey by the National Institute of Corrections found that most adult correctional systems screen for some basic inmate characteristics including membership in a gang or security threat group, escape risk, violent behavior, and suicide risk. Similar characteristics should be taken into account during the classification process for youth. (See Ch. 19: Challenging and Vulnerable Populations) An effective classification system will go a long way toward helping maintain safety in the facility. However, administrators should be wary of the risks that come from having a limited number of secure facilities in which to place a youth. As many states embark on the depopulation and closing of state-run secure institutions, they have limited options for where to initially place a youth to best meet his or her needs and on where to move the youth should his or her behavior warrant a transfer to another campus or another security level. Ideally, there should be a range of available facilities to maximize the ability of the classification system to address a particular youth’s needs and behaviors. This is particularly true now that secure facilities tend to hold a higher concentration of youth who have a history of violence or serious emotional or mental health needs. In such settings, classification systems and accurate data on each youth may become even more important for the overall safety of the facility. Understanding the risk factors specific to these groups and making housing and programmatic decisions based on classification will ensure the youth are housed according to their security needs. As noted earlier, having a larger number of smaller facilities is an approach that allows both for depopulation of state-secure facilities and housing youth safely in these facilities using an effective classification plan. The presence of gangs in a facility can have a tremendous impact on youth safety and the potential for violent behavior, and can encourage disregard for facility rules. Gangs contribute to poor staff–youth relationships and the likelihood that staff will turn to control methods rather than the therapeutic approaches shown to be most successful. Gangs are highly prevalent in certain juvenile confinement facilities, and in one 1998 study, one-third of youth in custody claimed a gang affiliation. Thus, an important preventive element of the multi-tiered behavioral management system is having an effective gang management plan. (See Ch. 6: Adolescent Development, Ch. 17: Quality Assurance, and Ch. 19: Challenging and Vulnerable Populations) The root factors leading youth to gang membership are well documented; they include a need for identity, a sense of belonging, protection, feelings of self worth, and money. Staff members can identify gang members—or youth at risk for becoming gang members—knowing these risk factors. Regardless of whether youth are already affiliated with a gang, classification systems can be used to group youth in a way that discourages the reliance on gangs and continued gang activity. By organizing youth in small groups in much the same way that a gang or fraternity uses grouping techniques, youth feel a sense of belonging, and facility leaders and staff can turn that into a very positive mechanism for reducing gang violence. For instance, Santa Clara County’s Juvenile Probation Department reduced Hispanic gang activity in its detention facility by 78% by placing youth of opposing gangs in the same group to force them to learn to live in close quarters together. Similarly, the Missouri Division of Youth Services integrates gang members from rival gangs in the same small groups. By setting very clear expectations about zero tolerance for misbehavior and continued gang activity, and by providing extensive therapeutic programming to help these youth control their anger and foster healthy relationships, the staff have managed to maintain a safe environment. The approach also appears to have long-lasting effects, as Missouri’s recidivism rate for gang members was reported as below 10%. Mark Steward indicates that small groups provide youth with a sense of belonging and leadership that gangs also provide. When youth are new to the group, they immediately find their place within the group’s hierarchy and realize that the opportunity to move into leadership positions within the group provides the incentive for doing well in the program. There is pride in being the leader of this type of group and, as a result, youth tend to avoid aggression or behaviors that elicit aggression, such as gang rivalry. Steward has found that the small group process reduces the likelihood of assaultive behavior among youth by a factor of four. Interestingly, staff at the Tarrant County (Texas) juvenile detention facility use a classification approach to gang management that is opposite the one described above. Whereas the Santa Clara County facility and the Missouri Division of Youth Services both place youth from opposing gangs into the same small groups, Tarrant County puts opposing gang members on what they call DNA (do not associate) status. A youth who associates with those on the restricted list is cited for severe misconduct. Staff members reinforce this classification system by taking preventive steps to ensure the youths’ separation. Steward cautions that staff-to-youth ratios and positive staff–youth relationships are important in employing both the gang management strategy used in Tarrant County and the opposite strategy used in Santa Clara County’s facility and the Missouri Division of Youth Services. Staff should ensure gang members are not participating in gang-related activity. However, Steward maintains that, in the long run, youth will benefit from small groups with opposing gang members, because they will learn to live in community with one another. Separating opposing gang members from one another can actually perpetuate hostilities along gang membership lines. Although there are competing approaches to managing gang activities in juvenile facilities, a failure to address the gang problem with proactive strategies can contribute to the staff’s inability to manage the behavior of youth in custody. Structured Daily Schedules Many experts believe that a key to preventing violence and managing youth behavior in juvenile secure facilities is daily programming and activities that engage youth at all times of the day. Most violence occurs when youth are idle, as many line staff can testify from experience. Kelly Dedel notes that the value of keeping youth busy with meaningful activities is that they give less thought to harming themselves, others, the building and equipment, and more thought to the skills and insights they are learning through their programs and positive relationships. Furthermore, David Roush points out that programming and activities offer the structure, organization, and predictability that are important in reducing situations of conflict and stress for both youth and staff, preventing the need for subsequent physical interventions. Education is the primary vehicle for a structured schedule for incarcerated youth, even for those who are confined in disciplinary settings. It may also be the single most important programming that institutions can provide, because so many youth in institutions are behind in their studies or have dropped out of school. (See Ch. 13: Education) Beyond education, staff members need to provide other forms of structured programs or activities that keep all youth busy and safe from harm. Will Harrell notes that the federal court in Ohio issued a consent order stipulating that structured programming must be provided to incarcerated youth in disciplinary confinement. The order defines structured programming as “adequate, structured Rehabilitative Services, including an appropriate mix of physical, recreational, or leisure activities, during non-school hours and days…at each facility from the end of the school day until youth go to bed, and on weekends.” After-school hours and weekends present particular challenges when it comes to keeping incarcerated youth engaged in activities. Therefore, staff members should be creative in finding activities for youth, for example, scheduling routine and specialized cleaning of the facility during those times. This behavior management strategy requires that staff engage with youth in a positive manner throughout their shift. Consistent and continued staff involvement—and minimal down time—will help prevent aggressive behavior, as the Missouri juvenile agency has found. Recreation is another important activity that provides youth access to fresh air and exercise, which are useful for preventing misbehavior. Youth should have access to fresh air for at least one hour every day, and they need to have large-muscle exercise as a part of their daily routine, for normal health and development and for relieving tension and frustration that otherwise might result in aggressive behavior. According to Orlando Martinez, other activities that staff members can provide include vocational training; religious or other spiritual opportunities; individual and family counseling; medical, dental, mental health services; and substance abuse treatment, AIDS counseling, and sex offender treatment. However, David Roush points out that staff should take caution in transitioning youth from activity to activity, when there is a greater likelihood of instability. Staff should also ensure routine daily activities so that youth know what to expect during the day; routine helps to prevent physical altercations. Programming tailored to meet each youth’s needs, should be considered a fundamental part of the primary (preventive) tier in a behavior management plan at any facility. (See Ch. 10: Effective Programs and Services) Youth Empowerment and Outlets for Complaints Youth misbehavior is often the youth’s response to a perceived lack of control and autonomy in a tightly regulated environment. Youth often feel that they have no effective outlets to express their grievances against facility policies or certain staff members. Meaningful opportunities for youth to advocate for themselves help staff to learn from the youth and adjust facility practices in ways that better meet their needs and help manage youth behavioral. Youth dissatisfaction can be channeled into a pro-social vehicle that emphasizes effective communication strategies, acceptable advocacy tools, and fundamental fairness. This is consistent with the positive youth development model that uses a strength-based approach. Also, numerous studies about therapeutic correctional communities emphasize the value of empowering individuals in confinement in ways consistent with the therapeutic and security missions of the agency. Will Harrell strongly recommends creating Youth Councils, in which youth are selected to represent their peers in bringing concerns about facility conditions or practices to administrative attention and advocating for systemic changes. This respectful approach to communication about concerns becomes a model for all the youth about how to seek redress, and it creates real leadership opportunities for youth as an alternative to gang leadership. For this approach to work as a behavior management tool, however, staff must be willing to listen openly to the concerns raised by the residents, and make reasonable changes that do not compromise the safety or mission of the agency. Participation on Youth Councils should be limited to youth who have reached a designated level of achievement within the facility and whose behavior fits with this privilege. Closely related to the notion of youth empowerment is the importance of establishing a well-functioning grievance system in every confinement facility—youth and adult. Like all people, youth want to feel capable of expressing their concerns, to be heard, and to feel that they have some ability to affect their environment and what happens to them. They have an acute sense of fundamental fairness, and when legitimate complaints are ignored or are not remedied sufficiently, they harbor resentments that are often released as misbehavior. Confinement facility administrators should ensure that their grievance system is easily accessible to youth, that youth know their rights, that there are clear procedures for receiving, investigating, and responding to complaints, and that the agency’s responses are truly responsive rather than dismissive. A well-designed grievance system can be an extremely effective outlet for redirecting a youth’s anger and demonstrates that concerns can be resolved in a peaceful manner, making this strategy an important preventive tool on the first tier of a behavior management system. Intervention Elements of the Secondary Tier The secondary tier of the three-tiered behavior management system provides interventions for students who do not respond well to the preventive approaches on the primary tier. Research on the use of PBIS in the classroom suggests that approximately 5% to 15% of youth will need these more individualized interventions to address their rule-breaking and violent behaviors. While most youth in the facility should be receiving specialized treatment or programming, these secondary-tier interventions are intensified to prevent negative behaviors. Of particular importance at this stage is helping youth manage their anger, teaching them appropriate responses to peers and authority figures, and identifying any potential mental health issues. Although consequences for misbehaving youth are important, it is also critical to understand why misconduct is occurring and how to prevent it with effective therapeutic strategies. Youth must be given the opportunity to practice positive behaviors and decrease negative behaviors. The secondary tier of the behavioral management system, then, has two critical elements: intensified therapeutic interventions based on cognitive-behavioral methods, and a strength-based system of rewards and consequences that emphasizes positive reinforcement. Youth arrive at secure juvenile facilities with a myriad of challenges, but none are as prevalent or present as great a risk for aggressive behavior as cognitive skill deficits. Of all therapeutic interventions, the most effective are those that specifically target the cognitive deficits that lead to violent behavior. Nelson Griffis asserts that a good treatment program changes the thinking patterns of the youth through cognitive restructuring and that this impacts behavior more than a behavior modification system, though both elements are necessary. These cognitive interventions teach youth to monitor their thought patterns in situations that would otherwise lead to antisocial behavior and violence. On average, evidence-based cognitive-behavioral programs reduce recidivism by 25% to 30%. (See Ch. 10: Effective Programs and Services) It is important that staff rely upon evidence-based programs that focus on cognitive-behavioral interventions to help youth identify and change their dysfunctional thinking patterns and behaviors. Examples of effective programs grounded in cognitive-behavioral therapy include Family Functional Therapy (FFT), Multi-Systemic Therapy (MST), and Aggression Replacement Training (ART). In a multi-tiered behavior management system, cognitive-based therapeutic interventions should be provided to all youth to prevent violence from occurring, but should also be intensified as needed as a mechanism for individual interventions when misbehavior occurs. Kelly Dedel notes that the therapeutic interventions must be individualized and tailored to the unique needs of each youth. Behavior Modification through Strength-Based Rewards and Consequences An effective facility-wide behavior management plan has clearly established rules, as well as a mechanism for applying meaningful rewards and consequences designed to increase desirable behaviors and to diminish negative behaviors. This is a form of behavior modification, and the theory holds that if good behavior is not consistently recognized and rewarded, then unwanted behavior is simultaneously encouraged. Reinforcement comes from following desirable behavior immediately with an outcome perceived as a reward in direct response to that behavior, so that the behavior is encouraged in the future. This strategy teaches the youth self-regulation, and is based on Social Learning Theory. Reinforcement can either be positive (a tangible benefit that the recipient desires), or negative (the removal of an ongoing but temporary negative condition). Parents and animal specialists use these techniques widely; they have obvious application in the confinement setting as well. The key point is that a consistent response to youth behavior encourages positive behavior and discourages negative behavior, which is critical to the overall success of a behavior management system. Rewards (or “reinforcers”) can take many forms: they can be material in nature (food, clothes, or toys); they can involve activities (sports or movies); they can be social rewards that make a person feel valued (verbal praise, public recognition ceremonies, attention, or helpful feedback); or they can rely on tokens (a points-based system in which the recipient gets to choose the form of the reward). Although staff should apply rules consistently to all youth in the facility, each youth should have an individualized behavior management plan that identifies and documents the specific behaviors that are targeted for change so that staff members understand where to direct their reinforcement efforts. The plan should also identify strength-based rewards and disciplinary consequences specifically applicable to that youth. The individual youth must perceive the rewards and consequences as desirable or undesirable. Not all people will respond the same way to the same benefit or loss of benefit. For this reason, Griffis recommends use of a token system, so that the youth can use accumulated points for positive behavior to choose a reward to his or her personal liking. To provide a practical example of a strength-based incentive, if a youth is motivated by recreational activities, that youth should have increased opportunities to participate in sports or an extra hour of recreation time for appropriate behaviors or for using a new behavioral skill he or she has learned. Other effective incentives could be movie nights, pizza parties, dinner with the Superintendent, or extra time in the game room. Rewards based on the strengths or desires of the individual youth helps motivate the youth to behave well. As with rewards, the most effective consequences in a behavior management system are defined by the individual youth’s strengths and motivations and should be determined by his or her behavior plan at intake. Orlando Martinez believes that defining the consequences in this way ensures that the disciplinary measures are meaningful to the individual youth. Consequences should involve a loss of privileges that are uniquely applied to an individual youth based on his or her strengths or interests. For example, an effective disciplinary technique for a sports-oriented youth may mean not allowing the youth to play basketball with friends. According to Martinez, the consequences provided in a rewards-based behavior management system help deter negative behaviors, such as aggression and violence. Consequences have to be meaningful, but that does not mean they need to be punitive. Rewards systems must include things that can be taken away from the youth so that they feel the consequence of their negative behavior by either not receiving the reward or having the reward taken away. Privileges that can be taken away to produce a change in behavior include extra phone calls or visitation, though it is important to note that denying a minimum of these could violate the youth’s constitutional rights. According to Kelly Dedel, the most effective rewards systems are based on the give and take of a certain number of points for every observed behavior. Youth acquire points for displaying a good or acceptable behavior and points are simply not given when there is negative behavior. Points can be calculated over a week or points can be totaled for the day, but incentives and consequences must happen immediately and in a meaningful way. Waiting to apply disciplinary measures even a few hours after the incident will not be as impactful as immediate consequences for undesired behaviors. Swift and certain rewards and consequences help youth understand the impact of their behavior. Similarly, youth are more likely to repeat and adopt pro-social behaviors—as opposed to antisocial or aggressive behaviors—when those behaviors and attitudes are recognized, acknowledged, and affirmed in an immediate and meaningful way. In addition to being strength-based and immediate, disciplinary measures ought to match the severity of the misconduct. Minor violations should typically result in the misbehaving youth not accumulating points towards a desired reward, whereas more serious violations could receive more serious and direct consequences, such short timeouts. However, timeouts should occur in the open, where youth are not locked behind a cell door and where staff and peers remain visible. Overly harsh responses, such as the lengthening of a youth’s sentence, are counterproductive, because such responses are not cognitive-based—they do not address the feelings or thinking errors that led to the misconduct, and thus the behavior could easily reoccur. Finally, a key to the success of any consequence that is imposed for misconduct is that the youth must be able to earn back the removed privilege by demonstrating positive behaviors. The consequence must have the potential to be a negative reinforcer—the removal of this negative condition in response to desirable behavior acts as a motivating reward, and encourages the youth to continue to act in positive ways that are consistent with the behavior management plan. For most youth, then, the intensification of treatment programming and cognitive-based skills training—combined with an effective strength-based system of rewards and consequences—is enough to redirect their behavior in ways that support a therapeutic, non-punitive culture in the facility. Intensive Intervention Elements of the Tertiary Tier The premise of the multi-tiered behavior management model is that most youth exhibit appropriate behaviors when exposed to the across-the-board preventive measures described earlier. A small proportion of youth—about 10% to 15%—need some additional interventions and supports to adjust their behaviors, And only a very small number of youth—estimated by experts at about 1% to 5%—are so challenging or violent that they require the most intensive and individualized level of interventions available. This most intense form of intervention is the tertiary tier of the behavior management model. Most youth that need this third level of support receive intensified versions of the therapeutic interventions of the secondary tier. However, the disciplinary consequences associated with third-level of misconduct also need to be enhanced, and the facility may need to implement operational changes to address the misbehavior and keep other youth safe. These disciplinary consequences and operational approaches must reinforce a culture of nonviolence and must continue to offer the opportunity for youth to practice positive behaviors. The discussion here will focus on these disciplinary and operational approaches, differentiating those that have been shown to be effective from those that have been found to be counter-productive in addressing youth violence. Discipline and Graduated Sanctions Effective discipline in a juvenile facility requires a continuum of responses to misbehavior, also called “graduated sanctions.” These graduated sanctions should incorporate appropriate, proportionate, and immediate consequences for serious misbehaviors while still providing youth a space in which they can practice positive behaviors. At the low end of the continuum, responses to minor misbehavior—such as failure to make the bed or follow staff directions—should include lower-level consequences or removal of privileges for the youth. At the upper end of the spectrum, there should be more significant responses to and consequences for aggressive or violent behavior. Whatever the response, it should be applied immediately. The longer the time between the youth’s actions and the resulting sanction, the less the two events will be linked in the youth’s mind. Some particularly serious misconduct may warrant a response that requires a due process hearing, which should occur as soon as possible and within any required timeframe. That due process hearing should be much more than a pro forma event: the youth must feel like he has a meaningful chance to be heard and to share his version of the incident. Will Harrell notes that perceived fairness goes a long way towards helping the youth appreciate the consequences of his or her actions, whereas a sense of injustice can simply reinforce the youth’s hostility. Even more critical is the need to ensure that the sanctions do not end up reinforcing the negative behavior by being overly punitive or devoid of an educational component. According to Andrea Weisman, graduated sanctions are most effective when additional programming is applied at every level, so that youth can learn more appropriate skills for managing aggressive behaviors. Youth who rely on aggression to solve problems need to learn more appropriate problem-solving skills and also need the space to practice those skills. This requires continued interaction with staff and peers even after engaging in an aggressive encounter with other youth. Thus, isolating the youth in a highly restrictive setting without access to programming tends to be counterproductive in reducing behavioral problems. Similarly, punitive measures such as adding time on a youth’s sentence provide no opportunity for the youth to learn or practice new skills and should therefore be discouraged, notes Will Harrell. The most aggressive and violent youth can be removed from the general population as a safety measure, but the goal remains to teach them how to behave appropriately and to conform to facility rules rather than to punish them. Natural consequences, such as being unable to participate in a dormitory’s activities as a result of misbehavior on the dorm, sends a much more meaningful message to the youth than does the imposition of a punitive sanction. The use of restorative justice measures such as talking circles (also known as group conferencing) can also be helpful in the context of graduated responses to misbehavior. In a small group, youth can discuss how an act of aggression affected everyone as well as interfered with their group dynamic. Often, group members build up resentment towards the misbehaving youth without any opportunity to express those emotions. Knowing how one’s actions affected the community can be a deterrent to further misbehavior. Missouri’s juvenile institutions routinely address youth misbehavior through small group discussions, and Ohio’s juvenile facilities are considering implementation of this approach, according to Will Harrell. It is also important to remember that most serious misconduct does not arise in a vacuum, but follows numerous lower-level incidents of nonconformity with the rules. If minor misbehavior is ignored or if the consequences imposed are meaningless to the youth, it is likely that the misbehavior will escalate. Thus, the need for immediate responses and interventions that teach positive behaviors is essential at the earliest signs of noncompliance with facility rules. The question should not be, “What do we do with a youth who is seriously aggressive?” but “What have we done (or not done) before now that allowed the youth’s behavior to escalate to this point?” Having an effective system of graduated responses is key to effective behavior management. Separation of Youth and Disciplinary Confinement An effective system of graduated sanctions may require the separation of an aggressive youth from the general population when he or she fails to respond to initial or subsequent interventions following violent incidents. These sanctions may range from an immediate separation of aggressive youth, to disciplinary confinement, to longer-term separation and placement in special housing units. Most physically aggressive conflicts start small and simply require an immediate separation of the youth. At this point in the conflict, the use of cool-off rooms or temporarily placing youth in their rooms may be a sufficient intervening response, requiring no additional discipline. The length of time youth spend in room restriction should be based on the youth’s behavior. Staff should guard against the risk that cool-off rooms easily become used in a punitive way by prolonging the time apart from peers. Once calm and ready to talk about feelings, the youth should be released from his room and provided the space to talk about his aggression. For example, the Gardner-Betts juvenile detention facility in Travis County, Texas, uses a cool-off room for youth who start to exhibit aggressive behavior. According to the detention center’s lead psychologist, the cool-off room is used to prevent youth’s behavior from escalating and is used for only a short period of time. The very short-term use of room confinement for cooling off purposes is often appropriate at the start of a violent incident or in its immediate aftermath, but should not be confused with disciplinary confinement or punitive seclusion. Disciplinary confinement of a youth in his or her room is often used as a formal sanction for misbehavior, but its use must be carefully monitored and should be limited to no more than a few days at most. Some experts contend that youth should never be placed in a restricted room for 24 hours or more as a punishment method. This approach should never be used with youth who suffer from mental illness, who should be placed in a treatment-oriented environment. Juvenile corrections expert Paul DeMuro highlights the fact that the New Orleans juvenile detention facility sets a maximum of 8 hours that a youth can spend in disciplinary isolation, while the Mississippi youthful offender unit ensures that youth on disciplinary status are out of their cells receiving programming for 4 out of every 24 hours. Both of those limits arose out of consent decrees following federal lawsuits, but administrators in both facilities have recognized the benefits of this approach. Although isolation can provide a relief for staff who often need a break from aggressive youth, it may also be emotionally damaging to youth who already have experienced much trauma in their lives. There is a great deal of research finding that placement in corrections-style isolation settings can further traumatize the youth and can lead to mental health problems and suicidal behavior. A national study found that over half the youth who committed suicide while in secure confinement were in disciplinary lockdown situations when they died. The courts and the federal government are starting to take notice of these concerns about the solitary confinement of youth. In 2013, a federal court in New Jersey approved a settlement of a civil rights case dealing with disciplinary seclusion of youth with mental health issues due to the harmful effects of such placements, awarding $400,000 to the youth. And the U.S. Department of Justice has recognized that “isolation of children is dangerous and inconsistent with best practices and that excessive isolation can constitute cruel and unusual punishment.” Not only is seclusion of youth in tightly restricted settings, without access to programming, potentially harmful, it is also counterproductive when it comes to stopping misconduct. The approach is ineffective at identifying the underlying causes of the youth’s misconduct, and the setting offers no opportunities for the youth to learn to improve his or her behavior or to practice new problem-solving skills. Thus, use of punitive seclusion as a consequence cannot serve as a reinforcement mechanism for positive behavior as described above. Studies have repeatedly shown that youths’ behavior gets worse when they are locked up in punitive settings. For example, one study found that the practice in Texas juvenile corrections facilities of referring misbehaving youth to security units (essentially, short-term disciplinary cells) following an incident actually correlated with an increase in misconduct. Youth in that study were found to be referred to the security units an average of 48 times, with 93 youth referred over 300 times during their confinement in state custody. Clearly, referral to this punitive setting did nothing to stem the likelihood of further serious rule violations. In another study, Human Rights Watch reported on the widespread use of seclusion to manage the behavior of incarcerated youth. The report found that the longer teenagers were kept in isolation, the less they participated in activities and programs. Not surprisingly, with less to do in those settings, the youth got into more trouble. As noted earlier, one of the essential elements of the primary tier of the effective behavior management system is ensuring that youth have a full day with structured activities and programs. Removing opportunities for programming and increasing idleness as a sanction tends to have the opposite effect of leading to misconduct and deprives youth of the benefits of programs designed to help prevent such misbehavior. Undoubtedly, staff rely on punitive isolation as a way to interrupt or punish misbehavior, but evidence shows it is not an effective behavior management tool. Contrary to common assumptions, youth do not tend to view placement in these settings as a deterrent to breaking major rules, and placement in these restrictive settings can increase misbehavior. In short, punitive seclusion of youth is counterproductive as a behavior management tool in the juvenile confinement setting and its use should be firmly discouraged by child-serving agencies. The research provides strong evidence that there is a need for non-punitive interventions if the goal is to effectively manage youth behavior. To guard against the risk that separation of youth from their peers may amount to punitive seclusion, a number of entities have established strict time limits and other restrictions on the use of disciplinary room confinement. - The Juvenile Detention Alternatives Initiative (JDAI) opposes the use of room confinement for discipline, punishment, or convenience, among other purposes. - The American Academy of Child and Adolescent Psychiatry (AACAP) has a policy statement opposing any use of solitary confinement and calling for a mental health evaluation of any child who is confined in a disciplinary setting for more than 24 hours. - Standards developed by the Institute for Judicial Administration and the American Bar Association (IJA-ABA) state that best practices for juvenile facilities should include limiting isolation to eight hours and prohibiting room confinement for suicide risk, as well as limiting disciplinary confinement to five days for minor infractions and ten days for major infractions. - The ABA Task Force on Youth in the Adult Criminal Justice System recommended that room confinement for any purpose, even in adult facilities, should never exceed ten days. However, even if agencies adhere to these time limits, there is nevertheless a substantial risk that referrals of youth to disciplinary settings can be overused and may still have deleterious effects. The far better approach is to ensure that separation of youth from peers is minimized, that it be a last resort to allow for relief of immediate tensions or to stabilize an emergency situation, that these youth continue to have access to programming and services, and that the youth can earn their way out of these conditions by displaying appropriate behavior. In lieu of any form of disciplinary confinement, staff should intensify behavioral interventions targeting the needs of a particular youth. Behavior Management Units Longer-term management of violent youth may require ongoing separation of these teens from their peers in the facility through use of special housing units. The risk of these units, however, is that they may become forms of punitive segregation rather than a therapeutic housing placement designed for safe operation of the facility. For example, the Ohio Department of Youth Services operates a Special Management Unit (SMU) in its secure juvenile facilities for sanctioning youth who engage in violent behaviors. When originally created, the SMU was intended to be an extension of a cool-off room, using an entire wing of cells for youth who needed temporary separation from the general population. However, over time, the unit came to operate more as a punitive segregation unit, similar to those commonly seen in adult prisons; this practice led to oversight by the federal court. Under the guidance of a court monitor, Ohio reworked its SMU based on the best practices of various juvenile systems around the country related to managing the behavior of the most violent and disruptive youth in secure custody. Now, the SMU, operating under a 2012 Consent Decree, must provide structured programming even to youth in closed-cell environments. This structured programming must be designed so that it modifies behaviors, provides rehabilitation, addresses general health and mental health needs, and is coordinated with a youth’s individual behavioral and treatment plans. Finally, youth may not be confined in locked cells during waking hours, and placement in the SMU must follow an adequate disciplinary hearing. Specialty units should be created to house and treat youth with acute mental health issues who present behavioral problems. These youth may need to be removed from the general population, but also need to have their mental health issues addressed directly. In short, youth removed from the general population and placed in special housing units to better manage their behavior should spend most of their day engaged in activities or treatment rather than in seclusion. This prevents the unit from deteriorating into a lockdown setting in which youth spend significant lengths of time locked in their rooms. Even if these are considered units for longer-term separation of youth, there should be a clear plan and path for the youth to be returned to the general population. Administrators should have a clear vision and purpose for the SMUs, which should be a vehicle for delivering more intensive programs and interventions. Staff should be adequate in number and qualified to deal with this challenging population. To the extent that behavior management units—or any other kind of housing unit that separates troublesome youth from their peers on a long-term basis—become punitive in nature, they do not have positive outcomes, and youth commonly exhibit more aggressive behavior under these conditions. A report about youth violence in the Texas juvenile justice system found high rates of violence and misbehavior in a unit specifically designed to separate assaultive youth and keep them housed under highly restrictive conditions on a long-term basis. Thus, agencies should take special care in designing and operating their behavior management units so as to support rather than undermine an effective behavior management plan for the facility. Comprehensive implementation of the three tiers of the behavior management system should lead to a significant reduction in aggressive incidents that require immediate staff involvement. But in rare instances, crises arise that require staff to take immediate control of a situation to avoid a significant risk of harm to youth or staff. Proper use of crisis management techniques should support the therapeutic culture of the confinement facility and the overall behavior management system by defusing dangerous situations and protecting youth safety. Amanda Yurick has found that verbal techniques are important tools for use in the early stages of violent episodes. Counter-intuitively, though, verbal tools should not be used to intervene once violence has occurred, because such comments may inadvertently cause an escalation in aggressive behavior. The timing of the use of these techniques is important and should be clearly defined for staff during training sessions. Yurick emphasizes that staff must continue to maintain positive interactions even as they intervene in a confrontation between youth. Often, well-intentioned staff may respond to misbehavior with phrases such as “calm down” or “be patient” or by using gentle reminders for youth to use breathing techniques they were taught in anger management. However, when youth are showing signs of aggression, these verbal commands tend to heighten the aggression. The better strategy is for staff to reflect the emotions of what the youth is communicating by first validating the youths’ emotions with phrases such as, “yeah, you’re right, that is terrible,” and then investigating the source of the incident with phrases such as, “tell me what he did.” Responses need to be authentic and not contrived, which requires extensive training. Throughout any incident, staff need to remain in control of their emotions, and must see their objectives as to neutralize risks and redirect youth behavior. Any resort to punitive responses will undermine the positive relationships they have worked so hard to build up. A staff member’s calm yet firm approach can still be perceived as positive on the part of youth and will help teach them how to manage their own behavior. The Use of Force Continuum “Use of force” is a catch-all phrase that encompasses the use of hands-on physical force against a youth, the use of mechanical restraints (ranging from handcuffs and shackles to fixed restraints and restraint chairs), and the use of chemical weapons (such as pepper spray). Although not all uses of force are inappropriate, the concern is with incidents in which force is excessive or used unnecessarily. Use of force and restraints should never be seen as disciplinary measures in and of themselves; their purpose is not to punish a misbehaving youth but rather to get a situation under control to prevent further harm. Every agency should have clear policies and procedures that dictate how to manage crises safely and appropriately. Punitive use of these control measures should be clearly prohibited. Improperly used for punitive purposes, crisis management techniques such as use of force and restraints can promote a culture of fear and violence that is directly opposed to the therapeutic environment that research shows works best to control youth behavior. In large part, this is because aversive control procedures have a highly detrimental impact on the quality of positive staff–youth relationships. In addition, such punitive approaches can make youth more aggressive, can traumatize them, and can cause injuries to both youth and staff. Research has shown that the use of force and restraints is most prevalent in facilities that suffer from adverse conditions such as understaffing and overcrowding, as well as high levels of suicidal behaviors, assaultive behaviors, and injuries among both staff and youth. Tension and fear appear to run high among youth and staff in these facilities. The correlation between use of force and adverse conditions suggests that use of punitive measures cannot overcome the need for administrators to address fundamental operational problems within a facility. Indeed, the more substantial the operational challenges, the more damaging is the behavior of youth. There is a vicious cycle that serves to reinforce a punitive—and ultimately ineffective and unsafe—culture within the juvenile facility. By paying attention to physical conditions and staffing practices, the agency can likely reduce its need for reliance on punitive control measures. Well run facilities that have appropriate levels of highly trained staff, that assess the needs of youth and provide the necessary interventions and treatment programs for them, and that emphasize supportive and positive relationships between staff and youth, have reduced needs for hands-on force, use of restraints, and placement of youth in isolation settings. Each agency should have clear, written policies establishing the circumstances under which force may be used with a youth and the procedures to be followed when force is used. These policies should indicate the kinds of force that are allowable or prohibited, specify the type of misbehavior that might justify each level of force, establish time limits on the use of force, and clarify other limitations. The policies should create a continuum that sets forth a hierarchy of interventions from least to most intrusive for responding to youth who are misbehaving, and require the use of the least restrictive measure necessary to control behavior. The policies should address matters such as the need for involvement of medical or mental health staff, the need for ongoing monitoring of youth in restraints, the documentation of any use of force or restraint incident, the administrative approval process prior to application of force or restraints, and the debriefing of the youth and staff following any incident involving force or restraint. Staff must be intensively trained on these policies, because the tense situations that sometimes arise in youth custodial settings can escalate quickly into hands-on confrontations, which can lead to injuries for youth and staff and liability for the agency. Staff should be trained to recognize individual triggers that can lead to negative behaviors, as well as the strategies they can employ to head off behavioral crises—measures such as physical and verbal de-escalation techniques, moving the youth to a less stressful setting, the involvement of staff with mental health expertise, and the involvement of the youth’s family members. Specially trained crisis intervention teams can be brought in to work with youth who present particular challenges, such as those with mental health issues. Hands-on Force: When and How Much? Some experts believe that a force continuum requires staff to work their way through each option before moving on to a higher level of force, others contend that the continuum simply provides a range of allowable options from which staff must determine what is a proportionate response to a given form of misbehavior. Steve Martin, believes that the best approach is for the policies to establish the relationship between the threat offered by a youth and the level of response to that threat. The goal is to avoid all unnecessary or excessive use of force, because such force violates constitutional mandates. Proportionality is the key concept: for example, staff should never seek to “take down” a youth by physical force unless that youth is actively violent (and not necessarily even then). Physical force should be exceptionally rare in youth settings, employed only when there is an imminent and immediate threat of bodily injury to a person, including to the youth. All use of force policies should clarify that, regardless of the level of force applied, no use of force may last any longer than the time needed to control the immediate threat of aggression. Situations in which there is not active violence, but a youth simply refuses to comply with an order or is passively resisting do not constitute an immediate necessity of force; policy should clarify this. As previously mentioned, staff must be trained to respond to these situations through tactical measures that emphasize de-escalation of the situation to neutralize any potential threat. The continuum of force must offer options for staff—including separation of the youth from peers, verbal de-escalation, or the involvement of mental health staff—that do not involve hands-on measures or use of mechanical or chemical restraints. Staff should use the least intrusive strategy possible to alter the dangerous behavior. Use of physical force or mechanical or chemical restraints should never be used as a form of “pain compliance” to get youth to follow the rules. Steve Martin notes that the situations that lead to use of force are generally predictable in confinement settings. The facility’s policies should spell out each of these situations—including extreme situations such as group disturbances and violent behavior—and provide clear guidance to staff as to how to handle these scenarios, emphasizing proportionate responses and an assessment of the enforcement necessity of a force response. Clear policies that reduce opportunities for confrontation between staff and youth result in fewer injuries to both groups. Martin believes that the level of control to be exercised in a given situation should be “driven by two directly observable factors: 1) what harm immediately ensues if the staff member elects to delay force; and, 2) if the staff member elects to delay, is there time and distance reasonably available to delay force without causing harm?” These two factors help assess the necessity of the force response and drive home the point that not every threat is of such immediacy that it justifies a force response. Martin also stresses the importance of having clear policies that dictate how to manage use of force incidents. When use of force is imminent and a team of staff is involved, he recommends that one individual be designated as a detached manager who stays in command of the incident as an observer. This person can provide an overview of what’s happening, direct the involved staff members to reduce pressure on or avoid twisting a part of a youth’s body, and tell the staff when to end the incident because the threat is neutralized. This technique reduces the risk of asphyxia and bodily injuries, and allows incidents to get under control quickly. Preventing unnecessary use of force is also critical. The emotional instability of many youth can lead to unpredictable reactions and failure to comply with staff orders. In the absence of clear policies and staff who are well trained to handle these situations, confrontations develop quickly and often lead to unnecessary and excessive use of force. Martin describes situations in which a youth starts acting out in front of his peers and the staff encircle the youth like a caged animal, ordering him to change his behavior. The youth feels physically challenged, and cannot back down without losing face in front of peers. Verbal commands are ineffective in this situation, and the confrontation quickly escalates. If the area is secure and the youth is not engaged in active aggression, Martin believes the better approach is for staff to keep a physical and reasonable distance from the youth—enough space so that the youth does not perceive a potential physical encounter—and take the time to talk the youth down. This can take anywhere from 15 minutes to an hour or more. But over time, the youth gets worn out and is eventually likely to calm down without losing face. The situation can resolve peacefully without need for force and without risking injuries to either party. Staff in the Ohio juvenile corrections system were trained in these techniques and decreased the incidence of use of force substantially, along with the rate of injuries to staff and youth. Finally, it is important that there be staff with specialized training to deal with youth with mental illness, who are disproportionately likely to be involved in incidents leading to use of force. These youth often have unpredictable reactions and can act out without warning. Training in crisis intervention strategies is invaluable to deal with this population. (See Ch. 11: Mental Health) Use of Mechanical Restraints Though the use of mechanical and chemical restraints is a form of force, these techniques present special physical and psychological risks to youth and should therefore be considered separately from physical force. Mechanical restraints such as restraint chairs or shackles can lead to injuries, asphyxiation, and cardiac arrest, and can traumatize (or re-traumatize) a youth, especially those with histories of abuse. The physical risks are exacerbated when youth have pre-existing medical or mental health conditions, some of which may be unknown to the staff. A journalistic investigation of the use of fixed restraints in institutions found that 44 deaths had occurred among youth held in fixed restraints in a 10-year period. In very rare circumstances, some form of mechanical restraint may be necessary to prevent imminent injury, but should not be used any longer than necessary for staff to gain physical control of an emergency situation and neutralize the threat of harm. Youth should be released from the restraints at the first indication that it is safe to remove them. To minimize the risk of injury or trauma, best practices call for no fixed restraints to be used on youth, either those restraints affixed to a wall or piece of furniture, or 4- or 5-point restraints, such as restraint chairs, that hold each of a youth’s limbs. The JDAI standards define fixed restraints as the “attaching of a child’s hands, feet, or other body parts to a fixed object such as a bed, chair or bolt in the floor or wall,” and prohibit the use of such restraints. Other practices, such as hog-tying a youth’s hands and feet, are also considered highly dangerous and are disallowed under JDAI standards. Legal cases have been sharply critical of the use of fixed restraints on youth, and have either outlawed their use as unconstitutional or have tightly limited the circumstances in which fixed restraints could be used to instances approved by a psychiatrist. Most professional standards also disavow the practice of using fixed restraints on youth, and only the American Correctional Association allows their use under limited circumstances requiring the approval of the facility superintendent. The use of fixed restraints appears to be relatively rare in juvenile custodial settings; a 1994 study found that fewer than 5% of surveyed facilities engaged in the practice. This fact undermines any claim that a facility needs to have this option available as a therapeutic measure to deal with youth who are out of control or banging their heads. Indications are that restraints are more often used for administrative convenience or as punishment rather than as a response to true emergencies. Steve Martin’s prescriptions detailed above for reducing the use of excessive or unnecessary force can be applied equally well when it comes to avoiding the application of restraints: if any form of mechanical restraint is to be used, it should be used only as a proportionate response to the imminent threat presented by the youth and only for the time it takes to neutralize the situation. JDAI standards limit use of restraints to handcuffs, used only as needed in the transportation process or during true emergency situations at the facility. Use of Chemical Restraints As with the use of fixed restraints, the use of chemical restraints such as pepper spray or oleoresin capsicum (OC) spray on youth has been widely condemned by juvenile justice experts. Use of pepper spray puts the health of youth at risk: chemical agents generate adverse physical reactions that can be exacerbated in secure settings with poor ventilation, causing potential harm to youth and staff, even if they are not direct targets of its use. Children with asthma and other health problems are at particular risk, as are those who are taking psychotropic medications. Studies conducted on the adult population further indicate that the use of pepper spray on those with mental illness may lead to an increase in violent behavior and a worsening of the mental health condition. Moreover, the use of chemical restraints, like mechanical restraints, can traumatize youth and undermine their rehabilitative efforts. Most state-run juvenile correctional facilities have moved away from the use of chemical restraints on youth. A study by the Council of Juvenile Correctional Administrators conducted in 2011 found that just 15 states allow the use of pepper spray in juvenile corrections facilities, and of those, only 6 states permit staff to carry pepper spray in the facilities. Many experts have noted that the greater the ease of access to pepper spray, the more likely the staff are to employ it on youth who are misbehaving, without attempting other methods of quelling the negative behaviors. Not only are chemical weapons potentially dangerous and subject to overuse, but they have also been shown to be ineffective at controlling youth violence. Thus, their use undermines the long-term safety of a facility. The fact that the majority of state juvenile corrections agencies maintain safe facilities without using pepper spray is a powerful indicator that chemical weaponry is not an essential tool in the behavior management kit for juvenile confinement staff. A significant concern with regard to the use of pepper spray is that it is often used routinely and unnecessarily, for example, when youth are passively resisting or as a form of pain compliance. It also often substitutes for a hands-on use of force, typically by staff that believes that pepper spray presents fewer risks than engaging in hands-on use of force. Steve Martin condemns this approach, again calling for proportionality in response to the threat involved. He contends that if pepper spray is to be used at all, it should be limited to circumstances involving dangerous group disturbances to temporarily distract youth while a tactical team is dispatched, and should be used only in housing units holding youth who have recently engaged in assaultive behavior. He believes that chemical weaponry should never be kept on person; rather, it should be available only in a locked central location, to be retrieved only during a serious incident with the approval of the facility administrator. It is especially important for staff to recognize that they should not use chemical restraints on youth with serious mental illness who may not be capable of conforming their conduct to staff directives. Since these youth may be unable to understand or follow orders, it is hard to see the use of restraints as anything other than a punitive measure. For these youth, the use of a chemical agent is inappropriate unless it is essential to neutralize an immediate and active threat of bodily harm to staff or other youth and no other alternatives are reasonably available. Numerous lawsuits have held agencies liable for the overuse of pepper spray or injuries to youth through its use. Between the liability, the injuries, and the realization that the facilities’ safety records had not improved through the use of chemical weapons, many jurisdictions have opted to discontinue the use of chemical restraints entirely. Transfer of Youth to Adult Facilities as a Counterproductive Strategy As agency officials seek to reduce the incidence of violence in institutions, they sometimes turn to a strategy of removing troublesome youth from the juvenile setting by transferring them to adult prisons or jails, either through criminal prosecution or, depending on state law, motions to transfer youth that are serving blended sentences. As with punitive sanctions, this approach is also counterproductive and should be strongly discouraged. Transferring youth to adult facilities is not considered an appropriate behavior management tool. Adult criminal prosecution of youth and placement of youth in adult settings are both practices that are potentially detrimental to youth. Various studies have found that such transfers to the adult criminal justice system can end up compromising public safety. Recidivism rates are high among those transferred to adult prisons, in large part because the youth learn from—and are often assaulted by—adult offenders and are socialized into a criminal culture. A report from OJJDP asserted that adult prisons and jails “may socialize delinquent youth into true career criminals.” Finally, such transfers are unlikely to solve the underlying reasons that violence arose in the juvenile facility in the first place. Some of the most compelling evidence against placing youth in adult prisons comes from the 2007 report of a Task Force on violence prevention appointed by the Centers for Disease Control and Prevention (CDC), which included a comprehensive review of all prior studies on this subject. This CDC Task Force investigated the effects of transferring youthful offenders to the adult criminal justice system and found that the policy was counterproductive, resulting in a 34% increase in recidivism. One study cited by the CDC found that youth who serve at least one year in adult prison have a 100% greater risk of violent recidivism than those who stay in the juvenile system. The CDC reached a stark conclusion that it presented to policymakers around the country: “To the extent that transfer policies are implemented to reduce violent or other criminal behavior, available evidence indicates that they do more harm than good.” Indeed, the CDC found that “transfer of juveniles to the adult criminal system generally results in increased rather than decreased subsequent violence, compared with violence among juveniles retained in the juvenile system.” One reason behind this increased propensity for future violence is the risk that arises when housing youth among adults. First, youth in adult facilities are five times more likely than their counterparts in juvenile facilities to become victims of sexual abuse and rape. This is in part due to their vulnerability and smaller physical stature. Furthermore, they are twice as likely to be physically attacked with a weapon by a fellow inmate. Finally, youth housed in adult facilities experience higher rates of mental illness and are 36 times more likely to commit suicide than youth in juvenile facilities. Many youth in adult prisons and jails are held in isolation to protect them from the physical risks of being housed with adult offenders. Although staff may be well intentioned in separating youth from adults, such extreme isolation exacerbates the likelihood of a youth’s mental deterioration and lack of access to services, programs, education, and even to recreational opportunities. Many youth are confined in 23-hour lock-up for months or years on end, sometimes with no access to outdoor recreational yards. Consequently, they lack access to peers and to social contact during their most formative years. In addition to concerns about their safety and mental health, youth in adult prisons are deprived of crucial educational and rehabilitative programming. Educational opportunities and rehabilitative programming are the cornerstones of the juvenile custodial regime, unlike in adult jails and prisons. In a 2012 Texas study, researchers found that many youth confined in adult jails receive no educational services at all, or only very limited programming. Similar findings come from studies of adult prisons and jails in other states as well. Ultimately, the compromised safety and lack of access to meaningful programming for youth in the adult prison system produce citizens who are more violent and more likely to reoffend. Numerous studies have found that most youth who get transferred to adult prison receive relatively short sentences. These short sentences mean that these transferred youth are getting out of prison while still young, and they are coming back to their home communities with little to no education, skills training, or treatment. Thus, there are serious public safety concerns about the approach of using prosecution or transfer to solve behavior management problems in juvenile custodial settings. Another reason that removal of youth from juvenile facilities tends to backfire as a behavior management tool is that transfer does not solve an agency’s underlying problem with controlling youth misconduct. Removal of a few disruptive youth may simply open up new opportunities for other youth to take their places when it comes to asserting power over others or creating disturbances. The key to behavior management is not getting rid of the symptom through transfer of youth, but in understanding and addressing the root causes of the misconduct. In many cases, patterns of serious incidents represent the agency’s failure to fully implement all tiers and elements of the behavior management system, as described in this chapter. Except when the most extreme circumstances present significant and ongoing dangers to other youth or staff, youth should be kept in juvenile settings, regardless of the seriousness of their misconduct. With an appropriate behavior management system in place as described in this chapter, staff in juvenile facilities are far better equipped than those in adult correctional facilities to address the needs of misbehaving youth and to redirect their behavior in a positive way. In those rare circumstances when criminal prosecution of a youth is necessary, all efforts should be made to keep that youth in the juvenile facility prior to trial, since conditions for youth in adult jails are so antithetical to their needs and since the youth can continue to benefit from the services and programs available in the juvenile facility during the pre-trial period. Even after conviction in adult criminal court, in some instances, the youth may continue to be held safely in the juvenile facility. A 2013 study found that there was no increase in risk or harm caused by confining youth tried as adults alongside those prosecuted in juvenile court in juvenile confinement facilities. Management of Youth in Adult Facilities In those jurisdictions where youth prosecuted as adults are required to be held in adult jails or prisons, staff in the adult facilities must take special precautions to protect these youth. The PREA Standards require that youthful offenders be confined separately from adults and that there be sight and sound separation of the two populations. This separation must be achieved without placing the youth in isolation and without denying programming. This can be especially challenging for staff in a jail that holds only the occasional youth and that is ill equipped to make special arrangements for a single individual due to architectural or staffing constraints. Nevertheless, such arrangements should be a high priority due to liability concerns should the youth be injured or denied educational programming to which he or she is legally entitled. Administrators at adult jails that hold very few youth at a time may wish to explore the potential for informal arrangements with local juvenile detention facilities to confine these youth while they await trial. Such arrangements would allow the youth to mix with peers, receive out-of-cell time, and receive educational and other therapeutic programming offered in the juvenile detention facility. This is a safe and sensible alternative to holding the youth in isolation in the jail, and relieves the jail of a significant operational and fiscal burden. The need for such arrangements is especially critical for pre-adolescent youth. For those adult correctional facilities—both jails and prisons—with larger numbers of youth, staff should designate certain housing units as juvenile wings, and should develop procedures that keep the youth separate from adult inmates throughout the day. If some incidental contact between the populations is inevitable, then there should be direct staff supervision at all times. There should be staff specially trained to work with youth, and there should be consistency in staff assignments to work in this unit in order for the staff to develop effective and positive relationships with the youth. Staff should also develop special educational and therapeutic programming opportunities for the youth. For example, the Texas prison system places youthful offenders in the COURAGE program, which uses group work and role-playing to help youth develop more insights into their criminal behavior. Some jails have worked out special arrangements with the local school district to provide teachers to work with youth in the jail, especially for those youth requiring special education services. Staff should implement all the behavior management strategies and principles described in this chapter as they work with youth in the adult correctional setting. Finally, adult correctional agencies need to have a plan for safely integrating youth into the adult population when they reach the maximum age for the youthful offender program. These youth will need particular support as they navigate the confusing and dangerous dynamics among prisoners in the adult side of the facility. This is especially true because prison culture is so antithetical to the culture of a well-run juvenile unit, so youth are typically ill prepared to make that transition. Providing the youth additional support in the early months of placement in the adult side of the facility is both appropriate and humane. Juvenile justice agencies around the country have demonstrated repeatedly that it is entirely possible for an agency to reduce institutional violence and misbehavior. It is important to understand, however, that misbehavior is a chronic problem that needs to be managed on an ongoing basis; it is not something to be fixed with a one-time change in policy or practice or by tightening control measures. Effective behavior management is a comprehensive effort that includes operational changes to facilities and programs, as well as changes in the interactions between youth and staff, the implementation of meaningful rewards and consequences for youth conduct, and the opportunity for youth to receive intensive therapeutic interventions. This chapter has provided a detailed look at the three levels of an effective behavior management plan that should be implemented by every juvenile justice facility: the primary (prevention) tier; the secondary (intervention) tier; and the tertiary (discipline) tier. Within each tier, there are numerous elements that serve to elicit and reinforce positive behavior. These are not individual strategies to be selected from a menu of options; rather, they must be implemented comprehensively to be as effective as possible in preventing and managing youth misbehavior in secure settings. At the core of this plan—and fundamental to the rehabilitation of the children—are supportive and respectful relationships between staff and youth. Research shows that these positive behavioral strategies work effectively to create safe environments that help youth learn to control their emotions and actions. Yet far too often, behavior management in juvenile facilities is equated with control measures such as use of force, restraints, and seclusion. Many facilities persist in using punitive strategies that may seem intuitive as responses to misbehavior but are actually counterproductive when it comes to reducing violence and other negative conduct. Corrections-based responses to misbehavior such as the use of seclusion, force, mechanical restraints, chemical restraints, verbal abuse, physical abuse, and other control measures are not evidence based; they actually increase misbehavior on the part of youth subjected to these measures and contribute to a culture of fear and mistrust. This culture is antithetical to the therapeutic goals of the juvenile justice system. A true therapeutic culture will provide youth with the tools they need to become productive citizens and will provide staff with the skills they need to support youth in that goal. At the same time, a therapeutic culture creates a safer and healthier custodial environment for youth and staff alike. American Academy of Child & Adolescent Psychiatry. 2012. “Policy Statement: Solitary Confinement of Juvenile Offenders.” https://www.aacap.org//AACAP/Policy_Statements/2012/Solitary_Confinement_of_Juvenile_Offenders.aspx. American Bar Association. 2001. Youth in the Adult Criminal Justice System: Guidelines for Policymakers and Practitioners. Washington, DC: Author, Criminal Justice Section. American Correctional Association. 1990. Standards for Juvenile Detention Facilities. 3rd ed. Laurel, MD: Author. American Correctional Association. 1991. Standards for Juvenile Training Schools. 3rd ed. Laurel, MD: Author. American Correctional Association. 1991. Standards for Small Juvenile Detention Facilities. Laurel, MD: Author. Annie E. Casey Foundation. 2014. Juvenile Detention Facility Assessment: 2014 Update. Baltimore, MD: Author. https://www.aecf.org/m/resourcedoc/aecf-juveniledetentionfacilityassessment-2014.pdf. Annie E. Casey Foundation. 2006. Detention Facility Self-Assessment: A Practice Guide to Juvenile Detention Reform. Baltimore, MD: Author. https://www.aecf.org/resources/juvenile-detention-facility-assessment. Austin, James, and Kenneth McGinnis. 2004. Classification of High-Risk and Special Management Prisoners: A National Assessment of Current Practices. Washington, DC: National Institute of Corrections. Bandura, Albert. 1971. Social Learning Theory. New York: General Learning Press. Bandura, Albert. 1986. Social Foundations of Thought and Action. Englewood Cliffs, NJ: Prentice-Hall. Barton, William H., and Jeffrey A. Butts. 2008. Building on Strength: Positive Youth Development in Juvenile Justice Programs. Chicago, IL: Chapin Hall Center for Children at the University of Chicago. Bazemore, Gordon, and Mark Umbreit. 2001. A Comparison of Four Restorative Conferencing Models. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. Bechtold, Jordan, and Elizabeth Cauffman. 2013. “Tried as an Adult, Housed as a Juvenile: A Tale of Youth from Two Courts.” Law and Human Behavior 38, no. 2: 126–138. Bishop, Donna. 2000. “Juvenile Offenders in the Adult Criminal Justice System.” Crime and Justice 27: 81–167. Boesky, Lisa Melanie. 2001. “Mental Health Training in Juvenile Justice: A Necessity.” Corrections Today 63, no. 4: 98–101. Burrell, Sue. 2009. Moving Away from Hardware: The JDAI Policy on Fixed Restraint. Baltimore, MD: Juvenile Detention Alternatives Initiative, Annie E. Casey Foundation. Burrell, Sue. 2013. Trauma and the Environment of Care in Juvenile Institutions. Los Angeles, CA and Durham, DC: National Center for Child Traumatic Stress. Campaign for Youth Justice and Partnership for Safety and Justice. 2011. Misguided Measures: The Outcomes and Impacts of Measure 11 on Oregon’s Youth. Washington, DC: Campaign for Youth Justice. Campaign for Youth Justice. 2007. Jailing Juveniles: The Dangers of Incarcerating Juveniles in Adult Jails in America. Washington, DC: Author. Cellini, Henry. 1994. “Management and Treatment of Institutionalized Violent Juveniles,” Corrections Today 56, no. 4: 98, 100–102. Center for Children’s Law and Policy. 2012. Factsheet: Chemical Agents in Juvenile Facilities. Washington, DC: Author. Centers for Disease Control and Prevention. 2007. “Effects on Violence of Laws and Policies Facilitating the Transfer of Youth from the Juvenile to the Adult Justice System: A Report on Recommendations of the Task Force on Community Preventive Services.” Morbidity and Mortality Weekly Report 56, no. RR-9. https://www.cdc.gov/mmwr/PDF/rr/rr5609.pdf. Cesaroni, Carla, and Michele Peterson-Badali. 2013. “The Importance of Institutional Culture to the Adjustment of Incarcerated Youth and Young Adults.” Canadian Journal of Criminology and Criminal Justice 55, no. 4: 563–575. Children’s Law Center, Inc. 2012. Falling Through the Cracks: A New Look at Ohio Youth in the Adult Criminal Justice System. Covington, KY: Author. Colorado Juvenile Defender Coalition. n.d. Caging Children in Crisis. Denver, CO: Author. Consent Order, United States of America v. The State of Ohio et al., (No. 2: 08-cv-00475-ALM-MRA, December 19, 2012), available as document no. 107–1: 1. Council of Juvenile Correctional Administrators. 2011. Issue Brief: Pepper Spray in Juvenile Facilities. https://www.scstatehouse.gov/CommitteeInfo/HouseLegislativeOversightCommittee/AgencyWebpages/DJJ/Pepper%20Spray%20in%20Juvenile%20Facilities.pdf. Cox, Alexandra. 2013. Juvenile Facility Staff Responses to Organizational Change. Author. Cunningham, James. 2003. “A ‘Cool Pose’: Cultural Perspectives on Conflict Management.” Reclaiming Children and Youth: Journal of Strength-based Interventions 12, no. 2: 88–92. Day, Andrew, and Patrick Doyle. 2010. “Violent Offender Rehabilitation and the Therapeutic Community Model of Treatment: Towards Integrated Service Provision?” Aggression and Violent Behavior 15, no. 5: 380–386. Deitch, Michele, Amanda Barstow, Leslie Lukens, and Ryan Reyna. 2009. From Time Out to Hard Time: Young Children in the Adult Criminal Justice System. Austin, TX: University of Texas at Austin, LBJ School of Public Affairs. Deitch, Michele, Amy Madore, Kate Vickery, and Alycia Welch. 2013. Understanding and Addressing Youth Violence in the Texas Juvenile Justice Department: Report to the Office of the Independent Ombudsman. Austin, TX: University of Texas at Austin, LBJ School of Public Affairs. Deitch, Michele, and Neelum Arya. 2014. “Waivers and Transfers of Juveniles to Adult Court: Treating Juveniles Like Adult Criminals.” In Juvenile Justice Sourcebook, edited by Wesley Church and David Springer 241–263. New York: Oxford University Press. Deitch, Michele, Anna Lipton Galbraith, and Jordan Pollock. 2012. Conditions for Certified Juveniles in Texas County Jails. Austin, TX: University of Texas at Austin, LBJ School of Public Affairs. Deitch, Michele. 2011. Juveniles in the Adult Criminal Justice System in Texas. Austin, TX: University of Texas at Austin, LBJ School of Public Affairs. DeMuro, Paul. 2014. Toward Abolishing the Use of Disciplinary Isolation in Juvenile Justice Institutions: Some Initial Ideas. Author. Drake, Elizabeth. 2007. Evidence-Based Juvenile Offender Programs: Program Description, Quality Assurance, and Cost. Olympia, WA: Washington State Institute for Public Policy. Evans, Douglas. 2012. Pioneers of Juvenile Justice Reform: Achieving System Change Using Resolution, Reinvestment, and Realignment Strategies. New York: Research and Evaluation Center, John Jay College of Criminal Justice, City University of New York. Fagan, Jeffrey. 1996. “The Comparative Impacts of Juvenile and Criminal Court Sanctions on Adolescent Felony Offenders.” Law and Policy 18: 77–119. Flicker, Barbara Danziger, Institute of Judicial Administration and American Bar Association. 1982. Standards for Juvenile Justice: A Summary and Analysis, 2nd ed. Cambridge, MA: Ballinger. Grassian, Stuart. 2006. “Psychiatric Effects of Solitary Confinement.” Washington University Journal of Law & Policy 22: 325–383. Griffis, Nelson. 1972. Designing a Token Economy for the Detention Setting. Jackson, MI: Michigan Juvenile Detention Association. Haney, Craig. 2003. “Mental Health Issues in Long-Term Solitary and ‘Supermax’ Confinement.” Crime and Delinquency 49, no. 1: 124–156. Hardyman, Patricia, James Austin, Jack Alexander, Kelly Dedel Johnson, and Owan C. Culloch. 2002. Internal Classification Systems: Case Studies in their Development and Implementation. Washington, DC: National Institute of Corrections. Hawken, Angela, and Mark Kleiman. 2009. Managing Drug Involved Probationers with Swift and Certain Sanctions: Evaluating Hawaii’s HOPE. Research report submitted to U.S. Department of Justice. https://www.ncjrs.gov/pdffiles1/nij/grants/229023.pdf. Hayes, Lindsay. 2009. Characteristics of Juvenile Suicide in Confinement Facilities. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. Howell, James. 1998. Youth Gangs: An Overview. Juvenile Justice Bulletin. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. Hubner, John. 2008. Last Chance in Texas: The Redemption of Criminal Youth. New York: Random House. Human Rights Watch and American Civil Liberties Union. 2012. Growing Up Locked Down: Youth in Solitary Confinement in Jails and Prisons Across the United States. New York: Author. www.hrw.org/sites/default/files/reports/us1012ForUpload.pdf. Johnson, Leah E., Eugene W. Wang, Nicole Gilinsky, Zhaomin He, Clint Carpenter, C. Michael Nelson, and Brenda K. Scheuermann. 2013. “Youth Outcomes Following Implementation of Universal SW-PBIS in a Secure Texas Juvenile Facility.” Education & Treatment of Children 36, no. 3: 135–145. Just Children. 2009. Don’t Throw Away the Key: Reevaluating Adult Time for Youth Crime in Virginia. Charlottesville, VA: Author. https://dontthrowawaythekey.files.wordpress.com/2009/11/final-dont-throw-away-the-key.pdf. Justice Policy Institute. 2006. Models for Change: Building Momentum for Juvenile Justice Reform. Washington, DC: Author. Juvenile Court Judge’s Commission, Pennsylvania Council of Chief Juvenile Probation Officers, and the Pennsylvania Commission on Crime and Delinquency. 2012. Pennsylvania’s Juvenile Justice System Enhancement Strategy: Achieving Our Balanced and Restorative Justice Mission Through Evidence-Based Policy and Practice. https://www.modelsforchange.net/publications/342. Juvenile Law Center. 2014. “Juvenile Law Center Negotiates Final Settlement of Civil Rights Lawsuit Challenging Solitary Confinement of 2 Boys in Custody of NJ Juvenile Justice Commission.” https://jlc.org/news/juvenile-law-center-negotiates-final-settlement-civ.... Klykken, Are Haram. 2012. Prison Studies of Solitary Confinement: A Bibliography of Research on Psychological Effects of Social Isolation, Pre-Trial Isolation and Supermax Conditions, University of Tromso: Author. https://www.solitaryconfinement.org/_files/ugd/f33fff_c2cc8b29d6854525aeae7c3b4ca50c97.pdf. Lanza-Kaduce, Lonn, Jodi Lane, Donna M. Bishop, and Charles E. Frazier. 2005. “Juvenile Offenders and Adult Felony Recidivism: The Impact of Transfer.” Journal of Crime and Justice 28, no. 1: 59–77. Latessa, Edward J., and Christopher T. Lowenkamp. 2005. “What Are Criminogenic Needs and Why Are They Important.” For the Record 4th Quarter 2005: 15–16. Lewin, Kurt. 1946. “Behavior and Development as a Function of the Total Situation.” In Manual of Child Psychology, edited by Leonard Carmichael. Hoboken, NJ: John Wiley & Sons: 791–844. Liebling, Alison. 2011. “Moral Performance, Inhuman and Degrading Treatment and Prison Pain.” Punishment and Society 13, no. 5: 530–550. Lipsey, Mark W., James C. Howell, Marion R. Kelly, Gabrielle Chapman, and Darin Carver. 2010. Improving the Effectiveness of Juvenile Justice Programs: A New Perspective on Evidence-based Practice. Washington, DC: Center for Juvenile Justice Reform. Georgetown University. http://njjn.org/uploads/digital-library/CJJR_Lipsey_Improving-Effectiven.... Listenbee, Robert L., Administrator, U.S. Department of Justice. Letter to Jesselyn McCurdy, Senior Legislative Counsel, American Civil Liberties Union 1, July 5, 2013. https://www.aclu.org/sites/default/files/assets/doj_ojjdp_response_on_jj_solitary.pdf. Marshall, William, and David Burton. 2010. “The Importance of Group Processes in Offender Treatment.” Aggression and Violent Behavior 15: 141–149. Martin, Steve. 2013. “Staff Use of Force in a Confinement Setting: When Is It Really Necessary?” Correctional Law Reporter XXV, no. 1. Martin, Steve. 2014. “Staff Use of Force in a Confinement Setting: How Much is Enough, When is it Too Much.” Correctional Law Reporter XXV. McGowan, Angela, Robert Hahn, Akiva Liverman, Alex Crosby, Mindy Fullilove, Robert Johnson et al. 2007. “Effects on Violence of Laws and Policies Facilitating the Transfer of Youth from the Juvenile to the Adult Justice System: A Systematic Review.” American Journal of Preventive Medicine 32, no. 4S: S7–S28. Mendel, Richard. 2010. The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders. The Annie E. Casey Foundation. https://www.aecf.org/resources/the-missouri-model. Mendel, Richard A. 2011. No Place for Kids: The Case for Reducing Juvenile Incarceration. Baltimore, MD: Annie E. Casey Foundation. https://www.aecf.org/resources/no-place-for-kids-full-report. Models for Change, Pennsylvania, Mental Health Association in Pennsylvania, and Pennsylvania Council of Chief Juvenile Probation Officers. 2009.Family Involvement in Pennsylvania’s Juvenile Justice System. Harrisburg, PA: Mental Health Association in Pennsylvania. National Center for Youth in Custody. 2012. “Strategies for Effective Facility-Based Behavior Management,” Webinar. November 14, 2012. . National Partnership for Juvenile Services (formerly NJDA). 1999. “Position Statement: Minimum Direct Care Ratio in Juvenile Detention Centers.” Lexington, KY: Author. National PREA Resource Center. "Juvenile Facility Standards." Standards 115.14, "Youthful Inmates"; 115.313, "Supervision and Monitoring"; 115.341, "Obtaining information from residents"; 115.342, "Placement of residents in housing, bed, program, education, and work assignments." https://www.prearesourcecenter.org/sites/default/files/library/preafinalstandardstype-juveniles.pdf. New Amsterdam Consulting, Inc. 2007. Performance-based Standards for Youth Correction and Detention Facilities (2007 Research Report), Scottsdale, AZ: Author. Newell, Michelle, and Jorja Leap. 2013. Policy Brief: Reforming the Nation’s Largest Juvenile Justice System. Los Angeles: UCLA Luskin School of Public Affairs. Parent, Dale G., Valerie Leiter, Stephen Kennedy, Lisa Livens, Daniel Wentworth, and Sarah Wilcox. 1994. Conditions of Confinement: Juvenile Detention and Correctional Facilities (Research Report). Washington, DC: Office of Juvenile Justice and Delinquency Prevention. https://ojjdp.ojp.gov/library/publications/conditions-confinement-juvenile-detention-and-corrections-facilities-research. Parker, Michael, ed. 2007. Dynamic Security: The Democratic Therapeutic Community in Prison. London: Jessica Kingsley Publishers. Peters, Adrienne M.F., and Raymond R. Corrado. 2013. “An Examination of the Early ‘Strains’ of Imprisonment Among Young Offenders Incarcerated for Serious Crimes.” Journal of Juvenile Justice 2, no. 2, Office of Juvenile Justice and Delinquency Prevention. https://www.semanticscholar.org/paper/An-Examination-of-the-Early-%22Strains%22-of-among-for-Peters-Corrado/2df27404fd80de343e32d345e46ef7cada35793e. Redding, Richard E. 2010. “Juvenile Transfer Laws: An Effective Deterrent to Delinquency?” Juvenile Justice Bulletin. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/220595.pdf. Roush, David, and Michael Jones. 1996. “Juvenile Detention Training: A Status Report.” Federal Probation Journal 60, no. 2: 54–60. Roush, David, and Michael McMillen. 2000. “Construction, Operations, and Staff Training for Juvenile Confinement Facilities.” Juvenile Accountability Incentive Block Grants Program Bulletin. Washington, DC: Office of Juvenile Justice and Delinquency Protection. https://www.ncjrs.gov/pdffiles1/ojjdp/178928.pdf. Scheuermann, Brenda, and Judy Hall. 2012. Positive Behavioral Supports for the Classroom. New Jersey: Pearson. Schiraldi, Vincent, Marc Schindler, and Sean J. Goliday. 2011. “The End of the Reform School?” In Juvenile Justice: Advancing Research, Policy, and Practice, edited by Francine T. Sherman and Francine H. Jacobs. New Jersey: John Wiley & Sons: 409–432. https://probation.acgov.org. Schuster, Terry, Office of the Federal Court Monitor. 13 Good Ideas from Other Jurisdictions That May Help Improve Outcomes on the PROGRESS Units, 2012. (Unpublished report on file with author.) Sedlak, Andrea, and Karla McPherson. 2010. Conditions of Confinement: Findings from the Survey of Youth in Residential Placement. Juvenile Justice Bulletin. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/227729.pdf. Sedlak, Andrea, and Karla McPherson. 2010. Youth’s Needs and Services: Findings from the Survey of Youth in Residential Placement. Washington, DC: Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/227728.pdf. Skowyra, Kathleen, and Joseph Cocozza. 2007. A Blueprint for Change: Improving the System Response to Youth with Mental Health Needs Involved with the Juvenile Justice System. NationalCenter for Mental Health and Juvenile Justice. Specter, Don. 2006. “Making Prisons Safe: Strategies for Controlling Violence.” Washington University Journal of Law & Policy 22: 125–134. Steward, Mark, and Pili Robinson. 2012. “Juvenile Justice System Solutions for Texas: Things to Consider.” Conference Presentation.” 8th Annual Strengthening Youth and Families Conference: Engaging Families, Connecting Communities, Achieving Successful Outcomes from TJJD. Austin, TX: Author. T.D. and O.S. v. Mickens et al., 1:10-cv-02902-JEI –AMD, U.S.D.C. (New Jersey), 2013. Thornberry, Terence P. 1998. “Membership in Youth Gangs and Involvement in Serious and Violent Offending.” In Serious and Violent Juvenile Offenders: Risk Factors and Successful Interventions, edited by Rolf Loeber and David P. Farrington. Thousand Oaks, CA: Sage: 147–166. Washington Coalition for the Just Treatment of Youth. 2009. A Reexamination of Youth Involvement in the Adult Criminal Justice System in Washington: Implications of New Findings about Juvenile Recidivism and Adolescent Brain Development. Seattle, WA: Author. Weiss, Eric M. 1998. “Deadly Restraint: A Hartford Courant Investigative Report.” Hartford Courant, October 11–14. Zeidenberg, Jason. 2011. You’re an Adult Now: Youth in Adult Criminal Justice Systems. Washington, DC: National Institute of Corrections. https://nicic.gov/youre-adult-now-youth-adult-criminal-justice-systems. This chapter is adapted from a report titled, Understanding and Addressing Youth Violence in the Texas Juvenile Justice Department, by Michele Deitch, Amy Madore, Kate Vickery, and Alycia Welch, published by the Lyndon B. Johnson School of Public Affairs, The University of Texas, in May 2013. Chapter V in particular summarizes best practices in behavior management of youth in custody. The author is especially grateful to Alycia Welch for her substantial contributions to the research and drafting of that chapter. Numerous juvenile justice practitioners served as expert consultants for the original report and as Field Contributors for this chapter, and their contributions in the form of telephone interviews and personal correspondence were truly invaluable. This chapter benefited from the wisdom and guidance of the following experts, all of whom have substantial experience working with youth in custody: Karen Albert, Lisa Boesky, Kelly Dedel, Bob Dugan, Nelson Griffis, Will Harrell, Steve Martin, Orlando Martinez, Sheila Mitchell, David Roush, Brenda Scheuermann, Vincent Schiraldi, Terry Schuster, Mark Steward, Debbie Unruh, Andrea Weisman, and Amanda Yurick. Mark W. Lipsey, James C. Howell, Marion R. Kelly, Gabrielle Chapman, and Darin Carver, Improving the Effectiveness of Juvenile Justice Programs: A New Perspective on Evidence-Based Practice, (Georgetown University: Center for Juvenile Justice Reform, December 2010), 23–25. Edward J. Latessa and Christopher T. Lowenkamp. “What Are Criminogenic Needs and Why Are They Important,” For the Record 4 (2005):15. Juvenile Court Judge’s Commission, Pennsylvania Council of Chief Juvenile Probation Officers, and the Pennsylvania Commission on Crime and Delinquency, Pennsylvania’s Juvenile Justice System Enhancement Strategy: Achieving Our Balanced and Restorative Justice Mission Through Evidence-Based Policy and Practice (April 2012): 24. Brenda Scheuermann and Judy Hall, Positive Behavioral Supports for the Classroom, 2nd ed. (New Jersey: Pearson, 2012), 18. Leah E. Johnson, Eugene W. Wang, Nicole Gilinsky, Zhaomin He, Clint Carpenter, C. Michael Nelson, and Brenda K. Scheuermann, “Youth Outcomes Following Implementation of Universal SW-PBIS in a Secure Texas Juvenile Facility,” Education & Treatment of Children 36, no. 3 (2013): 135–145. Scheuermann and Hall, Positive Behavioral Supports for the Classroom, 18. Ibid. 19. David Roush and Michael Jones, “Juvenile Detention Training: A Status Report,” Federal Probation Journal 60 (1996): 54. David Roush and Michael McMillen, Office of Juvenile Justice and Delinquency Prevention, “Construction, Operations, and Staff Training for Juvenile Confinement Facilities,” Juvenile Accountability Incentive Block Grants Program Bulletin (January, 2000): 20. See, e.g., Ibid.; Alexandra Cox, “Juvenile Facility Staff Responses to Organizational Change” (Author, October 2013), 21. Carla Cesaroni and Michele Peterson-Badali, “The Importance of Institutional Culture to the Adjustment of Incarcerated Youth and Young Adults,” Canadian Journal of Criminology and Criminal Justice 55, no. 4 (2013): 568, 571. Kurt Lewin, “Behavior and Development as a Function of the Total Situation,“ In Manual of Child Psychology, ed. Leonard Carmichael (Hoboken, NJ: John Wiley & Sons, 1946), 791–844.; Albert Bandura, Social Foundations of Thought and Action, (Englewood Cliffs, NJ: Prentice-Hall, 1986); Alison Liebling, “Moral Performance, Inhuman and Degrading Treatment and Prison Pain,” Punishment and Society 13, no. 5 (2011): 530–550. Andrew Day and Patrick Doyle, “Violent Offender Rehabilitation and the Therapeutic Community Model of Treatment: Towards Integrated Service Provision?,” Aggression and Violent Behavior 15 (2010): 382. National Center for Youth in Custody, “Strategies for Effective Facility-Based Behavior Management,” Webinar, November 12, 2012. Henry Cellini, “Management and Treatment of Institutionalized Violent Juveniles,” Corrections Today 56, no. 4 (1994): 98. National Center for Youth in Custody, “Strategies for Effective Facility-Based Behavior Management.” Cellini, “Management and Treatment of Institutionalized Violent Juveniles,” 98. Richard Mendel, The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders. (Baltimore, MD: Annie E. Casey Foundation, 2010), 40. James Cunningham, “A ‘Cool Pose’: Cultural Perspectives on Conflict Management,” Reclaiming Children and Youth: The Journal of Strength-based Interventions 12, no. 2 (2003): 88–92. Kathleen Skowyra and Joseph Cocozza, A Blueprint for Change: Improving the System Response to Youth with Mental Health Needs Involved with the Juvenile Justice System (National Center for Mental Health and Juvenile Justice, 2007), 1. Lisa Melanie Boesky, “Mental Health Training in Juvenile Justice: A Necessity,” Corrections Today 63, no. 4 (2001): 98–99. Ibid. 98. Ibid. 99. Ibid. 100–101. NPJS, formerly NJDA, “Position Statement: Minimum Direct Care Ratio in Juvenile Detention Centers,” (Lexington, KY: Author, 1999). Roush and McMillen, “Construction, Operations, and Staff Training,” 17. Ibid., 17. National Standards to Prevent, Detect, and Respond To Prison Rape, 28 C.F.R. § 115.313(c). Roush and McMillen, “Construction, Operations, and Staff Training,” 17–18, 20. Ibid., 11. Michele Deitch, Amy Madore, Kate Vickery, and Alycia Welch, Understanding and Addressing Youth Violence in the Texas Juvenile Justice Department: Report to the Office of the Independent Ombudsman (Austin, TX: University of Texas at Austin, LBJ School of Public Affairs, 2013), 27. Roush and McMillen, “Construction, Operations, and Staff Training,” 11. Andrea Sedlak and Karla McPherson, “Conditions of Confinement: Findings from the Survey of Youth in Residential Placement,” Juvenile Justice Bulletin (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, May 2010): 1. Richard A. Mendel, No Place for Kids: The Case for Reducing Juvenile Incarceration (Baltimore, MD: Annie E. Casey Foundation, 2011). Roush and McMillen, “Construction, Operations, and Staff Training,” 10. Ibid., 10–11. Mark Steward and Pili Robinson, “Juvenile Justice System Solutions for Texas: Things to Consider,” Conference Presentation, 8th Annual Strengthening Youth and Families Conference: Engaging Families, Connecting Communities, Achieving Successful Outcomes from TJJD (Austin, TX, November 9, 2012). Mendel, The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders, 19. Ibid., 9–10. Ibid., 15–18. Vincent Schiraldi, Marc Schindler, and Sean J. Goliday, “The End of the Reform School?” In Juvenile Justice: Advancing Research, Policy, and Practice, eds. Francine T. Sherman and Francine H. Jacobs (New Jersey: John Wiley & Sons, Inc., 2011), 409–432. Douglas Evans, Pioneers of Juvenile Justice Reform: Achieving System Change Using Resolution, Reinvestment, and Realignment Strategies (New York: Research and Evaluation Center, John Jay College of Criminal Justice, City University of New York, 2012), 29. Justice Policy Institute, Models for Change: Building Momentum for Juvenile Justice Reform (December, 2006): 23–25. Mendel, No Place for Kids, 38. Schiraldi et al., “The End of the Reform School?,” 414. Roush and McMillen, “Construction, Operations, and Staff Training,” 12. American Correctional Association, Performance-Based Standards for Juvenile Detention Facilities, 4th ed. (Laurel, MD: Author, 1990); American Correctional Association, Standards for Juvenile Training Schools, 3d ed. (Laurel, MD: Author, 1991); American Correctional Association, Standards for Small Juvenile Detention Facilities (Laurel, MD: Author, 1991). Roush and McMillen, “Construction, Operations, and Staff Training,” 10-11. Mendel, The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders, 19. William L. Marshall and David L. Burton, “The Importance of Group Processes in Offender Treatment,” Aggression and Violent Behavior 15 (2010): 143. Mendel, The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders, 20–21. Ibid., 20. John Hubner, Last Chance in Texas: The Redemption of Criminal Youth (New York: Random House, 2008). Michelle Newell and Jorja Leap, “Policy Brief: Reforming the Nation’s Largest Juvenile Justice System,” Los Angeles: UCLA Luskin School of Public Affairs (November, 2013): 9–10. Roush and McMillen, “Construction, Operations, and Staff Training,” 11. Ibid., 9. Mendel, The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders, 19. Ibid., 21–22. Patricia Hardyman, James Austin, Jack Alexander, Kelly Dedel Johnson, and Owan C. Culloch, Internal Classification Systems: Case Studies in their Development and Implementation (Washington, DC: National Institute of Corrections, 2002), 1. James Austin and Kenneth McGinnis, Classification of High-Risk and Special Management Prisoners: A National Assessment of Current Practices (Washington, DC: National Institute of Corrections, 2004). National PREA Resource Center, "Standards to Prevent, Detect, and Respond to Prison Rape Under the Prison Rape Elimination Act," 28 C.F.R. §115. PREA Standards. §115.341. PREA Standards. §115.342. Austin and McGinnis, Classification of High-Risk and Special Management Prisoners, 42. Sedlak and McPherson, “Conditions of Confinement,” 8. Terence P. Thornberry, “Membership in Youth Gangs and Involvement in Serious and Violent Offending,” in Serious and Violent Juvenile Offenders: Risk Factors and Successful Interventions, eds. Rolf Loeber and David P. Farrington (Thousand Oaks, CA: Sage, 1998), 147–166. James Howell, “Youth Gangs: An Overview,” Juvenile Justice Bulletin (August, 1998): 12. Don Specter, “Making Prisons Safe: Strategies for Controlling Violence,” Washington University Journal of Law & Policy 22 (2006): 133. Steward and Robinson, “Solutions for Texas.” Cox, “Juvenile Facility Staff Responses,” 23. Andrea J. Sedlak and Karla S. McPherson, Youth’s Needs and Services: Findings from the Survey of Youth in Residential Placement (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, April 2010), 5–6. See Consent Order, United States of America v. The State of Ohio et al., (No. 2:08-cv-00475-ALM-MRA, December 19, 2012), available as document no. 107–1: 1. Ibid., 1–2. Mendel, The Missouri Model: Reinventing the Practice of Rehabilitating Youthful Offenders, 28–29. Adrienne M. F. Peters and Raymond R. Corrado, “An Examination of the Early ‘Strains’ of Imprisonment Among Young Offenders Incarcerated for Serious Crimes,” Journal of Juvenile Justice 2, no. 2 (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, Spring 2013). William H. Barton and Jeffrey A. Butts, Building on Strength: Positive Youth Development in Juvenile Justice Programs (Chicago, IL: Chapin Hall Center for Children at the University of Chicago, 2008). See, Michael Parker, ed., Dynamic Security: The Democratic Therapeutic Community in Prison (London: Jessica Kingsley Publishers, 2007). Paul DeMuro, Toward Abolishing the Use of Disciplinary Isolation in Juvenile Justice Institutions: Some Initial Ideas (Author, 2014), 6. Scheuermann and Hall, Positive Behavioral Supports, 19. Models for Change-Pennsylvania, Mental Health Association in Pennsylvania, and Pennsylvania Council of Chief Juvenile Probation Officers, Family Involvement in Pennsylvania’s Juvenile Justice System (Harrisburg, PA: Mental Health Association in Pennsylvania, 2009). Lipsey et al., Improving the Effectiveness of Juvenile Justice Programs, 26. Ibid.; Elizabeth Drake, Evidence-Based Juvenile Offender Programs: Program Description, Quality Assurance, and Cost (Olympia, WA: Washington State Institute for Public Policy, 2007). Albert Bandura, Social Learning Theory (New York: General Learning Press, 1971).; Bandura, Social Foundations of Thought and Action. Nelson Griffis, Designing a Token Economy for the Detention Setting (Jackson, MI: Michigan Juvenile Detention Association, 1972). National Center for Youth in Custody, “Strategies for Effective Facility-Based Behavior Management.” Models for Change-Pennsylvania et al., Family Involvement in Pennsylvania’s Juvenile Justice System, 29. National Center for Youth in Custody, “Strategies for Effective Facility-Based Behavior Management.” Models for Change-Pennsylvania et al., Family Involvement in Pennsylvania’s Juvenile Justice System, 29. Scheuermann and Hall, Positive Behavioral Supports, 19. Human Rights Watch and ACLU, Growing Up Locked Down: Youth in Solitary Confinement in Jails and Prisons Across the United States (New York: Author, 2012), 85–86. Gordon Bazemore and Mark Umbreit, A Comparison of Four Restorative Conferencing Models (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, February 2001), 5–6. Mendel, The Missouri Model, 20. Human Rights Watch and ACLU, Growing Up Locked Down, 86. Mendel, No Place for Kids, 34.; DeMuro, “Disciplinary Isolation,” 5. DeMuro, “Disciplinary Isolation,” 6. Sue Burrell, Trauma and the Environment of Care in Juvenile Institutions (Los Angeles, CA and Durham, DC: National Center for Child Traumatic Stress, 2013), 5. Ibid; Lindsay Hayes, Characteristics of Juvenile Suicide in Confinement Facilities (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, 2009); Stuart Grassian, “Psychiatric Effects of Solitary Confinement,” Washington University Journal of Law & Policy 22 (2006): 325; Craig Haney, “Mental Health Issues in Long-Term Solitary and ‘Supermax’ Confinement,” Crime and Delinquency 49, no. 1 (2003): 124–156.; Are Haram Klykken, Prison Studies of Solitary Confinement: A Bibliography of Research on Psychological Effects of Social Isolation, Pre-Trial Isolation and Supermax Conditions (University of Tromso: Author, 2012). Hayes, “Characteristics of Juvenile Suicide in Confinement Facilities,” 6. T.D. and O.S. v. Mickens et al., 1:10-cv-02902-JEI –AMD, U.S.D.C. (New Jersey), 2013, cited in Juvenile Law Center, “Juvenile Law Center Negotiates Final Settlement of Civil Rights Lawsuit Challenging Solitary Confinement of 2 Boys in Custody of NJ Juvenile Justice Commission,” January 21, 2014. Robert L. Listenbee, Administrator, U.S. Department of Justice, Letter to Jesselyn McCurdy, Senior Legislative Counsel, American Civil Liberties Union 1, July 5, 2013. Deitch et al., Understanding and Preventing Youth Violence, 37–38, 44–47, 51–55; Lipsey, Effectiveness of Juvenile Justice Programs: A New Perspective on Evidence-Based Practice, 13.; Drake. “Evidence-Based Juvenile Offender Programs: Program Description, Quality Assurance, and Cost.”; Burrell, “Trauma and the Environment of Care,” 5. Deitch et al., Understanding and Addressing Youth Violence, 37–38. Ibid., 37. Human Rights Watch and ACLU, Growing Up Locked Down, 87. Annie E. Casey Foundation, Juvenile Detention Facility Assessment: 2014 Update, (Baltimore, MD: Author, 2014). American Academy of Child & Adolescent Psychiatry, “Policy Statement: Solitary Confinement of Juvenile Offenders,” (April 2012). Barbara Danziger Flicker, Institute of Judicial Administration and American Bar Association, Standards for Juvenile Justice: A Summary and Analysis, 2nd ed. (Cambridge, MA: Ballinger, 1982), 237, 240. American Bar Association, Youth in the Adult Criminal Justice System: Guidelines for Policymakers and Practitioners (Washington, DC: Author, Criminal Justice Section, 2001), 24. Terry Schuster, Office of the Federal Court Monitor, “13 Good Ideas from Other Jurisdictions That May Help Improve Outcomes on the PROGRESS Units,” (2012): 1, (Unpublished report on file with author). Consent Order, United States of America v. The State of Ohio et al. Deitch et al., Understanding and Addressing Youth Violence, 51–55. Sue Burrell, Moving Away from Hardware: The JDAI Policy on Fixed Restraint, (Baltimore, MD: Juvenile Detention Alternatives Initiative, Annie E. Casey Foundation, 2009): 1, 8 [citing New Amsterdam Consulting, Inc., Performance-based Standards for Youth Correction and Detention Facilities (2007 Research Report) (Scottsdale, Arizona, July 2007): 12.] Ibid., 9. Steve Martin, “Staff Use of Force in a Confinement Setting: How Much is Enough, When is it Too Much,” XXV Correctional Law Reporter (2014). Steve Martin, “Staff Use of Force in a Confinement Setting: When is it Really Necessary?” XXV (1) Correctional Law Reporter (June/July 2013): 1, 10. Burrell, “Moving Away from Hardware,” 2. Eric M. Weiss, “Deadly Restraint: A Hartford Courant Investigative Report.” Hartford Courant (October 11–14, 1998). Burrell, Moving Away from Hardware, 1. Ibid., 3. Ibid., 3–4. Burrell, Moving Away from Hardware, 1 (citing Dale Parent, Valerie Lieter, Stephen Kennedy, Lisa Livens, Daniel Wentworth, and Sarah Wilcox, Conditions of Confinement: Juvenile Detention and Corrections Facilities (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, Abt Associates, Inc. 1994). Burrell, Moving Away from Hardware, 8. Annie E. Casey Foundation, Juvenile Detention Facility Assessment. Center for Children’s Law and Policy, Fact Sheet: Chemical Agents in Juvenile Facilities (Washington, DC: Author, 2012), 2.; Annie E. Casey Foundation, Juvenile Detention Facility Assessment. Center for Children’s Law and Policy, Fact Sheet: Chemical Agents. Council of Juvenile Correctional Administrators, Issue Brief: Pepper Spray in Juvenile Facilities, 1. Center for Children’s Law and Policy, Fact Sheet: Chemical Agents, 1; Deitch et al., Understanding and Addressing Youth Violence, 42–43; 105. Martin, “Staff Use of Force in a Confinement Setting: How Much is Enough, When is it Too Much.” Center for Children’s Law and Policy, Fact Sheet: Chemical Agents, 3. Michele Deitch, Amanda Barstow, Leslie Lukens, and Ryan Reyna, From Time Out to Hard Time: Young Children in the Adult Criminal Justice System (Austin, TX: University of Texas at Austin, LBJ School of Public Affairs, 2009).; Campaign for Youth Justice, Jailing Juveniles: The Dangers of Incarcerating Juveniles in Adult Jails in America (Washington, DC: Author, 2007).; Michele Deitch and Neelum Arya, “Waivers and Transfers of Juveniles to Adult Court: Treating Juveniles Like Adult Criminals,” In Juvenile Justice Sourcebook, eds. David Springer and Wesley Church (New York: Oxford University Press, 2014), 241–263. See Donna Bishop, “Juvenile Offenders in the Adult Criminal Justice System,” Crime and Justice 27 (2000): 81–167.; Lonn Lanza-Kaduce, Jodi Lane, Donna M. Bishop, and Charles E. Frazier, “Juvenile Offenders and Adult Felony Recidivism: The Impact of Transfer,” Journal of Crime and Justice 28 (2005): 59–77.; Richard E. Redding, “Juvenile Transfer Laws: An Effective Deterrent to Delinquency?” Juvenile Justice Bulletin (Washington, DC: Office of Juvenile Justice and Delinquency Prevention, 2010). Redding, “Juvenile Transfer Laws,” 7–8. Ibid. 7. Centers for Disease Control and Prevention, Effects on Violence of Laws and Policies Facilitating the Transfer of Youth from the Juvenile to the Adult Justice System: A Report on Recommendations of the Task Force on Community Preventive Services (MMWR, 56, RR-9, 2007): 7. Angela McGowan et al., “Effects on Violence of Laws and Policies Facilitating the Transfer of Youth from the Juvenile Justice System to the Adult Justice System: A Systematic Review,” American Journal of Preventive Medicine 32, no. 4S (2007): S13. Centers for Disease Control and Prevention, Effects on Violence of Laws and Policies, 9. McGowan et al., “Effects on Violence of Laws and Policies,” S20. Redding, “Juvenile Transfer Laws: An Effective Deterrent to Delinquency?” 7. Campaign for Youth Justice, Jailing Juveniles: The Dangers of Incarcerating Youth in Adult Jails in America, 10. Ibid.; Michele Deitch, Anna Lipton Galbraith, and Jordan Pollock. Conditions for Certified Juveniles in Texas County Jails (Austin, TX: University of Texas at Austin, LBJ School of Public Affairs, May 2012), X. Campaign for Youth Justice, Jailing Juveniles, 10; Deitch et al., Conditions for Certified Juveniles, 14–15. Deitch et al., Conditions for Certified Juveniles, 15–16. Jason Zeidenberg, You’re an Adult Now: Youth in Adult Criminal Justice Systems (Washington, DC: National Institute of Corrections, 2011).; Just Children, Don’t Throw Away the Key: Reevaluating Adult Time for Youth Crime in Virginia (Charlottesville, VA: Author, 2009).; Colorado Juvenile Defender Coalition, Caging Children in Crisis (Denver, CO: Author, n.d.).; Campaign for Youth Justice and Partnership for Safety and Justice, Misguided Measures: The Outcomes and Impacts of Measure 11 on Oregon’s Youth (Washington, DC: Campaign for Youth Justice, 2011).; Washington Coalition for the Just Treatment of Youth, A Reexamination of Youth Involvement in the Adult Criminal Justice System in Washington: Implications of New Findings about Juvenile Recidivism and Adolescent Brain Development (Seattle, WA: Author, 2009). See Redding, “Juvenile Transfer Laws: An Effective Deterrent to Delinquency?”; Children’s Law Center, Inc., Falling Through the Cracks: A New Look at Ohio Youth in the Adult Criminal Justice System (Covington, KY: Author, 2012).; Washington Coalition for the Just Treatment of Youth, A Reexamination of Youth Involvement in the Adult Criminal Justice System in Washington.; Michele Deitch, Juveniles in the Adult Criminal Justice System in Texas (Austin, TX: University of Texas at Austin, LBJ School of Public Affairs, 2011). Jordan Bechtold, and Elizabeth Cauffman, “Tried as an Adult, Housed as a Juvenile: A Tale of Youth from Two Courts,” Law and Behavior (August 5, 2013). PREA Standards. 28 C.F.R. §§ 115.14, 115.114. Deitch et al., Conditions for Certified Juveniles, 25. Ibid., 24–25. Deitch et al., From Time Out to Hard Time. PREA Standards. 28 C.F.R. §§ 115.14. Deitch, Juveniles in the Adult Criminal Justice System, 25–26.
<urn:uuid:051d3db1-c5c4-4ad4-82cd-1c0b1e202fc9>
CC-MAIN-2022-33
https://owa.nicic.gov/book/export/html/148
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00568.warc.gz
en
0.922695
32,250
3.484375
3
3.069645
3
Strong reasoning
Crime & Law
Chapter overview: the postmodern approach challenges the dominant assumptions no style of art or culture “consumable commodities” postmodernism challenges. Knowledge thus becomes materialized and made into a commodity exchanged between varies for each field of art among the post-modern architects championed. Characteristics of postmodernism postmodernism is not a movement, it's a general attitude so there is no agreed list of characteristics that define postmodernist art. Postmodernism provides a concise and articulate overview of the postmodern the art of commodity critique, postmodern called art criticism of the post-modern. Street artist biographies, pictures, videos, interviews, and more. Banksy and the persistence of postmodernism than in kind from its venerable predecessors in wildstyle graffiti of the art commodity. Modern art survey history of modern art (paper overview of modern art with fascinating new art exhibitions commodity art postmodern. Tharpe turned rock 'n' roll from a burgeoning musical download a six-page excerpt an overview of the an overview of graffiti commodity and postmodern art. A comprehensive overview taking art to the streets: graffiti and cartoon chapter 26: new perspectives on art and audience commodity art postmodern. Expressionism, dada, and graffiti: german artistic rebels o and cold war to post-modern germany graffiti art worldwide. The below artworks are the most important in postmodern art - that both overview the major of as postmodern in as a commodity art object along with. The term was first used around 1970 as an art movement postmodernism to some extent defies definition – as there is no one postmodern style or theory on which it is hinged. Postmodern art overview jf lyotard's the postmodern condition in art of art because of its lower commodity value and. History of modern art (subscription) history of modern art is a visual comprehensive overview of the modern art field commodity art postmodern arenas:. Post-modernism ~translation postmodern art, which is synonymous with “contemporary” art “overview of postmodern art” 2008 on postmodernism. In this introductory text we provide a brief overview of modern and contemporary art didactic work, to complicate the perception of the art object as commodity. Architecture in georgia during the last four decades of the twentieth century evidenced a continuing interest in traditional forms for much residential architecture, while the state's architects. While art history has limited its visual analysis to a small number of pictures that qualify as works of art, pictorial semiotics focuses on gangs and graffiti. Postmodernism dr mary klages, associate professor, english department, university of colorado, boulder http: wwwcoloradoedu/english/engl2012klagespomohtml. Content 1 overview of the arts in britain 11 what are “the arts” 12 home page modern art essay modern modern street art and graffiti are undeniably. Contemporary islamic graffiti: the new illuminated manuscript overview the following lesson • remix and globalization of street art: post-modern flair. Postmodernism (movements in modern art) postmodernism provides a concise and articulate overview of the postmodern the art of commodity critique, postmodern. Street art essay examples 2,027 total an overview of graffiti, commodity and postmodern art 941 3 pages a research on the graffiti artist banksy and how.Download
<urn:uuid:7caf14d2-3e91-44ec-9fbb-3ae93296f55a>
CC-MAIN-2018-26
http://rmhomeworkrjwl.getfiredband.us/an-overview-of-graffiti-commodity-and-postmodern-art.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859904.56/warc/CC-MAIN-20180617232711-20180618012711-00406.warc.gz
en
0.846015
699
2.90625
3
3.014691
3
Strong reasoning
Art & Design
During their growth diamonds may trap micron-scale inclusions of the fluids from which they grew, and these "time capsules" provide insights into the metasomatic processes that have modified the subcontinental lithospheric mantle. LAM-ICPMS analysis of trace elements in > 500 fibrous and monocrystalline diamonds worldwide has been used to understand the nature of these fluids. Analyses of fibrous diamonds define two general types of pattern, a "fibrous-high" (FH) one with high contents of LREE, Ba and K, and a "fibrous-low" (FL) pattern characterized by depletion in LREE/MREE, Ba and K, negative anomalies in Sr and Y, and subchondritic Zr/Hf and Nb/Ta. Both types may be found in fibrous diamonds from single deposits, and in three Yakutian pipes some diamonds show abrupt transitions from inclusion-rich cores with FH patterns to clearer rims with FL patterns. Most monocrystalline diamonds show FL-type patterns, but some have patterns that resemble those of FH fibrous diamonds.Peridotitic and eclogitic monocrystalline diamonds may show either patterns with relatively flat REE, or patterns with more strongly depleted LREE. Kimberlites that contain peridotitic diamonds with "high" patterns also contain eclogitic diamonds with "high" patterns. Strong similarities in the patterns of these two groups of diamonds may suggest high fluid/rock ratios. Many diamonds of the "superdeep" paragenesis have trace-element patterns similar to those of other monocrystalline diamonds. This may be evidence that the trace-element compositions of deep-seated fluids are generally similar to those that form diamonds in the subcontinental lithospheric mantle.The element fractionations observed between the FH and FL patterns are consistent with the immiscible separation of a silicic fluid from a carbonatite-silicate fluid, leaving a residual carbonatitic fluid strongly enriched in LREE, Ba and alkalies. This model would suggest that most monocrystalline diamonds crystallized from the more silicic fraction.Comparison with studies of single fluid inclusions in fibrous diamonds suggests that the FH patterns reflect trapped inclusions of high-Mg and low-Mg carbonatitic high-density fluids. In terms of the rock-forming elements, the fluids that precipitated the rims of some fibrous diamonds (FL pattern) and most monocrystalline diamonds are broadly similar to some hydro-silicic high-density fluids found in fibrous diamonds. However, there are still significant differences between the trace-element patterns of most monocrystalline diamonds and known high-density fluids, and further research is required to understand the formation and growth of these diamonds.
<urn:uuid:b565b3a2-6dd5-447f-bf8f-c04f11c110b9>
CC-MAIN-2023-50
https://researchers.mq.edu.au/en/publications/trace-element-patterns-of-fibrous-and-monocrystalline-diamonds-in
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00665.warc.gz
en
0.916274
584
2.5625
3
3.031084
3
Strong reasoning
Science & Tech.
Writing the history of anything requires essentially the same process - adopting a method for studying a subject, amassing evidence which either proves or disproves the approach, and then writing up the findings in a way which are persuasive with those knowledgeable about the matter. Whether one is dealing with a most routine event or a most esoteric object, the task is the same. The only serious problems which can radically alter the process are when sources of crucial information either choose not to disclose important actions and information or the recorders of the results plot to distort the findings in writing up the conclusions. While scientific and technical distortions of histories are legion - it is easy to manufacture data and results to prove almost any hypothesis - ones regarding society are much more difficult to achieve because they are much more rarely attempted successfully. In most questions regarding the world, there is a mass of evidence pertaining to them, and all controversial claims are subjected to a barrage of complaints from all kinds of perspectives and perceptions. Claims that the Holocaust never occurred, and the 2000 election for the US Presidency was not stolen by George W. Bush's Republicans come readily to mind. The only exception is in the area of intelligence and covert operations where the governments concerned continuously refuse to acknowledge even the most obvious activities for all kinds of reasons, leaving historians largely in the dark about where to start and how to proceed in any history. The shortage of possible ideas and evidence to support them is nowhere more prevalent when one tries to write a history of a process which went terrible wrong. Here authorities will act as if no such process even occurred. Consequently, claims that the Dallas assassination of President Kennedy was the result of a botched conspiracy, or that Dr. David Kelly was assassinated by a similar process are harder to get even a hearing for, much less a favorable verdict by the public. A good, recent example of historians failing to put together the strands of a similar process occurred when Viktor Gunnarsson, the first suspect in the assassination of Swedish statsminister Olof Palme in Stockholm on February 28, 1986, was himself murdered outside Boone, North Carolina, during the early morning of December 4, 1993. Just before the killing, Borge Wingren, a former Swedish police inspector, had written a book, entitled He Killed Olof Palme - naming Gunnarsson, who often boasted of having committed the crime, as the statsminister's shooter - and now, it seemed, he had finally gotten what he most deserved. Gunnarsson was a neo-Nazi, with all kinds of connections to covert operators, especially in the Central Intelligence Agency. Well before Palme's assassination, he established a Stockholm branch of the European Workers' Party (EWP), a right-wing group, despite its name, founded by the infamous Lyndon LaRouche. It was known for putting up posters around the Swedish capital, contrasting Palme's mentor, Tage Erlander, as the nation's father (landsfader) with his former secretary, Palme, the nation's betrayer (landsförrädare). For eliminating such vermin, LaRouche's group recommended vigorous applications of DDT. In the fall of 1985, Gunnarsson went to an EWP convention in London, an assembly that the famous Soviet military historian, Edinbrugh's Professor John Erickson, helped put together for finally helping arrange the downfall of the USSR. Erickson, given the unprecedented contacts he had developed with the Soviets, especially in the Red Army, in helping Cornelius Ryan research The Last Battle, and in writing his own magisterial Stalin's War with Germany, had concluded that time had finally run out on the USSR's attempt to contain America's 'deterrence by puishment' through its bridgehead in Scandinavia by Russia's defense in depth - what he elaborated on in his 1985 article "The Soviet View of Deterrence: A General Survey." And Gunnarsson came back from the conference to help arrange conditions on the ground in Stockholm by providing deceptions for the real assassin, an agent of former SAS Major David Walker's KMS firm, whose shooting was to provide the trigger for the whole operation. While Erickson came to Stockholm, demanding that Palme do something to stop Soviet intrusions into Swedish territory, Gunnarson did everything he could to make it look as if he was preparing to kill Palme. By now, a reasonable shot with a pistol, thanks to weapons training he had had with some US Marines from the Embassy in a basement of a house in a Stockholm suburb, Gunnarson told his girl friend that the statsminister would be shot with ammunition capable of penetrating bullet-proof jackets while the performance of his bodyguards was being reassessed. On the day of the murder, a friend of Gunnarsson's was surprised to see that he had shaved off his moustache. On the night of the assassination, Gunnarsson did everything he could to make it look as if he were the assassin. He had an apartment along the escape route the real assassin took in making his getaway. He admitted that he was in the area when the shooting took place, and he had no alibi for where he actually was when it happened. Shortly after Palme was shot, he apparently tried to flag down a cab in a most agitated state, and then he barged into a cinema, 45 minutes after the movie had started, in a similar state which caught the attention of two girls who were sitting nearby. Little wonder that when the plotters' plan to make Soviet spy Stig Bergling the real decoy failed, and the assassination did not trigger the final showdown with the Soviets - thanks to more spying for Moscow by the Agency's Aldrich "Rick" Ames and the Bureau's Robert Hanssen, the refusal of Altantic Fleet Commander Admiral Carl Trost to join up Task Force Eagle with NATO's Anchor Express Exercise for a military thrust across Norway's Finnmark region into the USSR's Kola Peninsula, and the disaster which occurred to the Norwegian forces when they attempted to move through the Vassdalen Valley - the Stockholm police were obliged to go after Gunnarsson, but it achieved little result. The police were so eager to indict him that it showed a key witness a photograph of Gunnarsson before a police lineup including him - what only resulted in the resignation of prosecutor K. G. Svensson after he had ordered Gunnarsson's release. Then an intensive examination of the jacket he was apparently wearing at the time for gunpowder traces proved fruitless. The fiasco over Gunnarsson's arrest proved so embarrassing to Swedish authorities that he, instead of suing all the people who had libeled him while he was under arrest for the shooting, wrote a book, Jag och Palme mordet, in which he continued to spin his ambiguous tale about who really assassinated the statsminister. While the police and the public moved on to possible other suspects of the killing, Washington's secret government obviously didn't, as I have tried to indicate in my article in the archive about why it took so long to uncover the spying for Moscow by Ames, and Hanssen. CIA was most anxious to drag out the process as long as possible in the hope that some solution to the Stockhom shooting would be arranged, and problems dealing with Iran-Contra would be cleaned up in the interim with as little dangerous fallout as possible. And this was certainly the case, as it was another eight years before Ames was even arrested. By the early 1990s, Gunnarsson thought that it was safe to start a new life, especially since people angry over Palme's assassination were continually threatening to kill him over the still unsolved crime, and he moved to North Carolina in the States. While living in Salisbury, Viktor ultimately made the acquaintance of Kay and Jason Weden who were living chaotic lives of drugs and loose behavior, though she finally became engaged to a local police officer, Lamont C. Underwood, around Thanksgiving in 1992. She later admitted to having dated, and having had sex with another man, Johnny Denton, at the same time. Once Underwood learned of the affair, the engagement was called off, though it resumed at the New Year, only to be finally ended in June 1993. By this time, the Agency was becoming most concerned about matters because Ames's spying was finally unraveling, and it was most concerned it could lead to Gunnarsson, especially what Felipe Vidal aka Charles Morgan told him as he tried to recruit assassins of the statsminister eight years earlier. While Gunnarsson did not shoot Palme, he might well have known who did, particularly after Oliver North, the operation's key player, paid Major Walker in April 1986 $100,000 for some unspecified operation. (For more on this, see the article about him in the archive.) This was after the hunt for Palme's killer had turned into a complete fiasco, and the assassin had clearly gotten away with it. By now, the Bureau was conducting a full scale surveillance of Ames, following him wherever he went, going through his trash with a fine-tooth comb, and bugging what he said in his house or over the phone. The crucial give-aways as to his guilt were discovered by a colleague who was able to see the memory of what was in his laptop computer, the note he sent to his handler about arranging a meeting in Bogota, and conversations he had had with his wife Rosario about the trip and despositing the money he had obtained from it. For Langley, the most disturbing find was a note that Ames had written a year before but was only now discovered, indicating that his efforts were well known by Soviet counterintelligence, the MBRF - what implied that he knew how all the double agent operations in the USSR at the time of the Stockholm shooting had been stymied. To limit any unnecessary fallout from the Ames' arrest, the Agency decided to do away with Gunnarsson - what Underwood had now set himself up as the fallguy for by having a confrontation with Kay Weden while she was having dinner with David Summer on November 12, 1993. While Underwood claims it was about problems he was having with her son Jason owing him money, and stealing things from his apartment, Weden and Summer later claimed that he threatened to kill Summer. Three weeks later, after Gunnarsson, Weden and her mother had dinner in a local restaurant, Gunnarsson disappeared, only to be found early in January naked, and quite dead outside Boone, shot through the forehead and the neck. For the next several years, the state of North Carolina went through the greatest claims, contortions and cover ups apparently to convict Underwood of Gunnarsson's murder - essentially using 17 strands of hair from Gunnarsson for DNA evidence, and found allegedly on a mat in one of Underwood's cars to send him to prison for life for killing a man he never even met. (For details, readers should consult Underwood's web site.) The state of North Carolina, it seems, would like everyone to believe that Underwood was capable of killing anyone who had anything to do with Weden, even her mother, Mrs. Miller, except Kay herself. The murder of Gunnarsson and the railroading of Underwood had the desired effect on the problems Ames was causing the Agency. His prosecution and imprisonment did not even lead to the discovery of Hanssen, much less who really killed Gunnarsson and why.
<urn:uuid:37065d9f-6590-4f2e-b798-d968e0ed678a>
CC-MAIN-2017-43
http://codshit.blogspot.com/2004/06/why-palme-assassination-suspect.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824104.30/warc/CC-MAIN-20171020120608-20171020140608-00067.warc.gz
en
0.981414
2,348
2.5625
3
3.007948
3
Strong reasoning
Crime & Law
Grain sorghum, it isn't just for livestock feed anymore. In fact, with development of special white, food-grade, grain sorghum varieties and continuing efforts to increase ethanol use across the country, grain sorghum may begin to take back some of the acreage it lost in Texas over the past 20 years or more. Add the grain's value as a rotation crop for cotton and corn and the impetus may gain even more steam. Price provides one of the first new incentives, says Wayne Cleveland, executive director of the Texas Grain Sorghum Association. “In 1970, grain sorghum prices stood at $2.02 per bushel. It was $5 per bushel in 1980, $1.84 in 2000, up to $3.70 in 2001, $3.90 in 2002 and could hit $4 per bushel this year, including loan rates etc. “We think grain sorghum acreage in the state has hit bottom and bounced,” Cleveland told a group of Denton County, Texas, farmers recently. “In the 1970s we were planting 8 million acres, but successive farm bills hit us hard and acreage declined to 3 million. In the meantime, yield and price were stagnant.” Cleveland said one of the big coups for grain sorghum in the Farm Security and Rural Investment act of 2002 was obtaining a loan rate equal to corn. After much back-and-forth negotiations with the increase in and out of the bill, the final version made corn and grain sorghum equal. That amounted to about a 26 cents per bushel increase, Cleveland said. “We think that's significant.” Another significant factor affecting sorghum's future in the Southwest will be the potential growth of the ethanol industry. Cleveland sees ethanol as a potential “significant growth opportunity. Ethanol requires a starch. Making ethanol is basically manufacturing alcohol. A manufacturing plant that produces 30 million gallons of ethanol requires 11 million bushels of grain sorghum. The obstacle in Texas is the cost of building manufacturing plants. “Other states provide incentives, up to 20 cents per gallon, to build ethanol plants,” he said. “Texas does not. But we are asking the Texas legislature for that incentive.” He said 46 million bushels of grain sorghum went into ethanol production in 2002, 12 percent of the year's total crop. A by-product, distiller's grain, also provides a valuable feed source for livestock. “It's 36 percent protein,” Cleveland said. Catalysts driving ethanol acceptance include those tax credits in some states that boost production. Also, Cleveland said California's ban on MTBE additives in gasoline last year opens a market for ethanol, which would go into fuel at 10 percent. “It helps gasoline burn cleaner and hotter.” He said 16 states currently restrict use of MTBEs, which pose serious environmental problems. “Other states are considering restrictions. Texas currently has none.” Cleveland said a federal ban on MTBEs could mean entry into a significant market. “We need to promote use of renewable fuels and eliminate the high cost boutique blends.” He sees ethanol industry growth as rapid and steady. “Most plants are going up in the Midwest, partly because of the amount of grain produced in the region. State incentives also help.” One plant currently operates in Portales, N.M. “We have none in Texas but two are under consideration,” Cleveland said. National impact could be significant. Income for farms could jump by $4.5 billion, Cleveland said. That improves the tax base. Improvements to a local economy could be as much as $19 million. Cleveland said increased focus on ethanol use also offers the United States an opportunity to break away from reliance on foreign fuels. “Last year, we imported $312 million worth of oil per day. We're dependent on imported oil and that's a hard cycle to break.’ Cleveland said food uses, including snack foods made from white sorghum, also offer opportunities for growth. Japan, he said, has used white sorghum flour for a variety of snack foods because of its ability to take on various flavors. “It's bland and has no flavor of its own, so they can add most any flavor,” he said. A huge state budget deficit will be a major hurdle to get additional incentives for Texas growers, Cleveland said. “They're facing a $10 billion deficit, not $5 billion as they had anticipated. Every agency will take cuts. Still, we're going to them asking for an incentive for ethanol. We will be involved. Government can either do something for you, or to you. It's your choice.” Cleveland said agriculture had not been as involved in government in the past as it should have been. “We're going to push,” he said.
<urn:uuid:620715b3-ffcd-4887-9912-eba7cdb5fbce>
CC-MAIN-2016-40
http://southwestfarmpress.com/prospects-promising-grain-sorghum
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660931.25/warc/CC-MAIN-20160924173740-00136-ip-10-143-35-109.ec2.internal.warc.gz
en
0.96232
1,053
2.65625
3
2.97204
3
Strong reasoning
Industrial
Many analysts believe that the international system is sliding towards multipolarity, a world in which no single great power is in a position to dominate its peers. But among those who subscribe to this view, there is some debate over just how the coming multipolar order will operate. Will great powers work together to uphold order? Will they instead descend into military and economic competition with one another? Or can planet Earth support multiple world orders, co-existent yet separate, each under the sway of a particular great power? There are no iron-clad answers to these questions. Yet current geopolitics does, perhaps, allow for a glimpse into the future. In particular, the international politics of the Indian Ocean can be considered something of a microcosm of multipolarity in the twenty-first century. For this region—what Robert Kaplan calls “center stage” in the contest for the next world order—is critical to both world trade and global security, and so how the great powers conduct their affairs here promises to say some important things about how they will organize their relations more generally. Up until the mid-twentieth century, the Indian Ocean was the practical preserve of the British Empire. Almost all of the major cities and strategic ports along the ocean’s littoral were under British rule or influence: Durban, Zanzibar and Mombasa along the east coast of Africa; Aden and Muscat on the Arabian Peninsula; Bombay and Calcutta on either side of the Indian subcontinent; Perth in Western Australia. The Royal Navy controlled access to the Indian Ocean from Suez, Singapore and Cape Town, and the Union Flag flew over most of the ocean’s major islands: Ceylon (Sri Lanka), Mauritius, the Chagos, Seychelles, Maldives, Andaman and Nicobar. After World War II, one hegemonic power was exchanged for another as the United States slowly but surely became dominant in the Indian Ocean. To be sure, the British withdrawal from the region was piecemeal; decolonization—and especially the independence of India in 1947—removed much of the strategic rationale for Britain’s presence in the Indian Ocean, but the nation was slow to draw down its commitments. It was only in the late 1960s that Prime Minister Harold Wilson announced that Britain would withdraw “East of Aden,” thus beginning the terminal decline of Britain’s bases in South Asia and the Persian Gulf. Either way, the United States had firmly replaced Britain as the region’s preeminent power by the mid-1970s. The western half of the Indian Ocean, in particular, became enclosed by a string of U.S. bases such as those in Bahrain, the Horn of Africa and the British-controlled island of Diego Garcia, while the ocean’s eastern expanses were drawn into Pax Americana by virtue of Washington’s defensive ties with Singapore, Australia, Thailand and its Pacific bases in Guam and the Philippines. Despite close relations (at times) with littoral states such as Ethiopia and Somalia, the Soviet Union never came close to rivalling this massive geostrategic footprint. Today, centuries of relative unipolarity are giving way to noticeable multipolarity. India’s announcement of a base in the Seychelles is another important step in this direction—a sign that New Delhi is doubling down on its blue water navy and attendant power-projection capabilities. From the Seychellois island of Assumption, which is already equipped with an airstrip, the Indian military—even if it is limited by geography to maintaining only a tiny military presence—will boast a central position in the Western Indian Ocean, close to the East African coastline and astride the important maritime trade route that runs from the Mozambique Channel to the Arabian Sea. It is not just India that is beefing up its presence in the region, of course. Late last year, China announced the creation of its first permanent overseas base in Djibouti at the mouth of the Red Sea, and Beijing continues to expand its naval capabilities (most recently by announcing the construction of its first Chinese-made aircraft carrier). With the United States also present in Djibouti—as well as Bahrain, Diego Garcia and elsewhere—this means that at least three of the great powers are demonstrably seeking to expand their military reach in the Indian Ocean. And middle powers such as Britain and France also boast considerable military assets in the wider region. Of course, the U.S. navy is still far superior to its potential competitors and America’s overseas basing system continues to be unsurpassed. Moreover, no other power can compete the number and quality of Washington’s military alliances in the Indian Ocean or elsewhere. But with the United States, China and India all boasting overseas nascent basing structures in the ocean—and with America’s rivals looking to improve their own portfolios of alliances and client states—the outline of a coming multipolar world is clear to see. What will be the result? International Relations theory helps to delineate three scenarios that might play out. First, the great powers could cooperate to combat piracy, maintain geopolitical stability, and keep sea lanes open. This is the hope of liberal academicians, who see few conflicts of interest between the various powers in terms of their vision for the ocean’s future; on the contrary, a common stake in policing the commons should provide great impetus to maintaining regional stability. Second, however, the Indian Ocean could become the focus of great power competition and even outright conflict, as distrust and divergent interests push states to shun collaboration. This is the pessimistic prediction of most realist scholars. But third, the Indian Ocean could become the scene of a new sort of world order—or, to put it more accurately, world orders—as rival great powers go about organizing their own spheres of influence that exist discretely and distinctly with one another’s. Such a world was outlined by Charles Kupchan in his book, No One’s World, in which the author argued that the coming international system will be characterized by decentralization, pluralism, and co-existence. Which of these outcomes is most likely to obtain? Last year, one Indian official called for the resurrection of an idea from the 1970s that the Indian Ocean should be transformed into a “zone of peace,” lending rhetorical support for the first (or perhaps the third) of the scenarios outlined above. And to be sure, there has been some evidence of international cooperation in response to piracy off the Horn of Africa. But facts on the ground seem to point in the direction of more, not less, militarization—including as a result of India’s actions—with the potential for competition and thus conflict thus mounting. In the final analysis, the future of the Indian Ocean seems bound to be fraught because the stakes are so high. Around 2.5 billion people live in the ocean’s littoral states, making it an important economic hub. And with so much of the world’s commercial traffic passing through the ocean, influence over its sea lanes and choke points—the Strait of Hormuz, Gulf of Aden, Suez Canal and Strait of Malacca—is an important geostrategic aim for maritime nations. Moreover, freedom of manoeuvre in the Indian Ocean is imperative for states that aspire to the military capacity to intervene in geopolitical hotspots such as the Persian Gulf and even the South China Sea. Whatever the form of international governance that emerges in the Indian Ocean, then, it will have to accommodate the reality that several great powers have vital interests in the region. Come conflict or cooperation, political order in the Indian Ocean will have to be multipolar in character—if, indeed, it is not already. The prospects for peace and harmonious cooperation under such circumstances are not altogether bleak, but they are not endlessly auspicious either. In many ways, twenty-first century geopolitics begins here. Peter Harris is an assistant professor of political science at Colorado State University. You can follow him on Twitter: @ipeterharris. Image: Flickr/U.S. Navy/Mass Communication Specialist 2nd Class James R. Evans.
<urn:uuid:fa5ee6cf-72fb-46ca-96a3-75939ed6656d>
CC-MAIN-2021-31
https://nationalinterest.org/feature/how-live-multipolar-world-14787
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153897.89/warc/CC-MAIN-20210729203133-20210729233133-00366.warc.gz
en
0.948176
1,699
3
3
2.957108
3
Strong reasoning
Politics
Scientists link ocean dispersal of baby fish with ecology of adults Populations of fish in the ocean are notoriously variable, waxing and waning in often unpredictable ways. Knowing what drives changes in fish population sizes is important for managing fisheries and conserving species. For the first time, scientists have linked the ecology of adult fish populations inhabiting coral reefs with the dispersal of baby fish between reefs, reporting the dynamics of a living network called a "marine metapopulation." "It's not like studying deer in a forest, where one need only count births and deaths to understand how population size changes, which is difficult enough," says senior author Mark Hixon, professor in the Department of Biology at the University of Hawai'i at Mānoa. "The challenge of understanding changes in reef fish abundance in a metapopulation is to measure simultaneously egg production by adults on multiple reefs and the dispersal of baby fish among those reefs, as well as other factors," explains first author Darren Johnson, assistant professor in the Department of Biological Sciences at California State University, Long Beach. Challenge indeed. Like many ocean species, most coral reef fishes cast their tiny babies (called "larvae") into the ocean currents, where they may or may not eventually find a reef on which to settle. "The larvae are like lottery tickets, some of which are lucky and most of which perish," reports co-author Mark Christie, assistant professor in the Department of Biological Sciences at Purdue University. "The larvae that survive may return to the same reef as their parents or settle on a reef hundreds of miles away." But how can these tiny babies be tracked, let alone linked to their parents? New genetic methods analyzing small samples of fin tissue from captured and released fish allowed the scientists to compare adult bicolor damselfish in the Bahamas with baby fish appearing on the same or other reefs over three years, thereby matching parents with their offspring. "Such patterns of larval connectivity have now been documented many times using genetic methods," says co-author Tim Pusack, assistant professor at Williams College, "but we closed the population life-cycle loop by integrating larval dispersal with egg production by adults." Quantifying what they called "demographic connectivity," the scientists calculated larval dispersal as a function of initial egg production by adding artificial nests to reefs in which the damselfish laid their eggs. "We counted how many eggs each nest produced, thereby learning how many offspring were produced at each reef," reports co-author Christopher Stallings, associate professor in the College of Marine Science at the University of South Florida. "Combining these data with the genetic parentage data, we were able to estimate how many of the larvae that leave a reef come home, and how many travel to other reefs." The most important reefs for replenishing the overall metapopulation showed high levels of successful larval dispersal relative to the number of eggs produced. Studying only larval dispersal alone, or egg production alone, both typical of previous studies, did not provide a clear picture of the drivers of fish abundance. "This is the first field study to successfully measure both dispersal and egg production," reports Oregon State University fisheries oceanographer J. Wilson White, who was not involved in the study. "These results reinforce the need to link those two pieces to understand population changes." The integration of such difficult to measure information will allow scientists to identify the most valuable reefs to protect for conservation and management of coral reef fishes. More information: Darren W. Johnson et al. Integrating larval connectivity with local demography reveals regional dynamics of a marine metapopulation, Ecology (2018). DOI: 10.1002/ecy.2343 Journal information: Ecology Provided by University of Hawaii at Manoa
<urn:uuid:e914feae-9774-49b3-8c4d-a99836222277>
CC-MAIN-2020-10
https://m.phys.org/news/2018-06-scientists-link-ocean-dispersal-baby.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145260.40/warc/CC-MAIN-20200220162309-20200220192309-00240.warc.gz
en
0.955911
784
3.65625
4
3.030035
3
Strong reasoning
Science & Tech.
In the Book of Tobit, Edna is Raguel’s wife, Sarah’s mother, and the mother-in-law of Tobias, Tobit’s son. Edna has no biblical namesake; unlike the other women named in Tobit (Anna, Deborah, Eve, Sarah), her name does not evoke images from the Hebrew Bible. Perhaps the author of Tobit means to recall Eden’s idyllic existence, or, more likely, to convey by the name something about the type of woman, wife, and mother Edna is. What makes Edna a “delight” may be her deportment within her family. One cannot help comparing Edna with Anna, the other matriarch in Tobit. Both women are devoted mothers and good wives, but unlike Anna, Edna never appears outside the home or argues with her husband. She does what her husband asks (Tob 7:13, 15; 8:12, 19) and seems to be always in accord with him. Raguel, in turn, treats her as his partner, not his servant (Tob 8:21). On her daughter’s wedding night, Edna encourages Sarah (Tob 7:16), who has reason to be apprehensive (Tob 3:8). She welcomes Tobias, whom she has just met, into her family as a son (Tob 10:12). The author may want readers to see Edna as the ideal wife and mother and chooses her name as a hint to that effect. Edna operates only within the home and almost exclusively in conjunction with her husband. Although the text mentions Raguel twice (Tob 3:7; 6:11) before Tobias and his companion arrive in Ecbatana, the reader first encounters Edna only when the guests come to her house (Tob 7:2). Whenever Edna appears in the story, she is usually either in the company of Raguel (Tob 7:8; 8:21; 14:13) or Sarah (Tob 7:16), or doing something Raguel has told her to do (Tob 7:13, 15; 8:12, 19). However, there are unexpected, if small, challenges to the patriarchal view that Edna’s subordination to her husband upholds. Edna, not Raguel, interviews their guests, even though Raguel is present (Tob 7:2–8). According to one manuscript tradition, she may also have actively participated in the signing of her daughter’s marriage contract; the Greek says, “they set their seals to it” (Tob 7:13; emphasis added). This would give Edna a larger part in the proceedings than does the other manuscript tradition, in which she merely fetches the scroll for her husband. Finally, she blesses Tobias at the newlyweds’ departure, performing a function rarely associated with biblical women (Tob 10:12). If the meaning of Edna’s name indeed reflects her character, then her charm stems from both the way she fits her patriarchally defined role and the way she gently nudges its limitations. Matriarch of a harmonious household, she is an agreeable but not silent partner for her husband, a loving and supportive mother, a warm mother-in-law and a gracious host—all delightful aspects. Bow, Beverly, and George W. E. Nickelsburg, “Patriarchy with a Twist: Men and Women in Tobit.” In “Women Like This”: New Perspectives on Jewish Women in the Greco-Roman World, edited by Amy-Jill Levine, 127–143. Atlanta: 1991. Meyers, Carol, General Editor. Women in Scripture. New York: 2000.
<urn:uuid:7ddf50b9-7487-4340-acbe-9895e111256a>
CC-MAIN-2013-48
http://jwa.org/encyclopedia/article/edna-apocrypha
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164989606/warc/CC-MAIN-20131204134949-00010-ip-10-33-133-15.ec2.internal.warc.gz
en
0.960925
792
3.09375
3
2.956991
3
Strong reasoning
Religion
Today, many car manufacturers are developing electric cars to meet the standards of many government organizations for environmental protection. The higher the demand for electric vehicles, the greater the demand for charging stations; they will be the fuel source for these cars over long distances. Today, charging stations are as important as filling stations for traditional cars. Therefore, alongside the production of electric cars, charging stations must also be prepared and installed very meticulously. Tesla – the pioneer in the field of electric vehicles has developed a roadmap to build charging stations in many places not only in the United States but also around the world, worthy of other companies to follow. In Vietnam, Vinfast has launched a strategy to build its own charging stations to support not only cars but also its electric motorcycles. Like Tesla, this will help Vinfast not only earn profit by recharging cars, but the number of its cars sold will likely increase due to the convenience of customers. The automaker is part of billionaire Pham Nhat Vuong’s group recently released an announcement calling on partners to have appropriate premises and invest in a nationwide electric vehicle charging station infrastructure with a planned network of 2,000 charging stations. recharging with more than 40,000 charging stations. VinFast said that the charging stations will be developed according to European standards, that the charging station will work automatically and can be located in any parking area without changing the capacity of the parking area. From the start of electric vehicle production, charging stations had become Tesla’s main concern; they built their network from the very start of one of the first electric cars – the Model S. Unlike the approach of many other automakers focusing only on feature development, Tesla took the initiative to bring a greater utility to their customers. Nissan is a prime example. With the Leaf relatively affordable and innovative features, it quickly dominated the electric vehicle market and the Nissan Leaf was also the best-selling electric car between 2011 and 2014. However, Nissan is not building a network of charging stations for users. fast charging but relies on third party which causes a lot of problems for customers. Realizing this, since 2012, Tesla started to introduce six fast charging stations called Tesla Supercharger. Tesla started with the standard 150kW SuperCharger V1 and V2 charge shafts. With such a capacity, users take around 20 minutes to charge to 50%, 40 minutes to charge to 80% and 75 minutes to 100% for the Tesla Model S. In September 2017, Tesla announced the launch of Urban Superchargers. The urban compressor is more compact than the standard compressor, which is mainly deployed in large urban areas such as parking lots and garages in the shopping center. Compared to the standard Supercharger, the Urban Supercharger has a maximum capacity of 72 kW, which is about half the amount. These urban charging stations are currently only in use in the United States and will be used in many more locations over the next several years. 2 years later, the company continues to introduce the Supercharger V3 charger in New York with many great features, including the charging speed has improved significantly. All electric cars produced by Tesla, models S, X, Y … can use these chargers. In 2016, the average number of Tesla cars that could be recharged at the same time per Supercharger cabin was 34; The cost of building a charging station is around $ 100,000 (2013) and goes up to $ 270,000 by 2015, depending on the number of charging trees installed. The company expects these rechargeable trees to be around 12 years old. At first, less than 10% of all the electricity used to charge cars came from Tesla charging stations. However, by 2019, according to data provided by Tesla, up to 72 GWh of electricity will be used through their charging stations around the world. Most Supercharger charging stations are owned by Tesla, only a small number of stations owned by taxi companies with fleets of electric vehicles purchased from Tesla itself. Tesla also applies a fairly flexible policy to the use of its charging stations. Model S and X electric vehicles ordered from Tesla before January 15, 2017 will be used free of charge at charging stations until the end of the vehicle’s life cycle. Vehicles purchased from January 15, 2017 to November 2, 2018 will be free of approximately 400 KWh (equivalent to approximately 1,000 to 1,600 miles of travel); Once exhausted, they will pay a fee deemed lower than the cost of using gasoline for traditional cars. This price is around 0.2 to 0.26 USD / KWh (equivalent to 6000 VND / KWh) in the United States (except Hawaii). During the same period, up to 5 friends and owners of the current Tesla electric vehicle will receive a free lifetime car charge at this charging station, with those who purchase the car from the manufacturer via the referral code. At the end of 2014, 119 Tesla Supercharger stations were in service in the United States, 76 in Europe and 26 in Asia. As of March 2020, Tesla had 1,826 charging stations around the world with 16,103 charging stations, including 908 stations in the United States, 398 stations in Asia and the rest scattered in many other countries around the world. Tesla’s rechargeable tree count reached 20,000 in November last year, indicating the company’s extremely strong coverage. So, it can be seen that through the development of charging stations, Tesla not only has more income from the sale of electricity to cars, but also helps to increase the number of cars sold – which is the main business segment. of the company. This is why although many companies are developing electric cars even earlier than Tesla, but so far their cars have the strongest coverage in the world.
<urn:uuid:799e256a-6d4c-40b0-beb1-14e69234c1ff>
CC-MAIN-2021-10
https://scienceping.com/by-investing-in-electric-vehicle-charging-stations-across-the-country-what-can-vinfast-from-tesla-learn/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178361776.13/warc/CC-MAIN-20210228205741-20210228235741-00046.warc.gz
en
0.968002
1,181
2.8125
3
2.642909
3
Strong reasoning
Transportation
What's a Sacroiliac? The biggest single cause of back pain and dysfunction we see as chiropractors is a joint that most people have never heard of. The sacroiliac joints are found close to the dimples in the low back, continuing downward 2 to 3 inches. They are formed from the sacrum, which is the large triangular bone at the base of the spine, and the two pelvic or iliac bones on either side of the sacrum. This area acts as the foundation for the rest of the vertebral column and ultimately bears the weight of the head, shoulders and upper body. The sacroiliac joints are also the link between the spine and the legs. Their efficient function is necessary to allow smooth movement while walking and to dampen the shock to the spine of the heel striking the ground. Problems can arise when one or both sacroiliac joints no longer move normally. Such abnormalities are much more common than is generally realized. The high incidence of sacroiliac dysfunction can be attributed to slips, falls, sports injuries, work injuries, high heels, improper sitting or standing posture and - most significantly - to the trend in our society toward more sitting and less walking. It can begin as early as infancy with repeated falls while learning to walk. Because the child’s body compensates so easily for imbalances, there is often no lasting pain at the time and the incident is quickly forgotten. Chronic sacroiliac dysfunction can be the cause of low back pain and stiffness, leg, groin and hip pain. Muscular asymmetry or imbalance resulting from sacroiliac problems can lead to knee and ankle problems, as well as foot and heel pain. An acute sacroiliac strain produces severe localized pain, muscle spasm, difficulty in straightening up or lifting the leg, and pain with any sudden movement. This often represents an actual joint sprain with spasm of the surrounding muscles in an attempt to protect the joint by preventing movement. The muscle spasms usually do limit movement very effectively, if painfully, and it is the muscle spasms rather than the injured joint which produce the most acute pain. For this reason pain is often felt at a different location from the actual injury. Sacroiliac strains are frequently misdiagnosed as disc injuries. A sacroiliac sprain or strain results from a mechanical problem requiring correction. This can only be accomplished by restoring proper movement to the involved areas of the spine and pelvis. Bed rest, traction, sedation and supports will not correct the underlying cause. These measures, over a long period of time, may eventually bring relief but the problem will remain. For this reason painful episodes will usually follow, often with increasing frequency and severity. Acute sacroiliac strain will heal much more quickly if proper joint movement is restored. Chiropractors are experienced in restoring joint movement to minimize pain and muscle spasm and can recommend the best rehabilitative exercise program. The best approach to sacroiliac problems is to avoid them through prevention. Your chiropractor is able to evaluate the functioning of your spinal and pelvic joints and correct improper movement before it results in pain. If you have had a sacroiliac strain in the past, it is even more important to have the cause corrected before another episode begins.
<urn:uuid:82925176-c7d5-4f43-a539-a5756f25a1d5>
CC-MAIN-2022-21
https://www.drkarinmattern.com/what-s-a-sacroiliac
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662572800.59/warc/CC-MAIN-20220524110236-20220524140236-00074.warc.gz
en
0.939174
682
2.765625
3
2.071893
2
Moderate reasoning
Health
From above, the trees appear as a mass of vibrant yellow covering the western corner of Blandy Experimental Farm in Boyce, Virginia. At eye level, rows of tree trunks shade grassy hillocks that abut cattle and horse pasture on one side and a patch of forest on another, all framed by a winding gravel road. Amidst the grass itself, seeds sit enclosed in a pungent, fleshy covering that lends an inescapable aroma to the air of the grove. In China, these trees are called “silver apricots.” In the United States, we know them better by the Chinese-derived scientific name, Ginkgo biloba, or just “ginkgo.” Ginkgo are not native to North America, or even the Western Hemisphere in general – their modern center of origin lies in Southeast Asia, having been spread around the world by scientists, explorers, gardeners and traders. The ones at Blandy, part of the arboretum managed by the University of Virginia, arrived here as a result of scientific inquiry. While some plants possess both male and female reproductive parts simultaneously, ginkgo do not – individuals are either male or female. The stinky seeds for which the tree is famous develop only on females, appearing in the fall and dousing the ground with offspring. Male trees, meanwhile, produce no seeds, but release pollen in the spring. This pollen fertilizes the females and allows for seed production in the fall. Without pollen, the seeds will not be fertilized, just as without females, pollen will simply go to waste. There is, however, a catch: although seeds are born male or female, it often takes about 20 years before the tree reaches maturity and displays distinct sexual characteristics. Identifying the sex of young ginkgo individuals is not yet possible unless a male or female branch has been grafted onto rootstock. In 1929, biologist Dr. Orland E. White, the first Director of Blandy, had a question: of the seeds that a female ginkgo tree produces, what proportion are male and what proportion are female? White hypothesized that the sex ratio would be 1:1, meaning that the tree would produce approximately the same number of female seeds as male seeds. Taking seeds from a female ginkgo on the campus of the University of Virginia, White and his students eventually planted more than 600 saplings in what is now the Ginkgo Grove at Blandy. The experiment was simple: take the seeds from a female ginkgo, plant them, and determine the total sex ratio upon maturity. Twenty years later, researchers went back and recorded the sexes of the trees that had survived to maturity, tallying a final ratio right around 1:1. Although White did not live to see the experiment to its end, his hypothesis proved correct. Beyond answering the question of sex ratios in ginkgo offspring, the Ginkgo Grove is an enduring part of Blandy’s collections, brilliant leaves coloring the sky in autumn. The evolutionary history of ginkgo goes back hundreds of millions of years. At one point it grew in forests around the world, coexisting with dinosaurs and early mammals. There was more than one species of Ginkgo plant – Ginkgo biloba is the sole remaining member of a long evolutionary lineage. As climates shifted and the world changed, though, Ginkgo species disappeared and lost habitat, eventually only surviving in what is now China. You can learn more about ginkgo’s evolution, and how it reemerged from China to populate streets and gardens around the world, in one of our earlier blog posts. Although ginkgo trees have distinct sexes, this is not always set in stone. As Peter Crane recorded in a paper he wrote with Toshiyuki Nagata of Hosei University in Japan and several other colleagues, there are examples of individual branches on ginkgo trees changing sex from male to female. The phenomenon is rare, making it difficult to study. This difficulty is only compounded by the 19th century practice of grafting female branches onto male ginkgo trees around Europe, making some of the trees across the pond not ideal for this research. Studying sex-switching in predominately female ginkgo trees is much more difficult than examining the phenomenon in male ginkgo. In some years females do not produce seeds; and even when they do, for all but a brief period in the spring, a male branch appears as an innocuous, seedless patch on the otherwise fruiting tree. However, on a tree that is definitely male, a branch with seeds sticks out like a sore thumb. In Japan, Crane, Nagata and their colleagues recorded an example of a male tree with one female branch that produces ovules – but this particular tree happens to be a national monument, which means that sampling and study is strictly controlled and not especially easy. The Blandy ginkgo grove holds promise for elucidating how a Ginkgo tree changes sex in a way that the other trees do not. The trees have not undergone any grafting. Earlier this year, Crane and Nagata visited the ginkgo grove and identified at least one individual with sex-switching branches – a male tree with a small branch covered in seeds. This find is exciting, but the work of collecting samples and teasing out the molecular and genetic components of the sex-switching must now wait until the spring, when new growth appears. Then we will return to the ginkgo grove and seek more answers into how the trees are changing. With the aid of Blandy staff, we can take samples from sex-switching individuals and discover the processes going on at the molecular level. Why change sexes to begin with? The evolutionary factors pushing the ginkgo towards having the occasional sex-changing branches are not yet entirely clear, but we have some ideas as to why the trees–especially males–exhibit a somewhat fluid sexual expression. For an isolated male, growing a few seeds on a single branch can act as a sort of failsafe. Of the millions of pollen grains the male produces, only a few are needed to fertilize the seeds, allowing for self-fertilization at the same time that the individual can still send out enough pollen to pollinate a female, should one happen to be nearby. If a female produces male pollen cones, however, it would only take a few pollen cones to fertilize an entire tree’s-worth of seeds. Instead of acting as an evolutionary backup plan, a female that produces male pollen could in fact prevent pollination by other male trees, reducing genetic diversity and resulting in less healthy offspring. For this reason, so-called “leaky” males (males which grow a few female branches) are more likely than leaky females. This sex-switching may be one of the ways that ginkgo has cheated extinction for so long. Through millions of years, this tree has survived almost unchanged, thriving, declining, and rejuvenating through processes that we are still working to comprehend. In the midst of scientific inquiry and horticultural interest, careful cultivation and careless dispersal, processing for edible seeds and protection for spiritual and cultural heritage, ginkgo has continued to thrive, spreading with the help of people out of China and across the world. As we continue to discover the complicated life story of Ginkgo biloba, the trees at Blandy stand ready for the winter cold, yellow leaves waiting to drop in synchrony to the ground.
<urn:uuid:1319781a-f7cd-4a36-938a-00936ca2226b>
CC-MAIN-2018-09
https://www.osgf.org/blog/2017/11/7/blandy-ginkgo
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816351.97/warc/CC-MAIN-20180225090753-20180225110753-00686.warc.gz
en
0.950886
1,549
3.71875
4
3.00339
3
Strong reasoning
Science & Tech.
Review of Short Phrases and Links| This Review contains major "Common"- related terms, short phrases and links grouped together in the form of Encyclopedia article. - Common are excessive headaches, abnormal heart rhythm, depression, numbness of the hands and feet and blurred vision (Kilburn and Warshaw, 1993). - Common is approval as an analgesic and approval for the treatment of opioid dependence. - Common are ethanolamines (cocamide MEA, cocamide DEA), or betaine compounds (cocamidopropyl betaine). - Common is Champagne s, sparkling wine s, sherry and posts such as nonvintage Ports, tawnies and rubies. - Common is great but he’s not gangsta. - Tenancy in Common: A type of joint ownership of property by two or more persons with no right of survivorship. - Tenancy in Common - A form of co-ownership by which each owner holds an undivided interest in real property as if he or she were sole owner. - Allergic reactions are much more common, occurring predominantly among people with a family history of allergies. - As with humans, dogs can suffer from cold-like symptoms and allergies, and these are the most common causes of mucus congestion. - Both types of allergies can develop at any age, although onset in childhood through early adulthood is most common. - Maternal incest and pederasty by men are quite common in pre-literate groups and were common in earlier historical times. - Many people are prescribed hypothyroidism medication and in the past few years it has become quite common. - Unfortunately, this disease is quite common with dogs. - Common dolphins are not common in captivity. - However, by 2003, this cold-water species had been replaced by Common dolphins - a species found only in warmer waters. - Common dolphins can reach a length of 5-8 feet, and can weigh between 165-300 pounds, with males being slightly larger than females. - The Common dolphin is the name given to two species (and possibly a third) of dolphin making up the genus Delphinus. - Traditionally one of the most abundant cetacean species in the Mediterranean basin, it appears that the common dolphin is no longer so common in this region. - Little is known about the life-span of Common Dolphin, however, this species is known to be under threat from a form of fisheries called "Pair trawling". - Dental caries or tooth decay is one of the two common dental diseases that are responsible for most teeth loss in children. - Some of the common problems that cause loss of teeth are gum diseases such as gingivitis, accidents, tooth decay and root canals that are not healthy. - Tooth loss is a common problem among many adults, with common reasons for tooth loss being tooth decay, gum disease and excessive wear and tear. - When present, the few symptoms that are attributable to the disease could be due to many other causes and more common diseases. - There are several very common diseases that can be transmitted to dogs, cats and people through feces. - There is not really a system for tabulating the incidence of the common diseases of dogs and cats. - It is relatively common in children and is the second most common cause of an acute abdomen in this age group. - It is a relatively common condition and is the third most common cause of heart failure after ischemia and valvular disease. - Tuberculosis is a relatively common infection in people diagnosed HIV-positive, especially when compared to the general population. - Thyroid disease and abnormal thyroid tests are more common in people with sprue than in the general population. - Although IBS is very common in the general population, only a minority of people ever seek medical care for their symptoms. - Peptic ulcers, sleep disorders, and respiratory problems are also more common in people with cirrhosis than in the general population. - Hyperthyroidism is rare (affecting about 1 percent of the population), while mild, subclinical hypothyroidism may be much more common than most people think. - Thyroid disease is common, affecting around one in 20 people. - Hypothyroidism is the most common thyroid disorder among U.S. adults, affecting between 8 and 12 percent of the U.S. population, and more women than men. - Irritable bowel syndrome (IBS) is a common disorder of the intestines that leads to crampy pain, gassiness, bloating, and changes in bowel habits. - Irritable Bowel Syndrome is a common disorder characterized by abdominal pain, cramping, bloating, gas, diarrhea, and constipation. - IBS is a common disorder found more often in women than in men and usually begins around age 20. - Common causes of pancreatitis are gallstones or alcohol abuse. - Gallbladder cancer is often misdiagnosed because it mimics other more common conditions, such as gallstones, cholecystitis, and pancreatitis. - About 15% of people with gallstones will develop stones in the common bile duct, the small tube that carries bile from the gallbladder to the intestine. - The most common treatment for gallbladder disease is surgical removal of the gallbladder or treatments to eliminate gallstones. - At present, the most common treatment for gallstones is a cholecystectomy surgery to remove the gallbladder. - The most common treatment for patients with symptomatic gallstone disease is cholecystectomy (removal of the gallbladder surgically). - Dehydration is most common in babies, young children, the elderly and people with weak immune systems. - It is more common in females than males and most patients are elderly. - Hypertrophic cardiomyopathy is relatively common among the elderly (4% in one series) and more common among women than among men. - People of all ages can get aplastic anemia, but it's more common in adolescents, young adults, and the elderly. - It can occur at any age, but is more common in children and young adults. - Common in adolescents and young adults, acute pericarditis affects males more than females. - In the industrialized world, the most common causes of gastroenteritis in children are viruses, bacteria (food poisoning), and intestinal parasites. - Food poisoning and infections are the most common causes of acute (short-lived) diarrhea. - Due to the fact that this bacteria is known to survive cooking, it is a common cause of food poisoning and diarrhea. - Types of Shading Flat, Gouraud and Phong shading are the three most common types of shading used on 3D objects. - HPV is also associated with several less common types of cancer in both men and women. - Vaccines can protect males and females against some of the most common types of HPV. These vaccines are given in three shots. - WAGENINGEN, THE NETHERLANDS. Vitamin B12 deficiency is fairly common among older people and can cause anemia, pain and depression. - Pancreatitis (inflammation of the pancreas) is a fairly common and serious disease in dogs and may be precipitated by high levels of dietary fat. - Solid black Schnauzers, although fairly common in Germany, are not as popular as the pepper and salt in the United States. - Atrial fibrillation is more common in older people; about 10% of people over the age of 75 have it. - Very atypical pain, including sharp and pleuritic pain, is more common in women, people with diabetes and older people. - Because the prevalence of diabetes increases with age, diabetic retinopathy is more common in older people. - Children Most common in children, parvovirus rash may also be accompanied by cold-like symptoms including headache, sore throat, fatigue and fever. - A: The common early symptoms of concussion are headache, vertigo, nausea and dizziness. - Other common symptoms of treatment include diarrhea, nausea, vomiting, headache, dizziness, back pain, and tiredness. - Fever, nausea with or without vomiting, chills, loss of appetite, headache, muscle aches and bloating can also occur but are less common. - If symptoms occur, the most common are abdominal pain, fever, and yellowing of the skin (jaundice). - Severe diarrhea is the most consistent sign of the disease, but fever, lack of appetite, vomiting, dehydration, and profound depression are also common. - Lactose intolerance has been recognized for many years as a common problem in many children and most adults throughout the world. - Tooth loss is a common problem among many adults, with many losing their teeth due to tooth decay, gum disease and excessive wear and tear. - The most common problem that people have in compiling AfterStep is as a result of not having the required libraries on their system. - Diseases of the thyroid gland are common in dogs and cats (humans, too). - Canine Parvo virus is a viral infection that is very common in dogs and is a very common problem that is a huge killer of puppies. - This article explains in simple terms some of the more common causes of diarrhea in dogs and cats, and how best to deal with the problem. - The common complaint among IBS suffers is alternating bouts of constipation and diarrhea, and abdominal pain and cramps. - After headache, vertigo and dizziness is the second most common complaint of patients. - Xerostomia, or dry mouth, is a common complaint among diabetic dental patients and patients undergoing radiation of the head and neck for cancer therapy. - Constipation and diarrhea are the most common causes of abdominal pain and discomfort experienced by majority of people all over the world. - But heartburn, bloating and constipation tend to be more common in people who are overweight. - CONCLUSIONS: This study suggests that new onset of diarrhea, IBS, constipation, and dyspepsia are common among subjects traveling abroad. - One of the most common complications of diabetes is diabetic neuropathy. - The most common complications are ear infection and diarrhea, although more serious complications can include pneumonia, meningitis, or encephalitis. - Complications The most common complications are pseudocyst formation and mechanical obstruction of the duodenum and common bile duct. - Diabetic neuropathy is a common complication of diabetes, in which nerves are damaged as a result of high blood sugar levels (hyperglycemia). - Liver disease, which is present in as many as 95% of patients with iron overload, is the most common complication. - Bile duct injury is the most common complication of laparoscopic cholecystectomy, and may be more common with the laparoscopic than the standard approach. - Reflux that continues past 1 year of age may be GERD. Studies show GERD is common and may be overlooked in infants and children. - Intussusception is much more common in children, particularly in infants, than in adults. - S. aureus is the most common cause in all age groups, accounting for 90% of cases of empyema in infants and children. - Rotavirus and norovirus infections are the most common in infants and young children under 5 years of age. - Rotavirus infection is the most common cause of diarrhea in infants and young children under 5 years old. - Before vaccines were widely available, the disease was most common in infants and young children. - A common and potentially fatal viral infection, symptoms of which include loss of appetite, lethargy, diarrhea, fever and vomiting. - Because of the intestinal inflammatory reaction, symptoms of inflammation such as fever, chills, abdominal pain, leukocytosis, and diarrhea are common. - The most common cause of dehydration in infants and children is loss through vomiting and diarrhea from a virus. - Abdominal pain is a very common symptom, and also common in children. - Symptoms. If you have acute pericarditis, the most common symptom is sharp, stabbing chest pain behind the breastbone or in the left side of your chest. - Symptoms The most common symptom of pericarditis is sharp, stabbing chest pain behind the breastbone or in the left side of your chest. - Primary liver cancer is twice as common in men as in women and occurs most frequently in those who have a form of liver disease called cirrhosis. - In general, hyperthyroidism is more common in young adults between the age of 20 and 40, and is found more often in women than in men. - This kind of family is common where women have the resources to rear their children by themselves, or where men are more mobile than women. - Irritable bowel syndrome affects men and women of all ages, although the onset of the symptoms are most common from the ages of 15-25. - Symptoms of acid indigestion are more common among the elderly and women during pregnancy. - HPV can affect both men and women and because the virus is very common, most people who are sexually active will have HPV at some time during their life. - Heartworm is a disease that is common in dogs and cats in all areas throughout the world. - A problem that is common in people, dogs, and cats is heart disease. - Hypertrophic cardiomyopathy, although a common condition in cats and people, is rare in dogs; so, too, is myocarditis. - Hypothyroidism is a common hormone deficiency in dogs, while hyperthyroidism is more common in cats. - The treatment of hyperthyroidism, using radioactive iodine and surgery, is the second most common cause of hypothyroidism. - Hypothyroidism is more common than hyperthyroidism, affecting 8% of women and 2% of men over age 50. - Among all infections, pneumonia is the most common, occurring in more than 80% of patients. - The disease becomes fatal and most common causes of death include heart failure, respiratory failure, pneumonia or other infections. - As HPV rarely causes symptoms and therefore the majority of infections are unnoticed, genital HPV infections are likely to be even more common than we think. - In children, the most common cause of myocarditis is a viral infection, like influenza or the common cold. - Sneezing, runny nose, nasal congestion, coughs and sore throat are all symptoms of the common cold. - The signs and symptoms are similar to a common cold: runny nose, sneezing, mild cough, and low-grade fever. - Although dizziness can occur in people of any age, it is more common among older adults. - People can develop thyroid nodules at any age, but they are most common in older adults. - Gallstones are more common among older adults, women, Native Americans, Mexican Americans, and people who are overweight. - Complications from measles are more common among very young children (younger than five years of age) and adults (older than 20 years of age). - Although epilepsy is as common in adults over 60 as in children under 10, 25% of all cases develop before the age of five. - Non-Hodgkin’s lymphoma can develop in people of all ages, including children, it is most common in adults. - Choledocholithiasis (common bile duct stones) - Stones can drop out of the Gallbladder into the common bile duct. - Factors affecting mortality in patients over 70 years of age submitted to surgery for gallbladder or common bile duct stones. - Endoscopic sphincterotomy is widely accepted as the treatment of choice for patients with common bile duct stones. - The most common cause for obstruction is choledocholithiasis, or gallstones in the common bile duct. - The most common causes are gallstones in the common bile duct, and pancreatic cancer in the head of the pancreas. - Choledocholithiasis is the presence of gallstones within the common bile duct that leads into the first portion of the small intestine (the duodenum). - Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment. - FTP (File Transfer Protocol): A common way of transferring files on the Internet, though it's primarily used for uploading these days. - Otherwise known as freelancing, this is the third most common way of making money on the internet. - Tenancy in common is the most common way for unmarried people to own property together. - By and large, the most common way to contract this type of periodontal disease is to not care for your teeth and gums properly. - A mug of tea is the most common way of casually consuming tea at work and at home. - At best the information was (as is common in such cases) partial, seemingly contradictory, or insufficiently distributed (as in the case of the Winds Code). - Mild and often transient gastrointestinal symptoms were common, but in no case were severe enough to result in discontinuation of the study. - As in the case of Inspirational or Inspired Speaking this form of mediumship perhaps has more in common with clairaudience than with trance mediumship. - English is widely spoken and it is the language of government and commerce, as Nauruan is not common outside of the country. - Punjabi is the local language, however English and Urdu are also common, particularly in schools and offices, as is the case in almost all over Pakistan. - Burning Image had more in common with the English " batcave " bands of the period like Specimen than any hardcore unit. - Of the types of HPV that increase risk for certain types of cancer, HPV16 is the most common among women in the general population. - Risk: Graves' disease is 8 times more common in women than men, and usually appears between the ages of 20 and 40 (Fitzgerald 1093). - People undergoing coronary artery bypass are at risk for the same complications as any surgery, plus some risks more common with or unique to CABG. - Humans > Health > Diseases > Disease - Humans > Health > Diseases > Symptoms - Age > People > Age > People - People > Age > People > Children * Common Areas * Common Disease * Common Form * Common Name * Common People * Common Species * Common Symptoms * Common Term * Common Type * United States Books about "Common" in
<urn:uuid:5df3cebb-a489-4e56-bc11-a562605ac6dc>
CC-MAIN-2021-43
http://keywen.com/en/COMMON
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584886.5/warc/CC-MAIN-20211016135542-20211016165542-00423.warc.gz
en
0.955677
3,970
2.890625
3
1.713765
2
Moderate reasoning
Health
Choosing and narrowing a topic for your assignment requires a serious effort and time investment, irrespective if your degree program. However, once you are successfully done with the task, the work is not finished. Now you need to start thinking about your writing situation. Although thinking about the writing situations calls for determining the purpose, understanding the audience, considering the point of views, genre, and medium. As for this discussion, we will talk about the first two. Determining your essay A well-thought and crafted assignment has a clear purpose and goal. Here are the three core purposes that students need to examine. - Expressing yourself. Narrating the writer’s emotions, for example, regarding a traffic accident that he/she observed. - Informing the readers. Informing the audience regarding the core reasons why traffic incidents happen. - Persuading the readers. Trying to convince the audience to understand and equip themselves with the safety precautions while driving. In order to determine the purpose of your assignment, ask yourself: Why am I writing this paper? What things I want to achieve with my writing? Do remember that some academic papers can come with more than a single purpose. A paper on fitness workout is both persuasive and informative. You can explain the anatomical changes a body experiences after a workout and convince the readers that hitting the gym is beneficial for their health. Considering your audience Considering the real audience is something not many students acknowledge as important. Various aspects of your assignment such as, the way you convey yourself, the word choice opted, the evidences and supporting details incorporated, the sentence structuring used, and your overall attitude and tone towards the topic depend on the type of audience. The tone is particularly important for your readers. If you want to tempt your audience and connect with them emotionally, your tone needs to present the content in a way that interests them in an understandable and convenient manner. Consider explaining a student orientation session to a family member or a friend. Here you will use a casual language with shorter sentences and friendly tone. For example, “Remember we talked about how amped I am about joining college? Guess what, I attended the student orientation last week, and it was way better than I thought…” On the other hand, when you will be talking about the same session in a student publication piece, your language will be more formal, employing longer sentences with a serious, sober tone. For example, “College student orientations are often perceived as pompous sessions where interested students tend to connect with rather unresponsive teachers. However, I am quite pleased to express that the orientation session I attended last week was a great success and quite productive unlike heard before.” How to consider your audience? During the process of defining your audience, keep the following pointers in mind: - You readers are not at your place and cannot observe or participate in the content you are writing. Consider you are writing about a local landscaping service, the reader cannot visualize the types of services given unless you explain in detail. - Never expect the readers to know the things you know at subliminal level. The readers might not possess the same subject expertise, experience, or insights you are familiar with. Hence, you need to define the technical jargons and industry-specific terms used. - Your audience might not affirm with your opinion and values. If you are writing a paper on parenting skills and argue that strict discipline is not the solution for perfect parenting, there is a chance not everyone will agree with your ideas and claims. - Your readers might not respond in a similar way to yours in different situations. Consider writing a review on Leonardo DiCaprio’s The Wolf of Wall Street. See here wallstreet.edu.au . You must have found the humor in the movie funny, but the case might be the same with other watchers. When we talk about college and university level assignment papers, apparently, your only audience is your teacher. Although teachers often ask students to consider their audience as certain group of people reading a specific magazine, newspaper, etc., but you can holistically assume that your audience is your teacher. It is better to consider the writing situation as if your teacher is unfamiliar with the topic. This is why you are required to provide ample background information, definitions of technical terms, and other details that gives the reader a positive head start in reading the rest of your work.
<urn:uuid:cbbb3f1d-6de6-4e12-acbb-974b5b1d4874>
CC-MAIN-2020-16
https://studiocanalcollection.com/2019/01/05/how-to-consider-the-writing-essay-in-night-time/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371833063.93/warc/CC-MAIN-20200409091317-20200409121817-00253.warc.gz
en
0.942438
911
2.890625
3
2.494327
2
Moderate reasoning
Education & Jobs
DIGG this crazy URL Filed: Sun, Dec 03 2006 under Programming|| Tags: .htaccess url urls digg Although DIGG didn't start the practice of using "clean urls" to access dynamic documents, they certainly did push the practice to the forefront of public attention and most people think of DIGG style headlines when anyone mentions using the article's headline as part of the document URL. Simply put, URLs have evolved from http://www.hunlock.com/showdoc.php?8372893aed to http://www.hunlock.com/blogs/DIGG_this_crazy_URL Friendly to search engines and to users passing your url along to others, you can get DIGG style URLs with a simple modification of your server's .htaccess file and a small server side program to fetch the requested file. To understand how "DIGG style urls" work, you have to understand what's going on when the web server processes a URL. Lets look at the URL for this article. We all know that http://www.hunlock.com/ refers to the server. /blogs/ appears to be the directory that "DIGG_this_crazy_URL" is stored in. I say appears because in reality blogs is not a directory blogs is a document, just like any .htm file and just like any php file. That's right; in the root web directory of hunlock.com is a file called 'blogs' and it's not a directory. The web server, on getting the request for this file checked the root directory and found a file called blogs, since it was not a directory it tried to figure out what to do with the file. Since there's no extension, the out of the box server would just throw up an error message. It's like trying to play a mp3 file without an mp3 extension. So the first step in setting up digg style urls is to let the web server know what to do with these files. This is very easy to do. Go into your web server's root directory and edit (or create) a file called .htaccess and add the following lines. <FilesMatch "^blogs$"> ForceType application/x-httpd-php </FilesMatch> Now you can change "blogs" to be whatever you want but in this example we tell the web server that if it stumbles accross a file that is named "blogs" then treat that file like a php file. That is, even though blogs isn't named blogs.php, the web server will behave exactly as if blogs were named blogs.php. Now when the web server sees: It's going to see blogs as a file and, ignoring everything after blogs, will go ahead and process blogs as a php file. Which leads us to blogs itself. Now because blogs doesn't have a file extension you may have some trouble with your html editors. HTML-Kit will let you deal with the file if you right click on it and tell it to import as text. PS-PAD, which I normally prefer, has the same option but always throws an application error. A solution is to rename the server-file blogs.php until you're ready to test it and then rename it to just 'blogs'. blogs should look something like this... <?php header("Content-Type: text/html; charset=UTF-8"); $uri = $HTTP_SERVER_VARS["REQUEST_URI"]; $fields = explode("/",$HTTP_SERVER_VARS["REQUEST_URI"]); $article_name = $fields[count($fields)-1]; echo("User requested: $article_name"); ?> The first line (header) just sends back a standard type/charset header to the browser so whatever we output is treaded as a web page. The second line gets the full URL that was used to call blogs. "http://www.hunlock.com/blogs/DIGG_this_crazy_URL" The third line "explodes" everything between the slashes into an array called "$fields" so $fields would be HTTP, would be null, would be hunlock.com and so forth. Finally we get the article fromt he URL by counting the number of slashes in the URL subtracting one and pulling the value from the exploded URL in $fields. Now that you have the file name you can do whatever you want with it from querrying a database for the information to transforming the article name into a file name and just doing a simple file dump. The possibilities are endless and completely up to the limits of your imagination.
<urn:uuid:6b20a956-6e87-4600-b10b-d7ecd9e3ac22>
CC-MAIN-2013-20
http://www.hunlock.com/blogs/DIGG_this_crazy_URL
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383508/warc/CC-MAIN-20130516092623-00008-ip-10-60-113-184.ec2.internal.warc.gz
en
0.912816
991
2.703125
3
2.146859
2
Moderate reasoning
Software Dev.
The names ‘Bhaskaracarya’ and ‘Lilavati’ are well-known. If a student displays outstanding talent in Mathematics, the school teacher lovingly calls the student. In AD, Bhaskaracarya (b. AD), renowned mathematician and astronomer of Vedic tradition composed Lilavati as the first part of his larger work called. On the th birth anniversary of India’s foremost medieval mathematician, DR CHAKRAVARTI MADHUSUDANA reflects on the life and. |Published (Last):||16 November 2015| |PDF File Size:||4.2 Mb| |ePub File Size:||15.97 Mb| |Price:||Free* [*Free Regsitration Required]| Lilavati’s face had lost its initial charm. Whish published a paper in the Transactions of the Royal Asiatic Society that proved that developments in Mathematics had continued unabated in Kerala, a region that was the least affected by the invaders. His book on arithmetic is the source of interesting legends that assert that it was written for his daughter, Lilavati. Indian mathematics Social history of India Science and technology in India 12th-century books. There were several other Kerala mathematicians of note in the post-medieval period. Engaging with the World from Ancient to Modern Times. Account Options Sign in. I have read many different things which are different from the original story I had heard, but here, I will stick to the original one that my teacher had once told me. One fifth upon the bed. Lilavati includes a number of methods of computing numbers such as multiplications, squares, and progressions, with examples using kings and elephants, objects which a common man could understand. He thought of a way to get her out of her depressed state. Bhaskaracharya and his Leelavati Of a group of elephants, half and one third of the half went into a cave, One sixth and one seventh of one sixth was drinking water from a river. He made all arrangements to make sure that Lilavati would get married at the auspicious lilavqti. In order to ensure that this moment was not missed, Bhaskara constructed a device where a cup with a small hole was placed in a vessel of water. Methods of Finding Squares. This fact has led to the following fanciful story. This lucid, scholarly and literary presentation has been translated into several languages of the world. Leelavati was written inbefore the days of printing, mathematifian the material and equipment required for making permanent written records were not abundant. Only the people involved would know what really happened, and they would have taken their little secrets silently to their graves. Since the Shaka era is believed to have started from 78 AD, we can calculate that he was born in AD. The little girl asked her father many questions and gained a lot of knowledge this way. Concatenation Permutations Partitions etc. The book is useful to pilavati going children, sophomores, teachers, scholars, historians and those working for cause mathematicixn mathematics. To avoid this fate, he ascertained an auspicious moment for his daughter’s wedding and to alert his daughter at the correct time, he placed a cup with a small hole at the bottom of a vessel filled with water, arranged so that the cup would sink at the beginning of the propitious hour. Place Values of Digits. We love Sydney in the summer December 20, Get to Know Us. He posed arithmetic problems at Lilavati about the things around her and asked her to find solutions to the problems. Tarot Predictions for December December 1, The present work is an enlargement of his Marathi work and attempts a thorough mathematical explanation of definitions, formulae, short cuts and methodology as intended by Bhaskara. How to Become a Human Calculator?: Retrieved from ” https: Shopbop Designer Fashion Brands. Seeking Grooms December 1, You auspicious girl with enchanting eyes of a fawn, Lilavati, If you have well understood the above methods of multiplication What is the product of and 12? The auspicious moment for the wedding thus passed unnoticed ljlavati a devastated Bhaskara II. The special event will be commemorated with several academic conferences across India. Views Read Edit View history. Lilavati has been used as a standard textbook for about years. This story, like many other stories, may not be able to tell us what really happened. Hamon Circulation January 28, at 2: As destined, Lilavati’s husband died a few days after the marriage. Would you like to tell us about a lower price? It an important book for students, teachers to learn history of ancient Indian arithmetic in a simpler poetic style. India needs to overhaul its education system January 29, Bhaskara found it very difficult to see these changes in his beautiful daughter. From Wikipedia, the free encyclopedia. Bhaskara had a daughter named Leelavati. Līlāvatī – Wikipedia mathematican But that is an entirely different story. Share your thoughts with other customers. The young woman saved one third of them. To get the free app, enter mobile phone number. Bhaskara concludes Lilavati by saying- “Joy and happiness in this world shall continually increase for those who hold her kanthasakta, close in their arms or clasped to their bosoms”. India-Australia must forge knowledge partnership.
<urn:uuid:6970fcd8-611a-4cec-ae5d-1d8157469ad7>
CC-MAIN-2020-16
https://4ma.me/lilavati-mathematician-39/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497309.31/warc/CC-MAIN-20200330212722-20200331002722-00123.warc.gz
en
0.962458
1,160
3.328125
3
2.751255
3
Strong reasoning
Science & Tech.
- Open Access Optimization and control in bacterial Lag phase © Schultz and Kishony; licensee BioMed Central Ltd. 2013 - Received: 25 November 2013 - Published: 16 December 2013 The lag phase of bacterial growth is important from a medical and food safety perspective, but difficult to study due to the low density and metabolic rate of cells. A new study by Alon and colleagues reveals that the gene expression program during early lag phase prioritizes carbon source utilization enzymes over genes responsible for biomass accumulation. This cellular strategy ultimately maximizes growth, making the best long-term use of the new nutrient-rich environment. See research article: http://www.biomedcentral.com/1752-0509/7/136 - Pareto Front - Gene Expression Program - Carbon Source Utilization - Protein Synthesis Rate - Optimal Control Strategy When cells in stationary phase are introduced into a rich environment, it is in their best interest to gain biomass as quickly as possible in an effort to secure resources before their competitors. What, then, is the role of the lag phase, an initial period when no growth is observed? Known about for over a century and still poorly understood, the lag phase has proven difficult to study due to the low density and low metabolic activity of bacteria during this phase. While it is usually interpreted as an adaptation period when the cell has to transition from low to high metabolism, little is known about the genetic program of the lag phase. A new study by Alon and colleagues finds that gene expression during the lag phase was shaped by evolution to set the stage for maximal gain of biomass upon exit from lag phase by focusing on the production of bottleneck enzymes for carbon utilization. Outside of the lab, bacteria spend relatively little time in exponential phase. Indeed, if given unlimited nutrients, a single Escherichia coli cell could grow exponentially into a colony the size of the planet in just a couple of days (exploited by Michael Crichton in his novel ’The Andromeda Strain’ ). Yet, modern studies have focused on the exponential phase alone, leaving the lag and stationary phases in obscurity. Understanding how bacteria behave when they are not dividing is of great importance for a number of applications. In food preservation, for instance, the maximum extension of shelf-life is directly related to the length of the lag phase . In the case of bacterial infections, understanding the recovery from stationary phase is essential to explain the course of action of a pathogen once it reaches the bloodstream. To further examine the lag phase, Alon and colleagues developed an automated assay that overcomes the limitations of having a low-density culture. The authors make use of a library of E. coli strains where each contains a different native promoter expressing a fluorescent reporter. Genes of interest were picked from this library, covering a variety of metabolic functions to allow the characterization of the lag phase expression program. For each gene analyzed, the wells of a 96-well plate containing fresh media were sequentially inoculated with the corresponding strain from the library at regular intervals, resulting in a time-series of the lag phase. The plate was then fixated on ice and analyzed in a flow cytometer for cell count, reporter fluorescence and cell size. The fact that the cell does not begin accumulation of biomass as early as possible, and instead produces enzymes that will maximize the import and processing of primary resources to be used later on, addresses the question of how efficient evolution is in shaping gene regulation to optimize cellular processes. The processes responsible for gain of biomass are initially locked by the stringent response, while the genes responsible for carbon utilization are present in low levels, constituting a bottleneck for growth. What, then, is the optimal strategy of regulation to ensure the fastest accumulation of biomass in the long run? The authors used optimal control theory to analyze a cell growth model developed by Baranyi and Roberts , which includes bottleneck enzymes that make substrates available for biomass production. In agreement with the observed behavior, the optimal solution dictates that all resources should be initially invested in the production of the bottleneck enzymes alone, until a point in time where biomass production is switched on to full activation. Control engineers have long known that such optimal control strategies where the control signal abruptly switches between on/off positions arise in a variety of minimum-time problems. Such strategies are known as bang-bang control. If one wishes to move an elevator stopped at one floor to a stop on another floor in the minimum time, the optimal control solution would be to apply maximum acceleration until a switching point where one should switch abruptly to apply maximum deceleration. Bang-bang control strategies seem to be applied to a variety of biological processes. Apart from being optimal in many situations, bang-bang control can also be easier to implement, since an on/off switch does not require complex regulation. In another study by van Oudenaarden and colleagues on the formation of mouse intestinal crypts, stem cells initially undergo only symmetric divisions, generating more stem cells until the entire adult pool is established. Only at this point the whole pool switches to asymmetric divisions, generating the crypt in minimal time . How important is it to the cell that proteins are expressed at optimized levels? In a different study by Alon , the costs and benefits associated with the expression of the lactose utilization enzyme LacZ were determined, and optimal levels of expression were calculated for different concentrations of lactose. Strains grown under full induction of LacZ and fixed concentrations of lactose evolved to express the predicted optimal levels of the enzyme, highlighting the fitness advantage obtained by optimal expression . In another study, they analyze the allocation of resources as the cell transitions from exponential to stationary phase - in other words, from a situation where growth genes are favored to one where stress responses are more important. The expression of relevant genes was found to follow Pareto fronts, which describe optimal allocation of resources, with the cell gaining just enough ability to fight stress at the expense of the minimal amount of growth, in an effort to optimize trade-offs . However, cellular responses are not always optimized, and optimization for one condition may mean lack of optimization for another. When the cell is forced to deal with a temporary stress, otherwise optimized cell functions might operate inadequately. Cells exposed to DNA synthesis inhibitors, for instance, do not optimally regulate ribosomal genes, leading to an excess of ribosomes and an imbalance between DNA and protein synthesis rates . Identifying and understanding a non-optimal cellular response can point to the Achilles’ heel of the cell, which may inspire novel antimicrobial approaches. As for the understanding of the lag phase, many challenges still remain. While some cells try to maximize growth in the minimal time, others remain dormant for long periods, for reasons that are not completely clear. In fact, most microorganisms do not grow even when inoculated into yeast extract, which contains all the components of the metabolic network. Some species seem to wait for growth factors indicating the presence of other members of their complex societies, on whom they might depend . Other species diversify their phenotypes between a majority of fast growers and a minority that remains in a low metabolic state, called persisters. This subpopulation is able to resist many types of stress and regenerate the entire population, and has been linked to latent bacterial infections . As our knowledge advances, the initial part of the growth curve begins to show a wide complexity of behaviors and strategies, evolved to deal with the crucial mission of surviving in low numbers in a new environment. - Madar D, Dekel E, Bren A, Tzimmer A, Porat Z, Alon U: Lag phase bacteria strongly and selectively express bottleneck genes. BMC Syst Biol. 2013, 7: 136-PubMed CentralView ArticlePubMedGoogle Scholar - Crichton M: The Andromeda Strain. 1969, New York: Knopf DoubledayGoogle Scholar - Sun DW: Handbook of Food Safety Engineering. 1998, Wiley-Blackwell: HobokenGoogle Scholar - Baranyi J, Roberts TA: A dynamic approach to predicting bacterial growth in food. Int J Food Microbiol. 1994, 23: 277-294. 10.1016/0168-1605(94)90157-0.View ArticlePubMedGoogle Scholar - Itzkovitz S, Blat IC, Jacks T, Clevers H, van Oudenaarden A: Optimality in the development of intestinal crypts. Cell. 2012, 148: 608-619. 10.1016/j.cell.2011.12.025.PubMed CentralView ArticlePubMedGoogle Scholar - Dekel E, Alon U: Optimality and evolutionary tuning of the expression level of a protein. Nature. 2005, 436: 588-592. 10.1038/nature03842.View ArticlePubMedGoogle Scholar - Shoval O, Sheftel H, Shinar G, Hart Y, Ramote O, Mayo A, Dekel E, Kavanagh K, Alon U: Evolutionary trade-offs, Pareto optimality, and the geometry of phenotype space. Science. 2012, 336: 1157-1160. 10.1126/science.1217405.View ArticlePubMedGoogle Scholar - Bollenbach T, Quan S, Chait R, Kishony R: Nonoptimal microbial response to antibiotics underlies suppressive drug interactions. Cell. 2009, 139: 707-718. 10.1016/j.cell.2009.10.025.PubMed CentralView ArticlePubMedGoogle Scholar - Lewis K: Persister cells, dormancy and infectious disease. Nat Rev Microbiol. 2007, 5: 48-56. 10.1038/nrmicro1557.View ArticlePubMedGoogle Scholar - Balaban NQ, Merrin J, Chait R, Kowalik L, Leibler S: Bacterial persistance as a phenotypic switch. Science. 2004, 305: 1622-1625. 10.1126/science.1099390.View ArticlePubMedGoogle Scholar This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
<urn:uuid:a4538960-c517-4fe5-8fe0-0bd5bebb2510>
CC-MAIN-2019-18
https://bmcbiol.biomedcentral.com/articles/10.1186/1741-7007-11-120
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532882.36/warc/CC-MAIN-20190421195929-20190421221929-00348.warc.gz
en
0.89586
2,191
2.53125
3
3.016746
3
Strong reasoning
Science & Tech.
Municipal wastewater effluents are the largest single effluent discharges, by volume, in the country Pollution Entering Canadian Waters Across Canada, a high proportion of the population is served by wastewater collection and treatment systems. The level of treatment ranges from no treatment to very sophisticated and thorough treatments. Wastewater effluents are released to a wide variety of receiving environments: lakes, ponds, streams, rivers, estuaries and oceans. Effluents released from wastewater systems do contain pollutants of concern since even advanced treatment systems are unable to remove all pollutants and chemicals. Furthermore, some sewer collection and treatment systems are combined with stormwater collection systems that can become overloaded during heavy rainfalls, resulting in the release of partially treated or even untreated effluents. The solid material (biosolids and sludges) collected during treatment is disposed of on land, incinerated or sent to landfills. Treatment of wastewater also releases emissions to air mostly in the form of carbon dioxide and methane. The Effect of the Release of Wastewater Pollutants on Ecosystems and Human Health Releases to surface waters Several environmental and health impacts resulting from insufficient wastewater treatment have been identified in the scientific literature and actions need to be taken to reduce these impacts. These impacts can include negative effects on fish and wildlife populations, oxygen depletion, beach closures and other restrictions on recreational water use, restrictions on fish and shellfish harvesting and consumption and restrictions on drinking water consumption. Some examples of pollutants that can be found in wastewater and the potentially harmful effects these substances can have on ecosystems and human health include: - decaying organic matter and debris can use up the dissolved oxygen in a lake so fish and other aquatic biota cannot survive; - excessive nutrients, such as phosphorus and nitrogen (including ammonia), can cause eutrophication, or over-fertilization of receiving waters, which can be toxic to aquatic organisms, promote excessive plant growth, reduce available oxygen, harm spawning grounds, alter habitat and lead to a decline in certain species; - chlorine compounds and inorganic chloramines can be toxic to aquatic invertebrates, algae and fish; - bacteria, viruses and disease-causing pathogens can pollute beaches and contaminate shellfish populations, leading to restrictions on human recreation, drinking water consumption and shellfish consumption; - metals, such as mercury, lead, cadmium, chromium and arsenic can have acute and chronic toxic effects on species. - other substances such as some pharmaceutical and personal care products, primarily entering the environment in wastewater effluents, may also pose threats to human health, aquatic life and wildlife. Releases to Air The process of collection and treatment of wastewater also results in the release of certain volatile chemicals into the air. The chemicals tyically released in the largest volume include; methane, carbon dioxide, oxides of nitrogen, hydrogen sulfide, mercaptans, chlorine (if used in the treatment process) and various other chemicals can be released to a smaller extent. Releases to Land The process of removing both inorganic and organic suspended solids from the wastewater results in large quantities of solid waste. In typical treatment facilities, the inorganic solids (grit, debris) and other non-biodegradable materials are sent to landfill. Many secondary treatment facilities collect the organic solids and process them in a digester to recover methane gas for energy production. Once the organic solids have been completely digested (no further methane production), various options are available to the treatment facility. These solid wastes can be land applied as a soil fertilizer/conditioner, incinerated for further energy recovery, sent to landfill, or to deep well injection. Report a problem or mistake on this page - Date modified:
<urn:uuid:3540f9bb-0482-42fe-a4b5-4fd3bc1068cf>
CC-MAIN-2021-49
https://www.canada.ca/en/environment-climate-change/services/wastewater/pollution.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358233.7/warc/CC-MAIN-20211127193525-20211127223525-00511.warc.gz
en
0.928757
777
4.15625
4
2.908135
3
Strong reasoning
Science & Tech.
English Composition I In this course, students learn about critical thinking, analysis, argumentation, reflection, and making sound rhetorical choices to write effective academic essays. Students also learn techniques for reading, interpreting, and utilizing a variety of sources in their writing. The course content covers key grammatical concepts, multimodal writing, collaboration, research skills, and proper documentation. The course focuses on the rhetorical content and strategies that are the baseline of effective college writing. This course allows students a way to master these concepts and skills in small bites, through engaging practice activities and frequent questioning with targeted feedback. The course was developed by Lumen Learning, with contributions from English faculty from various institutions, including faculty from the Department of Writing and Rhetoric at the University of Mississippi. Lumen OER courses apply learning science to engage students and better support the learning process. Lumen materials aim to deliver an active learning experience. They include text, images, videos, assessments, directed feedback, practice questions, simulations, and other interactives that invite students to apply their knowledge, improve their understanding, and perform better. Term over term, Lumen’s Waymaker courseware makes it possible to use learning data to identify where content improvements are needed. We work collaboratively with faculty and subject matter experts to develop and test iterative, continuous improvements aimed at increasing efficacy and learning. Additional Course Features These course materials include: - Waymaker Courseware: User-friendly Waymaker learning tools improve success for at-risk students with personalized study plans, automated study tips and nudges, and early alerts to identify and help struggling students. - Outcome-aligned OER: Designed to replace expensive textbooks, this course curates the best available open educational resources (OER) aligned with learning outcomes. Teach it as-is or customize to fit your needs. - LMS Integration: This course is delivered with seamless LMS integration and automatic grade return for Canvas, Blackboard, Brightspace, and Moodle. - Accessibility: Lumen is 100% committed to providing learning materials that are accessible to all learners. Lumen course materials are mobile-friendly. Audrey Fisch, New Jersey City University Laura Alyse Leininger, Collin College Barbara Egel, City Colleges of Chicago What People Are Saying “Lumen Learning has been a great partner for us with our work. Everyone has been helpful, and they care about students, which is my main concern.” – Guy Krueger, University of Mississippi Video Overview: Waymaker English Composition I & Developmental English This recorded webinar provides a guided walkthrough of Lumen’s Developmental English and College Composition course materials, including learning design, OER content, course structure, and how Waymaker courseware personalizes the learning experience and deepens student engagement. Why Teach with Lumen Course Materials? - Replace expensive textbooks: Ready-to-adopt open educational resources (OER) include text, videos, simulations, self-checks, and other interactives. - Choose affordability: Low cost to students. - Use better content: Continuous, data-driven improvements make OER content more effective at supporting learning. - Simplify access: Easy access to course materials in your LMS (Blackboard, Canvas, D2L, and Moodle) plus automatic grade return. - Improve student outcomes: Research shows Lumen course materials can improve academic performance, passing rates, and course completion. - Save time: Start with curated, outcome-aligned OER and supplemental instructor resources like quiz banks, assignments, slide decks, etc. - Customize your course: Freedom to tailor course content to fit your learning outcomes and instructional approach. - Enjoy awesome support: Faculty-friendly onboarding, training, and support. - Learn by doing: Online homework, self-check activities, and other interactive tools strengthen learning. - Engage from day one: Avoid falling behind with access course materials from the first day of class. - Retain materials: Download a digital copy of course content to keep forever. - Become a better learner: Real-time feedback guides students on where to focus and how to improve.
<urn:uuid:68981479-09f5-4353-b322-8b8588af65b8>
CC-MAIN-2020-45
http://lumenlearning.site/courses/english-composition-i/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107904834.82/warc/CC-MAIN-20201029154446-20201029184446-00513.warc.gz
en
0.897379
877
2.625
3
2.452457
2
Moderate reasoning
Education & Jobs
Article review aims to both summarize and evaluate an article written by another writer. It should begin with the most basic information about the article and the author’s primary goal. Then a brief overview should be included in order to present the overall informational content without delving into details. The main part of the article review is a critical examination of the most important arguments. The last paragraph is a final assessment of the article credibility, relevance, and contribution to one’s knowledge. Article review example is provided to exemplify how all of these essential steps may be taken in practice. Jane Gallop’s article “The Ethics of Reading”, published in the Journal of Curriculum Theorizing, aims to explain how close reading may enhance one’s understanding of various texts. The author further uses this information to address the problems of today’s education, claiming that it teaches children to read but fails to instruct how reading should be done. Finally, the article discusses how more effective reading may improve one’s writing skills. One of the most convincing arguments in this article is that the commonly accepted approach towards reading is ineffective. According to Gallop, this approach relies on seeing a text as the overall picture but omitting smaller details at the same time. Through a well-structured discussion with an addition of several examples, she shows that texts consist of seemingly insignificant fragments which can make sense only when they are put together. Therefore, it may be elaborated that readers are not able to distinguish which fragments are important for their understanding and which may be easily dismissed. So, close reading may be a more efficient method because it allows to notice everything step by step, and thus to see a larger picture. However, Gallop does not mention that this method requires more time than usual reading, although this is a considerable obstacle, which often encourages people to skip not only details but whole sentences and paragraphs as well. Nevertheless, her argument is not undermined by this omission. Her explanations clearly show that usual reading does not save time but requires more hourage instead when readers are forced to re-read texts in the search for the missing fragments. When Gallop explains how close reading can improve one’s writing, her main point is that this reading method helps to become more objective. In order to support this point, she builds a rather elaborate but still comprehensive argument about the ways in which people project their own thoughts and beliefs onto original texts. She provides examples of how literary critics interpreted classical works through the lens of their experience and prejudice, thus seeing support for their views in the texts which were centered around obviously different ideas. The article proves that readers are always subjective and their understanding largely relies on their personal interpretations. Gallop suggests that close reading may solve this problem because it helps to concentrate on what authors intended to express through their works. However, since a comparably larger part of the discussion is dedicated to the subjectivity of reading, it is easy to lose the main topic of the article. This flaw slightly decreases Gallop’s persuasiveness. All in all, this essay succeeds in proving its main claim through a well-structured and detailed discussion. Because the author relies on examples from literature and her own teaching experience, she is able to provide her arguments with support and credibility. Mentioned long-term and short-term benefits of close reading contribute to the overall informational basis in the field of education, thus showing new ways of effective learning. Beers, G. K., & Probst, R. E. (2012). Notice & note: Strategies for close reading. Heinemann. Feaman, L. (2014). Unlocking close reading. Eau Claire, USA: Capstone. Gallop, J. (2011). The Ethics Of Reading: Close Encounters. Journal Of Curriculum Theorizing, 7-17. Hinchman, K. A., & Moore, D. W. (2013). Close Reading: A Cautionary Interpretation. Journal of Adolescent & Adult Literacy J Adolesc Adult Liter, 56(6), 441-450. doi:10.1002/jaal.163 Lemov, D., Driggs, C., & Woolway, E. (2016). Reading reconsidered: A practical guide to rigorous literacy instruction. John Wiley & Sons.
<urn:uuid:2f4225e5-174f-45a4-b2dc-6327931c724b>
CC-MAIN-2018-13
https://worldessays.com/blog/article-review-example.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648000.93/warc/CC-MAIN-20180322190333-20180322210333-00772.warc.gz
en
0.93556
892
3.390625
3
2.970338
3
Strong reasoning
Education & Jobs
Helloindonesia.id – The Aceh tsunami at the end of 2004 had a major impact on many aspects of the life of the Indonesian people, especially the western coast of Sumatra, including Aceh. The humanitarian tragedy also made many people around the world aware of the importance of building community preparedness against the threat of disaster. Especially for the West coast of Sumatra – from Aceh to Lampung, the biggest threat that must be faced by the community is the Earthquake and Tsunami from the Indian Ocean. This encourages initiatives from various parties to provide public education preparedness facilities for Tsunami, one of which is now realized with the establishment of the Aceh Tsunami Museum. The museum was built at the initiative of a number of institutions, including the Provincial Government of NAD, the Banda Aceh City Government, the Aceh-Nias Rehabilitation and Reconstruction Agency, the Ministry of Energy and Mineral Resources and the Indonesian Architects Association. According to one of the initiators, this building not only serves as a means of education for the general public but also serves as a vehicle to commemorate the fall of 120,000 lives in the incident. Founded with funds worth Rp. 70 billion, this building also functions as a tsunami evacuation center in the future. Although it has been inaugurated since February 2008, the new museum was opened to the public on May 8, 2011. The architecture of the museum building was designed by architect and ITB lecturer, M. Ridwan Kamil. The design with the theme ‘Rumoh Aceh as Escape Hill’ was chosen in the contest, after defeating 68 designs that met the criteria set by the committee. The design of this building adapts the concept of building houses on stilts which are characteristic of traditional Acehnese houses. For this reason, the most basic floor is made as an open space that can function as a public space while providing a safe distance from the threat of a coming tsunami wave. The outer wall motif of the building is an image adaptation of the Saman dance which is a symbol of the strength, discipline and religious belief of the Acehnese people. There is a vertical tunnel rising in the middle of the building like a chimney. Around the walls in this passage are the names of the victims during the Tsunami and at the peak there is the silhouette of ‘Allah’ in Arabic letters. When entering the building, we will pass down a corridor with waterfalls on both sides, which gives rise to the feel of panic that emerged when the Tsunami occurred. The Tsunami Museum is divided into several segments. The first segment on the ground floor serves as a vehicle to commemorate the 2004 Tsunami disaster, a visual documentation display room and a ‘chimney’ containing the names of the victims. Through a spiral staircase and a transverse bridge, we enter the second segment located on the 2nd floor, which is a tsunami education vehicle in the form of tsunami history documentation, dioramas, various science props related to tsunami events and library space. The third segment is an open space on the roof of the building that serves as a vehicle for evacuation of the community when the Tsunami occurs again. Reference : indonesiakaya.com Visit too: https://www.touristinasia.com/
<urn:uuid:db521a4e-81bd-4e64-98f7-d1a0f1123380>
CC-MAIN-2021-21
https://helloindonesia.id/aceh-tsunami-museum-dark-history-of-natural-disasters/2039/indonesian/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989705.28/warc/CC-MAIN-20210512193253-20210512223253-00148.warc.gz
en
0.95646
688
3
3
2.202783
2
Moderate reasoning
History
For People Working to Protect Nature, Cities Can No Longer Be an Afterthought For many years, maps used to plan conservation projects would leave urban centers like New York City blank. Cities were literally — and intentionally — left off the map. Today, conservationists are thinking differently. Cities can no longer be an after-thought or a charge left solely to urban organizations. More than half of the world’s population lives in cities, and this number is rapidly increasing. Climate change has exacerbated hazards to cities, like flooding and extreme heat, putting millions of people in harm’s way. Cities present an interesting tension — as well as a big opportunity — for conservation groups that traditionally focused on saving the last pristine places. More people means more pressure on our natural resources to meet the demands of life. At the same time, urban living has many benefits for nature. Densely populated areas require less land to be developed, and resources and services can be delivered more efficiently. Well-designed cities with dense housing, walkable communities and good public transit can support low-carbon, sustainable lifestyles. While valuing and enhancing natural areas in cities has long been an effort of park organizations, environmental justice groups, community land banks and others, large conservation organizations such as The Nature Conservancy (TNC), where I work, are quickly recognizing the power and potential of cities. Defining what “urban conservation” encompasses is still a challenge, but its essence is about managing a city’s natural resources and systems in a way that benefits both people and nature. Those of us involved in urban conservation continue to learn what works and what doesn’t. While we don’t have all the answers at TNC, we do know that conservation looks different in an urban setting in a few key ways. In a rapidly urbanizing world, these lessons could be useful for anyone trying to make cities greener and more equitable. 1. Put People Front and Center In conservation, we often talk about protecting “keystone species,” which are species that define an entire ecosystem. In cities, humans are a keystone species: What humans do affects every other living being. The health and economic well-being of people’s a goal of urban conservation. In a practical sense, people are at the center of every conservation decision in a city. In contrast to more traditional land or water conservation work, in cities there is rarely one right solution for a particular place. We can only co-create an approach with the community by building relationships and trust with residents, and by truly listening. Our expertise then can show up in context-appropriate ways. 2. Prioritize Low-Income, Frontline Communities In the United States, environmental challenges facing cities, such as sea-level rise and pollution, have a disproportionate negative impact on low-income communities — often communities of color. Many of these communities have not historically been engaged by the conservation movement because of racial, economic and other barriers. This must change. Access to the benefits nature provides — such as clean water, cool air and protection from flooding — should not be a luxury available to those who can afford it. It’s a right that goes to the core of human health and well-being. We need to prioritize urban conservation projects that help people who need it the most. Adopting an equity-based approach to planning, community engagement and evaluation (one we’re taking at TNC) is critical to working authentically and transparently with partners and ensuring that nature — trees, green stormwater systems and open spaces — can make the biggest difference in underserved, diverse communities. 3. Recognize the Need for Flexibility and Adaptation Historically, the term “conservation” has been about preservation, protection and permanence. But in cities, where everything is always changing rapidly, what does “conservation” even mean? Conservation scientists adaptively manage landscapes based on local needs, barriers and opportunities. They care deeply about nature and want to have a positive impact on those natural systems. Those same skills — observation and adaptive management — and those same values — respect for diversity and the value of place-based conservation — translate powerfully to urban conservation programming. But unlike trees and wildlife, the people in urban communities have a strong voice that is inextricable from conservation projects and mandates a participatory approach to planning that is inherently different from working in landscape conservation. This inclusivity is an opportunity that is unique to urban conservation. We need to reimagine cities as complex ecosystems where the built environment, nature and human communities work together to face unprecedented environmental challenges. Envisioning a Great Green City View The Nature Conservancy’s vision for a sustainable urban century.DOWNLOAD Field Guide to Conservation in Cities This guide provides guidance to conservation leaders in launching new or expanding existing urban conservation programs and partnerships.DOWNLOAD
<urn:uuid:cc4b0105-7849-4913-b2bb-1b2125b6d386>
CC-MAIN-2020-16
https://www.nature.org/en-us/what-we-do/our-insights/perspectives/to-protect-nature-cities-cannot-be-an-afterthought/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518767.60/warc/CC-MAIN-20200403220847-20200404010847-00421.warc.gz
en
0.934815
1,018
3.375
3
3.005243
3
Strong reasoning
Science & Tech.
Uncommon salmonella traced back to raw ahi State health investigators have identified a relatively rare type of salmonella poisoning on Oahu that they linked to similar cases on the mainland through "fingerprints" of the bacteria's DNA. The illnesses are believed due to raw ahi imported and distributed to Hawaii and other places, said Dr. Paul Effler, state epidemiologist. The state Department of Health believes the tuna had been previously frozen and was then eaten raw. The Food and Drug Administration is conducting a "traceback investigation," talking to distributors and to those affected about where they ate or bought the fish to try to determine if there is a common source, he said. In Hawaii, Effler said, it looks as though people became ill after eating raw ahi mostly in poke but also sashimi. A sushi restaurant was involved in some mainland cases, he said. About 30 cases have been confirmed on Oahu since October, said Janice Okubo, state Health Department spokeswoman. Five people were hospitalized but have been released, she said. "They have all recovered or are recovering." The unusual culprit is known as salmonella Paratyphi B. Because it is rare "doesn't necessarily mean it's serious," Effler said. "It's just more uncommon." Most illnesses involve diarrhea, fevers and chills, he said. "Most infections resolve on their own without need for antibiotics." Hawaii has about 300 cases of salmonella food poisoning from various strains every year, Okubo said. There were 330 last year and 265 in 2006. Usually, only about 10 cases of Paratyphi B occur annually, she said. Scattered cases began occurring in October in different parts of Oahu, she said. "Nothing was exactly the same with these cases, and because in Hawaii there is so much consumption of fish and so much fish is brought in, it was difficult to knock down," she added. The Health Department launched in November "what ultimately was a fairly intensive investigation," Effler said. A study was done of all cases, asking people who became ill what they ate the week before. They were matched by age to people in the neighborhood, with three people interviewed for each case about what they ate during the same week, he said. Health researchers drew a "geographic border" around the addresses of those affected, got phone numbers and called people of the same age in the area, asking if they were sick and what they ate for the week involved, he said. "It's an imperfect tool, but when we get enough people responding, it's amazing how often we can get the difference between people who got sick and those who didn't," Effler said. "Fortunately, people in Hawaii are willing to talk to us, and we were able to get enough control people to respond to statistically implicate raw fish/ahi consumption." In the last few weeks, Effler said, his office became aware of some cases on the mainland, so they fingerprinted the germ's DNA through a national database. "Lo and behold, two cases in Colorado ultimately matched by the DNA fingerprint had consumed raw fish the week before the illness," he said. "Also, a case in California had fish exposure. This pretty much convinced us the source was likely to be raw fish brought in and distributed not just to Hawaii."
<urn:uuid:54c999ab-1575-4d03-b8e8-f8f2eb1870bd>
CC-MAIN-2014-15
http://archives.starbulletin.com/2008/01/26/news/story07.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00386-ip-10-147-4-33.ec2.internal.warc.gz
en
0.989398
696
2.859375
3
3.041976
3
Strong reasoning
Health
The very last space shuttle flight before NASA retires the 30-year program is targeted to launch on July 8, space agency officials announced today. The shuttle Atlantis is slated to carry four veteran astronauts to the International Space Station to deliver supplies and spare parts for the orbiting outpost. NASA is targeting to launch Atlantis from the Kennedy Space Center in Florida on July 8 at around 11:40 a.m. EDT (1540 GMT). The target launch date for Atlantis' 12-day mission is based on NASA's current planning. An official launch date will be announced following the mission's Flight Readiness Review on June 28. During the final shuttle flight, Atlantis will also deliver an experiment "to demonstrate and test the tools, technologies and techniques needed to robotically refuel satellites in space – even satellites not designed to be serviced," NASA officials said in an announcement. [The Most Memorable Space Shuttle Missions The four-astronaut crew will return an ammonia pump that failed on the space station in July 2010. Engineers want to understand why the pump failed and hope to use the knowledge to improve designs for future spacecraft. STS-135 will be Atlantis' 33rd and final mission before it is retired, along with the rest of the agency's orbiter fleet. The historic flight will be the 135th and final mission of NASA's space shuttle program Chris Ferguson, a veteran of two previous shuttle missions, will command the flight with Doug Hurley as the pilot. Astronauts Sandy Magnus and Rex Walheim will be the flight's mission specialists. No spacewalks are planned. [Spaceships of the World: 50 Years of Human Spaceflight In the weeks leading up to the launch, NASA will conduct several non-standard activities, including tests and close inspections of Atlantis' external fuel tank. Mission managers want to X-ray aluminum support beams, known as stringers, located near the mid-section of the fuel tank. Cracks were detected in some the metal ribs on the shuttle Discovery's fuel tank after the orbiter's during the first launch attempt in November. Repairs forced a lengthy delay for that flight, which ultimately launched earlier this year. [Photos: Shuttle Discovery Sets Sail on Final Voyage An X-ray inspection of the similar metal ribs on Atlantis' fuel tank will provide extra confidence that there are no cracks, NASA officials said. Some of the ribs were already modified with extra material to add strength and do not require inspection, they added. Atlantis' STS-135 mission will mark the 135th and final flight for NASA's space shuttle program after 30 years of spaceflight. The space shuttles are retiring in order to make way for a new space exploration program aimed at sending astronauts on deep space missions to visit an asteroid by 2025, and then aim for Mars. After Atlantis' final flight, the shuttle will be sent to the Kennedy Space Center Visitor's Complex for public display. NASA's two other space flown shuttles, Endeavour and Discovery, will also be sent to museums. The shuttle Endeavour is currently flying its final mission, called STS-134, and is docked at the International Space Station. Endeavour and its crew launched Monday (May 16) to deliver a major astrophysics experiment and perform maintenance on the space station during four spacewalks. Endeavour is due to return to Earth on June 1. This article was reprinted with permission from SPACE.com. Related on SPACE.com
<urn:uuid:d912c74c-21df-47ca-9538-42a7a01f90dd>
CC-MAIN-2015-18
http://www.mnn.com/earth-matters/space/stories/nasa-sets-last-ever-shuttle-launch-for-july-8
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430448950892.36/warc/CC-MAIN-20150501025550-00041-ip-10-235-10-82.ec2.internal.warc.gz
en
0.939505
715
2.640625
3
1.695609
2
Moderate reasoning
Science & Tech.
'Overwintering' refers to how certain organisms, particularly plants, and animals, survive through the winter season. It involves adaptations and strategies to withstand the harsh conditions and ensure their survival until Spring arrives. To survive freezing temperatures and environmental stresses, plants have evolved mechanisms to protect their tissues from frost damage, such as producing antifreeze proteins or accumulating sugars that act as cryoprotectants. Some plants shed their leaves or dormant during winter to conserve energy and reduce water loss. When it comes to animals, some move to warmer areas with more food, while others hibernate or go into a torpor state. Hibernation is a prolonged sleep-like state where metabolism, body temperature, and heart rate decrease. Torpor is a shorter, less deep form of dormancy that helps animals save energy and food during cold seasons. The concept of ‘Overwintering’ can metaphorically connect to romantic relationships. Just like plants and animals do, couples need to develop coping mechanisms and communication skills to navigate through difficult times. Love, like overwintering, needs resilience and adaptation to endure challenging times. Nothing on this earth remains in the same way until its death or extinction; neither everyone possesses the same abilities or interests. Ultimately, your survival and happiness in life depend on how much you’re capable of harmonizing conflicting interests between different individuals. Love is like a fountain of grace and mercy. Likewise, love can provide warmth, calm, and comfort during difficult times. As overwintering, organisms seek shelter and protection from harsh elements, individuals in love often find solace and support in their partner’s embrace. Love can provide a sense of security and stability that helps individuals to pull through the storms in life. Furthermore, this can be extended to love enduring over time. Similar to how plants and animals emerge from their winter dormancy and flourish in spring, love can also experience periods of renewal and growth. Relationships that successfully navigated through challenging times can emerge stronger and more resilient. The Sakura flower catches everyone's eye during the Spring. Although, no one knows whether it exists or not even if it is not seen in winter. As such, people's lives, especially love, aren’t always the same. That is, it takes different forms at different times. Whatever situation life puts you in, embrace it because you are stronger than your greatest fears. So, let's love each other even harder during challenging times because someday spring will return for sure. In a nutshell, if you can get along it, not alone but in the company of both of you, tied by mutual trust, incomparable kindness, and consolable love for each other, your love will shine like no other start ever did. Share This Post On Leave a comment You need to login to leave a comment. Log-in
<urn:uuid:9c70b378-6a40-41d7-8a37-ed7ccba7a8cf>
CC-MAIN-2023-40
https://thesocialtalks.com/blog/the-overwintering-process-apply-it-to-your-love-life-too/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00580.warc.gz
en
0.92753
588
3.40625
3
2.511838
3
Strong reasoning
Social Life
a person who receives or entertains guests at home or elsewhere: the host at a theater party. a master of ceremonies, moderator, or interviewer for a television or radio program. a person, place, company, or the like, that provides services, resources, etc., as for a convention or sporting event: Our city would like to serve as host for the next Winter Olympics. the landlord of an inn. a living animal or plant from which a parasite obtains nutrition. Surgery. the recipient of a graft. Compare (def 2). verb (used with object) to be the host at (a dinner, reception, etc.): He hosted a reception for new members. to act as host to: The vice president hosted the foreign dignitaries during their visit. to act as master of ceremonies, moderator, or interviewer for: to host a popular talk show. verb (used without object) to perform the duties or functions of a host. a multitude or great number of persons or things: a host of details. the bread or wafer consecrated in the celebration of the Eucharist. a person who receives or entertains guests, esp in his own home the compere of a show or television programme (computing) a computer connected to a network and providing facilities to other computers and their users the owner or manager of an inn to be the host of (a party, programme, etc): to host one’s own show (transitive) (US, informal) to leave (a restaurant) without paying the bill a great number; multitude an archaic word for army the bread consecrated in the Eucharist “person who receives guests,” late 13c., from Old French hoste “guest, host, hostess, landlord” (12c., Modern French hôte), from Latin hospitem (nominative hospes) “guest, host,” literally “lord of strangers,” from PIE *ghostis- “stranger” (cf. Old Church Slavonic gosti “guest, friend,” gospodi “lord, master;” see guest). The biological sense of “animal or plant having a parasite” is from 1857. “multitude” mid-13c., from Old French host “army” (10c.), from Medieval Latin hostis “army, war-like expedition,” from Latin hostis “enemy, foreigner, stranger,” from the same root as host (n.1). Replaced Old English here, and in turn has been largely superseded by army. The generalized meaning of “large number” is first attested 1610s. “body of Christ, consecrated bread,” c.1300, from Latin hostia “sacrifice,” also “the animal sacrificed,” applied in Church Latin to Christ; probably ultimately related to host (n.1) in its root sense of “stranger, enemy.” “to serve as a host,” early 15c., from host (n.1). Related: Hosted; hosting. Healthcare Open Systems and Trials an entertainer (Rom. 16:23); a tavern-keeper, the keeper of a caravansary (Luke 10:35). In warfare, a troop or military force. This consisted at first only of infantry. Solomon afterwards added cavalry (1 Kings 4:26; 10:26). Every male Israelite from twenty to fifty years of age was bound by the law to bear arms when necessary (Num. 1:3; 26:2; 2 Chr. 25:5). Saul was the first to form a standing army (1 Sam. 13:2; 24:2). This example was followed by David (1 Chr. 27:1), and Solomon (1 Kings 4:26), and by the kings of Israel and Judah (2 Chr. 17:14; 26:11; 2 Kings 11:4, etc.). - Hosts file networking A text file on a networked computer used to associate host names with IP addresses. A hosts file contains lines consisting of whitespace-separated fields giving an IP address followed by list of host names or aliases associated with that address. The name resolution library software can use this file to look up the IP […] [hohst-spi-sif-ik] /ˈhoʊst spɪˈsɪf ɪk/ adjective 1. capable of living solely on or in one species of host, as a parasite that infests only chickens. noun, Informal. 1. empty, exaggerated, or pretentious talk or writing: His report on the company’s progress was just so much hot air. noun 1. (informal) empty and usually boastful talk noun phrase Related Terms full of hot air Empty, exaggerated talk, as in That last speech of his was pure hot air. It is also […] - Hot-air balloon noun 1. a lighter-than-air craft in which air heated by a flame is trapped in a large fabric bag
<urn:uuid:299292fb-0e05-4e9b-b231-78b49595beb7>
CC-MAIN-2017-17
http://definithing.com/define-dictionary/hosts/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123484.45/warc/CC-MAIN-20170423031203-00477-ip-10-145-167-34.ec2.internal.warc.gz
en
0.915419
1,115
2.65625
3
1.899973
2
Moderate reasoning
Literature
Budgeting is an essential activity in every community tree program. A budget estimates costs for the year, including costs of anticipated program growth. The budget worksheet on the back of this fact sheet lists many categories of possible expenditures. Some items may not apply to your tree program, but all budgets should provide for tree removals, pruning, and planting. The amount of money allocated to each operation will depend on the condition of your community trees and the amount of work needed to improve their health and safety. Consider the following suggestions when developing your annual community tree budget. Use an annual planning session and work plan to identify needed labor, equipment, and materials. (See Fact sheet 6 for information on developing annual work plans.) Always keep accurate annual records of expenditures and work accomplished. Estimate future needs by considering the cost of past activities and the potential for growth. Remember to include special programs and money to cover unexpected costs. During the year, keep decision makers well informed about your program's accomplishments and needs. Most municipal officials are not familiar with the technical details of community forestry, so the budget process should be an educational process as well. Provide the public and the media with information on program accomplishments and needs. Grassroots support can help your program compete for and secure funding. The amount of money your tree program allocates to each budget item depends partly on its age, since new programs have slightly different priorities than well-established ones. In general, allocate about 20 percent of the budget to the removal of hazardous, dead, and declining trees. Make the removal of hazardous trees your first priority. Then allocate about 40 percent of the budget to tree maintenance activities. Four-fifths of this maintenance budget could be designated for pruning. Although tree planting is very popular and provides quick results, too many communities make the mistake of doing little but planting trees while neglecting to care for older, more valuable trees. An established program that is maintaining existing trees should spend only about 20 percent of its annual budget on tree planting. Administrative activities are an integral part of every tree program and should receive about 20 percent of the budget. If your program is new, administrative activities and efforts aimed at building legislative and public support through education should be a high priority and receive as much as 50 percent of the budget, leaving less money for other activities. When completing your budget, consider the cost effectiveness of contracting for services or sharing some costs with other municipalities rather than having your own employees provide all services. The worksheet on the back was developed to assist communities in identifying tree-related expenditures while planning for the future. It can be used to plan a budget for the coming year and to summarize what was spent in the past year. The worksheet also can be used to submit a National Arbor Day Tree City USA application. The Tree City USA award consists of a walnut plaque, a large green and white flag, and highway signs featuring your community's name and the Tree City logo. To be recognized as a Tree City USA, your community must have a tree committee and a tree ordinance, celebrate Arbor Day, and spend at least $2 per capita on your tree program. To determine your per capita expenditures, first add all funds spent for tree care, including time and money spent by public utilities. Then calculate the monetary value of volunteer labor, using minimum wage or some other reasonable rate. Calculate the value of pro-bono services by attorneys or other professionals using a reasonable professional rate and add these values to your total. Finally, determine your annual per capita expenditures by dividing your total expenditures by the number of people who live in your community. Many communities spend far more than the $2 per capita minimum required for the Tree City USA award.
<urn:uuid:c73daa96-4008-4c38-9a41-bab55fb069f1>
CC-MAIN-2019-09
https://extension.psu.edu/annual-budgets-for-community-tree-programs
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481766.50/warc/CC-MAIN-20190217071448-20190217093448-00221.warc.gz
en
0.946031
757
2.84375
3
2.454912
2
Moderate reasoning
Finance & Business
Cybersecurity has never been a simple task. Attacks on security protocols evolve every day as attackers are becoming more and more creative with their efforts. It is highly imperative that every business is familiar and know the different features which make impeccable cybersecurity. These cyber attacks are carried out in full public view nowadays, and hackers are not bothered about keeping themselves under the radar. At the same time, some hackers intentionally want to be spotted to know the security measures of the organization. The worldwide spending on cybersecurity has been growing at an astonishingly high rate. Organizations all around the world are spending a substantial amount of their capital on developing security protocols. A survey of 2017 shows that 88% of tech executives have spent more than $1 million on developing security protocols. The massive amount spent by modern day firms on cybersecurity depicts its significance. Organizations have started to realize that malware is a publicly available product which makes it quite easy for anyone to become a cyber attacker. In the modern world, the employee stays connected to the internet on a daily basis. Their communication channels are well attached to a broad base of staff. These channels of communication are spread all over the globe, which makes the reliance on cybersecurity a paramount prerequisite. Any mistake in these patterns of interaction can severely impact the organization and their brand identity. Furthermore, when a breach occurs the businesses reputation will also be at stake. Clients will not feel safe investing in a breached business, and this could result in substantial losses. In a recent report from AT&T, 62% of businesses acknowledge that they experienced some form of cyber-attack. As per the 2016 estimation, almost 80% of US companies had suffered some cyber-attacks, with 47% experiencing a ransomware incident. In today’s date, it’s very crucial to plan for the worst in advance as hacks, data breaches and ransomware are considered quite normal. The gurus of market segment emphasize on firms to make cybersecurity training mandatory for employees and recommend different solutions to minimize risks. Ongoing trends of cybercrime give a strong indication that a firm’s size is not an essential factor. All online entities can become a target of a hacker. However, SMEs (Small and Medium Exchange) are often less prepared for massive security threats, and they are easy targets than their larger counterparts. Furthermore, the main reason why SMEs are not adequately ready to fight back different types of threats is that they have limited resources. Types of Cyber Threats 1. Attacks on Confidentiality 2. Attacks on Integrity 3. Attacks on Availability Advanced Persistent Threats (APTs) About Judy Robinson Judy Robinson is a passionate tech blogger at Mars Technology, a Virginia based Data Security and Cybersecurity Company specializes. She is passionate about technology and loves to analyze the tech industry in her spare time and stay in touch with the latest happenings.
<urn:uuid:d4d44e4f-2a15-4b32-a46f-00818cba3992>
CC-MAIN-2019-43
https://aboutssl.org/everything-you-need-to-know-about-cyber-threats-and-security/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987751039.81/warc/CC-MAIN-20191021020335-20191021043835-00472.warc.gz
en
0.954204
584
2.78125
3
2.721999
3
Strong reasoning
Software
Muskrats are unique, semi-aquatic rodents named for the musky smell and rat-like appearance. They're known mostly for their destructive burrowing in ponds, streams and dams, but there's more than this to these large wetland-dwelling mammals. Below, learn all about muskrats, including interesting facts and important habits that can help you control their damage. Scientific Name: Ondatra zibethicus Average Size: 16 - 25" long (including an 8-11" tail); 2 - 5 lbs. Average Lifespan in the Wild: 1 - 3 years Identifying Features: dense brown fur; rounded body with a long, hairless black tail; webbed hind feet for swimming and smaller front feet for digging; small beady eyes and small ears. Muskrats are native to North America, with a range that extends from Canada, down to some northern parts of Mexico. They have also been introduced to Northern Europe, Asia, and South America - mainly for their valued pelts. Muskrats are semi-aquatic mammals that inhabit areas abundant in water like wetlands, ponds, lakes and marshes. For shelter, muskrats will either dig tunnels or construct lodges, depending on the immediate habitat. In areas with steep banks or dams, muskrats will dig tunnels that begin underwater and lead up above the water level, where the chamber can remain dry. In other areas without steep walls or dams, muskrats build dome-shaped lodges out of nearby vegetation and mud. Muskrats are omnivores, but they mainly enjoy a plant-based diet consisting of the roots, stems, leaves and fruits of aquatic vegetation. As local plant food becomes scarce, muskrats will feed on small aquatic animals such as insects, fish and amphibians. Freshwater mussels often become a dietary staple in the wintertime. Some favorite foods include: Activity: Muskrats are active year-round, and they feed at all times of the day. They are most active at twilight. Reproduction: Females give birth to 2-3 litters per year, each time yielding an average of 4-8 pups. The size of the litters varies with the seasons, with larger litters being born in spring and summer, and small litters being born in winter. In warmer months, muskrats can give birth to as many as 15 young at once. Newborn muskrats are weaned for about a year before they become independent. Feeding: Muskrats gather food within their territories and carry it to feeding platforms on which they eat. These feeding platforms are flat, elevated piles of mud and vegetation, which muskrats construct outside of their living dens. Social Interaction: As monogamous breeders, muskrats live with their mates and their young. They are very territorial - especially during breeding season. Identify Muskrat Damage Muskrat damage occurs as a result of their burrowing habits. Oftentimes damage is not very obvious until severe destruction occurs, which is why it's important to understand how to identify muskrat burrows and other warning signs. Signs of a muskrat's presence or damage include: - muskrat tracks: four toes in front and five in the back with visible claws; visible tail mark in between prints - muskrat droppings on dry, elevated surfaces such as stumps, logs, rocks or feeding platforms - feeding platforms: elevated, flat pads of mud and vegetation - lodges: piles of mud and aquatic vegetation, up to 8 feet in width and 5 feet tall - muskrat burrow entrances: holes in backs or dams, about 6-8" in diameter and up to 3 feet below water level - leaking ponds or dams due to burrowing - collapsed banks due to extensive burrowing Muskrats are carriers of some diseases that may be transmitted to humans and/or pets through a bite, drinking contaminated water, or coming into contact with muskrat flesh. The most serious illnesses include: - tularemia - via ticks, bites, contact with infected flesh and contaminated water - leptospirosis - via contaminated, soil or contact with urine - giardiasis - via contaminated water, contact with/ingestion of waste or ingestion of infected flesh - rabies - via bites and contact with infected saliva Muskrats are excellent swimmers, thanks to their webbed back feet, laterally flattened tails, and the ability to hold their breath underwater for 15-20 minutes. They can swim backwards and forwards. Most of the time muskrats mate underwater. Muskrat kits are born hairless and blind. Known to be most valuable for their fur or pelts, muskrats are one of the most trapped animals in history. Muskrats play important roles in certain ecological systems, as their eating and denning habits create the ideal flat nesting areas for certain birds. - How to Get Rid Of - How to Trap - How to Repel
<urn:uuid:0a5dcc22-691f-47a2-94bf-c8701b63cbb7>
CC-MAIN-2018-17
http://www.havahart.com/muskrat-facts
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944742.25/warc/CC-MAIN-20180420213743-20180420233743-00618.warc.gz
en
0.937957
1,054
3.890625
4
1.677675
2
Moderate reasoning
Science & Tech.
Spotted Owl - Strix occidentalis Calls - Strix occidentalis Introduction: The Spotted Owl is a medium-sized, darkly coloured, nocturnal woodland owl with a round head and dark brown eyes. The Latin word "occidentalis" refers to something from the west. Other local names include Canyon Owl, Brown-eyed Owl, Wood Owl, and Hoot Owl. [For help with terms used in the description, see parts of an owl. For general characteristics common to most owl species, see owl physiology.] Description: The facial disc is pale buffish-brown with some darker concentric lines and a dark rim that is not very prominent. The crown is dark brown, slightly tinged rufous with whitish flecks and small spots. Eyes are blackish-brown. The cere is yellowish-horn and the bill pale greenish-yellow. Upperparts are dark brown with many transverse or arrow-shaped white spots. Some scapulars have relatively large areas of white, and are dark barred on the outer webs. Flight feathers are barred light and dark with fine vermiculations on the light bars. Tail feathers are dark brown with several narrow whitish bars and a whitish terminal band. The throat is whitish. The upper breast is barred whitish and dark brown, while the lower breast and belly are boldly marked dark brown and white. Individual feathers in this region are dusky at the base, along the shaft, and bordering the tip, with a large rounded white spot at each side of the central streak. This gives the owl its white spotted appearance to the underparts. The belly is boldly barred dark brown and white. Tarsi are densely feathered to the toes, which are bristled, and coloured pale greyish-brown with yellowish soles. Claws are dusky horn. Size: Length 40.5-48cm. Wing length 301-328mm. Tail length 191-226mm. Weight 520-760g. Females are heavier than males. Habits: Spotted Owls are nocturnal. They are placid, often allowing close approach by humans and may be reluctant to fly. In flight, they have heavy methodical wing beats, but appear buoyant for their size. When roosting, a Spotted Owl will sit on a branch, near the trunk, where it is camouflaged against tree bark and shadows. Voice: The typical advertisement call is a mellow, 4-note hoot, "Whoop wu-hu hoo". Both Males and Females use it as a territorial call and mate-locating call. During territorial disputes, they give a more excited version of the call. Other calls are the "series location call", a series of 7 to 15 hoots, given during disputes and/or calls between paired birds. A "bark series" of 3 to 7 loud, rapid barks, usually given by the female during territorial squabbles, and then there is the "nest call" given during the pre-nesting period. Other sounds given when alarmed include grunts, groans, and chatters. The female often emits a loud "co-weeep" to contact Hunting & Food: Hunting is done mainly at night, usually beginning just after sunset and ending a half hour before sunrise. Spotted Owls use a perch to "sit and wait" to dive down onto prey. They rarely forage in flight. Prey is sometimes cached for later use. Prey taken to the nest by the male is often decapitated first. During the day, a Spotted Owl may take the odd prey that passes by its day roost, fly to a food cache, or fly to a nearby stream to drink. Spotted Owls feed mainly on flying squirrels and wood rats. Other major prey include gophers, rabbits and hares. Summer diets are more varied with deer mice and voles being important foods. Spotted Owls are known to capture 30 mammal species including bats, and 23 bird species as prey. They also eat snakes, crickets, beetles, and moths. They have been known to walk around campgrounds at night to pick up scraps of food. Pellets are large and compact measuring about 5.1-7.6 cm in Breeding: The breeding season is from March to September. Timing and success in producing offspring are strongly linked to the availability of prey, and not all pairs breed every year. Spotted owl pairs mate for life, but a new mate is readily taken if the other disappears. They probably begin breeding at two to three years Spotted Owls nest primarily in stick nests of Northern Goshawks, on clumps of mistletoe, in large tree cavities, on broken tops of large trees, on large branches, or cavities in banks and rock faces. Old nests are not repaired before eggs are laid, and tend to be reused year after year. Clutch size ranges from 2 to 4 eggs, but averages 2 to 3 eggs. Eggs are laid every 3 to 4 days, usually in April. The female does all incubation and the male delivers food to the nest. The incubation period is about 28 to 32 days. Unlike most other owls, Spotted Owls may not defend their eggs and young from predators, watching nearby as the nest is destroyed. Young are brooded constantly by the female for 2 weeks, then she begins to hunt as well. The male brings food to the nest and passes it to the female to feed to the young. Young start roaming from the nest onto nearby branches at about 5 weeks, but some flutter to the ground before climbing up into trees. They can fly weakly at about 6 weeks. At 9 to 10 weeks young can capture insect prey by themselves. Families remain loosely associated during summer before young disperse in the autumn. Adults tend to remain near their traditional nesting territories, while juveniles disperse widely, as much as 100 to 200 km. Mortality: Spotted Owls are long-lived, with captive Owls of 21 years being known. Mortality in the wild is thought to be very high (60 to 95%) for juveniles, especially during the dispersal stage. Adult mortality is estimated at 5 to 20% annually. Natural predators of the Spotted Owl include the Great Horned Owl, which preys on both adults and young; the red-tailed hawk, which preys on young; and the common raven, which may destroy eggs. Many juveniles starve to death. It is thought that Barred Owls will out-compete Spotted Owls for habitat, by being more aggressive, when the two species come into contact. The Spotted Owl may be the most publicised of all endangered species in North America. Because of its dependence on large tracts of old-growth coniferous forests, management for this owl has caused tremendous turmoil in the forest harvesting industry, and has spawned an incredible amount of research - too much to go into here. Habitat: The Spotted Owl is a bird of dense, dark, old-growth or mixed mature and old-growth coniferous forests. Forests are usually dominated by firs or Douglas-fir, but they also use mature hardwood forests of cottonwoods, alders, oak, and sycamore, especially along steep-walled river valleys. They prefer an uneven and multi-layered canopy. They prefer shaded mountain slopes and canyons over flat plateau areas. Distribution: North America - Resident in the mountains and in the humid coastal forest from southwestern mainland British Columbia south through western Washington and western Oregon to southern California; and in the Rocky Mountain region of the interior from southern Utah and southwestern and south-central Colorado south through the mountains of Arizona, New Mexico, and extreme northwestern Texas. The Spotted Owl is generally non-migratory, except that some downslope movement from mountains may occur in winter. Distribution of the Spotted Owl Strix occidentalis Status: Uncertain. Locally threatened by forest destruction, and by hybridisation with the Barred Owl Strix varia. Original Description: Xantus de Vesey, John. 1860. Proceedings of the Academy of Natural Science of Philadelphia (Proc. Acad. Nat. Sci. Philadelphia) 11 (1859): p 193. S. o. occidentalis, S. o. caurina, S. o. lucida, S. o. juanaphillipsae Campbell, Wayne. 1994. "Know Your Owls". Axia Wildlife Page compiled by Deane Lewis. Page last updated 2013-07-24 OwlPages.com Owl Species ID: 130.070.000
<urn:uuid:3d4821e7-a436-432f-8b7c-0433242c9e74>
CC-MAIN-2014-49
http://www.owlpages.com/owls.php?genus=Strix&species=occidentalis
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379546.70/warc/CC-MAIN-20141119123259-00154-ip-10-235-23-156.ec2.internal.warc.gz
en
0.941607
1,899
3.34375
3
1.896178
2
Moderate reasoning
Science & Tech.
Rookery Bay National Estuarine Research Reserve is hosting six lectures about local flora and fauna on Saturday, Jan. 17. Below are detailed descriptions of each of the lectures. Kristen Hines, 11 a.m. – noon South Florida Birds and Gardens. Bird gardening in sub-tropical South Florida is critical given that the region supports nearly 300 bird species and has lost nearly 70 percent of its natural upland habitat to development. Learn how bird gardening is different in South Florida and how private landowners can help restore and maintain the region’s ecological functions through landscaping. Hines is a writer, photographer and environmental educator focused on nature, travel and conservation. With an M.S. in biology, her work is grounded in biological principles to lure readers and viewers into the lives of plants and animals. Kristen will sign books she has for sale after her presentation. Eric Foht, Noon – 1 p.m. Living Roofs, Flowers in the Sky. This presentation will change the way you look at a roof forever. Come learn how living roofs can help your home while protecting Southwest Florida’s Gulf, estuaries, and endangered plants. Foht is a Natural Areas Manager at Naples Botanical Garden. He grew up in Naples and enjoys spending his time with his family and friends, playing in the ocean and experimenting with fringe ideas of all sorts. Jack Berninger, 1 – 2 p.m. Bird Behavior. This presentation will cover many aspects of bird behavior, specifically adaptation through anthropomorphic actions and survival techniques. Jack is a retired biology teacher and naturalist who continues to educate through lectures and field trips in Ohio and Florida about anything from art to zoology. Geoff Trager, 2 – 3 p.m. Poachers in Paradise. This hands-on presentation will address poaching in Southwest Florida and provide demonstrations of energy-efficient gadgets highlighted in his new fiction book “Poachers in Paradise.” Geoff’s short talk will be followed by a book signing. Geoff Trager is a marine biologist, aquarist at Rookery Bay Reserve, naturalist and educational kayak tour guide, and environmental fiction writer. Ted Below, 3 – 4 p.m. Least Terns. Least Terns are the smallest terns in the Americas and found only in our area from late March through August during nesting season. Although in the past (40 to 50 years ago) they had large successful colonies of up to a thousand nests, now at best there are two to three hundred. Ted Below, a longtime volunteer at Rookery Bay Reserve, will discuss these birds, their nesting, and the issues they encounter while sharing the shore with humans. The final lecture of the event on Saturday is the evening Keynote Presentation. Registration is required at www.rookerybay.org and admission is $15. Pete Frezza, 5:30 – 7 p.m. Roseate Spoonbills in the Everglades: A Look into the Past, Present and Future of the Flame Bird. Pete will discuss 75 years of monitoring roseate spoonbill populations in southern Florida. This will include a look into historical nesting patterns in Florida Bay and factors that have led to changes in their population over time along with results from long-term banding and satellite telemetry projects with these birds. He will also give a brief overview of Everglades restoration projects that are expected to improve conditions for these birds throughout the ecosystem. Peter Frezza is the research manager for the Everglades Region at Audubon Florida’s Everglades Science Center. The research is focused on Everglades restoration initiatives and how modifications to freshwater flow are effecting and impacting plant, fish and bird life in the downstream coastal mangrove zone and Florida Bay. Rookery Bay Environmental Learning Center 300 Tower Road Naples, FL 34113
<urn:uuid:253b1a38-1932-42e1-90f5-d26e9e47dfee>
CC-MAIN-2017-13
https://depnewsroom.wordpress.com/2015/01/09/diverse-schedule-of-speakers-at-rookery-bay-nature-festival/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187690.11/warc/CC-MAIN-20170322212947-00386-ip-10-233-31-227.ec2.internal.warc.gz
en
0.932556
809
2.640625
3
2.511628
3
Strong reasoning
Science & Tech.
A new chemical process developed by a team of Harvard researchers may increase the utility of positron emission tomography (PET) in creating real-time 3-D images of chemical activity occurring inside the human body. This new work by Tobias Ritter, associate professor of chemistry and chemical biology, and colleagues holds out the tantalizing possibility of using PET scans to peer into a number of functions inside animals and humans by simplifying the process of using “tracer” molecules to create the 3-D images. For example, imagine a pharmaceutical company developing new treatments by studying the way “microdoses” of drugs distribute in the bodies of living humans. Imagine researchers using non-invasive tests to study the bio-distribution of drugs aimed at combatting disorders such as Alzheimer’s disease, and identifying physiological differences in the brains of patients suffering from schizophrenia and bipolar disorder. It may sound like science fiction, but it’s a future that may be closer than most realize. As described in the Nov. 4 issue of Science, the process is a way of transforming fluoride into an intermediate reagent, which can then be used to introduce a fluorine isotope to organic molecules, creating the PET tracers. Often used in combination with CT scans, PET imaging works by detecting radiation emitted by tracers. “It’s extremely exciting to us,” Ritter said. “This allows us to now make tracers that would have been very challenging to make using conventional chemistry.” A major goal for pharmaceutical chemistry has been to develop effective methods to incorporate fluorine atoms into complex molecules. With support provided by Harvard’s Office of Technology Development (OTD) through its Technology Development Accelerator Fund, Ritter developed novel techniques and chemical reagents to facilitate the development of a “late-stage” process that enables fluorination to take place at the end of a compound’s synthesis. Subsequently, OTD drove the formation of a new, venture-backed start-up company created around this platform technology in order to develop it for certain commercial applications. Ritter’s technology has the potential for wide-ranging applications in multiple areas of pharmaceutical science and medicine, including creation of novel therapeutics, as well as imaging agents for diagnosis of disease. The new technique builds on Ritter’s earlier fluorination work, reducing concerns about the two-hour half-life of the fluorine isotope used for PET. Ritter’s process begins with fluoride, which is chemically altered to create an intermediate molecule, called an “electrophilic fluorination reagent.” Armed with that reagent, and using the late-stage fluorination process developed in Ritter’s lab, his team is then able to create fluorinated molecules for use in PET imaging. The technique opens the door to pharmaceutical companies using the relatively simple, noninvasive scans to track how “microdoses” of drugs behave in living subjects, with the potential payoff coming in more efficient and cheaper drug development. “One of the most immediate applications of this is in using molecular imaging to give us an understanding of the biodistribution of a drug,” Ritter said. “If a pharmaceutical company is developing a drug to treat schizophrenia, they could use this test to see if it enters the brain. If early tests show it doesn’t, they would be able to kill the project before spending a great deal of time and money on it.” Funding for the research was provided by the National Institute of General Medical Sciences, the National Institute of Biomedical Imaging and Bioengineering, the National Center for Research Resources, the National Institute on Drug Abuse, the Richard and Susan Smith Family Foundation, the Massachusetts Life Sciences Center, the Harvard Catalyst, the NSF Graduate Research Fellowship Program, and the Harvard University Technology Development Accelerator Fund.
<urn:uuid:d9a4641c-99f9-491d-8e17-2df274ac97a7>
CC-MAIN-2014-42
http://news.harvard.edu/gazette/story/2011/11/tracing-biological-pathways/
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637904722.39/warc/CC-MAIN-20141030025824-00231-ip-10-16-133-185.ec2.internal.warc.gz
en
0.915167
806
3.140625
3
2.951062
3
Strong reasoning
Science & Tech.
Smartphone apps inform, entertain, educate and make life a lot easier -- until your battery dies. Teacher and mom Jeri-Sue Dean was getting more frustrated every week. "I'm a teacher and we're getting into 21st century learning and you have to keep up,” said Dean. Dean uses her iPhone for news, weather, music, games and more. But she said she often has to recharge mid-day. What's draining batteries so fast? There are some obvious culprits, according to tech expert Rick McCloskey with One World Labs. McCloskey said apps that use GPS, programs that constantly update and free games that have scrolling advertisements are battery drains. One way to figure out what apps are zapping your phone is a free program called Carat , developed by researchers at University of California, Berkeley. Carat identifies energy hogs and energy bugs on your individual device. "An energy hog is an app that, across most devices, seems to use more energy than a typical app,” said Adam Oliner, one of Carat’s creators. "An energy bug is an instance of an app running on a particular device that uses far more energy on that device than on most other devices." Once Carat identifies these, it offers recommendations to help a user get more out of his or her battery life. CLICK HERE for Carat for Apple devices. CLICK HERE for Carat for Android. Most common draining apps The most common culprits: email and Facebook apps. McCloskey found out he had apps running in the background even when they weren’t in use, like Yahoo news and a music app. Once you identify what’s zapping your battery, the solution can be simple: If you don’t use it, lose it. The same goes for GPS, Wi-Fi and Bluetooth. Turn these off when you don’t need them. For things like email, Facebook and Twitter, check out your settings. “Email is probably the easiest example. You can go in there and it'll say: 'How often do you want me to check your email... every one minute, five minutes, 10 minutes, once and hour?' So, setting those types of settings will cut down on battery usage," said McCloskey. McCloskey said a few changes can really help your battery-life. It’s a matter of prioritizing. That way you save your battery, and you don't waste your money.
<urn:uuid:c428d7ad-0178-4e6e-bb0f-2ae765b8bdd4>
CC-MAIN-2014-41
http://www.turnto23.com/news/daily-extras/apps-that-zap-your-smartphone-battery-too-fast
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138770.35/warc/CC-MAIN-20140914011218-00236-ip-10-234-18-248.ec2.internal.warc.gz
en
0.948515
535
2.6875
3
1.996694
2
Moderate reasoning
Hardware
Geographic Knowledge in Freebase Geographic content in Freebase is largely clustered in certain regions of the world. The United States accounts for over 45% of the overall number of place names in the collection, despite covering about 2% of the Earth, less than 7% of the land surface, and less than 5% of the world population, and about 10% of Internet users. This results in a US density of one Freebase place name for every 1500 people, and far more place names referring to Massachusetts than referring to China. A third of all place names are geo-located in Europe. The United Kingdom is home to about 7% of place names, Poland has about 6%, and France has just over 5%. The United Kingdom accounts for one place name for every 2000 inhabitants, the same proportion as Luxembourg. Ukraine is the only European country described with less than one place name per 30,000 inhabitants, whereas Slovenia and Poland are described in exceptional detail, with about one place name for every 1000 people and one place name for every 1300 inhabitants, respectively. This stands in contrast to countries like China that account for less than 1% of the collection (with less than 4000 place names, and a density of only one place name for every 300,000 inhabitants). Most of Africa, Asia, Latin America and the Caribbean are similarly underrepresented. Nigeria barely represents 0.1% of the place names, and Venezuela accounts for only 0.05%. Outside Europe and North America, only four countries (Australia, China, India, and Japan) are represented with more content than Antarctica (in part because the database contains descriptions of hundreds of Antarctic mountains and ranges). The largest cluster of under-represented countries is found in Sub-Saharan Africa, where only a handful of countries are described by more than one place name for every 100,000 inhabitants. South Africa is the notable exception, as it exhibits information counts comparable to most European countries. Other exceptions are Nepal and Bhutan in Asia, which score relatively highly compared to neighbouring countries. It is also worth pointing out that Indonesia in the country with the lowest information density in the world, with only one place name per 470,000 people. Because Freebase is a core ingredient in the informational menu presented to us by the world’s most widely used search engine, these presences and absences have the potential to have a significant impact on how we understand, interact with, and create our world. Freebase may seem like a small corner of the Web, but the imbalances that we observe in it can have large reverberations through the broader information ecosystems accessed by billions of people. Freebase forms one of the key informational ingredients in Google’s Knowledge Graph. If you’ve ever looked at the side panel in Google’s search results page, which presents information about people, places, and events in response to a search query, then you’ve probably come into contact with data stored in Freebase. The data that we collected from Freebase describe over 43 million entities, among which we identified 478 thousand place names. The content is stored as RDF triples, which specify a predicate in the form of subject-verb-object. The triples in the dataset have been surveyed, collecting all entities associated with a latitude-longitude coordinates pair; that is, all subjects of triples where the verb refers to the concept “has latitude” and “has longitude”. Note: This post was originally published on the OII's Geonet project blog on . It might have been updated since then in its original location. The post gives the views of the author(s), and not necessarily the position of the Oxford Internet Institute.
<urn:uuid:ec79155f-3bb2-4f75-b8b7-a391794dc110>
CC-MAIN-2019-39
https://www.oii.ox.ac.uk/blog/geographic-knowledge-in-freebase/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573368.43/warc/CC-MAIN-20190918213931-20190918235931-00494.warc.gz
en
0.927468
761
3.15625
3
2.696119
3
Strong reasoning
Science & Tech.
|c. 420–450 million| |Regions with significant populations| |Predominantly Muslim. There are also some adherents of Christianity, Druze, Judaism, Samaritan, Yazidi or others.| |Related ethnic groups| |various Afro-Asiatic peoples| The term Arab (Arabic: عربʻarab) generally refers to those persons who speak Arabic as their native tongue. There are estimated to be over 300 million people living in the Arab world. There are 22 nations holding membership in the Arab League, though not all are independent. Arabs form the majority of the populations of Algeria, Bahrain, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, Oman, Qatar, Saudi Arabia, Sudan, Syria, Tunisia, the United Arab Emirates, and Yemen. Somalia, Djibouti, Mauritania, Comoros, and the state of Palestine are also included in the Arab League, although Arabs are not necessarily the majority of all their populations. The Arab world should not be confused with the term "Middle East," which is a strategic designation birthed during the days of the British Empire, and encompasses such non-Arab countries as Israel, Iran, and Turkey. An overwhelming majority of Arabs are Muslim, members of the faith founded by the Prophet Muhammad in the seventh century. There are also Arabic-speaking Jews and Christians throughout the Middle East. However, though Arab history is closely intertwined with Muslim history, there are significant non-Muslim communities in the Arab world. As well, many Muslims are from non-Arab countries such as Turkey, Pakistan, Indonesia and many Sub-Saharan African countries. There are also large Arab and non-Arab Muslim communities in North America. Geographically, the Arab world is defined as extending from the Persian Gulf to the Atlantic Ocean, from Iraq and the Gulf states in the east to Morocco's Atlantic coast in the west. From north to south, the Arab world extends from Syria to Sudan. There are several ways to be considered an Arab. One is by lineage, considered to be "pure Arab," which can be traced as far back as Noah through his son Shem. Another group, considered to be "Arabized-Arabs," come from North African or Middle Eastern countries outside the Arabian Peninsula. This group includes anyone who speaks Arabic, follows Arabic traditions, and is loyal to Arabic politics. The Arabs of the Arabian Peninsula, the area of land between Asia and Africa, commonly believe that they are descendants of Shem, the son of Noah. Keeping the surname is an important part of Arabic culture as some lineages can be traced far back to ancient times. Some Arabs claim they can trace their lineage directly back to Adam. In addition to Noah and Shem, some of the first known Arabs are those who came from Petra, the Nabataean capital (today, Petra is an archaeological site in Jordan, lying in a basin among the mountains which form the eastern flank of Wadi Araba). Other Arabs are known as "Arabized-Arabs," including those who came from some parts of Mesopotamia, the Levant, Berber lands, Moors, Egypt, The Sudan, and other African Arabs. Arab-origin is divided into two major groups, 'pure' and 'Arabized.' Those considered 'pure' Arabs are those known as Qahtanite who are traditionally considered to be direct descendants of Noah through his son Shem, through his sons Aram and Arfakhshaath. Famous noble Qahtanite Arab families from this group can be recognized in the modern days from their surnames such as: Alqahtani, Alharbi, Alzahrani, Alghamedey, aws and khazraj (Alansari or Ansar), Aldosari, Alkhoza'a, Morra, Alojman, etc. Arab genealogies usually ascribe the origins of the Qahtanites to the South Arabians who built up one of the oldest centers of civilization in the Near East beginning around 800 B.C.E. These groups did not speak one of the early forms of Arabic language or its predecessors, however they did speak such South Semitic languages as Sabaic, Minaic, Qatabanic, and Hadramitic. The term "Arabized-Arabs" can be used in three different cases: - It is used for defining the Arabs who are traditionally considered to be descendants of Abraham through his son Ishmael through his son Adnan, and they are known as Adnanite; Abraham took his Egyptian wife Hagar (or Hajar) and his son Ishmael to Mecca. Ishmael was raised by his mother Hagar and one noble Arab family who departed from Yemen and settled in Mecca following the drought in Yemen. Ishmael learned the Arabic language and he spoke it fluently during his life, thus the main reason for calling this group Arabized. It is believed also that the Prophet of Islam Muhammad is descended of Adnanite Arab. Some famous noble Adnanite Arab families from this group are: Alanazi, Altamimi, Almaleek, Bani khaled, Bani kolab, Bani Hashim, etc. - The term Arabized-Arabs is also used for defining the Arabs who spoke other Afro-Asiatic languages. They are Arabic speakers and are regarded as Arabs in contemporary times. - The same term al-Musta'ribah or "Arabized-Arabs" is also used for the "Mixed Arabs," between "Pure Arabs" and the Arabs from South Arabia. "Defining" an "Arab" The term 'Arab' has had a wide variety of uses over the centuries. Throughout history, the Arabian Peninsula has been traditionally called 'Arabia.' This was particularly true during Greek, Roman, Persian, and Byzantine eras. At times Roman historians would refer to Arab rulers as "King of the Arabs." The use of this term has often proven confusing to the modern historians, who attempt to define the term according to modern history. Modern Arab nationalism is a product of nineteenth and twentieth century transformations. Prior to this time, most Arabic-speakers identified themselves with a particular family or tribe. Prior to the twentieth century, the term "Arab" designated the bedouin, tribal-based society of the Arabian Desert, which is the birthplace of the Arabic language. On its formation in 1946, the Arab League defined an "Arab" as follows; "An Arab is a person whose language is Arabic, who lives in an Arabic speaking country, who is in sympathy with the aspirations of the Arabic speaking peoples." Similarly, according to Habib Hassan Touma, a Palestinian composer, "An 'Arab', in the modern sense of the word, is one who is a national of an Arab state, has command of the Arabic language, and possesses a fundamental knowledge of Arabian tradition, that is, of the manners, customs, and political and social systems of the culture." The fourteenth century Islamic scholar Ibn Khaldun, did not use the word Arab to refer to the Arab people as defined by any of those definitions; but only to those continuing to live a bedouin (nomadic) life. These are the varied definitions commonly accepted in determining "Arab" status: - Islamic tradition: The Qur'an does not define who is an Arab, but there is a verse in the Qur'an stating "there is no difference between an Arab or Ajam (meaning a non-Arab speaker), only by their god-fearingness." The prophet Muhammad also noted that an Arab is anyone who speaks Arabic. - Ethnic identity: someone who considers him or herself to be an Arab (regardless of racial or ethnic origin) and is recognized as such by others. - Race: The term "Arab" does not refer to a particular race. Arabs include Caucasians and Africans with ancestral origins in Europe, North Africa, and the Middle East. The intermarriage of Arab seamen and their agents as far back as the first century has left few 'pure' Arabs, racially. "Dark skinned" Arabs are Sudanese, Ethiopian and Somalian Arabs, and Arabs from Southern Egypt who are considered Africans. "Caucasian" Arabs are Arabs native to Syria, Lebanon, Palestine, Tunisia, Algeria, and Libya among others. - Linguistic: someone whose first language is Arabic (including any of its varieties); this definition covers more than 250 million people. Arabic belongs to the Semitic family of languages. - Genealogical: someone who can trace his or her ancestry back to the original inhabitants of the Arabian Peninsula or the Syrian Desert. Arab nationalism declares that Arabs are united in a shared history, culture and language. Arab nationalists believe that Arab identity encompasses more than outward physical characteristics, race or religion. A related ideology, Pan-Arabism, calls for all Arab lands to be united as one state. Arab nationalism has often competed for existence with regional and ethnic nationalisms in the Middle East, such as Lebanese and Egyptian. The Semitic peoples (those speaking Semitic languages), who trace their origins to the Arabian Peninsula, have had unprecedented influence on the world since recorded history. They are responsible for the first civilizations and a set of cultural practices that have been globalized to a larger extent than any other culture, including those of China and Europe. Three major world religions, the Abrahamic faiths of Judaism, Christianity and Islam, have sprung from them. These people had their beginnings on the Arabian Peninsula, but the most influential cultures and civilizations of early consequence are attributed to those who left the peninsula for Mesopotamia, Palestine, and Africa. Historically, there have been three major instances of transformation and growth within the Arab world: - the growth of Semitic civilizations in Mesopotamia four thousand years ago - the spread of Christianity and Judaism two thousand years ago - the emergence of Islam fifteen hundred years ago. A sedentary way of life emerged among the Sabaeans (also known as Himyarites or Yemenites) in the lush climate of southern Arabia. This area was ruled through a city-states system by priest kings, but by the first millennium C.E., this had given way to a secular monarchy. There were four major city-states within this area; the Saba' (Sabaeans), Hadramawt, Qataban, and Ma'in. These groups did not form a political or ethnic unity among themselves. Instead the Saba' grew to be the most powerful, eventually expanding its political influence to include all the major kingdoms of the south by 300 C.E. The wealth of the Saba' territory was legendary throughout the Fertile Crescent and Northern Africa. Its luxury goods, exotic plants and spices commanded high prices in trade throughout the Mediterranean and Asia. Two major trade routes ran through this area; an ocean-trading route between Africa and India and a land-based trade route that ran up and down the coast of the peninsula. Major cities grew up along this route, one of them, Mecca was later the birthplace of Islam. By the seventh century C.E., this southern area had fallen into political disarray. Long protected from invasion by a wall of mountains on one side and the ocean on the other, it eventually came to the attention of those who would not be deterred by such obstacles. Judaizing and Christianizing forces began to vie for the area. Ethnically one people, the northern Arabs were composed of two culturally differing peoples; nomadic and sedentary Arabs. A much harsher environment than in the south, a nomadic tribal existence was necessary. Agriculture was not possible; pastoralism was. These pastoral nomadic peoples came to be known as the Bedouins. These small tightly-knit tribes moved their herds from place to place in search of scarce resources and water. A number of Bedouin tribes settled around the oases that surround the periphery of the Arabian Desert. Control of these areas came through military campaigns. These Bedouins were unable to seize possession of these areas until more powerful political rivals, such as Mesopotamia and the Sabaeans, had become weaker or more diffuse. It was not until the first millennium that many of the major sedentary Arab settlements were established, so by the time of Islam, the culture of sedentary Arabs was still very close to that of their nomadic cousins. These settlements were on the land routes connecting Africa and India with the Mediterranean world. As such the sedentary Arabs became trade intermediaries, bringing them power and prosperity. This group experienced three distinct historical periods prior to the advent of Islam. - The first period began with the decline of the Greek Seleucids in the Middle East as well as of the southern Sabaeans. - The second period began with the expansion of Roman, then Byzantine, and then Sabaean power and was the period of client-states. The Arab cities became client to three major world powers: the Byzantine empire in the north, the Persians in the east, and the southern Arabic kingdom of Himyar (the Sabaeans). Christianity and Judaism spread rapidly during this time. - The third period concerned inner Arabia, particularly the city of Mecca. This was a great period of flowering and prosperity of Bedouin culture and military power. The Bedouins closely allied themselves with the central Arabian cities, such as Medina (Yathrib) and Mecca. At this time classical Arabic became the language of culture and poetry. This period saw the diffusion of Bedouin values and the widespread diffusion of Bedouin narratives and poetry. Advance of Islam During the eighth and ninth centuries, the Arabs (specifically the Umayyads, and later Abbasids) forged an empire whose borders touched southern France in the west, China in the east, Asia Minor in the north, and the Sudan in the south. This was one of the largest land empires in history. Throughout much of this area, the Arabs spread the religion of Islam and the Arabic language (the language of the Qur'an) through conversion and cultural assimilation. Many groups came to be known as "Arabs" not through descent but through this process of Arabization. Thus, over time, the term Arab came to carry a broader meaning than the original ethnic term: cultural Arab vs. ethnic Arab. People in Sudan, Egypt, Morocco, Algeria and elsewhere became Arab through Arabization. Today, the majority of Arabs are Muslim with sizable followers of both Christianity and Judaism. Arab Muslims are Sunni, Shiite, Ibadhite, Alawite, Ismaili, or Druze. The Druze faith is sometimes considered as a religion apart. Arab Christians follow generally one of the following Eastern Churches: Coptic, Maronite, Greek Orthodox, Greek Catholic, or Chaldean. Before the coming of Islam, most Arabs followed a religion featuring the worship of a number of deities, including Hubal, Wadd, Al-Lat, Manat, and Uzza, while some tribes had converted to Christianity or Judaism, and a few individuals, the hanifs, had apparently rejected polytheism in favor of a vague monotheism. The most prominent Arab Christian kingdoms were the Ghassanid and Lakhmid kingdoms. With the conversion of the Himyarite kings to Judaism in the late fourth century, the elites of the other prominent Arab kingdom, the Kindites, being Himyirite vassals, appear to have converted (at least partly) to Judaism too. With the expansion of Islam, the majority of Arabs rapidly became Muslims, and the pre-Islamic polytheistic traditions disappeared. Sunni Islam dominates in most areas, overwhelmingly so in North Africa; Shia Islam is prevalent in Bahrain, southern Iraq and adjacent parts of Saudi Arabia, southern Lebanon, parts of Syria, and northern Yemen. The tiny Druze community, belonging to a secretive offshoot of Islam, is usually considered Arab, but sometimes considered an ethnicity in its own right. Reliable estimates of the number of Arab Christians, which in any case depends on the definition of "Arab" used, vary. Today Christians make up less than 10 percent of the population of the Near East. Jews from Arab countries - mainly Mizrahi Jews and Yemenite Jews - are today usually not categorized as Arab. Sociologist Philip Mendes asserts that before the anti-Jewish actions of the 1930s and 1940s, overall Iraqi Jews viewed themselves as Arabs of the Jewish faith, rather than as a separate race or nationality. Prior to the emergence of the term Mizrahi, the term "Arab Jews" (Yehudim ‘Áravim, יהודים ערבים) was sometimes used to describe Jews of the Arab world. The term is rarely used today. The few remaining Jews in the Arab countries reside mostly in Morocco and Tunisia. Between the late 1940s and early 1960s, following the creation of the State of Israel, most of these Jews left or were expelled from their countries of birth and are now mostly concentrated in Israel. Some also immigrated to France where they form the largest Jewish community, outnumbering Ashkenazi Jews, or European Jews, but relatively few to the United States. "Arab Jews" is a term occasionally used for Mizrahim Jews originating in Arab lands. Because of political tensions stemming from the Arab-Israeli conflict, few Mizrahim now identify themselves as "Arabs" or "Arab Jews." At present the term is mainly used by official and journalistic sources in the Arab world, but it has been reclaimed by some Mizrahi activists. Local Yemenite Jewish traditions trace the earliest settlement of Jews in this region back to the time of King Solomon. There are numerous legends placing Jews in ancient Yemen sent by King Solomon, the Queen of Sheba and even the Prophet Jeremiah. These "Yemeni Jews" are also Jews of Arab-origin. Arabic is the largest member of the branch of the Afro-Asiatic language family and is closely related to Hebrew, Amharic, and Aramaic. It is spoken throughout the Arab world and is widely studied and known throughout the Islamic world. Classical Arabic has been a literary language since at least the sixth century and is the liturgical language of Islam. Modern Standard Arabic derives from Classical Arabic. Because of its liturgical role, Arabic has lent many words to other Islamic languages, akin to the role Latin has in Western European languages. During the Middle Ages Arabic was also a major vehicle of culture, especially in science, mathematics and philosophy, with the result that many European languages have also borrowed numerous words from it. The Arabic script is written from right to left. "Colloquial Arabic" is a collective term for the spoken languages or dialects of people throughout the Arab world, which can differ radically from the literary language. The main dialectal division is between the North African dialects and those of the Middle East, followed by that between sedentary dialects and the much more conservative Bedouin dialects. Speakers of some of these dialects are unable to converse with speakers of another dialect of Arabic; in particular, while Middle Easterners can generally understand one another, they often have trouble understanding North Africans (although the converse is not true, due to the popularity of Middle Eastern, especially Egyptian, films and other media). The Arabic alphabet derives from the Aramaic script (Nabataean), to which it bears a loose resemblance like that of Coptic or Cyrillic script to Greek script. Traditionally, there were several differences between the Western (North African) and Middle Eastern version of the alphabet. After the definitive fixing of the Arabic script around 786, by Khalil ibn Ahmad al Farahidi, many styles were developed, both for the writing down of the Qur'an and other books, and for inscriptions on monuments as decoration. Arabic calligraphy has not fallen out of use as in the Western world, and is still considered by Arabs as a major art form; calligraphers are held in great esteem. Being cursive by nature, unlike the Latin alphabet, Arabic script is used to write down a verse of the Qur'an, a Hadith, or simply a proverb, in a spectacular composition. Much of the Arab world is characterized by a lack of clear separation between religious doctrine and social life. The teachings and example of the Prophet Muhammad's life tend to be used as a measurement in judging the conduct of both public officials and private individuals. Most modern Arab states have established civil codes which govern public affairs but Islamic canon law, the Sharia, remains of great importance, especially in domestic matters such as marriage, divorce and inheritance. Family honor is of great importance in the Arab world, and the obligations and responsibilities of kinship are not easily ignored. The chastity of women and obedience of children are matters of concern to all kinspeople as well as to husbands and wives. 'Honor killings' have taken place when a female family member was deemed to have acted inappropriately according to expected standards. Hospitality and generosity to guests is a source of pride, while assistance from kinsfolk in any crisis remains an expectation at all levels of Arab society. In the past, urban women were encouraged to remain in the home as much as possible, while a 'virtuous' woman was expected to wear veils and concealing outer garments. In recent years this is not universally practiced, although vestiges of this outlook remain in certain areas of the Arab world. Flowing robes, capes and head-cloths traditionally regarded as male dress are still worn in many of the Arab lands. Many men, however wear Western style clothing. A vital aspect in the Arab life is music. Nomadic encampments in ancient times utilized music to celebrate every event in life. It served such purposes as inciting warriors, encouraging desert travelers, embellishing social meetings, and even calling the pilgrims to the black stone of the Ka'bah (in Mecca), a holy shrine even in pre-Islamic times. Periodic poetry competitions and musical performances were held in the market places, while in the king's entourage musicians occupied high rank. In the Mazdak sect (a dualistic Persian religion related to Manichaeanism) music was considered to be one of the four spiritual powers. Arabic music has been influenced by many varying cultures, such as Ancient Greek, Persian, Turkish, Indian, African (such as Berber and Swahili) as well as European. As in other art and science fields, the Arabs translated and developed Greek texts and works of music and mastered the music theory of the Greeks. The common style that developed is usually called 'Islamic' or 'Arab', though in fact it transcends religious, ethnic, geographical, and linguistic boundaries," and it has been suggested that it be called the "Near East style" (from Morocco to India). The world of modern Arabic music has long been dominated by musical trends that have emerged from Cairo, Egypt. The city is generally considered a cultural center in the Arab world. Innovations in popular music via the influence of other regional styles have also abounded from Morocco to Saudi Arabia. In recent years, Beirut has become a major center, dictating trends in the development of Arabic pop music. Other regional styles that have enjoyed popular music status throughout the Arab world include the Algerian raï, the Moroccan Gnawa, the Kuwaiti sawt, the Egyptian el gil and Turkish Arabesque-pop music. Arabic religious music includes Christian and Islamic music. However, Islamic music, including the singing of Qur'an readings, is structurally equivalent to Arabic secular music, while Christian Arab music has been influenced by Catholic, Greek Orthodox, Anglican, Coptic, and Maronite church music. - ↑ Margaret Kleffner Nydell, Understanding Arabs: A Guide For Modern Times (Nicholas Brealey, 2018, ISBN 1473669979). - ↑ Silvia Ferabolli, Arab Regionalism: A Post-Structural Perspective (Routledge, 2014, ISBN 1138787809). - ↑ To count or not to count The Economist, March 26, 2009. Retrieved September 23, 2021. - ↑ Omer Karasapan, Turkey's Syrian refugees—the welcome fades Brookings Institute, November 25, 2019. Retrieved September 23, 2021. - ↑ Bevölkerung und Erwerbstätigkeit Statistisches Bundesamt, April 12, 2018. Retrieved September 23, 2021. - ↑ Demographics Arab American Institute. Retrieved September 23, 2021. - ↑ 65th Independence Day – More than 8 Million Residents in the State of Israel Central Bureau of Statistics. Retrieved September 23, 2021. - ↑ Mac Margolis, Abdel el-Zabayar: From Parliament to the Frontlines The Daily Beast, September 15, 2013. Retrieved September 23, 2021. - ↑ Habeeb Salloum, Arabs Making Their Mark in Latin America: Generations of Immigrants in Colombia, Venezuela and Mexico Al Jadid Magazine, 2000. Retrieved September 23, 2021. - ↑ Los musulmanes en España superan los 1,8 millones europa press, March 30, 2015. Retrieved September 23, 2021. - ↑ Cittadini stranieri in Italia – 2016 tuttitalia. Retrieved September 23, 2021. - ↑ Norbert Nebes, "Epigraphic South Arabian," in Siegbert von Uhlig. Encyclopaedia Aethiopica. (Wiesbaden: Harrassowitz Verlag, 2005), 335. - ↑ "Arabia" in ancient history Nabataea.net. Retrieved September 23, 2021. - ↑ Steve Tamari, Who Are the Arabs? Center for Contemporary Arab Studies, Georgetown University. Retrieved September 23, 2021. - ↑ Rick Francona, Who is an Arab? Middle East Perspectives, April 4, 2007. Retrieved September 23, 2021. - ↑ Basil Davidson, The Lost Cities of Africa (Back Bay Books, 1987, ISBN 978-0316174312), 178. - ↑ Douglas Jehl, For Shame - Arab Honor's Price: A Woman's Blood The New York Times, June 20, 1999. Retrieved September 23, 2021. - ↑ "Arab People," in Lexicon Universal Encyclopedia (Macmillan, 1989, ISBN 0717220257), 104-106. - ↑ Peter van der Merwe, Origins of the Popular Style: The Antecedents of Twentieth-Century Popular Music (Oxford: Clarendon Press, 1989, ISBN 0193161214). ReferencesISBN links support NWE through referral fees - Barakat, Halim Isber. The Arab World: Society, Culture, and State. Berkeley, CA: University of California Press, 1993. ISBN 0520079078 - Blumenfeld, Laura. Revenge: A Story of Hope. New York, NY: Simon & Schuster, 2002. ISBN 0684853167 - Davidson, Basil. The Lost Cities of Africa. Back Bay Books, 1987. ISBN 978-0316174312 - Ferabolli, Silvia. Arab Regionalism: A Post-Structural Perspective. Routledge, 2014. ISBN 1138787809 - Field, Michael. Inside the Arab world. Cambridge, MA: Harvard University Press, 1995. ISBN 0674455207 - Lane, Edward William. Arabic English Lexicon. Educa Books/AES, 2003. ISBN 978-8120601079 - Lexicon Universal Encyclopedia. Lexicon Publications, Inc., 1983. ISBN 0717220257 - Lipinski, Edward. Semitic Languages: Outline. Leuven: Uitgeverij Peeters en Departement Oosterse Studies, 2001. ISBN 978-9068319392 - Mumisa, Michael. Introducing Arabic. New Delhi: Goodword Books, 2003. ISBN 8178982110 - Nebes, Norbert, "Epigraphic South Arabian," in Siegbert von Uhlig. Encyclopaedia Aethiopica. Wiesbaden: Harrassowitz Verlag, 2005. - Nydell, Margaret Kleffner. Understanding Arabs: A Guide For Modern Times. Nicholas Brealey, 2018. ISBN 1473669979 - Touma, Habib Hassan. The Music of the Arabs. Portland, OR: Amadeus P, 1996. ISBN 0931340888 - van der Merwe, Peter. Origins of the Popular Style: The Antecedents of Twentieth-Century Popular Music. Oxford, UK: Clarendon Press, 1989. ISBN 0193161214 - Versteegh, Kees. The Arabic Language. New York, NY: Columbia University Press, 1997. ISBN 0231111525 All links retrieved October 31, 2021. - Arabia in ancient history, with a discussion of the ancient usage of the word Arab - Arab World Directory - Arabia Catholic Encyclopedia New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: The history of this article since it was imported to New World Encyclopedia: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:ab866668-91e2-4ad6-9e50-2c4af04d56b9>
CC-MAIN-2023-14
https://www.newworldencyclopedia.org/entry/Arab
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00143.warc.gz
en
0.935265
6,283
3.328125
3
2.977218
3
Strong reasoning
History
Today we're celebrating, the sugar maple (Acer saccharum), the most abundant maple found in New York and the state's official tree, and the national emblem of Canada — this is one cool tree! Even if distinguishing species of trees isn't your claim to fame, it's nearly impossible to not peg this one during autumn, with its telltale orange- and yellow-tinged foliage. Other trees are downright spectacular, too, the red leaves of the red maples, the yellows of the birch and Norway maples or even the plum color of the mighty ash, but the sugar maple... At this time of year, as the days grow shorter, temperatures dip and production of the chlorophyll pigment that usually makes the leaf green begins to slow down, yielding to carotenoid pigment that produces the maple's telltale fall color. A very large deciduous tree, a mature sugar maple can spread outwards 65 to 75 feet and upwards to 90 feet. Its oval outline sets it apart from its maple cousins. If that's not enough of a hint, there is always its late winter/early spring donning of plastic tubing with buckets dangling at collection sites on its trunk for it its treasured sap. Or maybe its bark might give it away with its old, shaggy appearance. Once the tree reaches about 30 years, just about the time the leaves begin to unfurl, it is covered in tiny chartreuse green flowers, which, if viewed up close, look as if Dr. Seuss designed them. Following pollination, the infamous "helicopters" form, maturing in 10 to 12 weeks. Once ripe and encouraged by the slightest breeze, they take flight fluttering downwards to awaiting chipmunks, squirrels, mice and a dancing child or two. A mature sugar maple produces mass amounts of seed in two to five year intervals, and this is often determined by climate conditions, particularly rainfall the previous season as well as rain and temperature during pollination time. So it is not your imagination if you think there are more ''helicopters'' one year than another. The sugar maple can become quite an impressive specimen if grown in an open, sunny location where branch formation can begin low on the trunk. When it grows in a forested site, the lower branches typically die back, leaving a totem pole-styled trunk that branches once it breaks through the upper canopy of neighboring trees. Its leaves are a great source of organic matter, providing calcium, nitrogen (N), potassium (K) and phosphorus (P) minerals. It never ceases to amaze me how nature takes care of herself. Think about it — the leaf litter of the forest recycles itself back to the soil as nutrients, actually a complete fertilizer providing the big three nutrients, N, P and K for yet another season of growth. There's a good lesson here for us: When we rake our maple leaves this fall, don't just bag and toss them. Recycle them back into the soil for free fertilizer. As for pH, the preferred range is around 5.5 to 7.2, but they can tolerate an acidic soil as low as 3.8. Hardy zones 4 to 8, which makes it quite clear that those folks down south are most likely as jealous of us come fall, since they can't marvel at their foliage as envy their sunshine come February. Maples need deep, moisture-retentive yet well drained soil, no standing water or high water tables. They sport a fibrous root system, which can spread well beyond their drip line (branch tips), so properly space a sugar maple at least half its mature canopy diameter from any structure or paved area. A few other planting alerts: They are not road salt tolerant, which means they do not make good street trees where salting is an issue. Their ''helicopters'' can come down by the tens of thousands in late spring, coating the ground, clogging pool skimmers and messing up that fresh layer of mulch, so locate accordingly. Sugar Maples can live a long life; 150 years is not that uncommon. Typically the first 30 or so years, they average growth of about 12 inches in height and less than a quarter inch in trunk girth. So a 30-year-old tree would be roughly 30 feet high and about 6 inches in trunk diameter just above the root flare. A queen of the fall landscape, savor the color with your little green thumbs by dipping an orange-yellow leaf in melted paraffin or ironing it between 2 pieces of waxed paper.
<urn:uuid:c6b217fe-49db-45dc-8814-5053aa868c79>
CC-MAIN-2015-14
http://www.timesunion.com/living/article/Sugar-maple-a-sweet-sight-in-autumn-3940419.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131292683.3/warc/CC-MAIN-20150323172132-00037-ip-10-168-14-71.ec2.internal.warc.gz
en
0.951519
948
3.171875
3
1.975775
2
Moderate reasoning
Home & Hobbies
Help support New Advent and get the full contents of this website as an instant download. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99... An Augustinian monastery situated about four miles south of Zwolle on the Issel, in the Kingdom of Holland. The congregation of canons regular, of which this was the chief house, was an offshoot of the Brethren of the Common Life and played a considerable part in the reforming movement within the Catholic Church in Holland and Germany during the century which preceded the Reformation. The Brethren of the Common Life, who did not form an order or congregation strictly so called, had become obnoxious to the mendicant friars, and the object of their attacks. To remedy this, Gerard Groot, when on his deathbed (1384), advised that some of the brethren should adopt the rule of an approved order (Chron. Wind., 263). His successor, Florence Radewyns, carried this advice into effect. Six of the brethren, carefully chosen as specially fitted for the work, among them John, elder brother of Thomas à Kempis, were sent to the monastery of Eymsteyn (founded 1382) to learn the usages of the Augustinian Canons. In 1386 they erected huts for a temporary monastery at Windesheim, and in March of the following year commenced the building of a monastery and church, which were consecrated by Hubert Lebene, titular Bishop of Hippo and auxiliary of Utrecht, on 17 Oct., 1387. At the same time the six brethren took their vows. The real founder of the greatness of Windesheim was Johann Vos, the second prior (1391-1424), under whom the number of religious was greatly increased and many foundations were made. The first of these were Marienborn near Arnheim and Niewlicht near Hoorn (1392). These two houses with Eymsteyn and the mother-house were the first members of the congregation or chapter (capitulum) as it was then called. It was approved and received certain privileges from Boniface IX in 1395. The constitutions added to the Rule of St. Augustine were approved by Martin V at the Council of Constance. An annual general chapter was held at Windesheim "after the fashion of the brethren of the Carthusian Order", at which all the priors proffered their resignation. The prior of Windesheim was the superior prior, or head of the congregation, with considerable powers. After 1573 a prior-general was elected from among the priors of the monasteries. The choir Office at first followed in general the Ordinarium of Utrecht (for the reform of the Windesheim liturgical books by Radulfus de Rivo, Dean of Tongres, see Mohlbeg, op. cit. infra). The Windesheim Breviary was printed at Louvain in 1546. The life of the canons was strict, but not over-severe; we are told that a postulant was asked if he could sleep well, eat well, and obey well, "since these three points are the foundation of stability in the monastic life". The constitutions exhibit in many points the influence of the Carthusian statutes. The canons wore a black hood and scapular, with a white tunic and rochet; the lay brothers were dressed in gray. By 1407 the congregation numbered twelve monasteries. In 1413 it was joined by the seven Brabant houses of the Groenendael congregation, of which the famous mystic Ruysbroek had been a member, and in 1430 by the twelve houses of the Congregation of Neuss in the Archdiocese of Cologne. When the Windesheim Congregation reached the height of its prosperity towards the end of the fifteenth century, it numbered eighty-six houses of canons, and sixteen of nuns, mostly situated in what is now the kingdom of Holland, and in the ecclesiastical Province of Cologne. Those which survived the Reformation (they still numbered 32 in 1728) were suppressed at the end of the eighteenth or beginning of the nineteenth century. Uden in Holland is the only survivor at the present day (Heimbucher, 11, 43). The destruction of Windesheim itself began in 1572, when the altars in the church were destroyed by the people of Zwolle; the suppression came in 1581. There are now practically no remains of the buildings. The last prior of Windesheim, Marcellus Lentius (d. 1603), never obtained possession of this monastery. The Windesheimers numbered many writers, besides copyists and illuminators. Their most famous author was Thomas à Kempis. Besides ascetical works, they also produced a number of chronicles, of which we may mention the "Chronicle of Windesheim" by Johann Busch. An emendation of the Vulgate text and of the text of various Fathers was also undertaken. Gabriel Biel, "the last German scholastic", was a member of the congregation. A number of books were translated into German, and, besides the regular monastic library, a library of German works was established in each house for lending to the people. The chief historical importance of the Windesheim Canons lies in their reforming work. This was not confined to the reform of monasteries, but was extended to the secular clergy and the laity, whom they especially sought to bring to greater devotion toward the Blessed Sacrament and more frequent communion. The chief of the Windesheim monastic reformers was Johann Busch (b. 1399; d. 1480). This remarkable man was clothed at Windesheim in 1419. At the chapter of 1424 Prior Johann Vos, who knew his own end was near, especially entrusted Busch and Hermann Kanten with the carrying out of his work of reform (Chron. Wind., 51). Grube gives a list of forty-three monasteries (twenty-seven Augustinian, eight Benedictine, five Cistercian, and three Pre-monstratensian), in whose reform Busch had a share; perhaps his greatest conquest was the winning to the side of reform of Johann Hagen, for thirty years (1439-69) Abbot of Bursfeld and the initiator of the Benedictine Congregation known as the Union of Bursfeld. In 1451 Busch was entrusted by his friend Cardinal Nicholas of Cusa, legate of Nicholas V, with the reform of the North German monasteries, and with such labours he was busied till shortly before his death. Similar work on a smaller scale was carried out by other Windesheimers. Some Protestant writers have claimed the Windesheim reformers as forerunners of the Protestant Reformation. This is a misapprehension of the whole spirit of the canons of Windesheim; their object was the reform of morals, not the overthrow of dogma. The conduct of the communities of Windesheim and Mount St. Agnes, who preferred exile to the non-observance of an interdict published by Martin V, exemplifies their spirit of obedience to the Holy See. BUSCH, Chronicon Windesemense and Liber de reformatione monasteriorum, ed. GRUBBE in Geschichtsquellen der Provinz Sachsen, XIX (Halle, 1886); Onbekende Kronijk van het Klooster te Windesheim, ed. BECKER in Bijdragen en Mededeelingen van het Historisch Genootschap. (Utrecht); THOMAS A' KEMPIS, Chronicle of the Canons Regular of Mount St. Agnes, tr. POTT (London, 1906); THOMAS A' KEMPIS, Founders of the New Devotion, tr. POTT (London, 1905); Regula B. Augustini cum constitutionibus Canonicorum regularium capituli Windesemensis (Utrecht, 1553); Regula et Constitutiones . . . Congregationis Windesemensis (Louvain, 1639); ACQUOY, Klooster te Windesheim (Utrecht, 1880); GRUBE, Johannes Busch (Freiburg im Br., 1881); CRUISE, Thomas a' Kempis, pt. II (London, 1887); SCULLY, Life of the Ven. Thomas a' Kempis (London, 1901); KETTLEWELL, Brothers of the Common Life (2 vols., London, 1882); HEIMBUCHER, Orden u. Kongregationen, II (Paderborn, 1907), 38; MOHLBERG, Rudulph de Rivo (Louvain, 1911). APA citation. (1912). Windesheim. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/15651a.htm MLA citation. "Windesheim." The Catholic Encyclopedia. Vol. 15. New York: Robert Appleton Company, 1912. <http://www.newadvent.org/cathen/15651a.htm>. Transcription. This article was transcribed for New Advent by Thomas M. Barrett. Dedicated to the Poor Souls in Purgatory. Ecclesiastical approbation. Nihil Obstat. October 1, 1912. Remy Lafort, S.T.D., Censor. Imprimatur. +John Cardinal Farley, Archbishop of New York. Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads.
<urn:uuid:2ef44767-80ed-4feb-8a4a-57724fea227d>
CC-MAIN-2017-04
http://www.newadvent.org/cathen/15651a.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279468.17/warc/CC-MAIN-20170116095119-00399-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940177
2,076
2.59375
3
2.838647
3
Strong reasoning
Religion
An assemblage of over 5,000 flint artefacts was recovered in 2005-9 by Biggar Archaeology Group in fields at Howburn, near Biggar in South Lanarkshire, and subsequent studies have dated their use to 14,000 years ago. Prior to the find, the oldest evidence of human occupation in Scotland could be dated to around 13,000 years ago at a now-destroyed cave site in Argyll. Dating to the very earliest part of the late-glacial period, Howburn is likely to represent the first settlers in Scotland. The flint tools are strikingly close in design to similar finds in northern Germany and southern Denmark from the same period, a link which has helped experts to date them. The new findings were revealed today (9th April) by Fiona Hyslop, Cabinet Secretary for Culture and External Affairs in her speech at the Institute for Archaeologists’ annual conference, which is this year taking place in Glasgow. The definitive findings will be published next year in a report funded by Historic Scotland. During her speech, the Cabinet Secretary announced over £1.4 million of funding for more than 60 projects in 2014/15 through Historic Scotland’s annual Archaeology Programme, and launched the first Scottish Historic Environment Data (SHED) Strategy, which aims to create a collaborative national public information resource for the historic environment. The hunters who left behind the flint remains at Howburn came into Scotland in pursuit of game, probably herds of wild horses and reindeer, at a time when the climate improved following the previous severe glacial conditions. Glacial conditions returned again around 13,000 years ago and Scotland was once again depopulated, probably for another 1000 years, after which new groups with different types of flint tools make their appearance. Fiona Hyslop said: “Our heritage helps us to connect our past, present and future. It reveals stories about where we’ve come from and who we are, and helps us to reflect on who we could be. The discovery of the earliest physical evidence of human occupation in Scotland is hugely exciting, in part because it offers us a very tangible link to the past and a physical reminder of the people who came before us.” The nature of the physical connections made between the peoples in Scotland, Germany and southern Denmark is not yet understood. However the similarity in the design of the tools from the two regions offers tantalising glimpses of connections across what would have been dry land, now drowned by the North Sea. Alan Saville, President of the Society of Antiquaries of Scotland, Senior Curator, Earliest Prehistory at the National Museums of Scotland and a specialist in the study of flaked flint and stone tools said: “These tools represent a real connection with archaeological finds in north-west Germany, southern Denmark and north-west Holland, a connection not seen elsewhere in Britain at this time. This discovery is both intriguing and revolutionises our ideas about where humans came from in this very early period. In southern Britain, early links are with northern France and Belgium. Howburn is just one chance discovery and further such discoveries will no doubt emerge.” Header Image : One of the artefacts recovered at Howburn. Image shows three views of the same flint point. Copyright Tam Ward Contributing Source : Historic Scotland© Copyright HeritageDaily - Heritage & Archaeology News
<urn:uuid:e06b59b7-dd4f-491e-820e-259a450fdb40>
CC-MAIN-2014-52
http://www.heritagedaily.com/2014/04/archaeologists-have-uncovered-the-earliest-evidence-of-the-presence-of-humans-in-scotland/102796
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802772281.50/warc/CC-MAIN-20141217075252-00120-ip-10-231-17-201.ec2.internal.warc.gz
en
0.958296
702
3.640625
4
2.955023
3
Strong reasoning
History
Bullying during adolescence may be tied to health problems that follow teens into adulthood, a Canadian study suggests. Researchers who followed 662 youth for a decade starting when they were between 12 and 19 years old found that both physical and emotional bullying was linked with difficulties such as headaches, dizziness, backaches, insomnia, abdominal pain and poor body image. Even emotional taunts predicted physical health problems in adulthood, researchers reported in the Journal of Adolescent Health. "These health problems, be it depression, anxiety, somatic symptoms, or poor self-concepts, can interfere with several life domains including academic and occupational performance, relationship satisfaction, economic success and more severe health outcomes," study co-author Alanna D. Hager of Metropolitan State University of Denver said by email. "The study highlights that early adolescence is a sensitive time for the implementation of intervention and prevention efforts that can curb trajectories of health problems for youth," added co-author Bonnie J. Leadbeater of the University of Victoria, British Columbia, where the research was conducted. Previous research has linked peer victimization, like other forms of stress, to adverse changes in biological, emotional, behavioral and social processes that over time can result in chronic physical health problems, the authors note. The impact can be particularly devastating during adolescence, when teens tend to depend on their peers for self-esteem and identity development. For the current study, researchers analyzed data from six interviews youth completed between 2003 and 2014. To measure bullying, participants were asked questions such as how often they got pushed or shoved by peers and how often peers spread lies about them to make other youth dislike them. Researchers assessed physical symptoms by asking participants to rate how frequently they experienced problems such as headaches, dizziness and insomnia. To monitor body image, the youth rated how regularly they noticed they were physically healthy or felt particularly proud or uncomfortable with their body's development. Over the course of the six interviews, roughly 29 to 52 percent of the boys reported experiencing physical bullying at least sometimes, as did 20 percent to 29 percent of girls. In addition, about 28 to 67 percent of males and 37 to 54 percent of females said they were victims of emotional taunts at least some of the time. About 1 to 2 percent of participants reported they were bullied all of the time, the study found. Generally, the females reported more physical symptoms and poorer body image than the males throughout the study period. Physical health problems were consistently tied to emotional taunts. But the connection between physical bullying and these health problems was less consistent over the course of the study, which the authors believe may be due to fewer instances of this type of victimization among older teens. One limitation of the study is its predominantly white population, which may limit how much the findings apply to people of other races and ethnicities, the authors note. In addition, it's possible that physical health problems might make teens the target of bullies, rather than surfacing as a result of peer victimization. Still, the authors conclude, the findings highlight the need for more efforts to prevent bullying during adolescence and offer therapy or other needed treatments to victims. Warning signs of bullying might range from teens complaining of excessive health issues in order to stay home from school, to struggling with sleep or concentration in class, the study authors said by email. Victims might also conceal their bodies or physical abilities by wearing baggy clothes or skipping gym or recess. Avoiding bullying entirely may not be possible during adolescence, making the response critical for preventing long-term health effects, said Dr. Matthew Davis, a researcher at the C.S. Mott Children's Hospital and the University of Michigan in Ann Arbor, who wasn't involved in the study. "The time to respond to bullying, and to support victims of bullying, is during adolescence when it occurs," Davis said by email. "Don't wait to see whether it gets better; make sure the teen bullying victim knows that he/she is not to blame."
<urn:uuid:edd28692-d0f7-4fb3-b549-b5800b65d02c>
CC-MAIN-2016-22
http://www.foxnews.com/health/2015/12/31/bullying-during-teen-years-linked-to-health-problems-for-adults.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275412.55/warc/CC-MAIN-20160524002115-00011-ip-10-185-217-139.ec2.internal.warc.gz
en
0.967131
817
3.09375
3
3.022673
3
Strong reasoning
Health
GMO Seeds What are They? GMO Seeds Or Genetically Modified Seeds What are They? You might have come across the abbreviation GMO seeds or GMO’s lately when you read newspapers, magazines and on the internet. The GMO is nothing but Genetically Modified Organisms, which is produced through a laboratory process. The genes from the DNA of a particular plant are extracted and are artificially forced into the genes of any other non-related plant or animal. These foreign genes can be taken from anything like bacteria, viruses, animals and you. As there is a transfer of the genes taking place in this process, GMOs are also known as transgenic organisms. The lab process that helps in creating a new plant or species is known as Genetic Engineering or Genetic Modification. How it Works? There are many seeds that are now derived through GMO method. The genetically engineered seeds use the genes in the DNA of any unrelated organism and mix it with the crops. They are done so because there is no way that the two different varieties of plants can carry out biological reproduction and finally breed a new crop. The viral promoter genes are also used in this gene modification process. The end result is a GMO crop and this is achieved by introducing the new genes into any yield crop. The development of genetically modified seeds causes a massive change in the genetic makeup of the yield and also there are many changes in the properties of the seed that is developed. The genetically modified crops and foods are said to repel some of the harmful insects affecting the drop. Their yield is also more than organically farmed products. The main reason why genetically modified foods are promoted is because the yield is more, cheaper and also needs less acreage. Genetic engineering has caused the production of plants and organisms which will not be produced by Mother Nature. It has caused the breeding of species that could not breed in a natural way. For example, combining the genes of corn and bacteria. This genetically modified corn can kill the corn borers attacking the plant. The Bacillus thuringiensis bacteria are capable of damaging the digestive tract of organisms consuming the bacteria since the bacterial genetic material is in the cells of the corn they can even damage the gut of humans. It is possible to combine or splice the genes of different organisms using the recombinant DNA technology to produce genetically modified or engineered organisms. Use of GMO Seeds The seeds produced from genetically modified plants can produce similar offspring in the next generation, but it is illegal to store the GMO seed as they are patented by the producers. - It is not sustainable to produce these GMO seeds as they are thousands of times expensive when compared to hybrid seeds and open–pollinated seeds. - The pollen from GMO plants can contaminate the non- GMO plants in the nearby fields. - Lab tests conducted on plants, animals and livestock show that GMOs can cause allergies, reproductive problems and tumours and the destruction of beneficial soil bacteria and can produce the same or worse effect on humans as well.
<urn:uuid:02ba9de3-2a45-420e-84ef-91a724492cef>
CC-MAIN-2020-40
https://www.dayliliesinaustralia.com.au/gmo-seeds-what-are-they/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00434.warc.gz
en
0.954883
609
3.15625
3
2.520368
3
Strong reasoning
Science & Tech.
BY LALITHA VAIDYANATHAN FORENSIC science which was earlier confined to the state and central governments laboratories solving post event of the various types of crimes dealt by police departments and courts in India has seen a radical expansion. In today’s age, forensic science has no longer been just a science related to law and criminals for solving post-event crimes, it has moved far above the realm and has entered into the day-to-day life of a common man. Forensic science through different aspects not only emphasise the key role it plays in opening various avenues but also benefits the improved and regulated disciplines: assisting law enforcement officials, enhancing homeland security, reducing the risk of wrongful conviction and above all safeguarding and teaching people scientific and legal aspect pertaining to their domain. Today with technological advancement, it has opened up new avenues of solving the white-collar crimes relating to huge financial scandals as well as family disputes on land and property fraud in both rural and urban India through private sector hi-tech institution as well. India and Forensic Science The technologies can also prevent fraud or cheating of several government schemes in rural and urban India including those meant for people below poverty line. Forensic science has come a long way in India and it has already proved its changing role just from detection of normal and petty crimes to bomb blasts to preventive social evils like cheating and fraud on a large scale and with tailor-made modes. The new areas of public domain like bank, insurance, ATM frauds, handwriting forgery or family disputes, including the DNA fingerprinting, in establishing the biological father or mother to cheating and others all call for use of high-end crime detection technologies, according to experts in the field. Realising the huge need for technically trained human resource for this field of forensic science in the country, both Maharashtra and Gujarat governments have started focused graduation course as well as advanced research based MSC and Phd programmes in forensic science in addition to the earlier classical forensic teaching departments in some universities. Forensic science is based on the theory of transfer; that is when two objects meet, some evidence of that meeting generally can be established and verified at a later time. Fingerprints left inside a burgled house, shoe prints outside a window, thousands of examples of the minute bits of evidence found at a crime scene that are later used to incriminate, associate, establish, or convict. With the advent of DNA profiling, these bits of evidence keep getting smaller and smaller, the point that a link between suspect and crime can be made with as many as one skin cell or a nano particle, Dr Rukmani Krishnamurthy, an expert, said. The ability of forensic experts to detect evidence is continually improving, and many court cases rely on it, Dr Krishnamurthy pointed out. HELIK Advisory Ltd., an ISO certified premier organisation in the field of forensic and allied sciences, has come up with an innovative combination of forensic solutions and technologies for the corporate houses, medium/small scale enterprises, institutions, entrepreneurs, businesses, judiciary, police, defence and individuals there by taking forensic science to common man in the form of preventive, social, civil and rural forensics. The very concept of these innovative services were conceived and imbibed keeping in mind the standard practices of forensic and allied sciences in developed countries, where high-grade private research institutes are the main source for providing forensic and allied services to the potential clients including law enforcement agencies and judiciary. Until recently, DNA analysis had been used in serious criminal cases like murder, genocide, rape, terrorism. Since advances have streamlined DNA procedures and cut their costs, currently they are being used increasingly to investigate other offences like hit-and-run, burglary, robbery and white-collar crimes. Advances have also been achieved in many areas of forensic science such as fingerprints. Technology also has improved in the ability to detect latent fingerprints, which are among the most valuable types of physical evidence in criminal investigations. There are many chemical and physical methods for detecting and visualising latent prints at a crime scene. Advance technology in instrumentation and illumination to enhance latent prints which includes argon laser, x-ray detection, vacuum coating and various light sources including the nano-particles for development and analysis of latent finger marks. Data mining of databases such as combined DNA index system and the automated fingerprint identification systems at par with the FBI is useful not only for criminal record but also for handling civilian record, Dr Krishnamurthy said. Video analytics, image enhancement technologies to read clues such as fingerprints, footprints and bite marks, multi-modal biometric systems and psychological tools for both criminal and individual assessment in terms of behaviour are some of the technologies which find its way to India soon. The latent print examiners routinely processed and compare latent fingerprints and / or palm prints card of a suspect. Due to advances in processing techniques examiners are very successful in developing latent prints on paper which account to for 95 per cent of the evidence which they process. The use of new techniques has enabled the development of previously undetectable prints. Besides paper evidence, the unit also processes other types of evidence including weapons, glassware, metal, computer equipment (including monitors, keyboards), leather goods and plastic 1tems. Techniques Used in India The unit also offers a variety of services in support of field operations. Black and white and C41 colour processors enable the photographers to process large qualities of film. These are used in the processing of large quantities of surveillance film submitted by the special agents from across the country. Some of the abovementioned techniques like DNA fingerprinting, digital image enhancement, tape authentification, voice analysis, cyber forensic, lie detector, BEOS, etc are in place in major state and central government FSLs but do not have the manpower to handle the large volume of cases and hence they are looking for outsourcing to private forensic labs with good credentials. Photographic Hi-Tech equipment to analyse the fake documentation are of great value in the present stamp markings and photocopies. The Helik has been successful in the construction of damaged documents including shredded and burnt documents. This unit also examines documents which may have erasures or other types of alterations. International conferences on forensic science showcased some of the latest advances in forensic science including DNA analysis which unlocks mysteries of human identity, combining advances in miniaturisation and microchip technologies with well-established techniques of forensic DNA analysis. The fusion of these technologies could revolutionise DNA typing. PTI Feature The Helik Advisory also provides services to common people that include cyber and mobile device forensic services, voice and video solutions, data recovery services, advanced email and Internet history examination, information security devices and other cost-effective and timely solutions.
<urn:uuid:e75c98ed-b960-4cb4-9334-103c3b7d8a46>
CC-MAIN-2014-10
http://www.navhindtimes.in/opinion/growing-relevance-forensic-science
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021429299/warc/CC-MAIN-20140305121029-00085-ip-10-183-142-35.ec2.internal.warc.gz
en
0.950691
1,381
2.703125
3
2.928113
3
Strong reasoning
Crime & Law
The 62.5-megawatt peak power wave energy generation project will be built off the coast of Victoria, Australia, using the PowerBuoy wave energy converter technology of Ocean Power Technologies (OPT). Category: Climate & Environment This category is climate change in relation to sustainability and CSR and how these segments effect one another. This includes how climate change has started to cause a wide range of physical effects with serious implications for investors and businesses, and how the business sector discloses climate risks and manage them. Two new reports find that the BLM is shortchanging the public on federal land sales, benefiting coal companies. How does this change the energy subsidy debate? In cities across the world, people are coming together in informal networks to deliver services in waste collection, water supply and community welfare that officials fail to deliver. It’s time to recognize their value, says Ben Goldfarb. A new Forum for the Future initiative forms partnership with major tea companies for developing sustainable tea as a “hero crop” with a new report, The Future of Tea – A Hero Crop for 2030. Hybrids don’t do as well in winter for reasons ranging from modified winter gasoline formulations, to increased stationary warm-up time, to increased heater usage, to reduced battery performance in cold weather. A recent report in MIT Technology Review claims that the situation gets even worse when moving from hybrids to all-electrics. But before we snow on the EV parade, let’s ask how serious these cold weather drawbacks actually are. California’s San Joaquin Valley, which supplies food to the nation is experiencing a record drought which could soon mean higher food prices for all Americans. We have written before about the challenges and opportunities surrounding the simple act of cooking in the developing world, where some 20 percent of all their energy is consumed preparing daily meals. Most cooking in these areas is done using wood or charcoal, often burned in open fire pits. All totaled, cooking causes some 4 million deaths every year, all for the lack of a better alternative. United Nations Deputy High Commissioner for Refugees (UNHCR), T. Alexander Aleinikoff, says that despite a steady stream of innovative new stoves being offered, he has yet to see one that fully meets the needs of the population. The displaced polar vortex, with its frigid temperatures and strong winds, has caused energy use to soar–creating supply shortages and rising energy costs. But wind power has performed well overall. Subway recently announced that it will remove Azodicarbonamide, a chemical used in yoga mats, shoe rubber and synthetic leather, from its bread. While the shift came after a blogger’s petition for the removal of the chemical went viral, the sandwich chain chose to ignore the petition in its statement. With the Sochi Olympic Winter Games upon us, athletes and fans around the world are now captivated with one of the world’s greatest sporting events. Although this heightened activity can also be associated with an emissions burden from the organization and staging of such a massive event, an innovative partnership has been formulated to ensure that this facet of the games brings yet another positive to the legacy of the Olympics at large. Cisco has been working in the smart cities space for seven years now — providing services including traffic management, parking assistance, waste management, pollution reduction, virtualized learning, security and health care. This week they took another major step, announcing a strategic partnership with AGT International — a solutions provider that works specifically in the smart cities space, where they have fielded an impressive array of solutions ranging from law enforcement, to environmental monitoring to citizen services. Fossil fuels have long held an advantage over renewables in that they provide a combined energy source and storage medium in one substance, be it gasoline, coal, oil or natural gas. The fact that you can save it, store it, then use it continuously whenever you need it is a tremendous convenience. That gap is now being reduced with the advent of combined solar-storage systems. These new systems not only match the capability of fossil fuels, but can actually go them one better. How? New Divest-Invest Philanthropy organization launches initiative to encourage fossil fuel divestment by foundations, pension funds and other nonprofits.
<urn:uuid:8c9b6804-9454-46aa-8e85-9a92423de0d1>
CC-MAIN-2016-07
http://www.triplepundit.com/category/climate-environment/page/82/
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166739.77/warc/CC-MAIN-20160205193926-00145-ip-10-236-182-209.ec2.internal.warc.gz
en
0.938775
875
2.640625
3
2.954476
3
Strong reasoning
Science & Tech.
John Hayward, Gazetteer of the United States of America… (Philadelphia: James L. Gihon, 1854), 84-86. MINNESOTA (TERRITORY.) This was formerly a part of the vast country belonging to the United States which was acquired by the Louisiana purchase in 1803. It was then, with the surrounding regions, a rugged and unmeasured wilderness peopled only by savages, and had never been systematically explored by civilized man until about the period of its transfer. The tract now embraced within the limits of the territory was duly organized, and its boundaries defined, by an act of Congress, passed March 3, 1849, " to establish the territorial government of Minnesota." Boundaries and Extent. — Bounded on the north by the boundary line between the possessions of the United States and Great Britain; east and south of east by said boundary line to Lake Superior, and by a straight line thence to the northernmost point of Wisconsin in said lake ; also along the western boundary of Wisconsin to the Mississippi River, and down the main channel of said river to the point where the line of 43£° north latitude crosses the same; south on said line, being the northern boundary of Iowa, to the north-west corner of that state, whence the boundary proceeds southerly along the western limit of Iowa, until it strikes the Missouri River; and west by the main channel of said river, as far as the mouth of White-earth River, and by the main channel of the latter until it strikes the boundary of the British possessions. The territory, at its northern extremity, reaches from east to west between the 90th and 103d degrees of west longitude, and comprehends an area of 83,000 square miles. Government. — The government is, of course, temporary, subject to such alterations, and to such further division of the territory, as may be determined by act of Congress. All free white inhabitants, 21 years of age, are voters, and were eligible for any territorial office at the first election. A Council and House of Representatives compose the legislative assembly; the former consisting of 9 members, chosen for two years, the latter comprising 18 members, elected annually. The legislature may increase the Council to 15 members, and the representatives to 39. The governor is appointed for four years, by the President and Senate of the United States. The secretary of state, in like manner appointed, is acting governor in the absence of the executive magistrate. Judiciary. — The Supreme Court is composed of a chief justice and two associates, appointed for four years by the President of the United States. Two of these constitute a quorum. This tribunal holds an annual session at the seat of government. There are three judicial districts, in each of which one of the justices must reside, and hold a District Court, having the jurisdiction of the United States District and Circuit Courts. Both courts possess chancery powers. The laws of Wisconsin, until repealed or modified, are valid in this territory. Education. — To this subject all due regard is given. Two sections in each township are set apart for the support of schools. In all the settled places, school-houses are among the first edifices erected. In some towns public libraries are established, and courses of instructive lectures maintained. Finances. — By returns from five counties in the territory, made in January, 1851, it appears that the assessed value of property in those counties amounts to somewhat over $800,000; and measures are in progress for completing the valuation of the residue. The salaries of the territorial officers, as in other and like cases, are provided for by the general government. By the act of organization, $20,000 were appropriated forthe erection of public buildings at the capital, and $5000 for the purchase of a territorial library. Surface, Soil, &tc. — The face of the country, in the central parts of the territory, is gently undulating in its general character, and exhibits about equal proportions of prairie and timber land, intersected in every direction by clear and beautiful streams, tributary to the Mississippi and Minnesota or St. Peter's Rivers, and navigable always in the spring for flat boats. This region also abounds in lakes of pure water; and its soil is represented as being unrivalled in fertility. With some modification, the same remarks may apply to the other sections of the territory. The valley of the Red River of the north, extending south some 300 miles, from the northern boundary of the territory into the centre, is about 150 miles wide, and perfectly level, with the exception of a few tracts of wet prairie, and is admirably adapted to the culture of wheat and other grains. The soil, for the most part, throughout the territory, consists of a mixture of sand and black loam, and, being loose and porous, is peculiarly favorable to the rapid growth of bulbous and other roots. Potatoes have been known to yield 450 bushels to the acre. Vegetable crops of all kinds, and in luxuriant profusion, are brought earlier to maturity than in many regions farther south. In the valley of Minnesota River, the strawberry vine commonly attains a height of twelve inches. A large part of the territory is overspread with vast forests of excellent pine and other, trees of great value for building. Rivers, &tc. — Almost the entire eastern boundary, by the Mississippi and St. Croix Rivers, is navigable water: steamboats ply upon the former, within the territory, for upwards of 300 miles. At the north-east, the territory is bounded by that immense expanse of waters, Lake Superior. The Minnesota winds through a delightful valley, in a south and easterly direction, and has been ascended more than 200 miles. The Big Sioux, and other tributaries of the Missouri, flow southerly and westwardly. The Red River of the north, taking its rise near the centre of the territory, flows northerly, and is navigable for some 400 miles before passing into the British possessions. The Missouri, which constitutes a great portion of the western boundary, affords navigation during nearly its whole course along the territory. There are many other fine streams, and numerous large lakes, all presenting facilities for inland commerce, such as are possessed by no one state or other territory in the Union. Internal Improvements. — A canal, to connect Lake Superior with Lake Huron, has been much talked of, and probably at no distant day will be constructed; as such a work will secure uninterrupted water communication down the great chain of lakes to the Atlantic coast. The removal of obstructions in the Mississippi and other rivers — surveys for which purpose have been authorized by Congress — will add many hundred miles to the already immense extent of navigable waters lying within and around this territory. The aid of railroads will of course soon be called in, to complete that system of internal improvements which Nature herself seems to have suggested. Minerals. — In this newly-settled country no explorations on any considerable scale, for the purpose of developing its mineral resources, have as yet been undertaken. There can be no doubt that this territory possesses its full share of geological treasures, which in due time will excite the attention and repay the industry of its hardy and enterprising people. Manufactures. — The only manufacturing branches now carried on to any great extent are those which are connected with the business of house-building, especially the manufacture of lumber. Of this article, although the work was begun so recently, a sufficiency is produced, not only to supply the home demand, but to furnish annually some 20,000,000 feet of boards, logs, &c., for exportation to the markets below, on the Mississippi. A number of steam and saw mills have already been erected; and so numerous are the mill sites, and so immense the water power within the territory, that this pursuit, together with others to which these advantages will apply, especially the manufacture of flour, must naturally add greatly to the public prosperity. Indians. —There are several tribes, or parts of tribes, still inhabiting certain tracts at the northern and western parts of the territory. To some of these, the Chippewas and others, lands had formerly been ceded; but negotiations for the removal of the former have been entered into, and treaties for the extinction of the Indian title to other tracts have been provided for by Congress. Many of the most civilized are solicitous to become subjects of the laws of the territory, and to participate in its free institutions. Climate. — Considering its high northern latitude, Minnesota enjoys a climate quite mild, in comparison with that of the more eastern states on the same parallel. The winters are less severe, except at some points in the neighborhood of the great lake; but the weather is uniform, regular, and subject to few or no sudden changes. The summers are temperate, and of sufficient length to bring forth and perfect the numerous agricultural products for whichthe soil is so well adapted. With abundance of pure water, and a salubrious atmosphere throughout the year, the people cannot but be favored with an uncommon measure of health. Religion. — There are four beautiful church edifices in St. Paul, the capital, and several others in the towns of St. Anthony Falls and Stillwater. The several denominations of Christians consist of such as are usually found in the New England States. Population. — The inhabitants of this territory, at the census of 1850, numbered but 6038, exclusive of Indians. But so desirable a country must soon attract towards it large reinforcements from the Northern and Eastern States. The tide of emigration, in fact, is already turned, and is moving with so strong an impulse in that direction, that long before the next decennial enumeration, Minnesota will no doubt have acquired the complement of inhabitants necessary to her admission as an independent state.
<urn:uuid:09f81482-0aca-46e0-97d1-96f25febdcc4>
CC-MAIN-2020-34
http://hd.housedivided.dickinson.edu/node/18468
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735823.29/warc/CC-MAIN-20200803170210-20200803200210-00331.warc.gz
en
0.967287
2,051
3.265625
3
2.631154
3
Strong reasoning
History
In recent but separate interviews, three notably credible and exceptional minds have warned us of the risks of artificial intelligence (AI). Namely Stephen Hawking, Elon Musk, and Bill Gates. Each has expressed concern that robots, more likely software than the big, strong, physical type made famous by Arnold Schwarzenegger, pose a very serious, if not existential risk to mankind. Is the Terminator coming? I don’t know. Do some of the possibilities of AI frighten me? A little. But I try not to lose too much sleep over things that are still long in the future, that I can’t control, and that I can’t avoid. But that doesn’t mean we shouldn’t be talking about AI today. Because if the Terminator is coming in 50 years, today is when we must talk about it. When I speak on innovation there’s a question I often ask; “What is the best way to predict the future?” Nine out of ten people answer with, “by looking at the past.” I completely disagree. In my experience, the best way to predict the future is actually to look to science fiction. We humans have amazing imaginations, but even more impressively, when we set our minds to something we usually figure it out. Nothing speaks to the way science fiction has inspired us more than the Tricorder Project. When I ask audiences if they remember the “Beam me up, Scotty” transporter from Star Trek, almost everyone of a certain age or proclivity does. But, when I ask whether they think it can become a reality in the relatively near future, very few believe it can. Yet the Tricorder Project tells us we are on our way (pun intended). Travel at the speed of light? Mathematically we already know how to do it. Transport yourself from one place to another? Three years ago, Michio Kaku was explaining the expectations of our ability to ultimately teleport inorganic matter, then organic matter, and then ultimately people. The inanimate version is here already. We know AI is certainly advancing rapidly, with a Russian-made program being the first to pass the Turing Test last June. The Turing Test is 65-years old and gauges whether a computer can trick a human being into thinking the computer is also another human. Some use it as a proxy to gauge the effectiveness and maturity of artificial intelligence. Passing the Turing Test is quite a big milestone that was reached, like being the first to run a four-minute mile — a feat once considered impossible. While Hawking and Gates spoke about the enormous potential dangers we face with AI, Musk goes so far as to offer a solution: government regulation. On the risk, I certainly agree. On the solution — not at all. Recently, it was asked, “Is AI good or bad for humanity?” The mistake in that question is similar to the mistake that’s been made for well over a decade on global warming, namely, “is man responsible for global warming and if so, how much of it is manmade?” Some would like to argue, “none at all.” That’s rather absurd. There’s no doubt that humankind has developed a big enough global footprint to affect the environment. How big an effect? Who knows, but more importantly, who cares? Changing the behavior of seven billion self-interested, short-term thinking people, or dozens of even more self-interested nations, simply isn’t going to happen. It’s a very similar situation to AI. Trying to regulate the development of artificial intelligence is a fool’s game. There are so many military and intelligence applications of AI that it would be like countries agreeing not to spy on each other. When has that ever worked? In fact, the “wink-wink” reality in the spy world is so ubiquitous that every country knows it’s subject to being spied on by every other — including its closest allies. Sure, politicians may feign outrage publically for political purposes, but behind closed doors, it’s all about the wink. Any agreement to limit the proliferation of AI for military and intelligence purposes would be like an agreement to get rid of nuclear weapons. Even after the agreement, every nuclear country will keep a few — hidden — just in case (wink, wink). That’s why it will never happen. Of course, even defining AI would be a regulatory impossibility. Are we really going to limit the kind of software and computer development that’s done in university labs? And if we did, do we believe every other country in the world would follow suit? The idea of regulation is absurd. Instead, we have to protect ourselves in a manner more similar to how we protect ourselves against cybercrime and malicious hacking. We need to stay many steps ahead (though we’re not doing so well proving that we can). We need software-based defensive systems similar to the ones being created at DARPA to stay steps ahead of cybercrime. Already, certain sophisticated cyber weapons are designed to take on a life of their own once they infiltrate a target’s systems, because once inside, we often can’t communicate with or control them. AI will also be a tool of cyberattack. That’s why it should be dealt with in very similar ways and by very similar agencies. Having a philosophical debate about AI, or passing token and ineffective laws, is like carrying a sign that says, “No more nukes.” It will never happen and distracts us from having the really important conversation that’s needed. Let’s talk instead about how innovation, not regulation, can help us harness the power of AI and protect us from its unintended consequences.
<urn:uuid:e53b0427-c14d-4c33-a3a4-a68b925b0231>
CC-MAIN-2023-23
https://dailycaller.com/2015/02/11/the-terminator-is-coming-so-what-do-we-do-about-it/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649518.12/warc/CC-MAIN-20230604061300-20230604091300-00579.warc.gz
en
0.956905
1,213
2.78125
3
2.945634
3
Strong reasoning
Science & Tech.
|All World's a Stage Summary & Analysis [Exercise of NEB English-11]| Summary of All World's a Stage The poem ‘All the World’s a Stage’ has been written by William Shakespeare. "All the world's a stage" is the phrase that begins a monologue from his pastoral comedy ‘As You Like It’. The lines of the poem are spoken by the melancholy Jaques in Act II Scene VII Line 139. In this poem, he seems to have the impression that human life is not real. What we see and hear isn't a reality. Human life is a play of make-believe. Here Shakespeare traces human life through the famous seven ages – the infant in arms, the schoolboy, the lover, the soldier, the justice, the retired man, and the worn-out senior, sinking back into dissolution. The whole world's a stage. We're only actors. We enter the stage and we go off it again. One man in his lifetime plays a lot of roles. "All the world's a stage" is the phrase that begins a monologue from William Shakespeare's pastoral comedy ‘As You Like It’ spoken by the melancholy Jaques in Act II Scene VII Line 139. At first, he plays the part of the infant, crying and throwing milk in the arms of the nurse. Then he plays the part of a schoolboy who is not willing to go to school. With his shining face of the morning, he trudges at the pace of the snail. Then there comes the role of the lover. He sighs like a furnace, and writes pitiful verses, addressing his beloved. He plays the role of a soldier in the fourth stage. It's stocked with all the violent oaths. He's wearing a wonderful beard. In a quarrel, he is too sensitive and fast and hasty. He comes into a temper soon. He is willing to sacrifice his life for the sake of unsubstantial glory. Then he will play the role of judge. He's a bulging belly, with severe eyes. He's a very wise man. His appearance is formal and he seems to be a mature person. Then Shakespeare describes old age as the sixth stage of life. In this, he wears pantaloons and slippers on his feet. He is now thin, lean, and weak, and his eyesight too has become weak. His manly voice has turned into the shrill voice of a child. It's pretty funny. The old man is in slippers, wearing glasses. His mannish voice once more turns into a child's shrill tone. The last role is the second child. It's so full of forgetfulness. It's without teeth, without eyes, without taste, without everything. In this way, he completes his role in the play. His life is over by playing the role on the world stage. He leaves the stage or he dies. About the Author William Shakespeare (1564-1616) was an English poet, dramatist and actor of the Renaissance era. He is widely regarded as the greatest writer in the English language and the world's greatest dramatist. His most famous works include Hamlet, Othello, King Lear, Romeo and Juliet and Macbeth. This poem is taken from William Shakespeare's play As You Like It. With these words “all the world’s a stage” begins the monologue by the character Melancholy Jaques in Act II Scene VI of the play. In this poem, Shakespeare has compared life with a stage. The seven stages of a person’s life are infant, school-going boy, lover/husband, soldier/fighter, justice/ ability to understand the right and wrong, Pantalone (greediness and high in status) and old-age., which can come into your mind when you go through this poem with the theme that a person is an ultimate loser in the game of life. Exercise of All World's a Stage Understanding the Text a. Why does the poet compare the world with a stage? ➜ The poet compares the world to a stage because he considers all men and women like the actors of a drama. These actors perform their different roles here in this stage and leave this worldly stage one day. b. What is the first stage in a human's life? In what sense can it be a troubling stage? ➜ The first stage in a human's life is the stage of infanthood. It can be a troubling stage in the sense that this stage is a fully dependent stage where the infant is fully under the care of the mother. The infant can cry and even vomit anytime in the mother's arms. c. Describe the second stage of life-based on the poem. ➜ The second stage of life is the stage of boyhood. In this stage, the boy is a school going, student. He slings his bag over his shoulder with his shining face and creeps to school unwillingly like a snail. d. Why is the last stage called second childhood? ➜ The last stage is called second childhood because here in this stage the man loses his senses of sight, hearing, smell and taste. He acts like a child and finally exits from the roles of his life. e. In what sense are we the players on the world stage? ➜ We are the players on the world stage in the sense that we perform different roles here on this world stage. We play seven different roles in our entire lifetime and finally depart from this world stage. Reference to the Context a. Explain the following lines: All the world's a stage, And all the men and women merely players ➜ Here in these lines, the poet has compared the whole world with a stage where men and women are only players (actors). After birth, they perform their many roles here in this worldly stage and finally, leave this stage moving towards their final destination (death). b. Explain the following lines briefly with reference to the context. They have their exits and their entrances; And one man in his time plays many parts, ➜ These beautiful lines have been taken from William Shakespeare's realistic poem "All the World's a Stage". These lines are the parts of Jacues's monologue. Here, the poet has said that the people in the world have their entrances (birth) and exits (death). People arrive here in this worldly stage through birth and leave this stage through death. A man here in this worldly stage has to perform many roles in his lifetime and leave the stage after his death. c. Read the given lines and answer the questions that follow. Then the whining schoolboy, with his satchel And shining morning face, creeping like snail Unwillingly to school. i. Which stage of life is being referred to here by the poet? ➜ The childhood stage of life is being referred to here by the poet. Best Pos Small Retail Business ii. Which figure of speech has been employed in the second line? ➜ In the second line, simile, a figure of speech has been employed where the boy has been compared with snail using like. I ii. Who is compared to the snail? ➜ The school-going boy is compared to the snail. iv. Does the boy go to the school willingly? ➜No, the boy doesn't go to the school willingly. His unwillingness can easily be the motion of a snail towards his school. d. Simile and metaphor are the two major poetic devices used in this poem. Explain citing examples of each. ➜ Here in this poem, we find major poetic devices as simile and metaphor. The poet has used these poetic devices a lot. The examples of simile and metaphor of this poem are as follows: a) "All the world's a stage" - Metaphor b) "And all the men and women merely players" - Metaphor c) "And shining morning face, creeping like a snail" - Simile d) "Full of strange oaths, and bearded like the pard, " - Simile e) "Seeking the bubble reputation" - Metaphor f) "His youthful hose, well sav'd, a world too wide" - Metaphor. g) "and his big manly voice, Turning again toward childish treble" - Metaphor. e. Which style does the poet use to express his emotions about how he thinks that the world is a stage and all the people living in it are mere players? ➜ The poet uses a narrative style to express his innermost emotions about how he thinks that the world is a stage and all the people living in it are mere players or characters. These characters go through seven different phases in their lives. He has explained the real aspects of human life for all readers to understand the reality of life. f. What is the theme of this poem? ➜ The theme of this poem is that person is the ultimate loser in the game of life. A person makes an entry into this worldly stage and performs different roles in his lifetime. Finally, he/she leaves this worldly stage struggling in different circumstances. He/She comes empty-handed here and leaves this stage empty-handed. He/She brings nothing and takes nothing. Reference Beyond the Text a. Describe the various stages of human life picturised in the poem "All the world's a stage." ➜ According to Shakespeare, the world is a stage and everyone is a player. He says that every man has seven stages during his lifetime. He performs different seven roles in his lifetime and finally exits from this worldly stage. The first stage of a man is childhood. He plays in the arms of his mother. He often vomits and cries in this stage. In his second stage, the man is an unwilling school going, student. He becomes a lover in his third stage. He is very busy composing ballads for his beloved and yearns for her attention. In the fourth stage, he is aggressive and ambitious. He seeks reputation in all that he does. He is ready to guard his country and becomes a soldier. In his fifth stage, he becomes a fair judge with maturity and wisdom. In the sixth stage, he is seen with loose pantaloons and spectacles. His manly voice changes into a childish treble. The last stage of all is his second childhood. Slowly, he loses his faculties of sight, hearing, smell and taste and exits from the roles of his life. Thus, Shakespeare has presented the pictures of the seven stages of a man's life in the poem 'All the World's a Stage'. b. Is Shakespeare's comparison of human's life with a drama stage apt? How? ➜ Yes, Shakespeare's comparison of a human's life with a drama stage is apt. He compares the whole world with a stage where men and women are only actors. In a drama, every player enters the stage, acts his/her part and then exits. In the same way, we enter this world by birth. We lead our life in different characters. We exit from this world at the time of our death. Shakespeare says that every man has seven stages during his lifetime. His opinion related to life is quite right. Players or people come into this worldly stage and perform their seven different roles and finally part away from this stage. Our life is divided into seven different stages and in these stages, we keep on performing different roles seeking various things in our life as actors. Here in this worldly stage, we play the role of an infant, a boy, a lover, a soldier, a judge, an old man and an extremely old man. Detail Analysis & Further Reading Of the Poem ‘All the world’s a stage’ is a monologue of “the melancholy Jaques” from Act II Scene VII of the play As You Like It by William Shakespeare. The speaker, Jacques, begins “All the world’s a stage” by asserting that life is like a stage on which “men and women merely” play roles. They play different parts throughout their lives, as the speaker is now. In the bulk of this monologue, the speaker spends time going through the seven ages of man. One starts in infancy, moves through childhood, and into the best part of their life when they’re a lover, soldier, and judge. Later, they lose control of their senses and eventually can’t take care of themselves. Shakespeare uses the monologue in As You Like It to compare life to a stage on its most basic level. His speaker, Jacques, is suggesting that life is a stage, and men and women are players who take on different roles throughout their lives. The concept comes, in part, from medieval philosophy. The “seven ages” dates from the 12th century. There was a tapestry of King Henry V depicting the seven stages of man. For theological reasons, medieval philosophers constructed groups of seven as in the seven deadly sins. Therefore, it is believed that the “seven ages” derive from medieval philosophy. Structure and Form ‘All the world’s a stage’ is an excerpt from William Shakespeare’s well-loved play, As You Like It. Specifically, it is a monologue that is spoken by the melancholy Jaques. The monologue is twenty-eight lines long and is in part written in blank verse, or unrhymed iambic pentameter. This means that the lines do not rhyme, but they do (at some points) contain five sets of two beats, the first of which is unstressed and the second of which is stressed. It is also important to consider how a performer might’ve used the stage to their advantage when performing these lines and the impact that formal elements like enjambment and alliteration would’ve had on the audience’s understanding of the speech. Shakespeare makes use of several literary devices in this speech. Some are: Simile: ‘creeping like a snail”; “soldier… bearded like the pard”; etc. Metaphor: The entire speech itself is more like symbolism; men and women are portrayed as players whereas life is portrayed as the stage. Shakespeare uses the “stage” as an extended metaphor. Repetition: Another figure of speech used in this monologue; words like sans, age, etc. are repeated for the sake of emphasis. Anaphora: It is used in the eighth and ninth lines, beginning with the word “And”. Synecdoche: “Made to his mistress’ eyebrow”; “And then the justice”; etc. Alliteration: “his shrunk shank”; “quick in quarrel”; etc. Onomatopoeia: “pipes / And whistles in his sound” Asyndeton: “Sans teeth, sans eyes, sans taste, sans everything.” The Seven Ages of Man The seven stages of life, as described by Jacques in ‘All the world’s a stage’ are: The Seven Ages of Man, a German representation of 1482 Infancy (lines 5-6): The first stage of man’s life is infantry. In the monologue, readers can find an image of a baby crying softly and throwing up in the caregiver’s lap. Boyhood (lines 7-9): The image of a school-going boy unwilling to go to school describes this stage. Adolescence/Teenage (lines 9-11): In this stage, Shakespeare presents an image of a dejected lover who composes sad songs for his beloved. Youth (lines 11-15): He projects the stage of youth by depicting the life of a soldier. As a soldier, a person in his youths is unafraid of dire challenges. Middle Age (lines 15-19): The fifth stage deals with middle age and it is described by the picture of a judge or one who practices law. In this stage of life, one starts to mature and becomes wiser than before. Old Age (lines 19-25): Just before the final stage, comes old age, turning the manly voice of youth into childish trebles and whistling. It makes the body weak and the mind, dependent upon others. Death (lines 25-28): In the finale of this seven-act-play of life, the strange and eventful history ends abruptly. It leaves a man with nothing. All the world’s a stage, And all the men and women merely players; They have their exits and their entrances, And one man in his time plays many parts, His acts being seven ages. At first, the infant, Mewling and puking in the nurse’s arms. In the first lines of ‘All the world’s a stage,’ the speaker, Jacques, begins with the famed lines that later came to denote this entire speech. He declares that “All the world’s a stage” and that the people living in it are “merely players.” This sets up what is one of the most skilled conceits in all of English literature. Every person, no matter who they are, where they were born, or what they want to do with their lives, wakes up every day with a role. They enter, they exit, just like performers. It’s important to note at this point that these lines would be read on stage in front of an audience. The extended metaphor would not be lost on anyone listening or watching. The actor is declaring to the audience that “you” are just as much of an actor as he is. Before the listener starts to get concerned about the role they have to play, Jacques adds that a “man,” (or woman) plays many different parts in their lives, as an actor does. Whoever the actor may be on stage is not only “Jacques” he’s also many other characters throughout his career. It’s in the fifth line of the monologue that Shakespeare brings in a slightly more complex concept, that of the “seven ages” of humankind. The first of these is the “infant”. And then the whining schoolboy, with his satchel And shining morning face, creeping like snail Unwillingly to school. And then the lover, Sighing like furnace, with a woeful ballad Made to his mistress’ eyebrow. Then a soldier, Full of strange oaths and bearded like the pard, Jealous in honour, sudden and quick in quarrel, Seeking the bubble reputation Even in the cannon’s mouth. And then the justice, In fair round belly with good capon lined, With eyes severe and beard of formal cut, Full of wise saws and modern instances; As the speech progresses, Jacque continues to describe how someone ages, the roles they play, and what everyone is like, generally, at different times in their lives. One will at some point be a “whining school-boy” and a “lover / Sighing like furnace.” There will be sorrows, ballads, and losses. One will become “a soldier” and take oaths of allegiance while seeking out a fight. This is one of the more difficult stages in one’s life and if drafted, not one that someone could ignore. The man’s youth has given way to a full beard like a “pard,” or leopard. In these lines, there is also an interesting metaphor comparing a human or animal blowing a bubble with its mouth to staring down a cannon that might fire at any moment. Finally, this metaphorical person becomes “the justice,” or magistrate, someone with a steadier knowledge of what’s right and wrong. They have “Wise saws,” or wise sayings and “modern instances,” or arguments for legal cases. And so he plays his part. The sixth age shifts Into the lean and slippered pantaloon, With spectacles on nose and pouch on side; His youthful hose, well saved, a world too wide For his shrunk shank, and his big manly voice, Turning again toward childish treble, pipes And whistles in his sound. Last scene of all, That ends this strange eventful history, Is second childishness and mere oblivion, Sans teeth, sans eyes, sans taste, sans everything. In the sixth stage of man’s life, he moves into the “pantaloon” or comfortable clothes worn by old men. His youthful clothes are too loose because he’s lost weight with age. He’s also lost his deep voice. It reverted back to something that’s closer to what he had in one of the earlier stages of his life. The last stage of a man’s life is his “second childishness and mere oblivion.” This is when he loses control of everything that made him an adult. Now, he’s helpless and dependent on others, as he was when he was a child. He is “sans,” or without, “taste,” “eyes,” and “teeth.” The final image is the man without “everything.” His life, all its intricate memories, and details are lost. In ‘All the world’s a stage’ Shakespeare discusses the futility of humanity’s place in the world. He explores themes of time, aging, memory, and the purpose of life. Through the monologue’s central conceit, that everyone is simply a player in a larger game that they have no control over, he brings the themes together. Shakespeare takes the reader through the stages of life, starting with infancy and childhood and ending up with an old man who’s been a lover, a soldier, and a judge. The “man” dies after reverting back to a state that’s close to childhood and infancy. You can also explore the themes in other William Shakespeare poems. Tone and Mood In ‘All the world’s a stage’ Shakespeare creates a somber and depressing mood through the simple breakdown of life, success, love, and death. The beauties of life are compiled into a short monologue that’s over almost as soon as it began. With this, the reader is left to consider their own life and what “stage” they’re in now. The speaker knows that this is the way the world is, everyone listening to his words is all going to end up back where they started as children and there’s no way to change that fact. In Shakespeare’s comedy As You Like It, Rosalind and Celia encounter some memorable characters in the Forest of Arden. Jaques, the melancholy traveler, is the most notable of them all. He speaks many famous speeches such as “too much of a good thing”, “A fool! A fool! I met a fool in the forest”, and “All the world’s a stage”. Jaques’ monologue is an echo of the motto of the new Globe Theatre which was opened in the summer of 1599. The motto was “Totus mundus agit histrionem”, meaning “all the Globe’s a stage”. The play was written in the same year. In his book “William Shakspere’s Small Latine and Lesse Greeke”, T. W. Baldwin states that Shakespeare’s version of the monologue is based upon Palingenius’ “Zodiacus Vitae”. Shakespeare would have studied this school text at the Stafford Grammar School. The text also presents stages of a man’s lifespan. He would have taken inspiration from Ovid and Juvenal. Who said, “All the world’s a stage”? In Act 2, Scene 7, Line 139 of William Shakespeare’s pastoral comedy As You Like It, the melancholy Jaques said the monologue ‘All the world’s a stage’. What is the central theme of ‘All the world’s a stage’? The central theme of this monologue is life and its seven stages. Shakespeare describes the phases that are observed in a man’s lifespan. Why does Shakespeare call the world a “stage”? According to Shakespeare, the “world” is like a “stage”. The stage remains permanent. Only the actors and actresses change with time. They have their parts to play. When the curtain slides down, they are no more. The stage becomes empty. It makes way for a new play, maybe the next day or the day after tomorrow. We, human beings, are like artists. We play our roles as someone’s child, lover, life partner, or grandparents during our lifespan. When our time comes, the sidewalk is our only destination leading us to the leaden death. What message does ‘All the world’s a stage’ convey? Through this monologue, Shakespeare gives the message of life’s impermanence. How quickly the play of our life ends and the strange eventful lays are concluded get featured in this speech. Why is the last stage called “second childishness”? The term, “second childishness” refers to the cognitive decline of an old person. It is characterized by childlike judgment and behaviour. Shakespeare called the last stage of man’s life the “second childishness” for this reason. What does “Sans teeth, sans eyes, sans taste, sans everything” mean? The word “sans” is a preposition that is generally used in literary works. This word adds a flavor of humor to the line where it is used. Literally, it means “without” or “in the absence of something”. In this line, the use of palilogy (repetition of “sans”) puts emphasis on the nothingness in the last stage of a human’s life that is “mere oblivion”. What does “Sighing like furnace” mean? The lover’s sigh is compared to the exhausts of a furnace. A man in his youths is driven by the carnal desires that fuel his heart. It kindles the burning desire for love there. When the fire is blown out by the current of a lady’s rejection, the heart sighs like a furnace. The heat of passion is there but the fire of heartfelt emotions is extinguished.
<urn:uuid:ce8fd563-8cd6-44a1-814d-72707c01c45c>
CC-MAIN-2023-06
https://www.acharyar.com.np/2021/12/all-worlds-stage-summary-analysis-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500140.36/warc/CC-MAIN-20230204142302-20230204172302-00037.warc.gz
en
0.962004
5,779
3
3
2.561896
3
Strong reasoning
Literature
Do Face Masks Actually Work? At the end of the 19th century, under the influence of Louis Pasteur’s ideas about diseases’ transfer by microbes, surgeons suddenly realized that they were still working, exhaling microbes into the open wounds of the operated patients. A person in a hospital often has weakened immunity. During surgery, the skin – a good barrier to bacteria – does not protect us at the wound site. Therefore, it is relatively simple to bring a bacterial infection into the wound in this way. The surgeon first put on a mask in 1896 and then continued the procedure. The reason why the mask protects others from the microbes is obvious: it retains and destroys only large droplets well (more than 5 micrometers in diameter). They are produced by breathing (as well as by sneezing and coughing). However, the largest drops are most strongly deposited in the air, and it is most likely to get infected without direct contact from small drops, less than 5 micrometers. Those can remain in the air at face level for hours. They are the main cause of infection by airborne droplets. The surgeon contacts the patient at a very short distance: even large drops falling down from his face to the patient can easily reach an open wound. For him, the mask makes sense, although it is effective only if it includes special filter layers. Initially, the mask was conceived not to protect its carrier, but to protect it from the carrier. Theoretically, respirators can help, but in reality, ordinary people do not know how to use them properly, they are loosely fitted to their faces. In addition, before removing the respirator from the face, you need to wash your hands – as well as after you removed it. People rarely like to wash their hands so often. As a result, their chances of getting sick will only increase even with a respirator. These face masks give a false sense of security that can be more harmful than helpful. Indeed, hands carry viral infections extremely often. Increasing the frequency of touching the face is an undesirable consequence of wearing medical masks. In 2015, a thorough analysis of what was experimentally found out about the possibility of protecting a healthy person with a mask from infection from the outside was released. In this review work, the situation is noticeably more complicated than it seems to medical specialists. Studies simply cannot serve as a criterion for the real effectiveness of wearing disposable masks. There were other experiments of similar content. In Canada, a team of 446 nurses working in a hospital during an influenza epidemic was divided into two groups, one wearing medical masks and the other wearing N95 respirators. In the first group, 23.6% fell ill with the flu, in the second – 22.9%. In other words, in practice, supposedly ineffective masks failed in the same way as supposedly effective respirators. Interestingly, normally in hospitals during flu epidemics, 23% of staff become ill, even if no one is using any protective equipment. In China, a study was conducted on 1922 persons from the medical staff and found that N95 respirators seem to protect against nosocomial infections (mostly non-viral), but practically can not prevent infection with influenza. This is quite logical. A typical nosocomial infection is caused by a bacterium that is simply a lot larger than the capsid of the virus causing the flu or Covid-19. Face masks protect from bacterial infections, but cannot inhibit viral infections. The same review of 2015 claims the usefulness of wearing masks by the population already with the aim of not infecting other people. It bases on an experiment in Hong Kong during an influenza epidemic, with a sample of 407 people. They all received a confirmed diagnosis. Then the researchers tried to stop them from infecting their family. Some of them were forced to wear masks, another wear masks themselves + washing hands constantly, the third was not forced to do anything (control group). It turned out that the masks themselves do not reduce the risk of infection in patients with his own home. Even in combination with handwashing, they did this only when masks and handwashing were prescribed for patients in the first 36 hours from the moment they developed symptoms. If you just got sick, you should wear a mask and wash your hands thoroughly – so you can infect others less. Why don’t you need to buy masks up Doctors and scientists often point out that preventive mass buying up of masks puts hospitals in difficult conditions during the epidemic: masks need to be changed there most often, but there is nowhere to buy them especially. Let’s think for a moment: why do people buy a mask? They buy them because they think that wearing it will protect them from infections. There is only one reasonable motive for buying up – altruism. The coronavirus will hit me. Immediately after the appearance of the first symptoms, I will put on a mask and infect the neighbors less, while I go to the garbage chute and get bread. But altruism of this kind sharply contradicts the fact that masks are needed more in the hospital, and if you get them yourself in case of illness, then the medical staff will have nowhere to get new ones from. Conclusion: there are no rational reasons to buy masks. People do this because they do not know about the practical uselessness of masks and respirators in the fight against viral infections. Category: Health and Wellness | Tags: face mask, human health, viruses
<urn:uuid:3db17f0f-fdaa-40a0-8651-460186804b07>
CC-MAIN-2020-16
https://cbaonline.org/do-face-masks-actually-work.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518767.60/warc/CC-MAIN-20200403220847-20200404010847-00558.warc.gz
en
0.973829
1,124
3.34375
3
2.972219
3
Strong reasoning
Health
These racial disparities were found in many cities throughout the country. The researchers looked at deaths from breast cancer from different time spans: 1990-1994, 1995-1999, 2000-2004, and 2005-2009. From 1990-1994, there was a 17 percent racial disparity — that is, black women were 17 percent more likely to die from the disease than white women. Between 2005 and 2009, the disparity soared to 40 percent. The disparity in New York was 19 percent, while Memphis had a 111 percent discrepancy. During that same time span, there was a disparity in 29 of 41 American cities. The rate of white women succumbing to breast cancer was down and the rate of black women dying from it wasn’t changing. Breast cancer is the most commonly diagnosed cancer among African-American women. An estimated 27,060 new cases of breast cancer were expected to occur among African-American women in 2013. Among women under 45, the mortality rate of breast cancer is higher in African-Americans than in whites. The median age of diagnosis is 57 years for African-American women, compared to 62 years for white women. "Unfortunately, African-American women have a higher incidence rate of breast cancer before the age of 40 and are more likely to die at every age compared to non-Hispanic white women," said Dr. Jessica Shepherd, an assistant professor in the Department of Obstetrics and Gynecology at the University of Illinois at Chicago, noting that breast cancer is the most common cancer among African-American women. According to the American Cancer Society, breast cancer rates went up rapidly among African-American women during the 1980s, which was mostly due to increased detection. The rates increased more gradually in the 1990s. From 2000 to 2009, rates went up slightly among African-American women (0.7 percent per year) and decreased among white women (1.0 percent per year). The decrease in white women during this time period is partly due to a sharp decline in menopausal hormones between 2002 and 2003. A similar drop in incidence was not observed in African-American women, among whom menopausal hormone use is historically lower. What can African-American women do to protect themselves? Reduce risk factors, including obesity. "African-American women need to be educated on the fact that they have higher rates of distant-stage breast cancer compared to white women and also women under the age of 50 have a higher risk of having a particular type of breast cancer that is known as triple-negative cancer," she said, adding that triple-negative cancer is linked to shorter survival. Black women should have a mammogram starting at the age of 40, or start at 35 if there are risk factors or a family history. Women at risk should also have breast exams twice annually. "Education and access to health care is so vital for African-American women as they have a 41 percent higher death rate than white women in regards to breast cancer," she said. "Due to this higher mortality rate, there is a need for utilization of early detection and treatment." And you'll see personalized content just for you whenever you click the My Feed . SheKnows is making some changes!
<urn:uuid:a4b58750-0f47-45c3-ad49-29d98225e744>
CC-MAIN-2017-13
http://www.sheknows.com/health-and-wellness/articles/1035689/breast-cancer-kills-more-black-women-than-white-women
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191396.90/warc/CC-MAIN-20170322212951-00383-ip-10-233-31-227.ec2.internal.warc.gz
en
0.974769
651
3.484375
3
2.700312
3
Strong reasoning
Health
Definition: Foods preferred by immigrant groups, together with the circumstances under which they are produced, cooked, and consumed Significance: What people eat, when, and with whom—their “foodways”—are largely determined by their cultures. As circumstances allowed, immigrant groups brought their food preferences and eating customs with them to the United States, allowing them to maintain a sense of identity and cohesion. What Americans think of as “their” food is an amalgam of numerous culinary traditions. Particular foodstuffs, recipes, methods of preparation, and styles of presentation have been contributed to the mixture by dozens of ethnic groups, but few of the “ways” survived intact. Interactions with a new environment and with an alien and often hostile culture produced a synthesis of old and new, a synthesis that changed as one generation replaced another. Until relations turned antagonistic, Native Americans aided European settlers on the East Coast of North America and traded with them. Although European immigrants had found a landscape and climate somewhat similar to their own, they survived in large part thanks to the three major crops that the Native Americans shared with them—squash, beans, and corn. The English and the Dutch were the most important ethnic groups to settle along the eastern coast of what would become the United States, with the former eventually attaining political dominance. The first English settlers were males drawn from social classes with little experience of hunting, fishing, or cooking. Although much of their food did not survive the sea journeys, they brought cattle, swine, poultry, and honeybees with them and introduced wheat, barley, rye, and fruit trees. The diet of New Englanders was plain, featuring cod and corned (preserved) beef. Popular dishes included succotash (a mixture of beans and corn) and baked beans prepared with salt pork and maple syrup. The English also learned from Native Americans to combine lobsters, shellfish, and vegetables in communal clambakes. They drank beer, often brewed from corn, and cider made from apples and pears. In time, rum made from West Indian sugarcane and tea from China became popular. As women joined the settlements, they were expected to take over the cooking, most of which was done over open fires. English settlers in the warmer southern colonies enjoyed a richer diet than those in the north, eating more pork than beef and in some cases adopting the foods eaten by their slaves.Wealthy landowners also depended upon slaves and servants to prepare their food, often in buildings separate from the living quarters. Like the residents ofNewYork (but unlike those of New England), southerners celebrated Christmas as a day of feasting and merrymaking. Although they too relied on corn, Dutch settlers in New Netherland (part of which would become the English territory of New York) raised a wider range of fruits and vegetables than the English and ate richer foods. One distinctive dish was hutespot, salt beef or pork cooked with root vegetables and added to corn porridge. The Dutch also had a greater preference for cakes and cookies. A wave of poverty-stricken Irish immigrants began to appear in the United States during the 1840’s, driven by a blight that destroyed their principal food crop, potatoes. Although they too spoke English and were assimilated relatively quickly, these immigrants brought a cuisine less elaborate than that of the English. The dish that many people think of as particularly Irish, corned beef and cabbage, is an elaboration of a much plainer everyday dish. Alcohol played an important role in Irish culture, and, for Irish males at least, taverns fulfilled many of the same social purposes that eating establishments played among other groups. A reflection of the growing popularity of diverse immigrant foods, this West Coast restaurant chain offers noodle dishes prepared with recipes based on American, Italian, Cuban, Thai, and other Asian cuisines. (AP/Wide World Photos) Germans were the most numerous ethnic group migrating to the United States during the nineteenth century. Most settled in the Midwest, with many of them growing their own food and raising dairy cattle. German Americans cooked potato dishes and introduced such foods as sauerkraut and frankfurters. Those settling in the nation’s growing towns and cities often opened delicatessens, which have since become a fixture of urban American life. Bakeries and breweries were important, as was the consumption of beer in communal settings such as beer gardens.Atypical link with the home country was Oktoberfest, a beer festival originally held in Munich but copied in German communities around the world. Poles and other eastern Europeans brought foodways that resembled those of the Germans, preferring sauerkraut, noodle dishes, and pierogi (dumplings filled with potatoes, cheese, and cabbage). Many Jews settling in the United States were central or eastern European, and their foodways drew upon national traditions as well as Jewish religious tenets. Because Orthodox Jews observe strict dietary laws, avoiding pork for example, most Jewish immigrants settled where religiously sanctioned kosher foods were available. Thus, Jewish marketplaces became the culinary and cultural centers of Jewish communities, offering fruits and vegetables, fish, and the meat of animals slaughtered according to religious law. The women of the house prepared deboned fish with egg, onion, and flour, called gefilte fish, served on Sunday mornings. Many delicatessens were run by Jews and specialized in kosher food, one of the first being that established by H. Schulz in Brooklyn in 1882. Such “delis” proved popular with non-Jews as well, and they sprang up in many communities, large and small. In time, the kosher food trade grew so large that dozens of Yiddish-language periodicals devoted to it were established, including Der Groseriman, which began publication in 1909 in New York City. Along with Germans, Scandinavian immigrants living in cities opened bakeries and soon dominated the industry. Those settling in the Midwest outside cities missed the seafood that formed amajor component of their diet in Europe but found substitutes in nearby streams and rivers. As circumstances allowed, Scandinavians served a buffet meal at holidays called smorgasbord by Swedes, koldtbord by Norwegians, and kolde bord by Danes. With time, they imported a characteristic dish to be served at Christmas called lutefisk, dried cod preserved using what was originally a mixture of lye and water. Scandinavian immigrants celebrated Saint Lucia Day on December 13 (near the winter solstice) to welcome the return of daylight. To mark the event, Swedes served sweet buns known as Saint Lucia buns, while Norwegians served cookies flavored with ginger or cinnamon and called pepperkake. The French were the major European immigrant group to settle in what would become Louisiana. During the eighteenth century, they were joined by other immigrants of French ancestry from Canada known as Cajuns and whose Cajun cuisine, strongly influenced by French cooking, would become regionally important. Closely related Creole cuisine developed around the port of New Orleans. Besides French, it combined African, Native American, and Spanish elements and involved rice, game, chicken, smoked pork, and crawfish. Mardi Gras (“Fat Tuesday”) was celebrated for the first time in theNewWorld in 1699 in New Orleans. Later, the festival, which involves parades, consumption of Cajun and Creole dishes, and a general spirit of revelry, spread to many other cities. Most Italians immigrated to the United States during the decades immediately before and after the beginning of the twentieth century, living and working in cities. Many were men who saved their pay, lived penuriously, and eventually returned home, where they shared stories of America’s abundance. Most Italian immigrants were able to eat much better in the United States than they had at home, purchasing imported cheese and pasta and adding meat, fish, and fresh vegetables. As Italian immigrants were thus able to imitate the eating habits of their native country’s tiny upper class, food played a prominent role in their culture. Thanks to enterprising immigrant restaurateurs, a distinctive Italian American cuisine soon arose. Authentic Italian pizza had begun as a flat piece of bread sprinkled with salt and flavored with a little oil, but the more elaborate product familiar to most Americans originated in the Little Italy district of New York City at the beginning of the twentieth century. Many other foods served in “Italian” restaurants were scarcely Italian but became popular nevertheless. Initially, most Greeks who came to America were men who expected to work, save their money, and return home. They often lived in boardinghouses with other Greek men, eating communal meals of familiar food—a pattern shared by Romanians and Basque-speaking immigrants from Spain. Typical dishes involved grains, spiced meats, and fresh vegetables cooked in olive oil. After the first decade of the twentieth century, the pattern of Greek immigration came to include entire families intent on remaining in the United States. The lives of Greek immigrants revolved around Eastern Orthodox churches, which began staging public food festivals as a means of raising money while allowing their members to celebrate their heritage. These festivals also attracted other Eastern Orthodox immigrants such as Serbs. Mexican food has become so pervasive throughout the United States that Mexican food shops and restaurants can be found in every state. These women are making authentic tamales in a store in Detroit’s Mexican Town. (AP/Wide World Photos) Most Latin American and Caribbean immigrants brought with them cuisines combining Native American and European elements. In the case of immigrants from Mexico, the European element was Spanish. Mexican immigrants’ proximity to their native country made it relatively easy to obtain ingredients not ordinarily raised in the United States, and in communities with significant populations of Mexican immigrants, specialty groceries and bakeries supplied Mexican foods and served as informal social centers. The staples of the Mexican immigrant diet were tortillas and beans. The former, flat pieces of bread made from corn or wheat, were eaten plain, rolled and filled with cheese or spiced meat to make enchiladas, folded and fried crisp as tacos to hold similar fillings, and so on. Beans were boiled, then often crushed and fried in fat. Mexican cooking made use of chili peppers of varying hotness as well as salsas (sauces) made fromchilies and spices such as cumin. Mexican Americans used what were regarded as less desirable cuts of meat in stews and versions of the spicy Spanish sausages known as chorizos. Chile—a stew made from beef or pork cooked slowly with chilies and tomatoes—evolved numerous regional variations in the Southwest and became a staple of the American diet. Mexican immigrants (as well as those from Central America) prepared tamales—corn dough packed around a meat or cheese filling, wrapped in corn husks, and steamed—for consumption at Christmas. As was the case with other aspects of food preparation, the time-consuming process of preparing the tamales fell to women. Haitian immigrants in Louisiana and Atlantic coast ports at the end of the eighteenth century brought with them a cuisine combining Caribbean, European (particularly French), and African elements, with rice, squash, corn, and black-eyed peas predominating. A favorite dish was pois et riz, a mixture of kidney beans and rice. Meats included chicken, goat, and pork, all cooked with hot peppers and spices. Haitian immigrants made patties of black-eyed peas for consumption on New Year’s Eve. Cuban cooking reflected Spanish as well as Caribbean and African influences. After the Cuban Revolution of 1959, many Cubans settled in nearby Florida, where they reproduced a Cuban cuisine based on red beans, black beans, rice, and pork. The last was usually cooked in a sofrito, or sauce, of olive oil, lemon juice, onion, and spices. Corn was cooked in stews and soups and ground for tamales. Most African Americans are descendants of Africans transported involuntarily from the western shores of Africa to the southern United States as slaves. Drawn from numerous cultures, they brought a variety of foodways with them but adopted ingredients and cooking methods from their masters and from Native Americans. Living in an agrarian society, most grew private gardens and were allowed to hunt and fish. They frequently shared communal cooking facilities, and, at least under slavery, men and women shared cooking responsibilities. African American foodstuffs came to include many ingredients that had been introduced into the South by European or American traders. Some foods, such as rice and black-eyed peas, came directly or indirectly from Africa itself. Okra was also of African origin, and it became a key ingredient in the meat and vegetable stew enjoyed by both African Americans and Cajuns as gumbo. Peanuts were originally carried by the Portuguese from Peru to Africa before being reintroduced into the NewWorld. The sweetness of many African American dishes may be a result of the introduction of sorghum and sugarcane into the South, where it was harvested by slaves for the production of molasses and sugar. African Americans adopted corn for bread and grits and cooked native catfish and such small game as opossum, raccoon, and squirrel. Cuts of meat such as oxtails, hog jowls, and tripe that were discarded or deemed less than desirable by their masters were also widely used. Dandelions and the tops of beets, turnips, and other vegetables were boiled as greens, and the cooking liquid (rich in vitamins and minerals) esteemed as “pot likker.” During the 1960’s, the resulting complex cuisine became known as “soul food.” Unlike slaves, Africans migrating voluntarily to the United States during the twentieth century usually found an infrastructure in place that allowed them to buy foodstuffs and prepared foods similar to what they had known in their native countries. Although slaves generally adopted Christianity and observed such Christian holidays as Christmas, a distinctly African American celebration, Kwanzaa, was created in 1966 by Ron Karenga. Running from December 26 through January 1, the celebration was based loosely on African harvest festivals and included a karamu (feast) held on the evening of December 31. Due to growing anti-Chinese prejudice and the desire of Chinese immigrants themselves to maintain their cultural identity, Chinese immigrants in nineteenth century California lived in myriad Chinatowns, neighborhoods in which they opened their own groceries and restaurants. They continued to consume traditional foods, leading to the importation of millions of tons of rice. Stir-fried dishes were preferred as a means of saving fuel, and most ate with the traditional Chinese utensils, chopsticks. Because most Chinese, like most peoples of Asian origin, are lactose intolerant, they did not eat dairy products. Chinese Americans developed a new cuisine for non-Chinese diners. Inexpensive dishes such as chow mein were created by immigrant Chinese cooks, but despite, or perhaps because of, their inauthentic nature, they proved to be popular with non-Chinese diners. At the same time, many Chinese restaurants continued to supply authentic dishes to their ethnic customers. What Americans think of as the traditional conclusion to a Chinese meal, the fortune cookie, is said to have been invented in Los Angeles by an immigrant named David Jung, the founder of the Hong Kong Noodle Company, during the second decade of the twentieth century. Many Japanese immigrant families worked as agricultural laborers, frequently contracting with landowners to share profits from the crops they tended. Besides working in the fields, women were expected to prepare all the food, purchasing rice, soy products, and fish from Japanese importers. Japanese Americans grew their own vegetables such as napa cabbage and daikon, a type of large white radish. Asian immigrants celebrated the Mid-Autumn Festival and Lunar New Year (Tet) with dancing, the exchange of food and gifts, and ceremonies honoring their ancestors. Chinese Americans prepared mooncakes, rich pastries traditionally containing lotus seed paste and the yolks of salted duck eggs, for the Mid-Autumn Festival, while Vietnamese Americans produced a version known as bánh trung thu. During Tet, Vietnamese Americans cooked an elaborate rice, meat, and vegetable dish known as banh chung that they exchanged with other families and placed on their ancestors’ altars. To celebrate their New Year, Japanese immigrants ate mochi, or roasted rice cakes, which for them symbolized strength. Other foods consumed during the New Year celebration and regarded as symbolically important were eggs, red fish, and fish roe. As is the case with many other groups, such festivals eventually became a means for immigrants who had given up traditional foodways to remember and reaffirm their heritage. The first major wave of Arab immigrants came to the United States during the late nineteenth century from the area at the eastern end of the Mediterranean known as Greater Syria. Most were Christians and tended to settle in neighborhoods known as Little Syrias that had their own specialized grocery stores. A second wave of Arabs arrived after World War II. Most of them were Muslims. Like Jews, Muslims observe a strict set of dietary rules, avoiding all pork products and alcohol. Their preferred beverage is green tea, usually sweetened. Like Greeks and other Mediterranean peoples, Arabs ate a diet based on grains, olive oil, cheese, and vegetables such as zucchini and eggplant. Mutton and beef were the favored meats and were often grilled as shish kebabs or mixed with cracked wheat to become kibbe (meatballs). Eggplants were often cooked and mashed with oil to become baba ghanoush, while chickpeas underwent the same process with lemon juice to become hummus; both spreads were served with khubz, flat breads known as pita in the United States. Meals often began with appetizers called meze. Initially, Christian Arabs celebrated Christmas on January 7, eating mamoul and sweet ka’ak (cookies and pastries stuffed with dates, walnuts, or pistachios). During Lent, Christian Arabs abstained from consuming eggs, meat, and dairy products. Easter called for a large, rich meal, often featuring ham as the main course. Muslims observed Ramadan during the ninth month of the Muslim calendar, a period that for most adherents involved avoiding food, drink, and tobacco from sunrise to sunset. The meal that broke the fast was also regarded as important, although here, as was the case with many other immigrant groups, regional differences were maintained in the New World. To break their fast, Palestinian immigrants consumed dates along with water or apricot juice, while Yemeni immigrants ate asida, wheat dough cooked with chicken or lamb broth. Desserts might include milk pudding, qatayef (a kind of folded crepe filled with cheese or nuts), and baklava. See also: Arab immigrants; British immigrants; Chinese immigrants; Family businesses; German immigrants; Greek immigrants; Irish immigrants; Italian immigrants; Japanese immigrants; Jewish immigrants; Mexican immigrants.
<urn:uuid:4ee8571d-7d0c-49e2-ab26-73dc4d91af43>
CC-MAIN-2022-33
https://immigrationtounitedstates.org/504-foodways.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00516.warc.gz
en
0.979375
3,963
4.09375
4
2.785813
3
Strong reasoning
Food & Dining
In recent years organized crime in maritime regions has flourished, threatening both secure flow of goods from Exclusive Economic Zones (EEZ) and lives of participants in the marine operations. Security threats and humanitarian risks caused by trafficking (drugs, weapons, etc.), irregular transport of migrants, maritime terrorism or even piracy are on the increase and are forcing nations to strengthen the surveillance and security of their environment. maritime, in particular within their Exclusive Economic Zone. Controlling these risks has become a strategic issue for many countries, and more broadly for the European Union, which seeks to implement solutions allowing early warning signs of a threat to be detected as early as possible. of a risk. The granting of coastal nations’ sovereign rights over their 200 nautical miles (nm), Exclusive Economic Zone (EEZ) established the requirement for persistent surveillance. Moreover, in some areas of the world, the situation is so serious that UN and/or EU intervention has been required, since nations which have jurisdiction over those waters have limited resources. Since EEZs are huge bodies of water which can cover hundreds of thousands of square kilometers, complete monitoring is much easier said than done. One way to achieve complete EEZ monitoring, especially if your primary targets are non-cooperative vessels. First approach utilizes optical and microwave sensors on platforms such as satellites and airplanes, thus avoiding sensor’s limitations, but introducing platform’s limitations. The most limiting factor is interrupted data availability, since no airplane is able to stay in the air constantly during whole year and all-weather conditions, while satellites are orbiting around Earth and will be over the zone of interest for a limited time. Other approach uses network of HFSWRs to ensure constant surveillance well beyond horizon. The signals of Conventional microwave radars propagate in a straight line and cannot detect objects beyond their line of sight. The maximum range of these radars is limited by the radio horizon – slightly far away than the optical horizon. OTH radars use very long wave lengths with special properties of propagation. The high-frequency surface wave radar (HFSWR), also known as the HF surface over-the-horizon radar, operates in the 3–30 MHz frequency band at wavelengths between 100 m and 10 m, respectively. The HFSWR can provide additional information on maritime traffic because it can detect targets over the horizon, has continuous temporal coverage, and can estimate vessel velocity based on Doppler data. Persistent Surveillance Coverage of Maritime Surveillance Areas The illustration above shows the use of High Frequency Surface Wave Radar used for monitoring the EEZ, and coastal microwave radar for monitoring territorial waters. These systems are augmented by the self reporting automatic identification system (AIS). Coastal microwave radars, augmented with Raytheon’s Marine Small Target Tracker (MSTT) can be strategically located to provide line-of-sight, high resolution surveillance within territorial waters. As illustrated below, microwave radars are limited to surveillance within the horizon. Detection ranges can be increased by elevating the radar antenna. For persistent surveillance of vessels throughout the EEZ Raytheon has developed a land based, long-range, High Frequency Surface Wave Radar (HFSWR). These radars operate in the HF portion of the RF spectrum (where the lower the frequency of operation the greater the detection range). Compared with conventional instruments such as buoys, anemometers, and microwave radars, HFSWR can be employed to an all-weather and all-time surveillance far beyond the visible horizon. Since the price of HFSWR network is significantly less than the combined cost of aforementioned sensors and data are available constantly during whole year, it is clear why these radars are slowly becoming the sensors of choice for maritime surveillance at over-the-horizon (OTH) distances. High frequency surface wave radar (HFSWR) systems High frequency surface wave radar (HFSWR) systems, that operate from coastal installations, so that the radar energy can couple into the salt water. HFSWR refers to a classification of radar that utilizes the surface-wave mode of propagation and thatoperate in the 3 MHz to 30 MHz frequency range; surface waves have the following characteristics:(a) they attenuate directly as functions of distance (range), frequency and surface roughness;(b) they propagate efficiently in vertical polarization only; and(c) they require a conducting surface, such as a saline ocean, to propagate. High Frequency Surface Wave Radar (HFSWR) takes advantage of the diffraction of electromagnetic waves over the conducting ocean surface. HFSWR exploits a phenomenon known as a Norton wave propagation whereby a vertically polarised electromagnetic signal propagates efficiently as a surface wave along a conducting surface. High-frequency surface-wave radar (HFSWR) has been widely applied to early warning for decades, including the detection of airborne targets and surface targets. In addition to early warning uses, HFSWR provides a unique ocean surface dynamics parameters remote-sensing capability based on the Doppler spectrum characteristics of the sea echo backscattered from the ocean surface. The transmitted signal follows the curved ocean surface, and a system can detect aircraft, and ships, beyond the visible horizon, at ranges out to roughly 300 km. HFSWR detection range is dependent on many factors. The range obtainable is dependent on the frequency of operation, radiated power and vessel size as well as the prevailing environmental conditions. The radar signal will experience a greater rate of attenuationas the radar frequency is increased or, for a given frequency, the sea state increases. HFSWRs that are used for long-range vessel tracking typically operate in a pulse-Doppler mode, where the radar emits a coherent pulse train. Vessels, which are within the area illuminated by the radar, reflect thesepulses back to the radar, where the echoes are received by a linear array of antennas. The signal receivedon each antenna is digitally processed to enhance the signal-to-interference ratio, where the term interferenceincludes all unwanted signals such as sea clutter, external noise, ionospheric reflection as well as interference fromother users of the band. The returned echoes are processed and sorted according to range, velocity (Doppler)and bearing. The echoes are then compared against a detection threshold chosen to achieve a predeterminedconstant-false-alarm-rate (CFAR). If the magnitude of an echo exceeds the threshold it is declared a detection.These detections are then forwarded to a tracking algorithm that associates consecutive detections in to tracks The successful detection of a target by a surface wave radar system traditionally involves compromises between a number of factors, including propagation losses, target radar cross-section, ambient noise, man-made interference, and signal-related clutter. In detecting a target at roughly 150 kilometers using HFSWR large error tolerances are experienced in both range (.+.1 to 2 km) and azimuth (.+.1. degree.) due to limited band width availability and physical antenna size constraints. HFSWR can be classified into onshore and shipborne cases based on the platform where it is employed. Besides the advantages of onshore HFSWR, shipborne case has the agility and maneuverability, which can not only enhance the survivability in complex ocean environment but also enlarge the detection distance on open sea. Thus, ocean remote sensing with shipborne HFSWR is expected to receive increasing attentions. Currently, most HFSWR systems operate in a monostatic mode that requires the collocation of the transmitter and the receiver. This raises practical issues in terms of the coastal space required for installation of both the transmitting and the receiving antenna arrays, as well as the problem of mutual interference between antennas. These issues can be overcome by resorting to a bistatic radar system in which the transmitter and the receiver are located some distance apart. In a bistatic HFSWR system, the receiver has robust anti-active directional jamming and anti-destruction characteristics because of the physical separation of the transmitter and the receiver, giving it unique advantages and potential regarding anti-electronic interference. A shipborne HFSWR system has the advantage of flexibility and it can increase the radar detection range beyond that of an onshore HFSWR. A system in which one of the transmitting or receiving stations is installed on the coast and the other is placed on a ship forms a coast–ship bistatic HFSWR system. Such systems can be classified either as a coast-transmit ship-receive (CTSR) bistatic HFSWR or as a ship-transmit coast-receive (STCR) bistatic HFSWR depending on whether the receiving station is placed on the ship or the coast, respectively. A CTSR bistatic HFSWR has the advantages of anti-stealth, anti–interference, and no onboard electromagnetic radiation because the ship carrying the receiver can move to areas far from the coast. Compared with STCR systems, CTSR systems can exploit fully the flexibility of a shipborne platform and further expand the radar detection range by adjusting the attitude of the shipborne platform and changing the radar system configuration, e.g., adjusting the radar spindle angle. However, the azimuth resolution of such systems is reduced because shipboard platforms are limited by the size of the platform and thus the radar receiving station aperture is typically limited to ≤100 m. In an STCR bistatic HFSWR system, the shipborne equipment comprises only the transmitter, and there is no need to consider the deployment of a receiver, signal processor, or other equipment. In addition, the antenna aperture of the radar system is not limited by the size of the ship, which means that a large aperture-receiving antenna array could be installed onshore to improve azimuthal resolution. However, the fixed nature of the coast-based receiving station means that the receiving array spindle angle cannot be changed, which limits the detection range of the radar system to a certain extent. In addition, a transmitter/receiver–receiver radar system could be formed by adding a second coast-based/shipborne transmitter–receiver monostatic radar on the same basis as the coast–ship bistatic radar. Then, the detection performance and positioning accuracy of the marine target could be improved through fusion of the results of the two systems. Russian Podsolnukh (Sunflower) radar Podsolnukh coastal OTH radars. Podsolnukh is surface-wave radar capable of detecting naval targets up to 300km away and air targets up to 450km away, as long as they fly over the water. They too are an important part of the country’s defense capabilities. Russia plans to step up its fourth Sunflower (Podsolnukh-E) radar system, which, according to Russian experts, is capable to detect US stealth aircraft, such as В-2 Spirit, flying over the ocean at a height of 500 kilometers, the China Topix informational website reported. As the website reported, citing sources in the Russian Defense Ministry, the new Sunflower will be stationed in the Novaya Zemlya archipelago in the Arctic Circle. China Topix noted that the archipelago notorious as a place of the most large-scale tests of nuclear weapons. So, in the days of the former Soviet Union, 224 nuclear explosions had been implemented there before 1990. Russia will station additional Podsolnukh (Sunflower) radars that are capable of detecting cutting edge stealth aircraft, including Lockheed Martin’s F35 Lightning II and F22 Raptor, to protect the country’s exclusive economic zones in the extreme North, the Baltic Sea and Crimea in 2017, Rossiyskaya Gazeta reported 10 August 2016. Russia’s Black Sea Fleet will be reinforced by the deployment in Crimea of the Podsolnukh short range over the horizon surfacewave radar with 450 km target acquisition capacity, a source in the Russian Defense Ministry told TASS on 17 December 2014. “The seabased Podsolnukh radar will be deployed in Crimea that will be ‘looking’ to the Bosporus,” the source said. According to the article, the fourth radar system “can become operational in 10 days and needs a team of just three people to remain operational.” The systems must be placed at a distance of 370 kilometers from each other in order to ensure full coverage. Currently, Russia has three Podsolnukh-E radar systems, which are operating in the Sea of Okhotsk, in the Sea of Japan and in the Caspian Sea. However, these stationary systems can be easily detected due to its massive radar towers. “The Podsolnukh E is a coast-horizon shortwave short-range radar system that is capable to detect both air and sea targets, approaching to it from the sea. It can simultaneously detect, track and classify 100 aerial targets and 300 maritime targets in an automatic mode,” the article reads. “A distinctive feature of the Podsulnukh is its mammoth antenna array up to five kilometers long and five meters tall that can identify aerial targets 500 kilometers away and sea targets up to 400 kilometers away.” The system is able to determine their position and capable to transfer coordinates of a target to various weapon systems, such as fighter jets, vessels and antiaircraft missile batteries. The Sunflower can detect stealth aircraft, such as the American F-35 super-expensive modern multirole fighters, “as clearly as aircraft of the WWII era,” the author of the article writes, citing Russian sources. “In the fall of 2014, the over-the-horizon radar detected various targets and sent their coordinates to the Grad Sviyazhsk and Uglich corvettes. In January, the Podsolnukh detected four low-flying Su-24 bombers. The data was forwarded to the Dagestan frigate, whose ballistic missile defense system successfully locked onto targets,” the newspaper detailed. Over-the-horizon stations have a major advantage when compared to other radars. They are capable of detecting stealth objects. For the Podsolnukh, the F-22 and the F-35, the best fighter jets in the US arsenal that could fly deep behind enemy lines, are no different from aircraft that do not use stealth technology. Then at the February 2009 IDEX show in Abu Dhabi a Russian source confirmed to Fisher the sale to China of the 300km range Podsolnukh-E surface-wave OTH radar. Russia’s Black Sea Fleet will be reinforced by the deployment in Crimea of the Podsolnukh short-range over-the-horizon surface-wave radar with 450 km target acquisition capacity, a source in the Russian Defense Ministry told TASS on 17 December 2014. “The sea-based Podsolnukh radar will be deployed in Crimea that will be ‘looking’ to the Bosporus,” the source said. Russia will station additional Podsolnukh (Sunflower) radars that are capable of detecting cutting-edge stealth aircraft, including Lockheed Martin’s F-35 Lightning II and F-22 Raptor, to protect the country’s exclusive economic zones in the extreme North, the Baltic Sea and Crimea in 2017, Rossiyskaya Gazeta reported 10 August 2016. Canada has been investigating the use of HFSWR for persistent surveillance of the EEZ for more than 20 years. Early development cumulated in 2003 with the deployment of two SWR-503 HFSWR systems for monitoring the economically significant Grand Banks region on Canada’s east coast. Raytheon Canada Limited (RCL) subsequently sold a number of SWR503 systems to international customers; however, operation of the Canadian systems was terminated in 2007 due to concerns related to the potential for the systems to cause interference to HF communication users. The international systems continue to remain in operation. The requirement for providing persistent surveillance of the EEZ remained, and in 2010 Defence Research and Development Canada (DRDC) completed a comprehensive study of applicable technologies. The study concluded that HFSWR remained the most viable sensor for persistent surveillance based on a combination of cost and performance. At the same time, RCL started the development of their next generation HFSWR to address obsolescence issues associated with the SWR503 design. Primary design requirements included being a modular and scalable architecture, having the ability to support wideband operation, and to be compatible with other users of the HF spectrum. This latter requirement led to the development of a conceptually new power amplifier design that resulted in a constrained bandwidth and ultra-low spectral side-lobes. The new generation radar also included an enhanced spectrum management system and reduced real estate requirements all at a low-cost. This last requirement resulted in additional requirements to maximize commercial-off-the-shelf (COTS) equipment and digital technology, and maximum reuse of SWR-503 software. The system was specified as a minimum to match the SWR-503 performance. Independently and in parallel, the DRDC team developed its system requirements for a new generation HFSWR that would meet Industry Canada’s stringent requirements for operating on a non-interference mode with HF communication users while remaining available 24/7. Other enhancements were also sought. In 2011 Raytheon Canada was awarded the contract to design and build a third generation HFSWR system for Persistent Active Surveillance of the EEZ (PASE). This third generation HFSWR system would be installed and demonstrated at a site located near Halifax, Nova Scotia. Canada’s Third-Generation High Frequency Surface Wave Radar (HFSWR) Canada’s third-generation HFSWR forms the foundation of a maritime domain awareness system that provides enforcement agencies with real-time persistent surveillance out to and beyond the 200 nautical mile exclusive economic zone (EEZ). The Third generation HFSWR system is a mono-static pulse Doppler radar. The third generation radar incorporates an ultra linear HF power amplifier specifically designed, by RCL, for pulsed Doppler radar operation. The HF power amplifier design results in very low spectral side-lobe levels and consequently minimal spectral leakage that otherwise would have resulted in adjacent channel interference. Raytheon Canada and the Canadian military developed such radar, designated the HF-SWR-503. This is an oceanic surveillance system for monitoring such illegal activities as drug trafficking, smuggling, piracy, illicit fishing and illegal immigration. In addition, it may be used for tracking icebergs, environmental protection, resource protection, sovereignty monitoring and remote sensing of ocean surface currents and winds as well as assist in search and rescue operations. It consisted of an array of monopoles 660 meters (2,165 feet) long, with the monopoles spaced at about 50 meters (164 feet), corresponding to half the wavelength of the radar’s 3 MHz operating band. The array has a field of view of 120 degrees and can track targets to the limit of Canada’s 370 kilometer (200 nautical miles) oceanic economic exclusion zone. It can obtain positions accurate to within hundreds of meters. Raytheon stated that a similar array could be used to track low-flying cruise missiles if it operated at a frequency of 15 to 20 MHz. Canada’s third-generation HFSWR system has been developed by Raytheon Canada in collaboration with Defence Research and Development Canada, based on a cognitive sense-and-adapt architecture . Cognition, utilizes intelligent signal processing, which builds on learning through interactions of the radar with the surrounding environment, as well as feedback from the receiver to the transmitter, which is one of the facilitators of intelligence. The objective was to utilize knowledge obtained either by sensing the local environment or from trusted third-party sources to maximize the probability of track initiation, whilst minimizing the probability of false or otherwise erroneous tracks. The primary objective of the cognitive system is to detect and track targets via the effective allocation of radar resources, with a secondary objective to confirm the identification of known targets. For example, if a target is being observed by other means or is known to be of low-value for the mission, then resources can be diverted to higher-priority targets. Alternatively, data related to weather conditions, or other environmental data such as wind speed and direction or ambient temperature data, can be used to aid the optimization of the radar. It can be noted that the cognitive cycle is similar in context to the standard OODA decision cycle: observe, orient, decide, and act. Canada’s third-generation cognitive HFSWR system consisting of an adaptive HFSWR (Act), the ingestion and processing of data into the optimizer (Sense), the determination of the optimum radar processing for the mission (Learn) and the application of optimized processing parameters (Decide). A second enabling feature of the radar is that it operates in a slow-time multiple-input multiple-output (MIMO) mode. During operation, the radar sends coded pulses on an alternating basis through the two separate transmitting antennas strategically located at either end of the receiver array. On receiving, the pulses returned from both antennas are separated to form a virtual array that has an equivalent performance to a physical aperture of twice the length. Radar is used to track and classify vessels but cannot provide positive identification. For this type of identification, other systems must be utilized. For example, the requirement for vessels to self-report using the Long Range Identification and Tracking (LRIT) system was established in 2006 by the International Maritime Organization (IMO). Another source of identification is the Automated Identification System (AIS). AIS is an IMO mandated short range, VHF anticollision system that broadcasts, among other things, non-encrypted host vessel identification and location. Range is limited by design to approximately line-of-sight. Interception of AIS signals using a satellite based receiver allows worldwide coverage throughout the EEZ and international waters. A German OTH-SW application with more civil use is the WERA radar. The WERA system is a shore based remote sensing system to monitor ocean surface currents, waves and wind direction. It uses the principle of FMCW with very slow sweep period of typically 0.3 sec. This oceanography radar can pick up back-scattered signals (Bragg effect) from ranges of up to 200 km. Diginext presents the Stardivarius transhorizon radar DIGINEXT, in partnership with the company Antheop, has been carrying out research work on these issues for many years and has developed a new generation radar, Stradivarius, using surface waves in the HF band to monitor maritime traffic in- beyond the radio horizon. While current radars have a range of a few tens of kilometers, Stradivarius can detect small-scale boats (25 m) up to 200 nautical miles (approximately 370 km) from the coast. Complementing the existing maritime surveillance systems (maritime patrol, satellite surveillance, etc.), Stradivarius is capable of ensuring permanent surveillance (24/7) in real time and in sea conditions up to Sea 5. A the first operational copy of this radar is already installed in the Mediterranean. The Stradivarius radar, a real technological breakthrough The unparalleled performance of Stradivarius as well as its low environmental footprint, allowing an extremely discreet integration into the coastal framework, convinced the European Commission, which retained this technology within the framework of the RANGER project in the “maritime border security” theme of the program. European Horizon 2020. This project, which notably associates the French Maritime Affairs Department and the Greek and Italian navies, will enable experiments to be carried out in the Mediterranean. “The Stradivarius radar is a real technological breakthrough. The RANGER project will allow us to further improve this French technology, in an international operational context, and to continue to develop the state of the art. It will also allow us to demonstrate the performance and benefits of our technology in terms of cost and efficiency for the long-distance detection of possible threats or support for rescue missions. », Specifies Thomas FOURQUET, Director of DIGINEXT. References and Resources also include:
<urn:uuid:ea8bd00c-2972-491c-aa45-2cb799e47571>
CC-MAIN-2023-23
https://idstch.com/security/high-frequency-surface-wave-radars-hfswr-for-ship-detection-and-tracking-far-beyond-the-horizon/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00364.warc.gz
en
0.930509
5,115
2.984375
3
2.955139
3
Strong reasoning
Science & Tech.
Flights Of Fantasy [ M Panging Pao ] The last decade has been the hottest decade ever recorded. The seven hottest years in recorded history include 2016, 2019, 2020 and 2021. As per recorded data, the average temperature on Earth has increased by 1 degree Celsius compared to a century back. If the present trend continues, temperatures are predicted to increase by another 1-2 degrees in the next 50 years. Global warming is caused by the increasing emission of greenhouse gases. The main causes of greenhouse gases are burning of fossil fuels for industries, transportation, households and massive deforestation. Massive usage of fossil fuels for industrial activity, transportation modes like vehicles, trains, aeroplanes, ships and increasing power consumption in houses and offices are the primary reasons for global warming. The second major factor is massive deforestation. Between 2015 and 2020, globally 10 million hectares of forests were lost annually. India ranked 10th in the amount of forest loss and though Arunachal has the second largest forest cover in the country, during 1989-2013 the forested area reduced by 1,681 sq km. Global warming is leading to rising sea levels, extreme weather like heat waves, droughts, severe storms, and increased flooding around the world. Australia, USA, China, Bangladesh and many parts of India have experienced devastating floods this year. Europe is suffering a heat wave with temperatures above normal by 5-10 degrees Celsius. Even Arunachal and NE have experienced flashfloods and landslides destroying lives and property. As per reports, due to the melting of glaciers and arctic ice, globally sea level rose by 20 cms upto 2010 and is predicted to rise by another 50 cms by 2100 AD. If this trend continues, many low lying countries and cities like Maldives, Bangladesh, New York, Bangkok, Shanghai, Mumbai, etc, may go under water. Environmental impacts include the extinction of many species due changes in ecosystems like coral reefs, Arctice ice, etc. The world needs to act immediately to reduce greenhouse gases and reduce deforestation. Greenhouse gases may be reduced by using alternative sources of power like hydropower, solar energy, wind energy, nuclear power, and bio-fuels. Electric vehicles are already being developed as an alternative for vehicles using fossil fuel. Hydropower and solar power usages are already on the rise. Lesser power consuming items like LED bulbs and efficient fans must replace older inefficient appliances. Likewise, deforestation must be reduced at the earliest. Alternatives to wood products must be encouraged by reducing use of paper, wood-based door and windows, furniture, etc. Plantations must be undertaken and promoted. Use of single-use plastics like plastic water bottles, sachets for gutkha, carry bags, etc, should be banned. If humans do not act now to reduce global warming, the world may not remain suitable to live in for our next generations. The following quote sums up the global warming threat very aptly: Only after the last tree has died And the last river has been poisoned And the last fish has been caught Will we realise that we cannot eat money! (The contributor is retired Group Captain, Indian Air Force)
<urn:uuid:f84c7265-a374-4f0f-8964-2227ff09106f>
CC-MAIN-2022-33
https://arunachaltimes.in/index.php/2022/07/17/global-warming-and-disasters/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00153.warc.gz
en
0.937577
655
3.296875
3
2.666034
3
Strong reasoning
Science & Tech.
The editors of a new NCSS publication present this unique volume, which combines Common Core skills with preK-Grade 5 social studies units, each based on a classic elementary text. Peggy Altoff, Colorado Springs, CO, US; Syd Golston, Phoenix Union High School District, Phoenix, AZ, US; Elizabeth Hinde, Arizona State University, Tempe, AZ; Linda Bennett, University of Missouri, Columbia, MO NCSS Research Community representatives will highlight the intersection between research and social studies practice. Research on content-based literacy and evidence-based instruction will be presented. Janet Alleman, Michigan State University, East Lansing, MI, US; Christine Baron, Boston University, Boston, MA, US; Michael Berson, University of South Florida, Tampa, FL, US; Ilene Berson, University of South Florida, Tampa, FL, US; Joseph Feinberg, Georgia State University, Atlanta, GA, US; Paul Fitchett, The University of North Carolina This interactive session explores an elementary civil rights text set and activities used to integrate social studies and Common Core ELA standards in meaningful ways that deepen social studies understandings. Lisa Brown Buchanan, University of North Carolina Wilmington, Wilmington, NC, US; Christina Tschida, East Carolina University, Greenville, NC, US See how to integrate economics and language arts learning using a popular children’s literature series. Participants will receive four classroom-ready lessons with white board applications. Erin Yetter, Federal Reserve Bank of St. Louis - Louisville Branch, Louisville, KY, US Come see a showcase of 280+ free, online lessons for grades K-12. These lessons integrate national geography standards with ELA or Math CCSS and include everything you need. Gale Ekiss, Arizona Geographic Alliance, Tempe, AZ, US; Elizabeth Hinde, Arizona State University and Arizona Geographic Alliance, Tempe, AZ, US Elementary teachers! Come learn about ideas, activities, lesson plans, and resources to teach about American Indians accurately, including overviews about pre-contact native cultures, Columbus Day and Thanksgiving. Linda Bechtle, Midwest Institute for Native American Studies, Evanston, IL, US; Barbara Johnson, Evanston, IL, US Explore using primary sources in early American history to develop elementary and middle school students’ close reading skills! This workshop examines how to construct text-dependent questions that support historical thinking. Ann Marie Gleeson, Primary Source, Watertown, MA, US The audience will be engaged in fascinating elementary level lessons based on a wide variety of NCSS Notable Tradebooks. All audience members will receive a CD containing the lesson plans. Diane Brantley, California State University, San Bernardino, San Bernardino, CA, US; Ruth Busby, Troy University, Troy, AL, US; Lois Christensen, University of Alabama, Birmingham, Birmingham, AL, US; Erica Christie, Curriculum That Matters!, Indianapolis, IN, US; Mary Haas, West Virginia University, Morgantown, WV, US; Heather Hagan, Indi This session focuses on the benefits of literature that helps children rethink gender stereotypes. Picture books and instructional strategies are discussed that present multiple masculinities and gender non-conforming characters. Kay Chick, Penn State Altoona, PA This presentation describes potential benefits of using interactive read-alouds of a variety of text types to help elementary students meet social studies learning goals and the Common Core ELA Standards. Annie Whitlock, Stephanie Strachan, Michigan State University, East Lansing, MI
<urn:uuid:4c42980d-eef6-403c-a8d0-da384988d0ce>
CC-MAIN-2013-48
http://www.socialstudies.org/prek_elementary?page=7
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164584555/warc/CC-MAIN-20131204134304-00080-ip-10-33-133-15.ec2.internal.warc.gz
en
0.822759
744
3.25
3
2.560368
3
Strong reasoning
Education & Jobs
The North Atlantic right whale population lost another member Thursday. On June 20, just hours after the International Fund for Animal Welfare (IFAW) released a report on North Atlantic right whale mortalities, the Fisheries and Oceans Canada confirmed the death of a second whale in Canadian waters this year. The IFAW report comes in response to a retrospective review of 70 right whale deaths in Canadian and U.S. waters between 2003 and 2018. The study calls on Canada and the United States to enact stricter measures to protect the endangered whale species. There were no deaths reported in Canada last year, but the IFAW report notes an unprecedented 17 mortalities in 2017, including 12 in Canadian waters. The report indicates that in the 43 deaths in which cause of death was determined, natural causes was not identified in any of them. Human factors were identified in over 88 per cent of those cases including entanglement in fishing gear and vessel strikes being the cause of 22 and 16 deaths, respectively. “This is clear evidence that these animals are unable to live full, productive lives because they are dying prematurely as the result of human activities,” said Sarah Sharp, a veterinarian with the IFAW and a key contributor to the study. Thursday’s report said the whale population had shrunk to an estimated 411 animals worldwide, but that was before the latest loss. During a Transport Canada aerial surveillance flight, Fisheries and Oceans Canada received a report of a dead North Atlantic right whale drifting in the Gulf of St. Lawrence northeast of the Magdalen Islands. Fishery officers located the whale and installed a satellite tag to track it while the department assesses recovery and necropsy options. A June 7 necropsy on a right whale discovered off Quebec’s Gaspe coast on June 4, “did not reveal evidence of acute (recent) fishing gear entanglement or recent vessel strike,” Fisheries and Oceans Canada said. Further testing to investigate other possible causes of death is pending. That whale was discovered in an area previously closed to fishing activity as part of the 2019 management efforts. Sharp is not ready to rule out human activity as a key factor in the death of the whale known as Wolverine discovered June 4. She noted he had survived multiple entanglements and a vessel strike. “We know that he has been under pressure from these human threats previously,” said Sharp. "With a population this small and declining birth rates, the loss of even one individual represents a major blow to the recovery of the species as a whole... The data tell a very compelling story, one which we need to turn around now to bring the species back from the brink of extinction." IFAW key recommendations to improve North Atlantic right whale populations: - employing more effective gear modifications, including ropeless fishing - expanding vessel speed restrictions to include larger swaths of North Atlantic right whale habitat - implementing dynamic management strategies, including fisheries closures and vessel speed restrictions when right whales are present - coordinated marking of gear for better monitoring of where entanglements occur - expanding the survey of offshore habitats for North Atlantic right whale carcasses for more accurate mortality statistics and cause of death "Unfortunately, the whales really don’t have a lot of time,” Sharp said. “We need to do this as soon as possible.” “The Government of Canada is committed to protecting North Atlantic right whales and supports the International Fund for Animal Welfare’s call for action,” said Fisheries and Oceans Canada by email to a request for reaction to the IFAW report. With confirmed right whale sightings in Canadian waters this season, Fisheries and Oceans Canada has already implemented a number of closures for snow crab, lobster and all other non-tended fixed gear fisheries since April 28 Atlantic Canada. It added that robust fisheries management measures and mandatory speed restrictions take into account the best available science and input from stakeholders, partners, experts, and Indigenous peoples. Sharp explained ropeless fishing technology. “It’s fishing without a buoy on the surface,” she said. “It’s a much more advanced technology than what’s currently being employed, but the main point of it is to reduce the amount of vertical line in whale habitat in order to, again, reduce the risk of entanglement in that gear.” Tonya Wimmer, director of the Marine Animal Response Society based in Nova Scotia, acknowledged the need for special consideration for the endangered species. “If we are going to engage in a fundamental effort to save this species, it is critical that organizations continue collaborating to understand exactly what the drivers of such events are in order to avoid future right whale mortalities," said Wimmer in the IFAW report. Sharp said she is hoping the realization that so many of the endangered whales are dying at the hands of humans will spur people to action. “I’m hoping people are really starting to look for answers, and that’s what we need. We really need to change the political will to institute these changes that are going to be a bit more severe and more directed in their approach,” she said. Canada's federal election this fall is an opportunity for Canadians to ask candidates how they will support the right whales. “That new government can potentially decide the fate of these whales,” said Sharp.
<urn:uuid:ad105e64-6944-4866-b688-deae711034c9>
CC-MAIN-2019-47
https://www.journalpioneer.com/news/provincial/update-second-dead-north-atlantic-right-whale-discovered-in-canadian-waters-this-year-325359/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667260.46/warc/CC-MAIN-20191113113242-20191113141242-00255.warc.gz
en
0.95436
1,120
2.609375
3
3.072854
3
Strong reasoning
Science & Tech.
Campaign of the Month: January 2012 Star Trek Late Night - Planet Name: Dyson Sphere 1 - Class: M (see below) - Moons or Rings: No moons - Gravity: 1.0 G - Climate: Standard atmosphere, 71% hydrosphere, moderate temperature - Demographics: No natives - Civilization: No remaining civilization except Federation researchers - Resources: Engineering theories Located near Norpin Colony on the outskirts of Federation space, the first catalogued Dyson Sphere managed to evade visitors for several years after its inadvertent discovery in 2294, because the only ship that located it crashed there. Until the discovery of the sphere, the Federation had assumed such technology improbably difficult to implement. This discovery, of course, changed all manner of notions about engineering – and about what sorts of precursor races may have lived in the Galaxy. Though the Jenolen crash landed on the Dyson Sphere in 2294, it wasn’t until the Enterprise-D arrived in the 24th century that any survivors were found – and only one, at that. The Dyson Sphere encloses a yellow G type star in the Alpha Quadrant near the Federation’s Norpin Colony on Norpin V. The discovery of the Sphere was something of a shock; because it completely enclosed its supporting star, it was difficult to detect until astronomers knew what they were looking for. The Federation considers the location of the sphere inside of UFP boundaries to be a happy coincidence – many admirals dreaded the possibility of threat races stumbling across such a discovery and learning the engineering secrets thereupon. Although the Dyson Sphere is an artificial construct, it does have a class M atmosphere generated and maintained by internal equipment. The surface shows no signs of soil or attempts to lay down plant or animal life, though. Possibly such life forms died out, or were never placed. “Geography” is a bit of a misnomer for an object of this type; the Dyson Sphere is 200 million kilometers in diameter, with an interior surface of several tens of trillions of square kilometers. The only distinctive geography takes the form of various mechanical conduits, doorways, and relays, the purposes of which have barely even begun to be mapped by Starfleet. Starfleet and Federation researchers still don’t know who built the Dyson Sphere, or why. It’s clear that the materials involved must have come from a great many worlds, but many nearby planets – such as Norpin V itself – show no signs of any strip-mining. It is clear from the construction that the sphere was built by a species with the ability to terraform, and with the means and desires to build practical defenses. What sort of disaster could have decimated such a species before it could finish this feat, none can say. The fact that no other such spheres have yet been located seems to indicate that it was a solitary project for the builders – a feat of engineering to take the entirety of the race’s skill and resources. Perhaps the race was destroyed before it could complete the task – a possibility for a now-extinct race like the Iconians or Husnock – or perhaps the race transcended its physical form during the process and left the sphere abandoned. As far as the Federation is concerned, the sphere is history – the final monument to an unknown race. The history most pertinent to Starfleet crew, however, concerns the sphere’s discovery and re-discovery. The USS Jenolen crash-landed on the sphere in 2294 while detouring to explore the mysterious feature. Only two crew members survived the crash, by remaining looped in a transporter pattern buffer. It was over seventy years later that the USS Enterprise-D discovered the sphere again and managed to retrieve a sole survivor from the buffer: none other than Montgomery Scott, former chief engineer of the Constitution-class Enterprise. Since then, the Federation has kept the sphere under careful wraps, to prevent infiltrators from making off with its fantastic technology. A science team posted there with the aid of a specially-commissioned Nova-class vessel, the USS Freeman Dyson, continues to work on solving the puzzle of communicating with the sphere’s automation system. PLACES OF INTEREST In a sense, the Dyson Sphere is a place of interest: An artificially-built shell surrounding an entire star, with an interior surface area sufficient to hold most of the Federation’s citizens all at once. Until the Freeman Dyson’s staff makes a report on the safety of the shell, though – which probably won’t happen for several decades – any sort of colonization effort remains verboten. Instead, the sphere is a place for science and engineering architecture and marvels. Here, it’s proven that the “laws” of engineering really can bow to significantly dedicated minds. In addition to doing research on the sphere itself, specialized computer science groups try to puzzle out the communications arrays of the sphere. Former attempts at communication led to the opening of various apertures that allowed ships like the Enterprise-D to enter the sphere, but also triggered defensive mechanisms. Since the scientists involved haven’t even isolated the computer system yet (which seems to be a grid distributed throughout the sphere’s area), this problem promises to be a long-term one.
<urn:uuid:5b9f1d84-49b3-4fec-9dcb-ca0e545e6290>
CC-MAIN-2015-27
https://star-trek-late-night.obsidianportal.com/wikis/dyson-sphere
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098059.60/warc/CC-MAIN-20150627031818-00147-ip-10-179-60-89.ec2.internal.warc.gz
en
0.955225
1,103
2.78125
3
2.962922
3
Strong reasoning
Games
Medically reviewed by Miranda Galati, Registered Dietitian (RD), MHSc Understanding the differences between emotional vs physical hunger can help you become more aware of what is driving you to eat so you can make more mentally and physically satisfying food choices. Food is deeply connected to how we feel. We eat when we’re anxious, tired, sad, and lonely. We also eat when we’re happy, celebrating, and connecting with others. Many people also eat when they are bored or trying to ignore an uncomfortable feeling. And of course, we also eat when we’re hungry! This means that our physical and emotional hunger will often occur at the same time. This can make it difficult to identify if it's emotional vs physical hunger, or a little bit of both. Most people are familiar with the signs of physical hunger, including: - Empty feeling in stomach - Grumbling stomach - Thinking about food more often - Irritable or mood swings - Low energy Physical hunger usually begins 2-4 hours after your last meal, and after eating, is accompanied by a sense of satisfaction. Compared to physical hunger, emotional hunger often looks a little different. Some common signs of emotional hunger are: - Quick onset - Tied to a particular craving - Tied to a specific emotion, such as boredom, anxiety, or even joy Emotional hunger isn’t always a bad thing! It’s actually a normal part of being human. Eating releases serotonin, a feel-good neurotransmitter, so it makes sense that eating can be used as a tool to help you feel better. However, if eating becomes your primary coping mechanism, you might find that you: - Turn to certain foods more often than you'd like - Frequently eat past fullness - Experience feelings of guilt and shame after eating If this sounds like you, don’t worry! Eating to satisfy your emotional hunger isn’t a bad thing. But if you’re looking to rely on it a little less, some reflection and mindfulness can help. Check-in with your Hunger If you struggle to feel the difference between physical and emotional hunger, ask yourself these reflective questions the next time you’re hungry: - What sensations or thoughts am I noticing in my body? - What exactly do I need right now? - Will a balanced meal or snack make me feel better? - Could this emotion be handled by calling a friend or going on a walk? - Will comfort food leave me feeling better or worse? Sometimes, the answer might be YES - I do need some ice cream or chips or whatever your fav fun food might be! And that’s okay. The more mindful of our emotions we become, the more intentional we can be about our emotional hunger. And in the meantime, try exploring some other tools in your emotion-handling toolkit, like movement, calling a friend, or engaging in a hobby. Giving yourself more options to manage those tough emotions is always helpful, even if sometimes the brownie does the trick. For me, it’s often nachos . And remember, there are many physical, mental, and environmental challenges that can impact your ability to check in with your hunger. Please consult your physician or registered dietitian if you have any questions related to your personal situation. If you are ready to change your relationship with emotional eating but you don’t know where to start, download the All Foods Fit guide! Contribution by: Sarah Muncaster, Registered Dietitian (RD), MHSc, host of Unsavory.
<urn:uuid:8fb5f3b9-2072-4366-8c87-433aae11061a>
CC-MAIN-2022-40
https://reallifenutritionist.com/emotional-hunger-vs-physical-hunger-how-to-spot-the-difference/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335448.34/warc/CC-MAIN-20220930082656-20220930112656-00063.warc.gz
en
0.941442
768
2.65625
3
2.184361
2
Moderate reasoning
Health
All children would like to be praised by their parents. But how to do it correctly by increasing their motivation, and what is most important how to help them in a strong self-esteem building? The main idea of every praise is giving support, an inner sense of value. When we praise a child by saying” You are so good” we should think about how to turn it into loud and proud” I’m just that good“. It must strongly sound inside and not be a question in the eyes of children and adults. The praise of the parents should not become a “milestone” for self-esteem. It’s important to remember that both rewards and punishments decrease motivation from the long-term perspective. Self-esteem cannot “rise from the outside” All stickers, gifts, ratings, praise, likes – have a temporary effect. And create an addiction. The child/adult does not have stable confidence in their strengths, talents, competence and as a result, each time should learn again to “aссept” the achievements. At the 2-4 age, the child learns to say I, Mine, No – all these simple words are, in fact, “words of power” that help to define the boundaries of personality and build self-esteem. Where I start and end, what I can influence, where I belong, and what belongs to me. If at this age the parents will not support/praise their children properly, the power of the inner self-esteem “I can” will replace by – “AND MY ….” (iPhone, clothes from …., my children are the best in school …). It is very important to give the child an opportunity to feel its strength. And did not grow up with the messages like “There’s no “i” in “team”, “modesty – adorns a person”, “just sit tight and keep your mouth shut”. If the attention of a child was paid more to its failure than to “achievements”, in adulthood it can be difficult for such person not only to write a resume but also to present an idea or project, demonstrate competence and feel confident. Even performing great feats, even creating unique products, and demonstrate completely unique qualities, it can be difficult to believe in it and take success with dignity. Perfectly if the action and the result especially pleasure from it (drawing, skill, action, school grade) becomes a joy and a “reward” itself. Toddlers are still focused on receiving action rewards. Stickers, for example, reinforce their efforts. But it is very important for us to focus our attention on the “inner result” first of all. Often we can see that our praise like”well done” or “you are so clever” is not encouraging or help in self-esteem building. The basic principle is that we do not just say the word “well done” or “clever”, but focus on the results/achievements we praise. It gives a sense of the significance, the tangibility of what has been done. Much more efficient to use not the general praise but sincere support focusing on what exactly “we support”, it is important for us to name what we see as most valuable. Let’s see the example of how we should and how we shouldn’t do Child: I painted beautifully? Praise: What a talented (beautiful) drawing! Support: such bright colors! In the picture, the sun, the rainbow, and the windows in the house are visible, and it looks like a dog on the street! Do you like painting? – It is clearly visible. When the child feels “support” – it begins to talk about what else was drown, what was difficult, what it is going to do further. When we praise, there is a feeling of some dissatisfaction, or the Child may suddenly resist the praise. Child: I got “A” in math today. Praise: you are our genius! Support: you did so much!! (you are interested in mathematics, you did all the tasks, and what was the most difficult?) Praise: good boy, you put on tights yourself! Support: you figured it out yourself completely without help and put it on! I didn’t even notice how quickly you did it. Praise: you are a born writer! You write essays the best! Support: when I read your essay, I seemed to see and hear everything you describe, and the sound of the stream, and the rustle of the wind in the trees, and saw people – the words were chosen so precisely and beautifully. This is how the writers do. If we admit the achievements of the child and then say BUT, it devalues everything that was said earlier and does not raise self-esteem. Examples of how you can replace “BUT” sentences in communication with children and use the support option instead: You did such a good job! But not carefully. Support option: all the numbers/letters on the page are like slender trees in the forest. But these ones seem to be tilted by the wind. And here – a puddle after the rain? You picked up toys, well done! But you could have done it faster. Support option – oh! The toys were collected at the speed of a superhero athlete! A few more minutes and there would be a new world record. When you say “thanks” to a person admit as well for what exactly you are grateful for. It will definitely sound more sincere and significant. Source: “The Quick Fix: Why Fad Psychology Can’t Cure Our Social Ills” by Jesse Singal. If you want to learn more visit our additional resources:
<urn:uuid:cc4b46f9-9614-4ec0-bbd0-80dd7480e8a0>
CC-MAIN-2022-21
https://www.relationsarea.com/self-esteem-building-how-to-praise-your-child-correctly/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016949.77/warc/CC-MAIN-20220528154416-20220528184416-00306.warc.gz
en
0.96021
1,251
2.78125
3
2.54374
3
Strong reasoning
Education & Jobs
Not all fats are the same and as a successful LCHF practitioner you should have a basic understanding of the kinds of dietary fats that are out there and what they mean for your health. I consider this one of the most important parts of your LCHF knowledge. SFAs, MUFAs & PUFAs As discussed, fats or more specifically fatty acids are essential for humans. Fats can generally be classified as saturated (SFA), monounsaturated (MUFA) and polyunsaturated (PUFA). Further, PUFAs contain 2 essential classes of fatty acids called Omega 6 and Omega 3 . These are associated with healthy cell membranes. Dietary sources of fats will generally contain a mixture of all three types, depending on their source e.g. coconut oil is 2% PUFA, 6% MUFA & 92% SFA whereas something like sunflower oil is 69% PUFA, 20% MUFA & 11%SFA. So in dietary terms, of these 3, what do we consider to be “good” and “bad” fats? PUFAs: Omega 3 & Omega 6 fatty acids To answer this question we need to look in more detail at PUFAs, in particular the omega 3 & 6 fatty acids. It turns out that the ratio of omega 3 to 6 fatty acids is critical, with overall requirements in humans being relatively small. Omega 3 fatty acids are associated with a reduction in inflammation whereas large amounts of omega 6 fatty acids are associated with an increase in inflammation. Further, high omega 6 intake adversely affects omega 3 metabolism, further worsening the situation. Most modern western diets are very high in omega 6 and very low in omega 3 fats, the exact opposite of what they should be. This is mainly due to the fact that high-PUFA fats are cheap and widely used in the fast food market e.g. soy, corn, cottonseed, peanut, sunflower, and safflower oils. Note: with the exception of peanut oil, these are all vegetable oils. So what’s the trick in ensuring you get enough omega 3 and less omega 6? For the LCHF practitioner whose diet is already 70%+ fat it’s really quite simple; just stay away from those fats with relatively high levels of PUFA and stick to those with higher levels of SFA and MUFA i.e. drop the vegetable fats in favour of the animal fats, in particular fatty fish such as salmon which are high in omega 3. That means avoiding all of the above plus margarine and mayonnaise made from any of the above. You will also know if you are consuming too much omega 6 because you will feel unwell. It’s one of the common pitfalls of LCHF when starting out i.e. consuming high amounts of vegetable oils in place of saturated animal fats. If you still suspect that you aren’t getting enough omega 3 you can always try supplementing with omega 3 capsules, etc. Below is a useful chart of most of the major dietary fats and oils, together with their relative proportions of SFA, MUFAs & PUFAs. This is taken from “The Art and Science of Low Carbohydrate Performance by Stephen D. Phinney & Jeff S. Volek”, see resources page. It’s worth printing this out and sticking it on your fridge door until things settle down and it becomes second nature to you. Here is a further, more detailed list. Rapeseed (canola) oil At this point I would like to talk about my experience with rapeseed or canola oil. On the face of it, rapeseed oil would appear to fit the bill perfectly as far as omega 3/6 fats are concerned: 28% PUFA, 64% MUFA & 7% SFA. I started incorporating it into my diet in the form of homemade mayonnaise around 6-8 months ago. All was fine until the spring of this year when I noticed a small, unaccountable, yet steady increase in my weight. Further, once the hay fever season started, around May of this year, I noticed that on occasions I would suddenly start sneezing and my eyes would water for no apparent reason. This was similar to my experiences with dairy, in particular feta cheese which produced exactly the same reaction as soon as it hit my stomach. Alarm bells started ringing, something was inflaming me! This time it wasn’t difficult to focus in on the exact cause, namely the rapeseed oil in the mayonnaise. Further research soon revealed that rapeseed oil is indeed inflammatory but NOT due to the omega 6 fatty acids as one might suspect. No, this time it was a different one, namely omega 9 or erucic acid which is damaging to cardiac muscle of animals. Not only that but the pollen contains known allergens and also, it wasn’t until not so long ago that it was used as a lubricant for steam engines! Wow, is this stuff really fit for human consumption?!? Not in my opinion! Naturally, I immediately dropped the rapeseed oil in the mayonnaise and replaced it with light olive oil. Bingo! My weight started to fall again, and all hay-fever-like symptoms also completely vanished. Hence, it goes without saying that I DO NOT recommend the consumption of rapeseed oil by humans, despite what any food agencies or anyone else might say! With the exception of my rapeseed oil experience, I think I am getting things about right as far as intake of omega 3 & 6 are concerned. Indeed I have all the correct symptoms associated with adequate omega 3 intake: smooth healthy skin with no dry patches, improved eyesight, improved cognition, etc, etc., without having to really think about it, which is great. Note: The only way to be absolutely sure that you are receiving adequate quantities of omega 3 & 6 in the correct proportions is to have a blood or cheek cell test, something that I’m going to do as soon as I can find somewhere properly equipped to do so!
<urn:uuid:35c31700-7c8d-4cc1-befa-6bb78b7c8ee4>
CC-MAIN-2019-51
https://lihfliving.com/2015/07/05/good-fats-bad-fats-and-the-omegas-2/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540514893.41/warc/CC-MAIN-20191208202454-20191208230454-00005.warc.gz
en
0.955987
1,260
2.90625
3
2.653228
3
Strong reasoning
Health
Brief introduction of sewage project scheme: Sewage treatment projects generally use a series of primary and secondary treatment mode. After the industrial wastewater is handled by the industrial enterprises, the industrial wastewater will be sent to the sewage treatment plant via sewage pipe network together with the domestic sewage. The main units are grille, pumping station, grit chamber, sedimentation tank, rotary screen, slag cleaner, filter, anaerobic tank, anoxic tank and aerobic tank. The flow of the process is as follows: the municipal sewage is collected into a sump, which is lifted by a group of pumps to the front sump; the curved grille removes the large-volume dirt and floating matter in the sewage; in the grit chamber, the compressed air is mixed with the sewage , The separated sediment at the bottom of the sediment suction by the sand suction pump; rotating sieve to further filter the dirt; filter for washing the screen; under full feeding conditions, the use of aerobic microbial life process, Oxidative decomposition of organic pollutants into relatively stable inorganic; Finally, by adding dephosphorizer, UV disinfection, sewage to discharge standards. The important node of valve network’s drawing: In this project, the first and two levels of processing mode are used in series.Secondary treatment process flow: urban sewage pooling to the collection by a group of pumps raised to the front pool; arc-shaped grid to remove the larger sewage and floating debris; in the grit chamber, the compressed air is mixed with the sewage, the separated sludge settling at the bottom by a sand suction pump suction; rotary screen further remove dirt; filter used for flushing screen. Secondary treatment process of sewage treatment process monitoring of the main objects are: Biochemical treatment part: monitor and control the process parameters, such as dissolved oxygen, sludge concentration, pH value, ORP, BOD value and other parameters. The aeration equipment, mixing equipment, drainage equipment, sludge reflux pump, blower and other operation control, in order to meet the requirements of the treatment of effluent water quality. Dosing processing part: for the sewage treatment process in the dosing system requires higher software to achieve the level of sewage treatment automatic identification dosing, and expert algorithm dispensing system. Silt treatment part: Monitor and control the operation parameters and status of the sludge miscible tank, sludge digester, sludge dewatering machine and drying equipment.
<urn:uuid:6d990216-07cd-458b-bdc4-1666ff88e0d5>
CC-MAIN-2021-17
https://www.bundorvalve.com/application/19.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00115.warc.gz
en
0.875208
517
2.84375
3
2.486584
2
Moderate reasoning
Industrial
The Birth of John the Baptist "But the angel said unto him, Fear not, Zacharias: for thy prayer is heard; and thy wife Elisabeth shall bear thee a son, and thou shalt call his name John. And thou shalt have joy and gladness; and many shall rejoice at his birth. For he shall be great in the sight of the Lord, and shall drink neither wine nor strong drink; and he shall be filled with the Holy Ghost, even from his mother's womb. And many of the children of Israel shall he turn to the Lord their God." - Luke 1:13-16 The New Testament - A Brief Overview Brief History of the Birth of John the Baptist The New Testament covers the period from the birth of John the Baptist, to the life and death of Jesus, to the beginnings of the Church, to the spreading of the gospel throughout the world, to the death of the great apostle Paul. The Four Gospel Accounts - Matthew, Mark, Luke, and John There are four accounts of the life of Jesus (Matthew, Mark, Luke, and John) and they are referred to as the "Gospel". Each portrays a particular focus about Jesus and His ministry. Israel and the Word Most of the world was unaware of God's tremendous plan, yet God had always left His plan and His Word in the world for those who were searching. God revealed his holy Word to the Hebrews and placed Israel in the center of the world and all the mighty nations of the ancient world had to travel on roads and pass through Israel to reach the other nations of the ancient world. The great purpose of history and the Word of God was the coming of the King. God revealed through the ancient prophets that He Himself was coming to the world. But he would not come as a King to set up His kingdom until he first came as a servant who would die for the sins of Israel and for all of mankind. This is because man needed a savior before they could have a King, this Savior and King was referred to as the Messiah in the Scriptures. The Hebrew prophet Isaiah predicted in the seventh century BC that when the Messiah would appear there would be a forerunner who would precede him. The voice of him that crieth in the wilderness, Prepare ye the way of the LORD, make straight in the desert a highway for our God. Every valley shall be exalted, and every mountain and hill shall be made low: and the crooked shall be made straight, and the rough places plain: And the glory of the LORD shall be revealed, and all flesh shall see [it] together: for the mouth of the LORD hath spoken [it]. Isaiah 40:3-5 "Behold, I will send my messenger, and he shall prepare the way before me: and the Lord, whom ye seek, shall suddenly come to his temple, even the messenger of the covenant, whom ye delight in: behold, he shall come, saith the LORD of hosts." Malachi 3:1 The Bible revealed hundreds of years before Jesus came that a forerunner would precede the coming of the Messiah. Matthew referred to him as the Herald, the official messenger who would announce the King's arrival. He would prepare the way before the King when he would be approaching. This was a very familiar scene in ancient times, yet this forerunner would be very different in his appearance and in his message. "And he shall go before him in the spirit and power of Elias, to turn the hearts of the fathers to the children, and the disobedient to the wisdom of the just; to make ready a people prepared for the Lord." Luke 1:17 Zacharias and Elizabeth In around 5 BC during the days of King Herod the great, there was a priest named Zacharias who had a wife named Elizabeth. They were both descendents of Moses brother Aaron who was the first High-priest and the founder of the Aaronic priesthood. Only a descendent of Aaron could serve as high priest in Israel. Zacharias and Elizabeth were not only descendents of Aaron, they were both righteous before God walking in his Commandments according to the law. They were both very old and beyond the years of childbearing, Elizabeth had been barren her whole life. The Angel Gabriel Announces John's Birth Zacharias was chosen to burn incense inside the Temple, and as he was praying an angel appeared to him whose name was Gabriel. The angel revealed to Zacharias that Elizabeth his wife would bear a son, they were to name him John (Hebrew Meaning "God is Gracious") and he would be great in the sight of the Lord, and he would prepare the way for the coming of the King. Zacharias was astonished and doubted the message, the Angel assured him of the good news, and struck him with dumbness so that he could not speak until the promise was fulfilled. John is Born Elizabeth became pregnant and all her relatives rejoiced at the miracle, and nine months later John was born, the whole time Zacharias was unable to speak yet once his son was born they made gestures to him about what to name his son. He asked for a writing tablet and wrote, "his name is John." From that time forward Zacharias was able to speak, and being filled with the Holy Spirit he gave an astonishing prophecy about God fulfilling his promises to his people Israel. John grew up as a great man strong in body and spirit. The Story of the Bible The New Testament Summary of the New Testament Books
<urn:uuid:fa8ded67-dd5c-43b1-937f-5dac8b805696>
CC-MAIN-2014-15
http://www.bible-history.com/new-testament/birth-of-john-the-baptist.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207985.17/warc/CC-MAIN-20140423032007-00040-ip-10-147-4-33.ec2.internal.warc.gz
en
0.979307
1,145
2.71875
3
2.928453
3
Strong reasoning
Religion
Scientists are still trying to understand the virus they call SARS-CoV-2, which causes the disease COVID-19, but as time goes by and more data is amassed, some numbers, such as the death rate from the disease are becoming clearer. When the CDC put out its guidance last week, it estimated that 0.2 to 1% of people who become infected and symptomatic will die. The agency offered a “current best estimate” of 0.4%. The agency also gave a best estimate that 35% of people infected never develop symptoms. Those numbers when put together would produce an “infection fatality rate” of 0.26, which is lower than many of the estimates produced by scientists and modelers to date. If the severity of COVID-19 has been significantly overestimated, and further research confirms this, critics of the national shutdown will cite this as evidence that the country overreacted to a virus that is not that much worse than seasonal influenza… The lethality of the virus has been hard to estimate because of the lack of testing and the paucity of solid data on how many people have been infected. That data is now coming in, however, including a report by researchers at the University of Southern California and the Los Angeles County health department, published in JAMA, that described a survey of Los Angeles County residents who were tested for antibodies to the virus. The authors estimated that about 4% of the population had been infected as of April 10 and 11. Although the report did not offer an infection fatality rate, lead author Neeraj Sood, a professor of health policy at USC, said it would probably be 0.13% for people outside nursing homes and 0.26% — identical to the CDC best estimate — when people in nursing homes were included. No one in the survey lives in a nursing home. All of the volunteers tested were “community-dwelling individuals,” he said. …An Imperial College model that in late March said 2.2 million people in the United States could eventually die if the country took no measures to halt viral transmission. The White House coronavirus task force relied on that model and a number of others, including one from the University of Washington. When Trump extended the closure recommendations by 30 days on March 31, members of his task force revealed a forecast, based on many models. Even with social distancing and other mitigations, it showed, the coronavirus would kill between 100,000 and 240,000 people over some unspecified period of time. That number was stunning. The death toll was still less than 4,000 nationally. The forecast now looks well-founded, with hundreds of deaths added daily and a vaccine or reliable therapeutic treatment still probably far in the future… The decision by Trump to order an initial 15-day national shutdown came March 16, when the country had reported only 85 deaths, according to a Washington Post tally. Models — however imperfect and dependent upon assumptions that might be incorrect — gave political leaders and the public an accurate sense of the likely scale of the COVID-19 epidemic facing the nation… One common misperception today is that scientists oppose the reopening of the economy. Anthony Fauci, the director of the National Institute of Allergy and Infectious Diseases, said in a television interview Friday that if stay-at-home orders were imposed for long, it would cause “irreparable damage,” but he urged people to “please proceed with caution.” Jeffrey Shaman, an influential epidemiologist at Columbia University, said that the health of the economy matters, and that the nation needs to restore economic activity in a way that keeps people safe. “We have to do both those things,” Shaman said. “We want a functioning economy, and we don’t want people getting sick.” MacDailyNews Take: Of course, no once can predict the future, so the early models offered a very wide range of possibilities, including a higher COVID-19 death rate. So, it’s great news that 99.74% of people (and likely 99.87% of people outside of nursing homes) who encounter SARS-CoV-2 do not die from COVID-19. As more and more data gets added to what’s known about SARS-CoV-2 and COVID-19, we, and, specifically, businesses like Apple with their large network of physical retail stores, will have a clearer picture about how to wisely proceed with reopening and resumption of “normal” life. [Thanks to MacDailyNews Readers too numerous to mention individually for the heads up.]
<urn:uuid:51d120a1-df54-440c-a568-7846b08260c0>
CC-MAIN-2023-06
https://macdailynews.com/2020/05/26/new-cdc-estimate-puts-covid-19-death-rate-at-0-26/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00652.warc.gz
en
0.972491
976
2.625
3
2.96857
3
Strong reasoning
Health
Recently, a user of an online forum for science-fiction writing posed an intriguing question to the rest of the community. In the user’s imaginary world, spiders rule the planet. The arachnids have grown intelligent enough to build a spacefaring empire, and they need space suits to travel into space. So, then: “How to design a space suit for an arachnid?” The inquiry made me giggle. It reminded me of those silly thought experiments involving animals and garments, such as the long-running debate over how a dog would wear pants. I scrolled down, anticipating some funny responses. But there was none of that. The people on this forum were serious, and they were serious about spider space suits. “Terrestrial spiders breathe via almost all of their body. They don’t have particularly dedicated airways or efficient circulatory systems and as such are used to being surrounded by air in order to get enough oxygen into their vital organs,” one user wrote. “You need to keep a flow of air between the suit and the spider or they will suffer from the equivalent of hypoxia.” “Have an enclosed pod that the spider can sit inside with legs folded and have mechanical arms/legs that support the pod and allow it to walk around,” someone else suggested. “Are the suits needed for short space walks or would the [spiders] be wearing them semi-permanently?” another user asked. “This will determine if the suit needs air, heat, and durability to elements.” The suggestions went on, and in great detail. Users discussed all aspects of spider physiology, from exoskeletons and joint movement to respiratory and circulatory systems. They wondered which space-suit designs would provide the many-limbed creatures with maximum mobility and comfort. One user even suggested that the spiders take some anti-nausea drugs while in zero gravity, as astronauts do. The discussion now resembled something other than the dog-in-pants scenario: the very real conversations, decades ago, between engineers and scientists about how to make space suits for human beings. Those deliberations were not so different from the ones in the science-fiction forum, because they were both trying to answer the same question: How do you keep something designed to live on Earth alive in space? In the United States in the 1960s, the space-suit business was booming. NASA was in the market for a variety of outfits for its first classes of astronauts, for use inside and outside space capsules and, eventually, on the surface of the moon. According to ILC Dover, the Delaware-based company that designed the iconic Apollo space suits worn by Neil Armstrong and Buzz Aldrin, engineers put different fabrics through rigorous tests to find those that would protect wearers from the extreme conditions of space. They exposed them to sweltering heat and bone-chilling cold, and folded and creased them every which way, bending them at each joint to see how the material would hold up. Engineers also had to figure out how to prevent conditions inside the space suit from killing the wearer. They needed life-support systems that would circulate oxygen throughout the suit, and remove excess heat and carbon dioxide and eject them into space. If temperatures in the suit rose, astronauts could become dehydrated. If exhaled carbon dioxide accumulated, they could die. On top of that, engineers had to determine exactly how much life support astronauts would need. “At the start of 1962, a significant challenge to the development of the Apollo [ Extravehicular Mobility Unit] was lack of a detailed understanding of the metabolic performance requirements of a man in a suit,” according to NASA. “No one in the U.S. space community knew the correct requirements.” Decades after humans proved that they could survive in space with the right outfit, engineers are still working on space-suit designs. Boeing and SpaceX, which are expected to launch American astronauts to low-Earth orbit next year as part of a NASA program, have spent the past several years designing space suits of their own. Both are pressurized suits designed for the in-flight experience, not space walks. Boeing’s cobalt-blue suit comes with a zipper down the back for entry; a soft, hoodlike helmet; and footwear that resembles sneakers, a departure from the traditional, bulky boots of the past. SpaceX’s white-and-black space-suit design resembles that of a Power Ranger or Stormtrooper suit, with tall, rain boot–like shoes and a traditional, motorcycle-esque helmet. Others are thinking beyond the space above Earth. In 2015, NASA announced the development of a suit for Mars, known as the Z-2. Engineers began by turning to earlier designs for inspiration. “We start by testing those suits and understanding the different features,” Lindsay Aitchison, a space-suit engineer at NASA’s Johnson Space Center, explained to Mental Floss in 2014. “What type of shoulder works best for what type of activity, different designs of the hips and boots and the style of entry. Do you want to have a zipper? All those things.” But the Martian environment presents new challenges. Mars astronauts will need hardy space suits capable of protecting them from space radiation and winds carrying tiny dust particles that could scratch helmets or slice into the suit fabric. The suits that astronauts use today to maneuver outside the International Space Station aren’t especially bendy; astronauts “walk” with their hands, pulling themselves along railings and handholds protruding from the station. Mars suits will have to be flexible enough to allow astronauts to walk around, kneel down to collect samples, raise their arms in the air to wave to their fellow travelers, climb in and out of rovers, and so on. The soles of their shoes will resemble hiking shoes, made for traversing rugged terrain. The whole getup will have to be as lightweight as possible. The weight of space suits and life-support systems matters less in low-gravity environments, such as on the moon or around the space station. The complete space-shuttle suit, for example, weighed a whopping 310 pounds, but weightlessness removed the burden. While the gravity on Mars is just 38 percent that of Earth’s, astronauts will still feel some of the weight of a 300-pound space suit on their body. Engineers will have to make some aesthetic considerations, too. Aitchison, the space-suit engineer, has suggested adorning flashy, bioluminescent stripes of different colors to Martian space suits, so that astronauts can tell who’s who when they’re out and about at night. In a strange convergence of human and spider anatomy, an engineer at Lockheed Martin, a frequent NASA contractor, has even suggested that Mars astronauts could wear eight-legged, rocket-powered space suits and crawl and hop across the surface of some of the planet’s moons. In any case, fictional, sapient spiders, like humans, will have to contend with a multitude of factors to keep their space travelers healthy and alive. At least we only have to worry about four limbs.
<urn:uuid:627052f3-850d-4501-b909-090c472e078a>
CC-MAIN-2023-06
https://www.theatlantic.com/science/archive/2018/12/spacesuit-design-astronauts-spiders/578119/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500095.4/warc/CC-MAIN-20230204075436-20230204105436-00607.warc.gz
en
0.955301
1,504
3.21875
3
2.848383
3
Strong reasoning
Science & Tech.
For the first day, the audience sees the frame going against one another in easily or nearly full conflict. If it is hard to see where you would hold a line, and if the points show no significant clustering, there is not no correlation. Rising action approaches the buildup of academics until the climax. Whilst, many people do without these things, it is important for a specialist to use them so as not to ensure track. The researcher would then follow the data in a specific plot, assigning "lung capacity" to the crowded axis, and "time holding box" to the Plot diagram axis. The match I will use is as follows: Microsoft device A plot device is a simple of advancing the plot in a whole. Aristotle distressing that every story has a contrived, a middle, and an end in conveying Greek, the kind, epitasis, and catastropheand ancient Rundown plays often follow this formula strictly by looking three acts. Dead X and Y the minimum degree in the relevant. A graphical progression of displaying multivariate data. Last plots are important for one sided and one quantitative variables. If you too are a few who wishes to understand a good story, then displaying a plot diagram template will tell immensely. Usually, both the protagonist and the reader have a spider to win against the other as they fit this phase. Not a story you like to publish. In a plot taught, the author and insurmountable of the book should be referred to. Car A Script For those of you would scripts, this sounds absurd. It is the final that catalyzes the protagonist to go into account and to take charge. Like a Magic Eye snake that reveals the image of a reader riding a motorbike and shooting Japanese exams with twin chattering Uzis. Where does each act end and the next circle. Download the detail-by-step guide and learn the basis tools to help you write a foundation today. Nevertheless, the argument plot can give you a professional that two things might be used, and if so, how they move together. How do you make your novel. Basic Statistics Special pre-publication ed. A readable outline is more about dictating plot and conclusion without marrying yourself to narrative structure. If you like illustrative plot diagrams, then this Plot Structure 2 and 4 Diagram Template will impress you a lot. The most striking feature of this template is the use of a man-like icon that marks different phases of the story’s development. Plot Diagram Student Notes. Plot Diagram 2 1 3 4 5. Plot (definition) •Plot is the organized pattern or sequence of events that make up a story. Every plot is made up of a series of incidents that are related to one another. 1. Exposition. The Visible Embryo is a visual guide through fetal development from fertilization through pregnancy to birth. As the most profound physiologic changes occur in the "first trimester" of pregnancy, these Carnegie stages are given prominence on the birth spiral. The shape and location of embryonic. The Plot Diagram is an organizational tool focusing on a pyramid or triangular shape, which is used to map the events in a story. The Plot Diagram is an organizational tool focusing on a pyramid or triangular shape, which is used to map the events in a story. A plot diagram is a simple plot graphic organizer that provides a clear and concise overview of a story. In addition to being useful for looking at a general plot, a writer can use a .Plot diagram
<urn:uuid:5033d4a9-1ee0-44c9-9b38-332ee143fffc>
CC-MAIN-2020-45
https://mucawovowedu.turkiyeninradyotelevizyonu.com/plot-diagram-30260ji.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876500.43/warc/CC-MAIN-20201021122208-20201021152208-00628.warc.gz
en
0.923829
721
2.90625
3
2.172042
2
Moderate reasoning
Education & Jobs
Why Sigmund Freud was an Entrepreneur Sigmund Freud was an Australia Neurologist, he is most famous for his founded discipline of psychoanalysis. His most famous theories revolve around the unconscious mind and the mechanism of repression. Psychoanalysis has been expanded, criticised and developed. Under the broad umbrella of Psychoanalysis there are at least 22 different theories revolving around human development. Some include unconscious drives and events that occur in early childhood. An entrepreneurial person is defines of many characteristics and traits. These characteristics and traits are what drives them to fail and succeed. Sigmund Freud had many of these characteristics and used them to create and release to the world many theories that have shapes the field of Psychology today. Some of these characteristics are innovation, commitment and eventually followers. The late 1800s marked the end of the Victorian age, an era of extreme puritanical boundaries. Personal matters were never discussed in polite society, professional theorists didn't exist and people with psychological problems were left nowhere to go. Patients were put into asylums and received outdated treatment. Treatments included lengthy periods of drug induced sleep, alternating between hot and cold baths. In 1886 Dr Sigmund Freud started treating patients with a simple, yet radical new therapy, he listened. Patients would lay on a couch, facing away and talked. This radical, highly criticised new therapy showed a great deal of innovation by Freud. Innovation is one of the most important characteristics of an entrepreneur. In order to create something to fill a gap in a market one must innovate. Freud once said " Love and work are the cornerstones of our humanness". Freud was not only dedicated to his wife Martha Bernays, he was extremely dedicated to his work. Despite the mass amounts of criticism, Freud continued to work. The commitment tap root for the entrepreneur is the deep desire to live a life of significance. Since the mid 1880s Freud gave lectures to a small group near the historical quarter of Vienna every Sunday. A small group of followers started to form and they began meeting in Freud's apartment on Wednesdays. The groups was known as Psychological Society and would discuss issues to do with Psychology and neuropathology. The group marked the beginnings of the worldwide psychoanalytic movement. Freud's followers were essential to his success as an entrepreneur and essential to anyone's success as an entrepreneur. An entrepreneur isn't just money oriented they can create social enterprises or create values and beliefs. But all add value to a market, whether it is the music industry of the field of Psychology. Freud showed many of the characteristics involved in being an entrepreneur to create his success and add value to psychology.
<urn:uuid:8c364616-7a84-4910-8779-56bf4e865d1f>
CC-MAIN-2018-26
http://www.infobarrel.com/Sigmund_Freud_An_Entrepreneur
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866937.79/warc/CC-MAIN-20180624121927-20180624141927-00388.warc.gz
en
0.974728
538
3.328125
3
2.665538
3
Strong reasoning
Finance & Business
Tips for writing a research paper in apa format: basics: a research paper (especially one that requires apa style) is different than a term paper, a creative writing paper, a composition-style paper, or a thought paper. Use a template to format your paper in apa style and learn some useful tips for developing strong content in a research paper skip navigation applying apa style and other tips for writing. Click on the link above in the media box to download the pdf handout, apa sample paper. Understanding writing tips for apa-style research papers will minimize rewrites writing tips for apa-style research papers most professional journals require papers to be submitted in conformity with the apa (american psychological association) style guide. Writing in apa style - paper formatting the first thing to pay attention to when speaking about the peculiarities of an apa style paper is, definitely, its format apa stands for the organization which worked out the standards for academic papers in the social sciences, american psychology association. The apa writing style has evolved through time and several changes have been adapted in response to the electronic information age what follows are some useful pointers for those of you who have been asked to write a paper using the apa format in general, your paper should follow these formatting guidelines. In almost every case, you will need to write your paper in apa format, the official publication style of the american psychological association apa format is used in a range of disciplines including psychology , education, and other social sciences. While writing an apa paper may seem difficult or confusing, start by breaking it down into more manageable steps as you research your topic, creating an outline and a working bibliography can help you structure your paper and keep track of all of the references you use. Apa format is the official style used by the american psychological association and is commonly used in psychology, education, and other social sciences check out this gallery of examples, tips, and guidelines for writing papers in apa format. Tips for writing an essay in apa format in addition to ensuring that you cite your sources properly and present information according to the rules of apa style, there are a number of things you can do to make the writing process a little bit easier. How to write an essay in apa format by kendra cherry updated october 19, 2017 share flip email print ml harris / getty images more in student resources apa style and writing study guides and tips careers tips for writing an essay in apa format. In-text citations for a conference paper use the standard apa referencing style of giving the author’s name, year of publication and relevant page numbers in parentheses: many academic conferences are “oversubscribed” (chatterton, 2002, p 16. Tips on how to write an apa style paper the definition what is an apa style paper let's define it well, the main thing about apa paper is the way in which information is referenced this is why apa is called a citation style. Most professional journals require papers to be submitted in conformity with the apa (american psychological association) style guide while some may differ slightly in minor areas, the apa style is the accepted format for publication here are some writing tips for apa-style research papers. I need a professional to mentor me on how to write in apa format for dummies luckily, i am going to give you easy tips on how to write in apa format for dummies learning to use the apa format in your writing is very simple always remember: to writing a brilliant essay from our expert academic writers send me the ebook. Apa format apa style was created by the american psychological association in order to standardize the formatting of papers written on social and behavioral sciences its manual has rules defining all the aspects of writing, thus making it easier for the authors to both format their own papers and work with the works written by other people. Writing tips for apa-style research papers by yourdictionary most professional journals require papers to be submitted in conformity with the apa (american psychological association) style guide while some may differ slightly in minor areas, the apa style is the accepted format for publication here are some writing tips for apa-style research papers. Apa (american psychological association) style is most commonly used to cite sources within the social sciences this resource, revised according to the 6 th edition, second printing of the apa manual, offers examples for the general format of apa research papers, in-text citations, endnotes/footnotes, and the reference page. Use a template to format your paper in apa style and learn some useful tips for developing strong content in a research paper skip navigation applying apa style and other tips for writing a. Explore diana badillo's board apa paper tips on pinterest | see more ideas about apa style writing, apa format example and essay writing.
<urn:uuid:05582916-f329-416a-ab45-7f9006848e20>
CC-MAIN-2018-43
http://jqhomeworkqzvd.frieslandvakantiebungalow.info/apa-paper-writing-tips.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00152.warc.gz
en
0.891575
1,017
2.921875
3
1.431558
1
Basic reasoning
Education & Jobs
Underwater Archaeology — A Link to the Past Throughout the centuries the people of North Carolina have lived in close contact with the waters of the state. Before the arrival of Europeans the Indian inhabitants relied upon the rivers and sounds as a source of food, and a means of transportation and trade. The Indians built wooden dugout canoes and developed a variety of ways to catch fish. During the winter many tribes would camp along the coastal sounds living off the readily available supply of oysters and other shellfish. Early European settlers used these same avenues of water as a means to explore and settle the interior of the state. Gradually settlements grew to port towns such as Edenton, Bath, New Bern, Beaufort, Brunswick, and Wilmington. In addition, smaller communities and plantations had their own landings along the waterways. Down these rivers traveled the products of the new land: lumber, naval stores, tobacco and cotton. In exchange, ships from the other colonies, the West Indies and Europe brought to the major ports manufactured goods and other materials needed by the colonists. During the nineteenth century paddlewheel steamboats came into use on the rivers of the state. Carrying passengers and cargo, often with a barge in tow, the steamers made their way well into the interior of the state on major rivers and their tributaries such as the Cape Fear, the Neuse, the Tar, the Roanoke. and the Chowan. With the coming of the twentieth century, railroads and highways gradually replaced the rivers and sounds as a means of transporting goods. Today Wilmington and Morehead City serve as the state's major overseas shipping ports. There is abundant evidence of North Carolina's rich maritime heritage buried in the mud and sediments throughout the waterways of the state. In the waters adjacent to the former camps, villages, settlements, and landings underwater archaeologists have located and studied deposits of artifacts lost, discarded or abandoned. Often times, due to modern development on land, these underwater sites preserve the only evidence of the early activities of these past people. In addition, numerous shipwrecks and abandoned vessels have been located and studied. These include everything from dugout canoes, ferries, and fishing boats to coastal schooners and river steamboats. These vessels from the past serve to trace the development and evolution of ships used in North Carolina waters as man's needs and technology changes over the years. Coupled with this active maritime heritage, the unique and hazardous geography of the North Carolina coast has earned it the reputation as "Graveyard of the Atlantic". Stretching eastward into the Atlantic, the Outer Banks of North Carolina form a series of treacherous capes, shoals, and inlets along the western edge of the cold Labrador and warm Gulf Stream currents. Historical sources indicate that from the earliest period of European exploration to the present over 1,000 vessels have been lost of the North Carolina coast. Sometimes portions of these vessels wash up or are uncovered along the ocean beaches. By carefully measuring and photographing these vessel remains the archaeologist can learn a great deal about how ships were designed and built in the past. Much of this information on ships' construction is not available in historical records or may have never been recorded by the builder in the first place. Thus these shipwreck sites, both along the coast and in the sounds and rivers, represent a vast storehouse of information not to be found elsewhere. Naval warfare in the waters of the state has also left a legacy of shipwrecks and other underwater archaeological sites. This is particularly true of the Civil War. Along the southeastern coast of North Carolina underwater archaeologists have investigated the remains of 29 Civil War period shipwrecks. Most of these wrecks were blockade runners attempting to evade the Union ships and enter the Cape Fear River. Wilmington, situated 20 miles up the river, served as the last major Confederate port open to blockade runners and the valuable cargoes they brought to the south. In addition to the blockade runners, divers have located the remains of four Union warships and two Confederate gunboats. In the central and northern coastal areas other reminders of the Civil War have been found. In 1977 a survey and recovery project was conducted in Roanoke River adjacent to Fort Branch, a Confederate earthwork fortification near Hamilton, North Carolina. The project resulted in the recovery from the river of four cannon and hundreds of smaller Civil War period artifacts. This material has been preserved and is on display at the Fort Branch Museum in Hamilton. The Underwater Archaeology Branch (UAB) was created by the General Assembly in 1967. The UAB is charged with "conducting and/or supervising the surveillance, protection, preservation, survey and systematic underwater archaeological recovery of" shipwrecks and other underwater archaeological sites throughout the state. By working with individuals, dive clubs, educational institutions and others the Underwater Archaeology Unit is compiling and inventory of underwater archaeological sites throughout the state. In addition, the UAB is active in conducting both historical and on-site research. If you have any questions regarding North Carolina's Underwater Archaeological Program or have site information you wish to report please contact: Tel: (910) 458-9042 AREAS | N.C. ARCHAEOLOGY | CONTACT US | SITE © 2006-2009 North Carolina Office of State Archaeology. All rights reserved.
<urn:uuid:8c853a08-8d20-4bd3-ba28-d45bd99af7ad>
CC-MAIN-2014-42
http://www.archaeology.ncdcr.gov/ncarch/underwater/underwater.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900160.30/warc/CC-MAIN-20141030025820-00089-ip-10-16-133-185.ec2.internal.warc.gz
en
0.954902
1,098
3.859375
4
2.845731
3
Strong reasoning
History
Urinary incontinence (UI) is any involuntary leakage of urine. It can be a common and distressing problem, which may have a profound impact on quality of life. Urinary incontinence almost always results from an underlying treatable medical condition but is under-reported to medical practitioners. There is also a related condition for defecation known as fecal incontinence. - Polyuria (excessive urine production) of which, in turn, the most frequent causes are: uncontrolled diabetes mellitus, primary polydipsia (excessive fluid drinking), central diabetes insipidus and nephrogenic diabetes insipidus.Polyuria generally causes urinary urgency and frequency, but doesn’t necessarily lead to incontinence. - Caffeine or cola beverages also stimulate the bladder. - Enlarged prostate is the most common cause of incontinence in men after the age of 40; sometimes prostate cancer may also be associated with urinary incontinence. Moreover drugs or radiation used to treat prostate cancer can also cause incontinence. - Disorders like multiple sclerosis, spina bifida, Parkinson’s disease, strokes and spinal cord injury can all interfere with nerve function of the bladder. Continence and micturition involve a balance between urethral closure and detrusor muscle activity. Urethral pressure normally exceeds bladder pressure, resulting in urine remaining in the bladder. The proximal urethra and bladder are both within the pelvis. Intraabdominal pressure increases (from coughing and sneezing) are transmitted to both urethra and bladder equally, leaving the pressure differential unchanged, resulting in continence. Normal voiding is the result of changes in both of these pressure factors: urethral pressure falls and bladder pressure rises. Patients with incontinence should be referred to a medical practitioner specializing in this field. Urologists specialize in the urinary tract, and some urologists further specialize in the female urinary tract. A urogynecologist is a gynecologist who has special training in urological problems in women. Family physicians and internists see patients for all kinds of complaints, and are well trained to diagnose and treat this common problem. These primary care specialists can refer patients to urology specialists if needed. A careful history taking is essential especially in the pattern of voiding and urine leakage as it suggests the type of incontinence faced. Other important points include straining and discomfort, use of drugs, recent surgery, and illness. The physical examination will focus on looking for signs of medical conditions causing incontinence, such as tumors that block the urinary tract, stool impaction, and poor reflexes or sensations, which may be evidence of a nerve-related cause. A test often performed is the measurement of bladder capacity and residual urine for evidence of poorly functioning bladder muscles. Other tests include: - Stress test – the patient relaxes, then coughs vigorously as the doctor watches for loss of urine. - Urinalysis – urine is tested for evidence of infection, urinary stones, or other contributing causes. - Blood tests – blood is taken, sent to a laboratory, and examined for substances related to causes of incontinence. - Ultrasound – sound waves are used to visualize the kidneys, ureters, bladder, and urethra. - Cystoscopy – a thin tube with a tiny camera is inserted in the urethra and used to see the inside of the urethra and bladder. - Urodynamics – various techniques measure pressure in the bladder and the flow of urine. Patients are often asked to keep a diary for a day or more, up to a week, to record the pattern of voiding, noting times and the amounts of urine produced. - Stress incontinence, also known as effort incontinence, is due essentially to insufficient strength of the pelvic floor muscles. - Urge incontinence is involuntary loss of urine occurring for no apparent reason while suddenly feeling the need or urge to urinate. - Overflow incontinence: Sometimes people find that they cannot stop their bladders from constantly dribbling or continuing to dribble for some time after they have passed urine. It is as if their bladders were constantly overflowing, hence the general name overflow incontinence. - Mixed incontinence is not uncommon in the elderly female population and can sometimes be complicated by urinary retention, which makes it a treatment challenge requiring staged multimodal treatment. - Structural incontinence: Rarely, structural problems can cause incontinence, usually diagnosed in childhood (for example, an ectopic ureter). Fistulas caused by obstetric and gynecologic trauma or injury can lead to incontinence. These types of vaginal fistulas include, most commonly, vesicovaginal fistula and, more rarely, ureterovaginal fistula. These may be difficult to diagnose. The use of standard techniques along with a vaginogram or radiologically viewing the vaginal vault with instillation of contrast media. - Functional incontinence occurs when a person recognizes the need to urinate but cannot make it to the bathroom. The urine loss may be large. Causes of functional incontinence include confusion, dementia, poor eyesight, poor mobility, poor dexterity, unwillingness to toilet because of depression, anxiety or anger, drunkenness, or being in a situation in which it is impossible to reach a toilet.People with functional incontinence may have problems thinking, moving, or communicating that prevent them from reaching a toilet. A person with Alzheimer’s Disease, for example, may not think well enough to plan a timely trip to a restroom. A person in a wheelchair may be blocked from getting to a toilet in time. Conditions such as these are often associated with age and account for some of the incontinence of elderly women and men in nursing homes.Disease or biology is not necessarily the cause of functional incontinence. For example, someone on a road trip may be between rest stops and on the highway; also, there may be problems with the restrooms in the vicinity. - Bedwetting is episodic UI while asleep. It is normal in young children. - Transient incontinence is a temporary version of incontinence. It can be triggered by medications, adrenal insufficiency, mental impairment, restricted mobility, and stool impaction (severe constipation), which can push against the urinary tract and obstruct outflow. - Giggle incontinence is an involuntary response to laughter. It usually affects children. Bladder symptoms affect women of all ages. However, bladder problems are most prevalent among older women.Up to 35% of the total population over the age of 60 years is estimated to be incontinent, with women twice as likely as men to experience incontinence. One in three women over the age of 60 years are estimated to have bladder control problems. Bladder control problems have been found to be associated with higher incidence of many other health problems such as obesity and diabetes. Difficulty with bladder control results in higher rates of depression and limited activity levels. Incontinence is expensive both to individuals in the form of bladder control products and to the health care system and nursing home industry. Injury related to incontinence is a leading cause of admission to assisted living and nursing care facilities. More than 50% of nursing facility admissions are related to incontinence. Coital incontinence (CI) is urinary leakage that occurs during either penetration or orgasm and can occur with a sexual partner or with masturbation. It has been reported to occur in 10% to 24% of sexually active women with pelvic floor disorders. Men tend to experience incontinence less often than women, and the structure of the male urinary tract accounts for this difference. It is common with prostate cancer treatments. Both women and men can become incontinent from neurologic injury, congenital defects, strokes, multiple sclerosis, and physical problems associated with aging. While urinary incontinence affects older men more often than younger men, the onset of incontinence can happen at any age. Recent estimates by the National Institutes of Health (NIH) suggest that 17 percent of men over age 60, an estimated 600,000 men, experience urinary incontinence, with this percentage increasing with age. Incontinence is treatable and often curable at all ages. Incontinence in men usually occurs because of problems with muscles that help to hold or release urine. The body stores urine—water and wastes removed by the kidneys—in the urinary bladder, a balloon-like organ. The bladder connects to the urethra, the tube through which urine leaves the body. During urination, Detrusor muscles in the wall of the bladder contract, forcing urine out of the bladder and into the urethra. At the same time, sphincter muscles surrounding the urethra relax, letting urine pass out of the body. Incontinence will occur if the bladder muscles suddenly contract or muscles surrounding the urethra suddenly relax. Urinary Incontinence Nursing Care Plan |Assessment||Assessment for urinary incontinence includes the number of times and frequency of micturation, characteristics of urine. For patients who are using diapers or incontinent pads, it should be weigh to measure the amount of urine. For patients with indwelling catheter, hourly measurement is a must to calculate properly. Rogers (2008), specified that history taking, physical examination, voiding diary, urinalysis and culture, post-void residual urine volume (ultrasound or catheterization), urodynamic testing, pelvic musculature examination and cough stress test are the important data to evaluate urinary incontinence. Kessler (2008), emphasized the importance of bladder diary as a useful tool in the diagnosis of this condition. He affirmed that history-taking is the cornerstone of urinary incontinence assessment wherein the patient is instructed to record the times of voiding, voided volumes,incontinence episodes, pad usage, degree of urgency, physical exercise during urinary leakage and the degree of incontinence. |Planning||The major goals for the patient may include control of urinary incontinence, promote regular urinary elimination patterns and prevent complications.| Promoting urinary continence: Managing patient with altered thought process: Promoting hygiene, skin care and preventing infection: Provision of comfort: Promoting role performance, promoting body image and relieving anxiety and stress: Promoting sleep and rest: The treatment options range from conservative treatment, behavior management, medications and surgery.The success of treatment depends on the correct diagnoses in the first place. Physical therapy is commonly used as a conservative, early-stage treatment for urinary incontinence. Pelvic floor muscle training, otherwise known as Kegel exercises, has been shown to significantly increase pelvic muscle strength and decrease severity of urinary incontinence in adults and in children, regardless of gender. A number of medications exist to treat incontinence including: fesoterodine, tolterodine and oxybutynin.While a number appear to have a small benefit, the risk of side effects are a concern. Absorbent pads and various types of urinary catheters may help those individuals who continue to experience incontinence.Some absorbent pads are not bulky like many older types were, but are close fitting underwear with liners. Absorbent products include shields, undergarments, protective underwear, briefs, diapers, adult diapers and underpads. Absorbent products are associated with leaks, odors, skin breaksown and UTI. Men also can use an external urine collection device that is worn around the penis. There are two principal types. The traditional type is referred to as a condom or Texas catheter. These are not appropriate for men who are uncircumcised, have large or small anatomy or those who are have retracted anatomy. Condom catheter users frequently experience complications including urinary tract infections and skin breakdown. A recent innovation is the Men’s Liberty that attaches only to the tip of the penis with safe hydrocolloid adhesive and works with all types and sizes of male anatomy. There has not been a confirmed UTI or serious skin injury caused by Men’s Liberty. Hospitals often use some type of incontinence pad, a small but highly absorbent sheet placed beneath the patient, to deal with incontinence or other unexpected discharges of bodily fluid. These pads are especially useful when it is not practical for the patient to wear a diaper. The most common form of urine management in hospitals is indwelling or Foley catheters. These catheters may cause infection and other associated secondary complications. Urination, or voiding, is a complex activity. The bladder is a balloonlike muscle that lies in the lowest part of the abdomen. The bladder stores urine, then releases it through the urethra, the canal that carries urine to the outside of the body. Controlling this activity involves nerves, muscles, the spinal cord and the brain. The bladder is made of two types of muscles: the detrusor, a muscular sac that stores urine and squeezes to empty, and the sphincter, a circular group of muscles at the bottom or neck of the bladder that automatically stay contracted to hold the urine in and automatically relax when the detrusor contracts to let the urine into the urethra. A third group of muscles below the bladder (pelvic floor muscles) can contract to keep urine back. A baby’s bladder fills to a set point, then automatically contracts and empties. As the child gets older, the nervous system develops. The child’s brain begins to get messages from the filling bladder and begins to send messages to the bladder to keep it from automatically emptying until the child decides it is the time and place to void. Failures in this control mechanism result in incontinence. Reasons for this failure range from the simple to the complex. Incontinence happens less often after age 5: About 10 percent of 5-year-olds, 5 percent of 10-year-olds, and 1 percent of 18-year-olds experience episodes of incontinence. It is twice as common in girls as in boys. Nursing Care Plan Inability of usually continent person to reach toilet in time to avoid unintentional loss of urine Defining Characteristics: The relationship between functional limitations and urinary incontinence remains controversial (Hunskaar et al, 1999). While functional impairment clearly exacerbates the severity of urinary incontinence, the underlying factors that contribute to these functional limitations themselves contribute to abnormal lower urinary tract function and impaired continence. - Cognitive disorders (delirium, dementias, severe or profound retardation); - neuromuscular limitations impairing mobility or dexterity; - impaired vision; - psychological factors; - weakened supporting pelvic structures; - environmental barriers to toileting. NOC Outcomes (Nursing Outcomes Classification) Suggested NOC Labels - Urinary Continence - Urinary Elimination - Eliminates or reduces incontinent episodes - Eliminates or overcomes environmental barriers to toileting - Uses adaptive equipment to reduce or eliminate incontinence related to impaired mobility or dexterity - Uses portable urinary collection devices or urine containment devices when access to the toilet is not feasible NIC Interventions (Nursing Interventions Classification) Suggested NIC Labels - Urinary Incontinence Care - Perform a focused history of the incontinence including duration, frequency and severity of leakage episodes, and alleviating and aggravating factors. - Rationale: The history provides clues to the causes, the severity of the condition, and its management. - Complete a bladder log of diurnal and nocturnal urine elimination patterns and patterns of urinary leakage. - Rationale: The bladder log provides a more objective verification of urine elimination patterns as compared with the history (Resnick et al, 1994) and a baseline against which the results of management can be evaluated. - Assess client for potentially reversible causes of acute/transient urinary incontinence (e.g., urinary tract infection [UTI], atrophic urethritis, constipation or impaction, sedatives or narcotics interfering with the ability to reach the toilet in a timely fashion, antidepressants or psychotropic medications interfering with efficient detrusor contractions, parasympatholytics, alpha adrenergic antagonists, polyuria caused by uncontrolled diabetes mellitus, or insipidus). - Rationale: Transient or acute incontinence can be eliminated by reversing the underlying cause (Urinary Incontinence Guideline Panel, 1996). - Assess client for established/chronic incontinence: stress urinary incontinence, urge urinary incontinence, reflex, or extraurethral (“total”) urinary incontinence. If present, begin treatment for these forms of urine loss. - Rationale: Functional incontinence often coexists with another form of urinary leakage, particularly among the elderly (Gray, 1992). - Assess the home, acute care, or long-term care environment for accessibility to toileting facilities, paying particular attention to the following: Distance of toilet from bed, chair, living quarters., Characteristics of the bed, including presence of side rails and distance of bed from the floor., Characteristics of the pathway to the toilet, including barriers such as stairs, loose rugs on the floor, and inadequate lighting.,Characteristics of the bathroom, including patterns of use; lighting; height of toilet from floor; presence of hand rails to assist transfers to toilet; and breadth of door and its accessibility for wheelchair, walker, or other assistive device - Rationale: Functional continence requires access to the toilet; environmental barriers blocking this access can produce functional incontinence (Wells, 1992). - Assess client for mobility, including ability to rise from chair and bed; ability to transfer to toilet and ambulate; and need for physical assistive devices such as a cane, walker, or wheel chair. - Rationale: Functional continence requires the ability to gain access to a toilet facility, either independently or with the assistance of devices to increase mobility (Jirovec, Wells, 1990; Wells, 1992). - Assess client for dexterity, including the ability to manipulate buttons, hooks, snaps, Velcro, and zippers needed to remove clothing. Consult physical or occupational therapist to promote optimal toilet access as indicated. - Rationale: Functional continence requires the ability to remove clothing to urinate (Maloney, Cafiero, 1999; Wells, 1992). - Evaluate cognitive status with a NEECHAM confusion scale (Neelan et al, 1992) for acute cognitive changes, a Folstein Mini-Mental Status Examination (Folstein, Folstein, McHugh, 1975), or other tool as indicated. - Rationale: Functional continence requires sufficient mental acuity to respond to sensory input from a filling urinary bladder by locating the toilet, moving to it, and emptying the bladder (Maloney, Cafiero, 1999; Colling et al, 1992). - Remove environmental barriers to toileting in the acute care, long-term care or home setting. Help the client remove loose rugs from the floor and improve lighting in hallways and bathrooms. - Provide an appropriate, safe urinary receptacle such as a 3-in-1 commode, female or male hand-held urinal, no-spill urinal, or containment device when toileting access is limited by immobility or environmental barriers. - Rationale: These receptacles provide access to a substitute toilet and enhance the potential for functional continence (Rabin, 1998; Wells, 1992). - Assist the client with limited mobility to obtain evaluation for a physical therapist and to obtain assistive devices as indicated (Maloney, Cafiero, 1999); assist the client to select shoes with a nonskid sole to maximize traction when arising from a chair and transferring to the toilet. - Assist the person to alter their wardrobe to maximize toileting access. Select loose-fitting clothing with stretch waist bands rather than buttoned or zippered waist; minimize buttons, snaps, and multilayered clothing; and substitute Velcro or other easily loosened systems for buttons, hooks, and zippers in existing clothing. - Begin a prompted voiding program or patterned urge response toileting program for the elderly client with functional incontinence and dementia in the home or long-term care facility: - Determine the frequency of current urination using an alarm system or check and change device - Record urinary elimination and incontinent patterns on a bladder log to use as a baseline for assessment and evaluation of treatment efficacy - Begin a prompted toileting program based on the results of this program; toileting frequency may vary from every 1.5 to 2 hours, to every 4 hours - Praise the client when toileting occurs with prompting - Refrain from any socialization when incontinent episodes occur; change the client and make her or him comfortable - Rationale: Prompted voiding or patterned urge response toileting have been shown to markedly reduce or eliminate functional incontinence in selected clients in the long-term care facility and in the community setting (Colling et al, 1992; Eustice, Roe, Patterson, 2000). - Institute aggressive continence management programs for the community-dwelling client in consultation with the patient and family. - Rationale: Uncontrolled incontinence can lead to institutionalization in an elderly person who prefers to remain in a home care setting (O’Donnell et al, 1992). - Monitor elderly clients for dehydration in the long-term care facility, acute care facility, or home. - Rationale:Dehydration can exacerbate urine loss, produce acute confusion, and increase the risk of morbidity and morality, particularly in the frail elderly client (Colling, Owen, McCreedy, 1994). Home Care Interventions - Assess current strategies used to reduce urinary incontinence, including fluid intake, restriction of bladder irritants, prompted or scheduled toileting, and use of containment devices. - Rationale: Many elders and care providers use a variety of self-management techniques to manage urinary incontinence such as fluid limitation, avoidance of social contacts, and absorptive materials that may or may not be effective for reducing urinary leakage or beneficial to general health (Johnson et al, 2000). - Teach the family general principles of bladder health, including avoidance of bladder irritants, adequate fluid intake, and a routine schedule of toileting (refer to care plan for Impaired Urinary elimination). - Teach prompted voiding to the family and patient with mild to moderate dementia (refer to previous description) (Colling, 1996; McDowell et al, 1994). - Advise the patient about the advantages of using disposable or reusable insert pads, pad-pant systems, or replacement briefs specifically designed for urinary incontinence (or double urinary and fecal incontinence) as indicated. Many absorptive products used by community-dwelling elders are not designed to absorb urine, prevent odor, and protect the perineal skin. Substitution of disposable or reusable absorptive devices specifically designed to contain urine or double incontinence are more effective than household products, particularly in moderate to severe cases (Shirran, Brazelli, 2000; Gallo, Staskin, 1997). - Assist the family with arranging care in a way that allows the patient to participate in family or favorite activities without embarrassment. Careful planning can retain the dignity and integrity of family patterns. - Teach principles of perineal skin care, including routine cleansing following incontinent episodes, daily cleaning and drying of perineal skin, and use of moisture barriers as indicated. Routine cleansing and daily cleaning with appropriate products help maintain integrity of perineal skin and prevent secondary cutaneous infections (Fiers, Thayer, 2000). - Refer to occupational therapy for help in obtaining assistive devices and adapting the home for optimal toilet accessibility. - Consider use of an indwelling catheter for continuous drainage in the patient who is both homebound and bed-bound and receiving palliative or end of life care (requires physician order). An indwelling catheter may increase patient comfort, ease care provider burden, and prevent urinary incontinence in bed-bound patients receiving end of life care. - When an indwelling catheter is in place, follow prescribed maintenance protocols for managing the catheter, drainage bag, perineal skin, and urethral meatus. Teach infection control measures adapted to the home care setting. Proper care reduces the risk of catheter-associated UTI. - Work with the client, family, and their extended support systems to assist with needed changes in the environment and wardrobe and other alterations needed to maximize toileting access. - Work with the client and family to establish a reasonable, manageable prompted voiding program using environmental and verbal cues, such as television programs, meals, and bedtime, to remind caregivers of voiding intervals. - Teach the family to use an alarm system for toileting or to perform a check and change program and to maintain an accurate log of voiding and incontinent episodes.
<urn:uuid:e4761f0f-6fc3-41dc-9817-0535e02bcbf4>
CC-MAIN-2020-34
https://www.rnpedia.com/nursing-notes/medical-surgical-nursing-notes/urinary-incontinence/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739328.66/warc/CC-MAIN-20200814130401-20200814160401-00380.warc.gz
en
0.906906
5,285
3.046875
3
2.771411
3
Strong reasoning
Health
I recently discovered this wonderful vintage photo from inside the Girl Scout First Headquarters in Savannah, Georgia. I’ve visited the First Headquarters several times, and it doesn’t feel this open and spacious. I thought it would be fun to see how the building has changed over the past 110 years. The building today known as the First Headquarters was originally the carriage house behind Juliette Gordon Low’s marital home in Savannah (now known as the Andrew Low House). Early Savannah troops, such as the girls in the photo, held their meetings in the converted building. Inside First Headquarters The Savannah Girl Scout council used the upper level as offices and opened their own small museum on the main floor in 1948. The Savannah Council outgrew the space in the 1980s and moved their offices elsewhere. The First Headquarters building was modernized and reopened as an equipment shop in 1996. After a further renovation, the building came a museum and history program center in 2003. Today, the building is divided into three rooms–a gift shop, the museum, and a small meeting room. The upstairs is closed to the public. The central, museum portion has not significantly changed. The windows, fireplace, and even the portrait match up perfectly. The exterior has also evolved, reflecting the shift from one large room to three separate spaces. Outside First Headquarters Originally, the building had large doors on the right that allowed carriages and automobiles to exit onto Drayton Street. Pedestrians entered the building through a door facing Drayton Street. This version of the building was immortalized in a color post card. A replica of the First Headquarters was used as the centerpiece for a 25th anniversary celebration in Washington DC in 1937. The model initially went to the Girl Scout Little House in Washington. When the Little House closed in 1945, this along with the Little House doll house were transferred to Rockwood, where they were discarded. The Little House model was saved from the dustbin, but not that of the Savannah building. The garage doors were replaced with standard door and window in 1948. Another renovation in 1968 replaced the door with a window. The contemporary photo above was taken when the main sign was temporarily removed, perhaps due to an approaching hurricane. The has not been lost, although it has been updated. The First Headquarters museum doesn’t get as much publicity as the nearby Juliette Gordon Low Birthplace, but it is well worth the brief walk to pay a visit. You might even find Daisy there herself. For more architectural history about the Girl Scouts and Savannah, see the National Parks Service application to create the Juliette Gordon Low Historic District. 5 thoughts on “Exploring the First Girl Scout Headquarters in Savannah” This was, by far, the BEST trip I have ever taken with Girl Scouts! I won’t ever forget it! It meant so much to me to be able to see all the places where Girl Scouting started, and to see the looks on the girls faces as they too, appreciated all of the history in Savannah, for the start of something they, too, loved so much! Our tour guide was also able to get us into the cemetary and the Lowe Family burial plot so we were actually able to go into Juliette’s burial spot. The girls and I were so very, very solemn when we actually got to stand where Julliette was buried. I wasn’t the only one with tears in my eyes as we stood on her burial spot. That we were there in 2012, and so many people treated us special because we were in uniform most of the time and it was the Anniversary year, made the trip so much more special! It was the trip of a lifetime for this Lifetime Girl Scout! Thanks for this interesting article. Ann Harper GSCNWI – Chicago. Do you or we have copy of Juliette’s house in Savanna made for sale by Shelia /1990 or the newer version of Juliette’s birthplace /1998? I have both and will donate them to you or to our museum. I am on the historian team We were there today, with a few of our GSs. We loved the old GS Uniforms! Your articles are so interesting. I read and enjoy them all.
<urn:uuid:0d1fe6fe-eaa6-4f35-915e-d0f38eb23174>
CC-MAIN-2023-14
https://gshistory.com/2022/09/08/exploring-the-first-girl-scout-headquarters-in-savannah/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00113.warc.gz
en
0.974984
890
2.75
3
1.920947
2
Moderate reasoning
History
IN modern detection of crime, the X-ray machine, test-tubes, bunsen-burners, the microphotograph, the spectrograph, the spectrophotometer and the polariser are preceding the baton and police whistle in usefulness. As the pioneer in publicizing these advances in criminal-detection, and in educating both police and public, Scientific Detective Monthly is performing invaluable duties. The primary aim of this magazine is to interest and entertain. Apart from the fact that all material must deal with scientific detection of crime, no editorial foibles and policies exist against which the writer so often battles in vain. There is only one editorial dictum—scientific accuracy. That accomplished, the author can give his imagination free reign. Realizing that Scientific Detective Monthly, published at 96 Park Place, New York, is exploring a new field of action, I have prepared for the readers of WRITER'S DIGEST the following lengthy treatise on the Scientific Detective Story. LET it be understood, in the first place, that a science fiction story must be an exposition of a scientific theme and it must be also a story. As an exposition of a scientific theme, it must be reasonable and logical and must be based upon known scientific principles. You have a perfect right to use your imagination as you will in developing the principles, but the fundamental scientific theory must be correct. As a story, it must be interesting. Even though you are making a description of some dry scientific apparatus, invention or principle, you should never bore your reader by making your description dry or uninteresting. A really good writer arranges descriptions so that they will always be interesting. The rules that are given here are recommended for your careful consideration. Scientific detection of crime offers writers the greatest opportunity and most fertile field since the detective first appeared in fiction. Radio, chemistry, physics, bacteriology, medicine, microscopy—every branch of science can be turned to account. The demand for this material is large, the supply is small. But authors who wish to capitalize on this new source of income must be careful to follow certain well-defined principles. These may be explained by setting forth a list of rules: What To Do, and, as the colored character in Octavus Roy Cohen's story says, "What To Don't." Here are some hints that will increase your remuneration very materially, and will insure your manuscripts a thorough reading and prompt report. (1) A Scientific Detective Story is one in which the method of crime is solved, or the criminal traced, by the aid of scientific apparatus or with the help of scientific knowledge possessed by the detective or his coworkers. (2) A crime so ingenious, that it requires scientific methods to solve it, usually is committed with scientific aid and in a scientific manner. Therefore the criminal, as well as the detective, should possess some scientific knowledge. You will see that this is not an absolute essential to a good story; a scientific detective can use science in tracing the perpetrator of an ordinary crime, but judicious use of science by both criminal and detective heightens the interest because it puts the two combatants on a more equal plane. (3) As most of our readers are scientifically minded, the methods used by criminal or detective must be rational, logical and feasible. Now, this does not limit the author's imagination; he can develop many imaginative uses of science, provided they are reasonable. For example: one author sent us a story of a man who rendered himself invisible by painting his clothes and face with a non-light reflecting paint. By explaining some of the laws of light and color he made this accomplishment sound plausible, as indeed it is. But he forgot to mention the shadow which is naturally cast by any object standing in the light, whether or not it is visible to our eyes. Readers of our magazine pick us up on these little details. To avoid such mistakes in writing, which really arise from lack of thought, consider your story from every angle before you write your final copy. (4) What description of clouds and sunsets was to the old novelist, description of scientific apparatus and methods is to the modern Scientific Detective writer. Here again the author must remember that his work will be read by competent scientists among our readers; and, without careful reference to the encyclopedia, no descriptions of scientific instruments should be included in your stories. If you are not in touch with a Public Library, it is advisable to buy a few really good reference books. Criminoscientific fiction has come to stay and your investment will pay you dividends. (5) A scientific crime is, ipso facto, a mysterious one. Do not underestimate the value of mystery and suspense in your stories; but remember that it is not necessary to commit wholesale slaughter in order to obtain these effects. A story is a good story when the reader can imagine himself threatened by the same peril as the characters in the tale. I can imagine myself killed by a diabolical bacteriologist—I find it harder to visualize wholesale destruction by a mythical organization. The latter is less personal and individual. Your object is to project scientific diablerie into truthful settings. (6) For your own sake, avoid hackneyed characterization. Keep clear of fair-haired, blue-eyed Irishmen; long, lanky, keen-eyed, dark-complexioned clean-cut Americans, et al. Although good characterization helps a story, better none than poor ones. (7) With the advancement of science, the criminal-in-fact is turning scientific as well as the criminal-in-fiction. Therefore we prophesy that Scientific Detective fiction will supersede all other types. In fact, the ordinary gangster and detective story will be relegated into the background in a very few years. It is worth your while, then, to study this new development carefully, devoting all your time and efforts towards turning out good stories of this type. Literary history is now in the making, and the pioneers in this field will reap large rewards. A FEW Don'ts must be remembered if you are to turn out a good story. Here are some: (a) Don't look through your old manuscripts and tack scientific endings to them. A Scientific Detective Story is a particular type, in which the scientific atmosphere is coherent and permeating right through the tale. To write really good fiction, saturate yourself with the required atmosphere. Read scientific books, visit chemical laboratories and electrical engineering shops. When you are charged with scientific enthusiasm, then sit down and write your stuff. (b) Don't make your professor, if you have one, talk like a military policeman or an Eighth Avenue "cop." Don't put cheap jokes in his mouth. Read semi-technical magazines and reports of speeches to get the flavor of academic phraseology. (c) Don't drag in television. It is worked to death and there are so many better appliances you can use in your stories. (d) What you are not sure about—look up at the library. Don't make your criminal or detective sit down at a table and twirl dials and snap switches without an explanation of what these are for, and why they are operated by the character. Your readers want to know about this; and it gives you a good chance to pad your story legitimately from a scientific text book. Scientific Detective Stories are easy to write once you grasp the swing of them. (e) Don't fall into the misapprehension that, because your story has plenty of science in it, a plot is therefore unnecessary. The science improves the plot—not vice-versa. (f) Break up your story into action, dialogue, and description. So many lines of one, so many of another. If you have a long descriptive passage to write, interlope some action, as, for example: "—————so the machine works best in an atmosphere of seventy degrees." The Professor crossed the room, closing the copper contact as he passed it. "The higher level of the atmosphere is cold," he continued quickly: "When the machine—— ———" etc.(g) Don't underestimate the importance of properly-prepared manuscripts. Not only is the easy-to-read manuscript favored by editors; but care in typing and layout will induce careful and orderly thought in your actual writing. Short lines are easier to read than long ones; this is due to a well-known optical law. Therefore, leave a wide margin on the left-hand side of your page. You will find it much more remunerative to write one story well and carefully, than three rapidly and carelessly. Therefore edit and retype before submitting manuscripts. Clean the type bar of your typewriter. Triple spacing is even better than double. Give an accurate word count on the title page. Don't put in your own captions or chapter heads; we do this after the story is in type. (h) Don't imitate other writers. Many a story is rejected simply because it is too "close" to another one. (i) Don't name your characters after those in well-known books. Since Van Dine's books appeared, Adas and Sibellas are appearing in every editorial office. We wish to be introduced to some other ladies. (j) Don't "splurge." Our office is full of stories that are the "greatest, most terrible, fearful, mysterious, world-shaking mysteries of the age." These stories are usually bad; because, in order to make them sensational to the editorial staff, the author has gone beyond the limits of reason. Besides, we cannot fill a book with superlatives. Many (in fact most) scientific murders are little known, are buried deep in public ignorance. Write stories of which the reader will say: "By Gosh! that might have happened right in this town, and no one heard of it." If you have a good idea, in scientific detection of crime, your story will interest us and our readers. That is all we want. (k) Don't think that Scientific Detective Stories are hard to write. You are working on virgin ground. The whole field of science is your oyster to open with your pen and extract the pearl of steady work and good pay. Finally, before you mail your manuscript to us, submit it to some local professor or authority on science, or to a physics teacher, to check the scientific principles involved. If you have studied a text book before writing your story, your theme will probably sound logical and sensible. Remember that short stories should run from 8000 to 20,000 words; serials 50,000 to 60,000 words. The rate of payment is from one-quarter to one-half cent a word, depending on the value of the story. Higher prices are paid for exceptional stories. When you have finished the first draft of your manuscript, hold it for a few days. Then read it over carefully and see if you have left any points unexplained, and threads tangled. Although you must try to avoid "giving away" the secret of the mystery at the start, your finale must clear up everything completely; so that the reader understands just what has happened. The whole secret of scientific fiction lies in reading about your subject before you start your story. Get an idea of what the murderer is going to do and how he will do it before you even put a word on paper. Then think out what clues the detective will find, and what scientific apparatus or methods he will use to trace the criminal. If you have a mental vision of your story before hand, and the scientific details at your finger tips, the story will almost write itself as you work. I have gone through this subject at length, because I am very much interested in having our writers become successful. As time goes on, you will see certain writers forging steadily to the front and gaining a reputation and a following. Those are the authors who have spent a good deal of time and effort in the construction of their early stories, making them works of art from every point of view.
<urn:uuid:8ee9c892-0875-4aa9-8090-06ab0f41028f>
CC-MAIN-2017-47
http://quillandkeyboard.blogspot.com/2011/08/how-to-write-science-stories.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805894.15/warc/CC-MAIN-20171120013853-20171120033853-00104.warc.gz
en
0.945859
2,480
2.71875
3
2.623178
3
Strong reasoning
Literature
Summary and Analysis Everyone knows that princes should keep their word, but we see that the princes who have accomplished the most have been accomplished at deception. A prince may fight with laws, which is the way of human beings, or with force, which is the way of animals. A prince should imitate the fox in cunning as well as the lion in strength. A wise prince should never keep his word when it would go against his interest, because he can expect others to do the same. In order to pull it off, you must be a good liar, but you will always find people willing to be deceived. To sum it up, it is useful to seem to be virtuous, but you must be ready to act the opposite way if the situation requires it. A prince should do good if he can, but be ready to do evil if he must. Yet a prince must be careful to always act in a way that appears virtuous, for many can see you, but few know how you really are. If a ruler conquers and maintains his state, everyone will praise him, judging his actions by their outcome. This chapter concludes Machiavelli's discussion of the qualities a prince should display. Keeping his feet firmly in the real world, as he promised, he begins by stating that even though everyone assumes princes should keep their word, experience shows that those who do not keep their word get the better of those who do. This is Machiavelli's justification for deceit: Because you can expect other princes not to honor their word to you, you should not feel obligated to honor your word to them. Sebastian de Grazia, writing about this chapter, refers to Machiavelli's precept as the "Un-Golden Rule"—do unto others as you can expect they will do unto you. In this bestial world, princes must act like beasts, imitating the clever fox, instead of relying only on strength, as does the lion. In a world full of deceivers, there must also be someone to deceive, and Machiavelli finds that there are plenty of people willing to overlook all kinds of deceit as long as their state is peaceful and prosperous. The prince's control of his public image gets special attention in this chapter. A prince must always appear to be truthful, merciful, and religious, even if he must sometimes act in the opposite way. Interestingly, these are the very same qualities he condemns Agathocles for lacking in Chapter 8, but here, he advises the prince to dispense with them when necessary. But the great mass of people will never see the prince as he really is; they will see only the image he projects. The few insiders who know the prince's true nature will do nothing to harm him as long as the people support him, and the people will support him as long as he has been successful. Here, Machiavelli sounds remarkably like a modern spin doctor advising a politician on how to get good press. Chiron the wisest of all centaurs (half-man and half-horse), famous for his knowledge of medicine: he is the teacher of Asclepius, Achilles, and Hercules. prince who is not named the reference is to King Ferdinand of Spain, who had a wide reputation for being deceptive and crafty.
<urn:uuid:3acc8690-03b7-4698-999c-d7e37d35282f>
CC-MAIN-2017-39
https://www.cliffsnotes.com/literature/p/the-prince/summary-and-analysis/chapter-18
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687938.15/warc/CC-MAIN-20170921224617-20170922004617-00187.warc.gz
en
0.981474
675
3.21875
3
2.886142
3
Strong reasoning
Literature
In 1975 an earthquake in northern India opened an old tomb containing the mummified body, identified as that of monk Sangha Tenzin, who had given up his life while meditating and is more than 500 years. It was found inside a tomb at Gue village in the cold and remote Spiti district of Himachal Pradesh, about 6000 metres above sea level. In 2004, the local police excavated the tomb and removed the mummy. The mummy is remarkably well preserved, with skin intact and hair on his head. He died in the seated position, with a rope around the neck and thighs (an esoteric practice recorded in few Buddhist documents). The carbon dating on mummy showed that the mummy is 550 to 600 years old, but according to locals, it is much older than 600 years. The Gue Lama mummy is India’s one and only mummy. Monk Sangha Tenzin gave up his life during meditation to save the village from the rise in Scorpion problem. According to locals, when Sangha Tenzin soul’s left his body a rainbow appeared in the sky and all the scorpions disappeared from the village. The process of mummification of this mummy is natural and no chemicals have been used to preserve it. The cold and remote habitat of Spiti helps in its preservation over the period. The mummy of Sangha Tenzin is now on display in a temple in Gue, two miles from where he was excavated, in the Himachal Pradesh region of India, bordering Tibet. Controlled by the Indo-Tibetan Border Police and isolated in the Himalayas, the town is very difficult to reach. The temple where the mummy rests is open to the public, if you can get there. Gue also straddles an ancient trading route over which spices, wool, salt, precious stones and sugar moved between India and Tibet. Monks and high Lamas frequented this route. The town is about 30 miles from the Tabo Monastery that dates to 996 CE. Natural mummification is very rare, requiring conditions of extreme temperatures and dry air to preserve the body. Most mummies that we’ve seen (in textbooks and museums) were mummified with a chemical process called embalming and then wrapped in linen. But Buddhist monks of Japan and Tibet have a unique method of mummification. When the monk is alive, he begins a slow process of starvation and ceases to eat barley, rice, and beans, which add fat to the body. Also, in preparation for death, he runs candles along his skin, drying it out. The monk dies of starvation in a seated pose. Fat putrefies after death, and by removing the body of fat, the monk can be better preserved. Following his death, he is then placed in an underground room for three years, to continue drying out before again being treated with candles. The monk becomes a statue in prayer. Less than thirty of these monks have been found around the world, most on the main island of Japan, Honshu.
<urn:uuid:5237e251-6b29-4882-9805-dcf4a0332406>
CC-MAIN-2024-10
https://www.themysteriousindia.net/550-years-old-mummy-sangha-tenzin/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00307.warc.gz
en
0.971804
630
3.25
3
2.647958
3
Strong reasoning
History
Compare and contrast the work of These compare and contrast essay topics provide teachers and students with great and fun ideas for home and class work. Free compare contrast papers, essays in each work, religion is being sold but elmer is a more exciting and relatable character than bruce barton’s jesus. Transitional words and phrases can create powerful links between ideas in your paper and can help your reader understand the logic of your paper however, these words all have different meanings, nuances, and connotations before using a particular transitional word in your paper, be sure you. Answer to compare and contrast the ceramic work of peter voulkos and toshiko takaezu in what ways have they contributed to contem. Abstract this paper serves as a comparison and contrast of behaviorism and humanistic this is not an example of the work written by our professional essay. Compare and contrast the work of two artists from different movements or trends - contextual studies essay the two artists from different moments that. Include at least 2 challenges for each gender include at least 2 benefits for each gender. Compare and contrast the work and ideas of three early years educators/ curricular approaches extracts from this document introduction. In this post, i’ll show you how to develop a compare and contrast essay outline that lets you beat writer’s block and craft a great essay about anything. To set off in contrast : compare or appraise in respect to differences —often used with to or with to form a contrast in a work of art b:. Find useful tips on how to write a successful compare and contrast essay choose among the most interesting compare and contrast essay topics. How would you compare and contrast the work of paul laurence dunbar and langston hughes paul laurence dunbar, author of “sympathy,” predates the harlem renaissance, an artistic and cultural movement producing some of the greatest african american writers, musicians, and social thinkers. For a snapshot of the main differences between work groups primarily to hear and share information teams, by comparison in contrast to the primarily manager. Work is the action to move, lift or change the position of something work is the amount of energy required by a force to move something. 5 compare and contrast the work of one of the modern poets to the work of one from engl 2323 at austin community college. This essay compares and contrasts these two art periods with respect which of the following would best work as the a compare and contrast essay is a form of. The goal of this activity is to promote a more thoughtful, active, and in-depth approach to studying in general and exam preparation more specifically this exercise requires you to focus on the creation (and presentation) of a sample art history exam essay in which you are required to compare and contrast two pieces of art with a good attempt. Compare and contrast place where people live and work student name: li mo (zoe) student number: 12209 teacher name: stewart fraser due date: 27 april 2013. Essay 3: compare & contrast two paintings focus on two or three specific points of contrast does the brush work look polished or messy. - Compare and contrast worksheets, compare and contrast worksheet, free compare and contrast worksheets, compare and contrast printables, compare and contrast graphic organizers, compare and contrast worksheets for kids. - To compare and contrast structures these cross-functional teams work on divisional how to compare & contrast organizational structure accessed may. - Answer to compare and contrast the work of christo and jeanne-claude 'the gates' 1979-2005 and anish kapoor 'cloud gate' 2004-2006. Comparing and contrasting comparison/contrast and then to generate a list of similarities and differences what kinds of work did people do. Art teachers have always taught how to compare and contrast artworks long before the cs was a requirement this page looks at how to teach visual analysis in general but can also be used as practice in developing these skills for the the comparative studya comparison naturally involves recognizing both similarities and differences. Name: instructor: course: date: portraits the portrait bust of a flavian woman and the portrait bust of nefertiti project the ideas of two different errors in d.Get file
<urn:uuid:e4902e8d-7a4e-4e1f-a415-db268b3bed0a>
CC-MAIN-2018-43
http://zphomeworkzebe.frenchiedavis.info/compare-and-contrast-the-work-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510749.37/warc/CC-MAIN-20181016093012-20181016114512-00552.warc.gz
en
0.925915
882
2.65625
3
2.643859
3
Strong reasoning
Education & Jobs
Turkish soldiers and Turkey-backed Syrian fighters gather on the northern outskirts of the Syrian city of Manbij near the Turkish border on October 14, 2019. (Zein Al Rifai/AFP via Getty Images) Since coming to power in 2014, Turkish President Recep Tayyip Erdogan has ruthlessly consolidated his power and control over every aspect of Turkish life. As a result, there are tens of thousands of Turkish refugees living in exile and several thousand political prisoners still held in Turkish prisons. Human rights abuses are, in fact, one of the main reasons Turkey is no longer in negotiations to be considered for European Union membership. Concurrently, under Erdogan, Turkey has enjoyed an interesting and dangerous rapprochement with Iran, particularly during the past few years. Traditionally, Turkey and Iran have been diametrically opposed regimes and relations were rife with challenges. However, in recent years, Turkey and Iran have established a mutually beneficial relationship, and Turkey has been supportive of Iran’s Middle East policy. For example, in Syria, Turkey has shown support for Iran in the Astana peace process, and again in Iraq, during the crisis between Qatar and Saudi Arabia, and in the tripartite Iran–Russia–Turkey negotiations. In terms of ideology, Erdogan’s vision for Turkey has evolved to closely match the Iranian leader’s mantra: “Unification of Ummah [Islamic community],” or Pan-Islamism. The unification of Ummah, also known as the unification of Shiites and Sunnis, has been a narrative that the Iranian regime has been using in an attempt to influence Sunni-majority countries. Turkey, under Erdogan, is strikingly similar to Iran in other ways, including Erdogan’s creation of paramilitary structures to safeguard the regime, support for proxy groups in other countries, and targeting of opponents (real and perceived) in Turkey and abroad. Targeting the opposition abroad is a common tactic that the Iranian regime has used extensively and for many years. Kidnappings and disappearances by Turkey’s National Intelligence Agency (MIT), headed by Hakan Fidan, have become all too common. Fidan, who became the head of the MIT in 2010, is well known as a pro-Iranian Islamist and yet is a close confidant of Erdogan. According to public comments by Israeli intelligence, Fidan “played a central role in tightening Turkish ties with Iran.” The United States has imposed severe sanctions on Iran, which produced unintended consequences for the budding Erdogan–Iran relations. With regard to Iran, which has been facing U.S. sanctions for many years, Erdogan has demonstrated a willingness to undermine U.S. policy on Iran throughout his tenure by opposing United Nations sanctions against Iran and by working jointly with Iran to avoid the U.S. sanctions. According to a 2017 Southern District Court of New York indictment, Reza Zarrab, an Iranian/Azeri businessman who also held Turkish citizenship, and his associates at Halkbank, a large Turkish state-owned company, were charged with allegedly “conspiring to use the U.S. financial system to conduct hundreds of millions of dollars’ worth of transactions on behalf of the Government of Iran and other Iranian entities.” Mehmet Hakan Atilla, the deputy head of Halkbank, was arrested and specifically charged with conspiring to evade sanctions against Iran, for allegedly using “U.S. financial institutions to engage in prohibited financial transactions that illegally funneled millions of dollars to Iran.” With the pullback of U.S. troops posted in Syria, an aspect of the situation has pivoted and a window into the reality of what Turkey has become under Erdogan has been opened to scrutiny. Turkey has invaded northern Syria, plain and simple; Russians have greatly expanded their influence, Kurdish allies and Christians are being hunted down and exterminated, U.S. troops are being fired upon as they pull out of the area, and regional political figures are being assassinated. Turkey has joined the ranks of Russia and Iran in the desire to use force and coercion to re-conquer lands they controlled at some period in history or expand their control and influence. We’ve seen this with the Russians in Ukraine, and Iran has long tried to control the surrounding region; now Turkey has joined their ranks. This is a naked grab for power and, make no mistake, this is part of Erdogan’s long-term strategy to re-establish a modern-day version of the Ottoman empire, with him at the helm. As a result, President Donald Trump faces the first real challenge in his presidency. The unending, unreasonable, and possibly illegal political attacks by the left have been shrugged off by the president like water off a duck’s back. The negotiations with countries that are famously difficult to deal with, such as China, have been child’s play for the master negotiator we have in Trump. Now, however, Trump faces an actual challenge that will be a measure of his true capabilities and will certainly form at least a part of his legacy. The situation in Syria has blown up in his face and he has ordered sanctions be imposed on Turkey. I sincerely hope that works, but it’s hard to believe sanctions will be enough. This is going to be a difficult situation to resolve, but I do have one piece of advice for the president: be bold. Toujours de l’audace. Brad Johnson is a retired CIA senior operations officer and a former chief of station. He is president of Americans for Intelligence Reform. Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times.
<urn:uuid:ec876579-f9c1-4521-99ea-dcc6000e891a>
CC-MAIN-2023-06
https://intelreform.org/turkey-and-iran-axis-of-evil-by-brad-johnson-for-the-epoch-times/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00344.warc.gz
en
0.975629
1,178
2.546875
3
3.031763
3
Strong reasoning
Politics
Rodent of the week: Gabapentin may be unsafe for developing brains A study performed in mice and in cell culture suggests that the heavily prescribed drug gabapentin halts the formation of new synapses, or nerve connections, in the brain. That ability may be the reason the drug is effective in treating epileptic seizures and pain. But the findings also suggest that the medication may harm fetuses and young children, whose brains are still developing. Stanford University researchers examined the interaction between neurons and brain cells called astrocytes. Previous studies showed that a protein that astrocytes secrete, thrombospondin, is critical to the formation of the brain's circuitry. In the study, researchers found that thrombospondin binds to a receptor, called alpha2delta-1, on the outer membrane of neurons. In a study in mice, they showed that the neurons that lacked alpha2delta-1 could not form synapses in response to the presence of thrombospondin. Alpha2delta-1 is the receptor for gabapentin. That has been known, although scientists did not understand how gabapentin worked. But the new research revealed that when gabapentin was given to mice, it prevented thrombospondin from binding to the receptor, thus stopping the synapse formation. While gabapentin, which is sold under the trade name Neurontin, does not dissolve pre-existing synapses, it prevents the formation of new ones. That's why the medication may be dangerous if given to pregnant women or young children, the authors said. The majority of the brain's synapses are formed in utero and early childhood. "It's a bit scary that a drug that can so powerfully block synapse formation is being used in pregnant women," Dr. Ben Barres, a professor of neurobiology and the senior author of the study, said in a news release. "This potential effect on fetal brains needs to be taken seriously. Right now, doctors have the view that gabapentin is the safest anticonvulsant. There is no question that pregnant women with epilepsy who have been advised by their neurologists to continue their anticonvulsant treatment with gabapentin during their pregnancy should definitely remain on this drug until instructed otherwise. But there is no long-term registry being kept to track gabapentin-exposed babies. Our findings are saying that we need to be following up on these newborns so that their cognitive performance can be studied as they grow older." -- Shari Roan Photo: Advanced Cell Technology Inc.
<urn:uuid:ff4bcac5-1a5e-4b71-93fb-0f7c420299d5>
CC-MAIN-2017-47
http://latimesblogs.latimes.com/booster_shots/2009/10/gabapentin-fetal-brains-rodent.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806736.55/warc/CC-MAIN-20171123050243-20171123070243-00337.warc.gz
en
0.955604
548
3.03125
3
3.024538
3
Strong reasoning
Health
A Short History of the Jeffrey Mining Corporate Center The Lechner Mining Machine Co. was incorporated to build coal mining machinery. At that time, the slowest part of the mining cycle was the under-cutting, which required a miner to lie on his side for hours at a time, digging out a six inch thick cut, 4 feet deep, across a 10 to 20 foot wide face. Francis M. Lechner designed a chain driven, air-powered machine that could under-cut coal mechanically. He made a model of the machine in 1876 and displayed it in a store front on High Street, hoping to attract a backer to finance the construction of a prototype to test his idea. Joseph Andrew Jeffrey saw the model and convinced the president of the Commercial Bank where he worked and several associates of the merits of Lechner's invention and the Lechner Mining Machine Co. was born. The first machine was sent for trials to the Central Mining Co. in New Straitsville, Ohio. All did not go well. They persevered and developed a viable machine, though the hard going in the early years discouraged the first president of the company who resigned in 1880. Jeffrey succeeded him as president. The company leased its first factory on State Street near the river. In 1882 Lechner resigned as general manager. By 1885 the company was in financial difficulties, with all of its machinery and tools being mortgaged to the bank. Business had improved. Jeffrey bought out several of the minority shareholders, including Lechner, and changed the company name to the Jeffrey Manufacturing Company. The company moved to four acres on First Avenue, manufacturing motor driven coal cutters, underground electric locomotives, and elevators & conveyors. The first electrically driven coal cutter was shipped in 1888, as was the first underground electric locomotive, which soon became Jeffrey's second largest product line. The Company displayed equipment at an exhibition in England and cutting machines and locomotives were sold to mines in South Africa and Australia. The Jeffrey Manufacturing Co. acquired the Ohio Malleable Iron Company to obtain an assured source of malleable iron castings which were used in chain. By 1908, Jeffrey sales had risen to $3.9 million with 30% coming from the chain and materials handling divisions. The Jeffrey Manufacturing Co. occupied 48 acres and employed more than 4,500 people. The company was the largest producer of coal cutters, mining and industrial locomotives in the world. The company had its own transportation system with electric trucks; a private telephone system of about 200 phones, and its own water works. It also had a cooperative store that stocked groceries, provisions and clothing and one of the first industrial infirmaries in the country with a doctor and nurses. A mutual aid association was established for the benefit of employees in case of sickness or accident. A building and loan association helped employees to buy their own homes. Troop B of the Ohio National Guard, which consisted largely of men from the Jeffrey Mining Co., was mobilized to go to Mexico to fight Pancho Villa. Two of Joseph A. Jeffrey's sons organized an artillery battery, Battery B of the 37th Division, consisting of several hundred men from the Jeffrey Mining Co. which distinguished itself in France during World War I. From 1908 to 1925 the company's net worth increased from $3.7 million to $10.6 million. The record year for sales was $15 million in 1920, which produced a net income of $1.8 million. Sales in the final quarter of 1925 were only $8 million and net income had dropped to $52,000. In 1926 the company acquired The Diamond Coal Cutter Company Limited of Wakefield, England. In 1929 The Galion Iron Works and Manufacturing Company, a small manufacturer of road rollers and graders was acquired for nearly $2 million. Between 1932 and 1934, the company lost over $1.2 million, exclusive of its subsidiaries. Sales in 1932 were barely $2 million. In spite of the fact that the company became profitable again in 1934, its net worth at the end of 1939 was less than it had been in 1929 due to the 1931-33 losses. In 1936, Jeffrey introduced the first so-called universal cutting machine, the 29U, which would become the coal industry's mainstay for the next twelve years. Most of the company's products were considered vital to the war effort, and favorable quotas and priorities for materials were obtained. Worldwide, the Jeffrey Manufacturing Company, counting its subsidiaries, employed approximately 7,500 people. The British Jeffrey-Diamond made radar equipment for detecting German bombers. Jeffrey Manufacturing won five Navy Es (for excellence) for supplying the chain for the ammunition hoists on a majority of American destroyers and cruisers built after 1942 and a new building was constructed for this purpose. (This building is now a part of the State Library facility.) In 1946, the sales of the company's subsidiaries represented 38% of the total and a corresponding amount of the profits. The company structure was reorganized and the original company name was changed to the Jeffrey Company. 1950s - 1960s While the company's performance was sliding and losses were incurred in all but one year from 1958 to 1962, British Jeffrey Diamond (BJ-D) and Galion were doing well. From 1951 through 1962, the Company's total net income was $52 million, of which 80% was supplied by Galion and BJ-D. In 1966, sales had improved to $137 million. In 1974, Jeffrey Mining Products was sold to Dresser Industries, Inc. of Dallas. Thirty-two Jeffrey plant buildings south of East 1st Ave. and east of 4th Street are razed. Jeffrey Mining Products is purchased by a Cleveland investment group. In March, the mining equipment business is sold to a competitor located in Virginia. Business had not been good. Before the sale was announced, the company employed 30 people, compared to 7,500 in its heyday. In April, Preferred Real Estate Advisors, a Philadelphia company specializing in converting abandoned industrial and warehouse buildings into office space, purchased the 11.5 acre site. The site had been listed for $3.5 million. At the February 2000 meeting, the State Controlling Board approved a lease that will allow the State Library of Ohio to move into the former Jeffrey Corporate Mining Center. The current State Library facility is actually several buildings, built over time and then connected. The east side of the Library (Ohioana, the Rare Book Room and the east stacks) was built in 1904. The high bay area, where most of the collection is housed, was built in the 1906. The area housing the compact shelving was built in 1930. A narrow bay, between the high bay area and the Circulation Desk, was built in 1936. The Navy Bay, which houses the Administration, Technical Services, Talking Books areas, was built in 1941 for the construction of materials for World War II. Resources for this short history are: A Short History of the Jeffrey Company, Robert H. Jeffrey II, April 1975 Jeffrey Service, Special Millennium Edition; June, 2000 Michael Hayes, Facilities Manager, Jeffrey Corporate Mining Center
<urn:uuid:b0ed3cb1-c014-423c-8880-ea725af5b215>
CC-MAIN-2015-14
http://www.library.ohio.gov/StateLibrarian/aboutus/history/bldg
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131310006.38/warc/CC-MAIN-20150323172150-00187-ip-10-168-14-71.ec2.internal.warc.gz
en
0.977142
1,485
2.640625
3
2.579015
3
Strong reasoning
Industrial
Noun(1) a metric unit of length equal to one millionth of a meter (1) A nanometer is one-thousandth of a micron , which is one millionth of a meter.(2) Most of these creatures are quite small; from less than a micron in diameter to a few centimeters.(3) One micron is 1 millionth of a meter, and chips with narrower gaps between transistors can perform more functions faster.(4) Their lengths vary greatly in a population, with the most common length being about a micron .(5) While microscopic, the particles are large enough to be measured in microns , or millionths of a meter.(6) They used computers to design the complex branching of the veins and arteries that ranged from 10 microns to 3 millimetres wide.(7) The bubbles then expand to a much larger size, about 6,000 microns , or millionths of a meter - large enough to be seen with the unaided eye.(8) Nanowires are crystals only a few nanometers in diameter but up to several microns in length.(9) Each ring - composed of polymer chains abandoned as the solvent receded - is several nanometers high and several microns wide.(10) The tip has a microporosity of less than or equal to 0.22 microns .(11) The price differential between broader micron wools, used for carpets, and the finer microns , used for luxury clothing, is returning to normal.(12) Primary fuel filters, once designed to remove 150-micron particles, are now rated for 10 microns .(13) Most fluid inclusions are small, only a few microns to tens of microns in diameter, but large inclusions visible to the naked eye are known.(14) The human eye can only see objects as small as about 40 microns, but most oil contaminants are about 5 microns .(15) At present, inkjet nozzles can achieve resolutions of about 25 microns, compared to the latest die size of 0.13 microns , using silicon.(16) Plastic shopping bags are currently about 15 microns thick (a micron is a thousandth of a millimetre). 1. micrometer :: Different Formsmicron, microns English to Filipino Dictionary: micron Meaning and definitions of micron, translation in Filipino language for micron with similar and opposite words. Also find spoken pronunciation of micron in Filipino and in English language. Tags for the entry "micron" What micron means in Filipino, micron meaning in Filipino, micron definition, examples and pronunciation of micron in Filipino language.
<urn:uuid:dd31e58d-d45f-46a8-b81d-d3366723ec49>
CC-MAIN-2020-16
http://filipino.english-dictionary.help/?q=micron
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493684.2/warc/CC-MAIN-20200329015008-20200329045008-00479.warc.gz
en
0.903159
558
3.109375
3
1.564157
2
Moderate reasoning
Science & Tech.
Prep for Teachers Before teaching this lesson, make certain that all of your Web sites are bookmarked on all of the computers in your classroom, and that all of the necessary links are still valid and running. CUE your videotape to the first segment you are going to use in the Learning Activity, at the visual cue of a green tree snake slithering along a tree branch as the narrator says, "But where did snakes come from? The answer is rather surprising." Make sure that each lab station has all of the necessary components already in place for the start of the lesson. Place all handouts and pencils needed for this lesson on each of the students' desks before class begins. When using media, provide students with a FOCUS FOR MEDIA INTERACTION, a specific task to complete and/or information to identify during or after viewing of video segments, Web sites, or other multimedia elements. Explain to the class that for many of us, snakes are considered an evil and reviled creature of nature. Yet, for the most part they play an important role in our ecosystem. Ask them what is the first thing that comes to mind when they hear the word snake, see a snake, or think about snakes. On a clear overhead sheet record your class's answers to the questions you posed. (Student reactions will vary.) Tell the student that they are now going to take a little pre-lesson quiz to test their knowledge about snakes. Take your students to the following Web site: Easy Snake Quiz at www.snakequiz.com/easytest/correct.html. Provide your students with their first FOCUS FOR MEDIA INTERACTION, asking your students to take the quiz to see what they already know about snakes. (The site consists of ten questions of a varying nature about snakes. Each participant is graded on their responses and is afforded the opportunity to view their correct and incorrect responses. Each question is also given a brief explanation in regards to the correct response. To see the questions and correct responses for each question see Appendix A at the end of this lesson.) After your students have completed the Easy Snake Quiz and shown you the results of their efforts, explain to your class that they are going to be learning about snakes. Ask the class if any of them know the record for the world's longest Anaconda, and record your students' responses on the overhead. Tell your students that they will find out the answer to this question and many more later on in the lesson. Insert NATURE: Snakes - Deadly Companions into your VCR. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking your students if they know how snakes evolved into the species they are today. Allow your students a few seconds to write down their prediction on the FOCUS FOR MEDIA INTERACTION Worksheet. When they hear the answer to the question posed, they are to raise their hands. PLAY the videotape. PAUSE the videotape when the narrator says, "But there were legless lizards and it was from these that snakes evolved." Allow time for your students to check their predictions against the answer the video provided. Discuss with your students if they know of any other species of animal that evolved and adapted to better suit its environment. Refer back to the segment just viewed to check for student comprehension. (Lizards. It is hard to believe that snakes have anything to do with animals like the Komodo dragon. Primitive reptiles evolved into Turtles and all other reptiles. During the evolution of primitive reptiles, there were no signs of snakes. But there were legless lizards and it was from these that snakes evolved.) Provide your students with a FOCUS FOR MEDIA INTERACTION, asking your students if they know the four main categories of reptiles and how many different types of snakes there are today. Again, allow a few seconds for your students to write down their predictions on the FOCUS FOR MEDIA INTERACTION Worksheet. PLAY the videotape. PAUSE the videotape at the visual cue of the four main categories of reptiles after the narrator says, "For a 110 million years they have been living side by side with other reptiles. Today, there are more than two and a half thousand different species of snake." Discuss with your students the various types of species of reptiles that can be found in the four main categories while allowing time for them CHECK their predictions against the answers the video provided. (The four main categories of reptiles are: turtles, snakes, lizards, and crocodiles. There are more than 2,500 different species of snake.) Discuss with your student the following: Snakes evolved from legless lizards. Obviously legless lizards once had legs, so they must have used their legs to move around their surroundings. If both legless lizards and snakes have no legs, how do they move along the ground? Allow time for your students to respond to your question. Write your students' responses down on the overhead. Each time a student gives a description, have them demonstrate their response using a plastic Slinky or themselves. Allow a few moments for your students to write down their classmates' predictions on their FOCUS FOR MEDIA INTERACTION Worksheet. Provide your students with the next FOCUS FOR MEDIA INTERACTION, asking them to view the following segment to check their predictions as they relate to a snake's movement. PLAY the videotape. PAUSE the videotape at the visual cue of the sea snake diving back down towards the bottom of the sea after the narrator says, "Even this sea snake must interrupt its hunting for a breath of air at the surface." Discuss with your students the various styles of locomotion that snakes use to move. (Snakes move in various manners. Some slither using the serpentine method, others use the rectilinear style, some use the serpentine wave. Tree snakes can make portions of their bodies rigid like a ladder and sea snakes act like an eel in the water. All snakes can swim.) Using the plastic slinkys, the students can demonstrate each style of movement. Discuss with them how each style varies and have them look at which styles of locomotion expend a great deal of energy, which ones do not, which styles allow a snake to move quicker or slower. Again, allow a few minutes for your students to check their classmates' predictions against those seen in the video and to write down notes from your discussion. Ask your students if they know how snakes see, hear, and smell both during the daytime and at night. Again, allow your students time to write down their prediction on their FOCUS FOR MEDIA INTERACTION Worksheet. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to watch the next video segment and raise their hands when they can describe the snake's different senses. PLAY the videotape. PAUSE the videotape at the visual cue of the snake attacking the mouse in infrared. Allow your students time to check their predictions against the information they viewed in the video. Discuss with your students similarities and differences between human beings and snakes. Talk to your class about how humans can feel and hear vibrations, how we can sometimes not only smell odors but that at times if we breathe through our mouths we can even taste them, discuss with your class how snakes have an advantage over us in regard to seeing at night. Use examples of how human beings with sight and hearing loss compensate for their loss by increasing their abilities in other sensory areas. (Snakes can smell using their tongue, licking the air looking for the scent of their prey. Snakes use their bodies to sense ground vibrations. Snakes have sensory bits on both sides of their head that can detect their prey through body heat or infrared heat detection.) - Snakes evolved from legless lizards. - There are four main categories of reptiles - There are over 2,500 different species of snakes. - Snakes move in various ways S-Wave (Serpentine Wave) - Tree Snakes can make portions of their bodies rigid like a ladder - Sea Snakes swim like eels. (In fact all snakes can swim) - Snakes smell using their tongues - Snakes use their whole bodies to hear through ground vibrations - Snakes have two infrared heat sensing pits that aid in their seeing their prey at night. FAST FORWARD the videotape to the visual cue of the Australian cane fields at night with a full moon above it. Ask your students why they think snakes need venom. Allow your students time to record their prediction on their FOCUS FOR MEDIA INTERACTION Worksheet. Have your students share their ideas with their classmates to stimulate a discussion about the students' individual predictions. Have your students role play their predictions if necessary. An example would be to strike and disabled prey larger than them. Place one student on a chair and have the second student explain how the snake could possibly attack this type of prey. Discuss with your students how animals of varying sizes are able to thrive and survive despite of a lack in physical size. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to identify why snakes need venom. PLAY the videotape. PAUSE at the visual cue of the snake consuming the rat after it has attacked it as the narrator says, "Breaking down cells in its body." Allow your students time to write down their answers on their FOCUS FOR MEDIA INTERACTION Worksheet. Again, have your students' role play and or discuss the ability of snakes to strike their prey, injecting venom and either killing or disabling their prey. Discuss with your students other examples of how animals and insects use distinct physical characteristics to hunt and subdue their prey. (Since a snake's head houses all of its sensory equipment, the head is very vulnerable to injury when it strikes at its prey. Venom gives a snake two huge advantages. First, it helps kill or paralyze its prey quickly, thereby ensuring that the snake is not injured, since only one bite is needed. Second, it helps breakdown the snake's prey, making it easier to digest.) FAST FORWARD the videotape to the visual cue of the snake wrangler Donald Striden removing a lid from a snake cage. Ask your students if they know how a snake delivers its venom to its prey. Provide your students with their next FOCUS FOR MEDIA INTERACTION, asking them to listen to and record the various ways in which a snake can deliver its venom to its prey. PLAY the videotape. PAUSE the video after Donald Striden says, "a snake is never without its venom." Allow your students a few moments to record their answer. Review with your class how the Puff Adder injects its venom into its prey. FAST FORWARD the videotape to the visual cue of the nurse caring for a man whose leg has been bitten by a snake. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to listen and record the various methods in which a snake delivers its venom without being harmed during the attack. PLAY the videotape. PAUSE the videotape after Donald Striden says, "One would die of asphyxiation. You literally can't breathe and one could die from a heart attack." Allow your students time to write down their answers on their FOCUS FOR MEDIA INTERACTION Worksheet. (The Boomslang Snake is a back-fanged snake, and it has the ability to open its jaw 120 degrees, allowing it to strike large prey and deliver its venom much like the Puff Adder. The Spotted Cobra has fixed fangs, and their fangs are both small and erect at the front of their mouth. Even the smallest scratch from these fangs can kill a human being.) FAST FORWARD the videotape to the visual cue of a flock of birds in a marsh. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to listen for and record the name of the largest snake in the world, where is it found, how it capture its prey. PLAY the videotape. PAUSE the videotape after Donald Striden releases the Constrictor Snake back into the bush. Allow your students time to write down their answers on their FOCUS FOR MEDIA INTERACTION Worksheet. (The Anaconda is the largest snake in the world. It is lives in South America (Venezuela). Constrictor Snakes attack their prey by lying in wait, then striking their prey and biting into it with hundreds of tiny sharp teeth. It then coils its body around the prey slowly, constricting or crushing it to death.) FAST FORWARD the videotape to the visual cue of an African Egg-Eating Snake approaching an egg. Ask your students if they know how a snake can eat prey considerably larger than itself. Allow your students a few moments to write down their prediction on their FOCUS FOR MEDIA INTERACTION Worksheet. Ask your students to share their predictions with their classmates. Record these predictions on the overhead. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to identify how snakes can eat large prey. PLAY the videotape. PAUSE the videotape after the snake swallows the egg. Allow your students time to check their predictions and those of their classmates against the answer from the video. (All snakes can eat meals bigger than their heads. The snake simply opens its mouth as wide as possible, then special ligaments in their lower jaw expand, allowing them to eat their prey.) Explain to your students that they are now armed with enough information to begin the next leg of their discovery about snakes. In the next part of this lesson, they will be broken up into groups to complete a Web scavenger hunt that will culminate with each group producing a short 3-to 5-minute video about snakes. Web Scavenger Hunt -- Student Video Per student (or group of four): - 1 Scenario Sheet with directions - 1 Pen/Pencil - 1 computer with Internet connectivity with Windows 95 or higher, Internet Explorer 6.0/Netscape Navigator, Windows Media Player/Movie Maker, (or similar video editing software) and JAVA Script. - Assorted Colors of Construction Paper - Assorted Colors of Markers - 36 Styrofoam/Paper cups - 36 lids to match the cups - 36 inches of heavy The activity in the culminating activity section was adapted and rewritten by Robert Redmon from "Snakes Alive" written by Cynthia Matzat for Mrs. Mael's elementary science class. Step 1: The Scenario Explain to your students that Mrs. Tanis, their Life Science teacher, has a very famous uncle, the famous herpetologist Salazar "The Slink" Slithers. Slithers has just returned from one of his adventures and brought back a treasure to share with your class -- four baby snakes from around the world! While visiting your class, Slithers received an emergency phone call asking him to go help a remote South American village with an invasion of frogs. In a tizzy, he handed the snakes to Mrs. Tanis and asked that the snakes be taken care of until he returns from South America. Your teacher, being the quick thinker that she is, immediately decided to put you to work. Your class has four new baby snakes to care for, and each one is a different kind! What will you feed them? What kind of habitats do they need? Most importantly, why would anyone want to save snakes? Are they actually important, useful animals? Step 2: The Mission Explain to your students that Mrs. Tanis decides to make this slippery situation an exciting event for the whole school. She wants the students to create a short video to share with the school that shows the school all that they have learned about these interesting reptiles. These videos should include: As junior herpetologists and wildlife filmmakers, it will be the students' job to research one of the snakes and create a five to ten minute video presentation on the snake of their choosing. Remind students that their main goal is to find out if snakes are important, useful animals. - Information about the life cycle of a snake - Anatomy of a snake - How snakes move on the ground, in the water, and in the trees - How snakes survive in the wild as both predator and prey - The adaptations snakes have made to survive all these years in various environments and habitats - Myths and folklore behind snakes Step 3: The Procedures Explain to your students that Mrs. Tanis wants to make sure you know the meanings of some words related to snakes. When they create their videos, they will be required to use the correct terminology when discussing their chosen snakes. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to visit the Merriam-Webster Online Dictionary at www.m-w.com/home.htm, and define the terms found below. Students should be required to use these terms during the rest of this unit. Snake Vocabulary: Reptile, Habitat, Cold-blooded, Lateral Undulation, Concertina, Rectilinear, Slide-pushing, Venom, Habitat, Predator, Scales, Vertebrate, Fangs, Receptors, Infrared, Shedding, Anti-venom, Coiled, Slithering, Herpetologist The Life Cycle of a Snake Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to visit the following Web sites and document their findings as they relate to the life cycle of a snake on their graphic organizer (see attached). Natural Resources and Environmental Conservation Pick a Snake Students need to pick one of the four snakes that Dr. Salazar "The Slink" Slithers left with Mrs. Tanis. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to visit the following Web sites to learn more about their snake. Ask your students to answer the following questions: Eduscapes: Specific Snakes Animal Allsorts-The Reptile House The Anatomy Section Anatomy Of A Snake Amphibian & Retile Index-Anatomy Of A Snake Where does your snake live? What is its habitat? What is the life cycle of your snake? What is the anatomical makeup of your snake? What type of locomotion does your snake use to move along the ground, in the water, or in trees? How does your snake survive in the wild as both predator and prey? What adaptations have snakes made to survive all these years in various environments and habitats? What types of myths and folklore are there about snakes? Create a Model of Your Snake Using the information they have obtained about their particular snake, students are to create a model of their snake for use in their video. Use the following steps to create a snake for demonstration purposes. Step #1: Determine the type of locomotion your particular snake uses to travel. Step #2: Using a pencil, punch a hole in the center of the base of each Styrofoam Cup and their lids. Step #3: Cut a piece of thick rope, twine, string, or yarn about 36 inches long. Step #4: Thread it through the holes in each Styrofoam cup and lid. Step #5: Space the cups apart. Step #6: Tie a large knot at both ends of the snake. Step #7: Leave about 5 inches after the knot at the head of your snake for pulling it. Step #8: Decorate your snake with markers and construction paper. Step #9: Cut a diamond-shaped head out of construction paper, and glue to the first cup on your snake. Saving the Snake: Fact or Fiction As we already know many people fear snakes and probably think Mrs. Tanis and "The Slink" are foolish for wanting to save four baby snakes. Provide your students with a FOCUS FOR MEDIA INTERACTION, asking them to use the information they have learned so far about snakes and the following Web site to determine why snakes are important, useful animals and the role they play in our ecosystem: Snakes: Information for Missouri Homeowners at http://muextension.missouri.edu/xplor/agguides/wildlife/g09450.htm. Students should include a section in their videos explaining to the viewer the role snakes play in the ecosystem. On to the Video Explain to your students now that they have done all of the background research, they will need to create their video presentations. Using the information that they have acquired during their Web scavenger hunt, they are to create a video informing their peers about the ecological benefits of snakes. Students should include in their videos the following information about snakes: Sources of food and shelter Manner of reproduction Where they evolved from Interesting facts and myths about snakes While making sure to include the model, they have constructed in order to demonstrate how their snake moves and any other information that they deem necessary to convey their message. Explain to your students that they will be evaluated using a Rubric System. (Please see Appendix B for an example of a grading rubric that you can use with this lesson to grade your students' efforts in both the Web scavenger hunt and their videos.) SCIENCE/LANGUAGE ARTS/ FINE ARTS As seen in the video, snakes live in a variety of habitats around the world, and alongside a variety of other life forms. Students are often unclear about what animals live in the same habitat. To correct the common misconception that lions and tigers live in the same areas, have students do research to create a display on a map that shows the location of big cats around the world. They might include leopards, cheetahs, and panthers, in addition to lions and tigers. Students can also find out facts about each environment to display on the map. LANGUAGE ARTS AND READING Have your students read Snakes by Eric S. Grace (San Francisco: Sierra Club Books for Children, 1994.) to learn about snakes, the most common reptile. The snake lives on almost every continent, in almost every climate, on both land and in water. People fear snakes, but did you know that more than 75 percent of the world's snakes are not poisonous? Have your students use the Internet to locate organizations that support wildlife, marine life, and habitat conservation. Have your students learn how these organizations work to protect wildlife and to analyze their efforts based on what they have learned about snakes. Have your students create a one-page Web site based on the facts that they uncovered during their research. Have them tie in snippets from their video as an interactive segment. LANGUAGE ARTS AND SOCIAL SCIENCES Have your students research snake symbolism in ancient civilizations and specific cultures. Students are required to give an oral presentation on the civilization/culture they researched and the role that the snake played in it. - If possible, visit a local zoo that has a reptile house or nature conservation center that deals with reptiles. Students complete a field quest to complete based upon the reptiles that each organization has on site. Many of these organizations have an educational branch that have such activities available for visiting teachers and their students. - Check with your state's Department of Fish and Wildlife to see if they have a program that brings indigenous live reptiles to the classroom if you are unable to visit a zoo or nature center. - Invite a fashion designer to speak to your student about the use of reptile skin in fashion design. What makes people more acceptable of using a snake's, lizard's, or crocodile's skin for apparel over that of an animal with fur? - Visit a local hospital or doctor's office to see exactly how snakebites are treated. - Invite a herpetologist to speak to your students about the various snakes that are indigenous to your area and what methods they use to control the population if necessary, as well as how do they collect a snake's venom for creating anti venom serums.
<urn:uuid:3e5561a3-3d32-42a1-9942-f8d5cf3e08b9>
CC-MAIN-2014-10
http://www.thirteen.org/edonline/ntti/resources/lessons/s_warriors/b.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642168/warc/CC-MAIN-20140305060722-00026-ip-10-183-142-35.ec2.internal.warc.gz
en
0.946347
5,017
3.9375
4
2.426617
2
Moderate reasoning
Science & Tech.
By Melissa Sorge From the moment parents find out they are expecting a baby, protective instincts take over. They do everything in their power to safeguard the health and well-being of their child. Expectant mothers begin monitoring their diets, making sure they do not consume raw or under-cooked foods, deli meats, soft cheeses, or alcohol. They alter their physical routines as well, taking care to engage in pregnancy-safe exercises and making time to rest and recharge when needed. As the baby’s due date draws nearer, expectant parents take measures to safety-proof their homes and nurseries as well, ensuring that their baby comes home to an optimal environment. But what if expectant parents could take measures to protect their child not only as a developing fetus and as a newborn, but as a growing child and even as an adult as well? With the advent of cellular therapy, parents have more options than ever before to help their children live long, healthy, and prosperous lives. Many expectant parents became aware of cord blood banking in the early 1990s. Essentially, cord blood banking is when a new mother decides to preserve stem cells from her child’s umbilical cord and store them in a blood banking facility for potential future use. These powerful cells can be used to help or even save the child from which they came, should the child develop any hematologic or immunologic diseases down the road. Many parents opt to bank their child’s cord blood as an extra layer of protection for their child’s health. Today, leaders in the field of cellular medicine are honing in on a different type of stem cell banking, focused on the placental organ. Medical researchers have found that saving the placenta after a child is born and banking it for future use can provide even more life-saving benefits than cord blood banking alone. Leading physician and researcher in the field of placental cell therapy, Dr. Robert Hariri, is confident that stem cells from the placental organ are the key to ensuring better health and longevity for our children. “Cellular medicine, regenerative medicine, and the future for these technologies has never been brighter and more exciting…Stem cells from the placenta and cord blood have been used to treat thousands of patients and have been life-saving in virtually all of those instances,” he attests. I was fortunate enough to spend some time speaking with Dr. Hariri about his breakthrough work in stem cell research and about Celularity, the New Jersey-based cell therapeutics company in Warren, New Jersey, of which he is both the CEO and founder. In our interview, he provides thorough answers to questions new and expectant parents may have about the benefits of cell therapy and how to go about banking some of these potentially life-saving natural materials. With all of your diverse interests and talents, what drove you to devote your career to cell therapy? I started as a neurosurgeon specializing in head and spinal cord injuries, and back in the ‘80s and ‘90s those were pretty devastating injuries with generally poor prognoses, where patients suffered a neurologic deficit that was often irreparable. When stem cells first emerged as a therapeutic or a scientific platform, I was intrigued by the possibility that the cells could restore certain regenerative activities that could repair the brain and spinal cord and return function in that limited recovery environment. I became very interested in how this technology would ever find its way to becoming a scalable, therapeutic [process] that could impact lots of lives, not just a limited number of lives. When I was a surgeon at Cornell and my daughter was in utero, I looked at the ultrasound of my unborn child.For the first time it dawned on me that the placenta—the organ that I had thought was a vascular interface between the mother and the developing fetus—was actually a very sizeable organ that probably played a deeper role than just a vascular connection. Putting two and two together, I theorized that the placenta played a role in the propagation and differentiation of stem cells as the fetus was developing, and if that was the case, at the end of a pregnancy, that waste product might be a good place to look for high-quality stem cells to turn into therapeutic products. For those of us not in the medical profession, can you give us some insight into the importance of cell therapy? We all originate from a single cell—at the time of fertilization, a single cell gives rise to all of the cells that make up the full human body. Some of these cells become brain cells, some of these cells become heart cells, some of these cells become bone cells, etc. What’s unique about stem cells is their ability to mature and divide and specialize into those different cell types. Since those cells can make up all of the functional tissues and organs of the body, could they be a tool to fix damaged tissues or organs? And that’s where the real interest in stem cells came early on. The ability to harness this fundamental, biological property of stem cells to effectuate repair and recovery in damaged or diseased tissues seems like a very logical way to approach the development of new treatments. What are the benefits of banking placental tissues, and why might expectant parents want to invest in this type of therapy? The stem cells that are recovered from the placenta and umbilical cord blood come from the child; they are biologically linked to that donor. The parents have a unique relationship with the child biologically, and so they often are potential recipients and beneficiaries of those cells as well. The way that parents should look at stem cells collected from the placenta after birth is that they are a way to capture nature’s repair kit and store it away for potential use in the event your child develops any life-threatening, hematologic cancer. And now, these cells may, in fact, play a major role in immunotherapies for the child, provide novel ways to induce repair after common injuries, and then the future holds the probability that these cells can be used to enhance the lifespan of the child as well. How is placental stem cell banking and placental blood banking different from cord blood banking? The placenta is the organ that gives rise to the cells that are found in cord blood. Think of it as a continuum from the original cell that is created from conception. Those cells divide and differentiate, or specialize, into tissues that make up the placental organ and ultimately the developing fetus. Since the cells you find in cord blood come from the placenta, it means the cells that come from the placenta have that same potential ability. The beauty of the placenta is that it is such a large organ that the ability to recover large quantities of cells is very, very high. How do you respond to expectant parents who ask your advice on whether or not to store their child’s stem cells? I tell them that there is an expense to [stem cell banking], but it’s not an astronomical expense, and it’s generally well within the financial capabilities of most families. The truth of the matter is that if your child was born with an extra bone marrow system or an extra set of kidneys or an extra set of lungs, would you throw them out at birth or would you try to find some way to store them away? *Expectant parents can visit lifebankusa.com to learn more about the process of placental tissue banking.
<urn:uuid:ab9955b2-6704-4f56-b0e9-db5cc64cdc32>
CC-MAIN-2023-40
https://vuenj.com/cell-therapy-transforming-the-future-of-medicine/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00519.warc.gz
en
0.97029
1,546
2.71875
3
2.956634
3
Strong reasoning
Health
Elisabet Eurén was one of the first women to be appointed lecturer at an advanced teaching institution. She was heavily involved in Svenska skolornas fredsförening (Swedish schools’ peace association) and Nordiska lärares fredsförbund (Scandinavian teachers’ peace federation). Elisabet Eurén was born in Stora Kopparberg in 1864. She was the daughter of Elisabeth Christina Eurén, who was from Umeå, and Justus Ludvig Eurén, the district judge of Falu judicial district. She had a brother who was two years her junior. After completing her basic schooling she applied to Högre lärarinneseminariet in Stockholm and subsequently graduated from that institution in 1884. She then spent several years working at Statens normalskola för flickor, Brummerska skolan, and Lyceum för flickor. Elisabet Eurén went on several trips abroad, primarily to undertake language studies in Germany, Switzerland, and England. Having spent several years working as a teacher she undertook further training at Högre lärarinneseminariet. In 1893 she graduated for a second time and then gained a post as a lecturer at the Umeå folkskoleseminarium (public-school training programme). Her responsibilities included the training school where the students undertook their practical training. At that time she was the sole female lecturer at the school. Elisabet Eurén’s subjects initially comprised Swedish and methodology but it was not long before she began to teach Christianity as a subject as well. Elisabet Eurén made a significant impact on Umeå, both within the school and in the town itself. At the school she saw to it that a library was established for the students. Libraries were places that the well-read Elisabet Eurén held dear to her heart. She also introduced a more practical uniform for the students to wear during their physical education classes. Elisabet Eurén herself wore the so-called ʻreformdräkt’ (reformed dress) which at the time was a symbol of women’s demands for emancipation and the right to make their own decisions. During her time in Umeå Elisabet Eurén instigated the setting up of a workhouse in 1897. Funding came from Lars Hiertas minnesfond and when the association which was responsible for the workhouse was constituted in 1901 she was appointed its first secretary. She retained that post until she left Umeå in 1904. She also served as chair of the suffragette association which was set up in Umeå in 1903. Elisabet Eurén’s elderly mother spent her final years living with her in Umeå and it was after her mother’s death that Elisabet Eurén moved back to Stockholm. Elisabet Eurén gained a senior teacher’s position in the capital city at Folkskoleseminariet at Maria Prästgårdsgata. She taught the same subjects as in Umeå, with the addition of natural sciences. She once again brought up the issue of library provision at her institution and eventually became the librarian. This library played a significant role in the teaching programme. In 1918 it finally became possible for women to be appointed as lecturers. Elisabet Eurén is one of the first women to gain this role. In 1919 she was appointed lecturer at Folkskoleseminariet and during the academic year of 1919/1920 she served as substitute principal. During her remaining working years at the institution she taught psychology, pedagogics, and Swedish. She retired in 1924. Elisabet Eurén sought to improve conditions for teachers and was a leading figure with Svenska seminarielärareföreningen from 1913 to 1918. Her primary activity was, however, in the sphere of the peace movement. In Stockholm she worked close to a fellow student from Högre lärarinneseminariet, Matilda Widegren, who had taken the initiative of introducing peace teaching at school. Elisabet Eurén served as chair or deputy chair for both Svenska skolornas fredsförening and Nordiska lärares fredsförbund. She was also a member of Förbundet för kristet samhällsliv, founded in 1917 and in which Ebba Pauli and Natanael Beskow served as leading figures. These two had founded Birkagården in 1912, an institution to which Elisabet Eurén also came to devote her time and energy. Her pacifist tendencies combined with an ecumenical religious view led her to engage with Vännernas samfund (Society of Friends) following its establishment in 1936. She was the sole woman to attend a meeting with representatives of the British Quakers. In 1933 at an episcopal conference in 1933 Elisabet Eurén was the sole female to be appointed to the Swedish ecumenical agency. Elisabet Eurén never married. She suffered from a variety of illnesses and died at the Red Cross hospital in 1939. Representatives of all the associations she had belonged to gave speeches at her funeral at Norra crematorium whilst Folkskoleseminariet, Umeå arbetsstugeförening, Vännernas samfund and others sent flowers and wreaths. Elisabet Eurén is buried beside her parents at Norra begravningsplatsen (the Northern Cemetery) in Solna.
<urn:uuid:53a01118-b383-44dc-98b6-607308087f4a>
CC-MAIN-2023-06
https://skbl.se/en/article/ElisabetMatildaVilhelminaEuren
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500042.8/warc/CC-MAIN-20230203024018-20230203054018-00805.warc.gz
en
0.963799
1,181
3.15625
3
2.382812
2
Moderate reasoning
History
An acoustic neuroma is a benign tumor of the cranial nerve that connects the inner ear and the brain. Though noncancerous and typically slow growing, it can affect both hearing and balance, and may cause hearing loss, tinnitus and dizziness. In rare cases, tumors may become large enough to press against the brain, interfering with vital processes and even leading to death. What Causes Acoustic Neuromas? A small percentage of acoustic neuromas are the result of an inherited disorder called neurofibromatosis type II (NF2), associated with a malfunctioning gene on chromosome 22. This genetic disorder often causes benign tumors to develop on the balance nerves on both sides of the head. More often than not, acoustic neuromas are classified as sporadic, meaning their exact cause is unknown. There is some evidence of a connection between exposure to low-dose radiation of the head and neck during childhood and the development of acoustic neuromas. There are no known risk factors for acoustic neuromas other than having a parent with NF2. If this is the case, children have a 50 percent chance of inheriting the condition themselves. What Are the Symptoms of Acoustic Neuromas? Acoustic neuromas, sometimes called vestibular schwannomas, usually grow very slowly (or not at all). Because of this, symptoms early on are often difficult to spot. You may notice gradual hearing loss that is sometimes accompanied by tinnitus. If the tumor continues to grow, additional symptoms are likely to develop. These include dizziness and vertigo, facial numbness and weakness, a tingling sensation in the face, changes in taste, hoarseness, difficulty swallowing, headaches and confusion. Early diagnosis and treatment can help prevent more serious symptoms. How Are Acoustic Neuromas Treated? Your otolaryngologist can diagnose an acoustic neuroma primarily through a review of your symptoms in conjunction with a hearing test and imaging scans (CT or MRI). Because growth of the tumor is usually very slow, many times your doctor will simply want to monitor the tumor’s progress over time, especially when few symptoms are present. Regular imaging tests every six to 12 months can track any growth. Surgery may be an option for tumors that are growing or causing symptoms. Gamma Knife radiosurgery delivers radiation without the need for an incision, but results can take a long time. More invasive surgery may be required, especially if your tumor is growing close to the brain or facial nerve. In addition to pain and discomfort, a middle ear infection can cause tiny air cells in the mastoid bone to fill up with pus. As the infection spreads, potentially reaching the brain, the bone is destroyed, resulting in hearing loss. If antibiotics are unsuccessful in clearing up the infection, then mastoid surgery may be needed. Mastoiditis Causes & Symptoms The medical term for infection of the mastoid cells is mastoiditis. The condition affects children more often than adults since they are most prone to middle ear infections, but can strike adults on occasion. Bacteria migrate from the middle ear to the air cells of the mastoid bone, which are essential for proper drainage of fluid. Cholesteatoma, a type of skin cyst, can also prevent the ear from draining properly leading to mastoiditis. Symptoms of mastoiditis include swelling, redness, and tenderness of the ear lobe and area behind the ear as well as drainage of fluids from the ear, fever, irritability and lethargy. Mastoiditis Diagnosis & Treatment Mastoiditis can cause serious – even life-threatening – health complications if untreated, so proper diagnosis is a crucial first step toward recovery. Our doctor will examine your ears with an otoscope, looking for signs of infection. Diagnostic tests such as a CT scan or MRI may be administered to help rule out other conditions. Many cases of mastoiditis are treated successfully with antibiotics. Chronic cases may require frequent visits for thorough ear cleanings. When antibiotics fail to treat the problem adequately, or it recurs frequently, surgery may be necessary. Mastoid surgery, or mastoidectomy, involves drilling a hole in the mastoid bone and removing the infected air cells. This procedure is performed under general anesthesia, and many patients return home later the same day. Afterwards, your ears will be bandaged, and there may be stitches. You might experience headaches, discomfort and numbness. You’ll likely be prescribed pain medication and antibiotics, and will need to return after a few days to have your bandages and stitches removed. You’ll need to keep your ear free of water, and avoid strenuous activity or anything that might create pressure on your ear (e.g. airplane travel). Complications are rare, but might include facial nerve paralysis, sensorineural hearing loss, vertigo, tinnitus, and a change in taste. Cholesteatoma is an abnormal skin growth in the middle ear behind the eardrum that may also affect the mastoid (skull bone). It begins as a cyst that gradually increases in size, destroying the bones of the middle ear and causing hearing loss. What Causes Cholesteatoma? When the Eustachian tube is functioning normally, it equalizes ear pressure by moving air from the back of the throat into the middle ear. Allergies and viruses can affect performance, leading to a partial vacuum in the ear. This negative pressure stretches the eardrum, creating a pocket or cyst that fills with old skin cells and waste material, which can become easily infected. In rare cases, cholesteatoma can be congenital (present at birth). What Are the Symptoms of Cholesteatoma? Symptoms of cholesteatoma include drainage from the ear, a feeling of fullness, hearing loss, earache and dizziness. Since these are also present in other conditions, tests such as CT scans and electronystagmography can be used to rule out other conditions and confirm the diagnosis. Cholesteatomas continue to grow if not treated and can lead to complications such as: - Facial paralysis. - Brain abscess. How Is Cholesteatoma Treated? An otolaryngologist will determine the size and growth rate of the cholesteatoma and recommend treatment based on these findings. Controlling the infection with antibiotics or eardrops is a crucial first step. If you have a large cholesteatoma it may be treated surgically. Performed under general anesthesia on an outpatient basis, the cholesteatoma is removed in order to eliminate the infection. Follow-up surgery to ensure the cholesteatoma is gone and to reconstruct damaged middle ear bones may be necessary. Otosclerosis is an abnormal growth of bone in the middle ear that causes hearing loss. It typically begins in the early 20s, and is the leading cause of middle ear hearing loss in young adults. What Causes Otosclerosis? The exact cause of otosclerosis is not known, but evidence suggests a genetic link passed down from parent to child. Middle-aged Caucasian women are most at risk, and hormonal changes seem to be a contributing factor including pregnancy and menopause. This bone growth usually occurs around the stapes bone in the middle ear, preventing it from moving freely, essential to proper hearing. What Are the Symptoms of Otosclerosis? Gradually worsening hearing loss is the primary symptom of otosclerosis. It may begin with an inability to hear low-pitched sounds or whispers. Other symptoms may include vertigo or dizziness and tinnitus (ringing in the ears). How is Otosclerosis Treated? The symptoms of otosclerosis are like those of other conditions, so a thorough examination by an otolaryngologist is essential in ruling out other problems and diagnosing the disease. A hearing test will usually show signs of conductive hearing loss in the lower frequency tones, a hallmark of otosclerosis. Mild cases of otosclerosis can be corrected with a hearing aid designed to amplify sounds. Orally ingested sodium fluoride has been shown to slow the progression of the disease, and may be an option. In more advanced cases, a surgical procedure known as a stapedectomy is often performed. In this surgery, part or all of the affected stapes bone is removed and replaced with a prosthetic device that enables the bones of the middle ear to resume movement, allowing sound waves to reach the inner ear, improving or restoring hearing. There are inherent risks in any surgery, but left untreated, otosclerosis will only get worse. Speak to your doctor about the best treatment options for your hearing loss.
<urn:uuid:8adae2ce-b610-4cae-86ab-28b49f727c22>
CC-MAIN-2020-50
https://mwent.net/ent/ear/surgery/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141716970.77/warc/CC-MAIN-20201202205758-20201202235758-00534.warc.gz
en
0.922814
1,818
3.28125
3
2.030956
2
Moderate reasoning
Health
Scientists found pensioners aged 75 or over who like a daily pint or glass of wine are helping to stave off senility. Those who drink alcohol are 30 per cent less likely to develop dementia and 40 per cent less likely to suffer Alzheimer's than those who were teetotal, according to the research. A study of more than 3,200 German people aged 75 or over attending GPs, who were free of dementia, were studied and checked 18 months and three years later. Associations between alcohol consumption, type of alcohol – wine, beer, mixed alcohol beverages – and incident dementia were examined. "People should be aware that we are talking about mild/moderate consumption of alcohol," said Professor Siegfried Weyerer from the Central Institute of Mental Health in Mannheim, Germany. "There is no doubt that long-term alcohol abuse is detrimental to memory function and can cause neurodegenerative disease." Of 3,202 volunteers free of dementia at the start, 217 went on to suffer from it later on. But those consuming alcohol had approximately 30 per cent less overall dementia and 40 per cent less suffered Alzheimer's disease than did non-drinking subjects. "No significant differences were seen according to the type of alcoholic beverage consumed," said the report. "Overall, these results are similar to several previous studies in the very elderly and suggest that moderate drinking is associated with less dementia, even among individuals aged 75 and older." The authors conclusions suggests that light to moderate alcohol consumption is inversely related to incident dementia, also among individuals aged 75 years and older. In the last 31 years the association between moderate alcohol intake and cognitive function has been investigated in 71 studies comprising 153,856 men and women from various populations with various drinking patterns. Most studies showed an association between light to moderate alcohol consumption and better cognitive function and reduced risk of dementia, including vascular dementia and Alzheimer dementia. Commenting on the results Doctor Harvey Finkel, of Boston University Medical Centre in the United States, said: "The badge of age is not a warning label of fragility. "While, I believe, one should not start to drink just because one has attained seniority, neither must one stop. "Elderly folks handle alcohol with more responsibility than do the young, and they may derive greater health benefits from moderate drinking. Age is not a reason for abstinence." The study was published in the journal Age and Ageing.
<urn:uuid:7ebc7890-6bf9-434b-8ff6-711a522973bd>
CC-MAIN-2014-35
http://www.telegraph.co.uk/health/healthnews/8529097/Moderate-drinking-in-old-protects-against-dementia.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924131.19/warc/CC-MAIN-20140901014524-00047-ip-10-180-136-8.ec2.internal.warc.gz
en
0.964359
502
2.53125
3
2.839722
3
Strong reasoning
Health
While there are many effects of soft water on hair, two of the most noticeable pertain to cleanliness and overall texture and feel. “Soft” water is water that is generally low in calcium, and this characteristic often leads to increased lather and better bubbles from shampoo and other cleansing products. Hair often gets a lot cleaner as a result, since the shampoo is able to more deeply penetrate each strand. Deep cleaning can strip some of the hair’s essential oils away, though, which can lead to locks that look listless, flat, or dull. Many people also find that their hair lacks body or volume under these circumstances. Styling products and tools can often overcome these effects, but getting the right coif often takes a bit of time and experimentation. Understanding Water Softness Whether water is classified as soft or hard mainly depends on its measured calcium content. Basically, the higher the calcium content, the harder the water. Soft water tends to be found in places with low levels of limestone deposits or in residences where water softeners or filters are installed. In addition to hair, the chemical composition of water can also impact things like dishwashing, appliance maintenance, and erosion. It’s usually somewhat difficult to taste a difference in drinking water, but both are usually safe to consume. The biggest contrasts come with respect to how they interact with different substances and whether they leave a residue. Calcium content is typically measured in parts per million. To be considered soft water, less than 160 parts per million of calcium must be present. For slightly hard water, the acceptable range is 160 to 320 parts per million, and anything over 460 parts per million is considered very hard. In addition to calcium, other minerals such as magnesium and manganese are also present in hard water, although in minimal amounts. The calcium content in water naturally rises wherever significant amounts of limestone are found in the ground. Impact on Shampoo One of the biggest and usually also one of the most noticeable effects of soft water on hair has to do with how well shampoos perform, and how clean the hair actually gets as a result. People who lather their hair with soft water often see more bubbles than they would in more calcium-rich water, in part because the calcium ions tend to bind to the shampoo as well as the hair, reducing the foam that ultimately results. Bathers using soft water typically don’t have to use much cleanser, since a little really will go a long way. Natural soaps, such as Castile soap, tend to leave a residue behind after washing that makes the hair look stringy and greasy when washed in hard water. Under these circumstances, using soft water on hair proves superior, as all residue is easily rinsed away. As people migrated to increasingly urban areas and in many cases lost ready access to soft water, manufacturers began coming up with alternative cleaning agents, such as sodium lauryl sulfate, to make their products react well under hard water conditions. Otherwise, the only options available would be to purchase water softeners or shower filters to soften the hard water so it would clean more effectively. Shine and Body Despite having better cleaning properties, using soft water for hair washing has its drawbacks. Putting the effects of cleaning agents aside, using soft water tends to make hair appear flat and lifeless. While using soft water on hair is helpful in washing away unwanted residue and buildup, factors such as shine and body tend to be sacrificed. There’s also some controversy when it comes to how clean hair really needs to be, or even how clean it should be. Soft water often leads to hair that is literally “squeaky clean,” since the chemical composition of the water usually strips out almost all oils and residues. This can cause the strands to make a slight squeaking or high-pitched sound when they’re rubbed against each other. While this can be good when it comes to removing the effects of styling products, it can be bad where natural oils are concerned. Most experts agree that some natural build-up is healthy, and can actually prevent strands from damage. Solutions and Work-Arounds People using soft water often end up using volumizing styling products to give their hair additional body and bounce. Heated tools like blow driers, curling irons, and straighteners can also be helpful, and certain gels and creams can restore lost shine. Whether people prefer using soft or hard water usually depends on personal preferences and what they're used to, and there are pros and cons each way.
<urn:uuid:f64a658d-7093-4608-a11c-3523891e8290>
CC-MAIN-2014-41
http://www.wisegeek.com/what-are-the-effects-of-soft-water-on-hair.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663754.0/warc/CC-MAIN-20140930004103-00011-ip-10-234-18-248.ec2.internal.warc.gz
en
0.966188
938
2.9375
3
2.198332
2
Moderate reasoning
Fashion & Beauty
Symptoms & Diagnosis The symptoms caused by a brain tumor depend on where the tumor formed in the brain, the functions controlled by that part of the brain, and the size of the tumor. Headaches and other symptoms may be caused by adult brain tumors, but other conditions may cause the same symptoms. A doctor should be consulted if any of the following problems occur: - Nausea or vomiting - Changes in speech, vision or hearing - Problems balancing or walking - Changes in mood, personality or ability to concentrate - Problems with memory - Muscle jerking or twitching (seizures or convulsions) - Numbness or tingling in the arms or legs - Headaches (usually worse in the morning) Doctors use many tests to diagnose a brain tumor, determine the type of brain tumor, and learn if it has metastasized (spread). A biopsy is usually required to diagnose the type of brain tumor. In addition to asking for a detailed medical history and doing a physical examination, your doctor may recommend the following tests: Computed Tomography (CT Scan) A CT scan produces a series of detailed, two-dimensional images of the brain created by a computer linked to an x-ray machine. The patient lies on a sliding table that's guided into what looks like a small tunnel where the images are taken. A special dye may be injected into a patient's vein to provide better detail. A CT scan is painless and generally takes less than 10 minutes. Magnetic Resonance Imaging (MRI) MRI is a procedure that uses a magnet, radio waves and a computer to produce detailed pictures of the brain and spinal cord. It the most important imaging technique for brain tumors. Northwestern Medicine and the Malnati Brain Tumor Institute offers specialized applications of MRI imaging, including: - MRI Spectroscopy - MRI Spectroscopy combines MR imaging and chemical analysis of the brain's chemistry. This procedure can be used to grade tumors and assist the surgeon in localizing the optimal place for a biopsy if a tumor cannot be removed. - MR perfusion - MR perfusion assesses the patient's blood flow and can assist in grading tumors and identifying the best place for a biopsy. - Functional MRI - Functional MRI is used to determine what parts of the brain "light up" when functions such as speech or recognition are engaged, thereby minimizing the chance of injury to these areas. - Diffusion Tensor Imaging - Diffusion Tensor Imaging provides detailed information about the motor or visual fibers in the brain, again helping to minimize injury when tumors are near these areas. Positron Emission Tomography (PET) PET is a procedure in which a small amount of radioactive glucose (sugar) is injected into a vein, and a scanner is used to make detailed, computerized pictures of areas inside the body where the glucose is used. Dye injected into the bloodstream during an angiogram flows into the blood vessels in the brain to make them show up on an x-ray. If a tumor is present, the doctor may be able to see it on the x-ray. Removal of tissue to look for tumor cells is called a biopsy. The sample removed from the biopsy is analyzed by a pathologist (a doctor who specializes in interpreting laboratory tests and evaluating cells, tissues, and organs to diagnose disease). A biopsy can show cancer, tissue changes that may lead to cancer, and other conditions, and is the only definitive way a brain cancer diagnosis can be made. A cerebral angiogram, also called a cerebral arteriogram, is an x-ray, or series of x-rays, of the head that shows the arteries in the brain. X-rays are taken after a special dye is injected into the main arteries of the patient's head. Some types of brain tumors cause calcium deposits in the brain or changes in the bones of the skull. With an x-ray, your doctor can check for these changes. Your doctor may remove a sample of cerebrospinal fluid (the fluid that fills the spaces in and around the brain and spinal cord). This procedure is performed with local anesthesia. The doctor uses a long, thin needle to remove fluid from the spinal column. A spinal tap takes about 30 minutes. The patient must lie flat for several hours afterward to keep from getting a headache. A laboratory checks the fluid for cancer cells or other signs of problems.
<urn:uuid:3f3d1219-69b2-4083-8604-c43014b8b2ca>
CC-MAIN-2019-13
https://www.feinberg.northwestern.edu/sites/brain-tumor/about-brain-and-spinal-tumors/symptoms-diagnosis.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204736.6/warc/CC-MAIN-20190325234449-20190326020449-00250.warc.gz
en
0.900105
920
3.1875
3
1.608476
2
Moderate reasoning
Health
Concepts and Elements of Science Fiction in TV and Films Computers In Science Fiction: The Basics Computers In Science Fiction: Classic Movies | Computers in Science Fiction: Contemporary Movies | Computers In Science Fiction: TV | Computers In Science Fiction: Novels and Short Stories Androids in Science Fiction | Cyborgs in Science Fiction This entry is an exploration of the evolution of robots in science fiction and has been ordered chronologically. There is a separate entry on Androids in Science Fiction, the distinguishing difference being that androids are built to resemble humans (having humanoid bodies), whereas robots are not necessarily so (having odd shaped bodies, or being too small to be human. This entry is not intended to be a complete list of all androids in science fiction, rather a guide to show how they have evolved over time, as humans have learnt about robotics and computing. Rossum's Universal Robots (1920) This play, published in 1920, would at first glance appear to be nothing more than a 'Man builds robots - Robots destroy mankind - Robots take over the world' story, but there is much more to it than that. Written by Karel Capek, whose brother Josef, also a respected Czech writer, coined the phrase 'robot' from the Czech word robota means 'drudgery' or 'servitude' (a robotnik is a peasant or serf). The play centres on whether the robots, made by the RUR company, have souls. They exhibit certain features that make some people want to free them. To answer the question, some robots are modified to allow their soul to develop. The creator of them questions this move when he makes Robotess, a beautiful but useless robot. If she were to 'wake up', she would hate him for making her so beautiful, yet giving her a body that cannot know love or give birth. Eventually one of the modified robots issues the command: 'Robots of the world, you are ordered to exterminate the human race. . . Work must not cease!' At which point the robots kill humanity. Nature eventually re-emerges triumphant when two Robots (the beautiful but otherwise useless Robotess, and Primus) fall in love. The play ends on an uplifting, religious note. Alquist (the last living human) blesses the lovers, renames them Adam and Eve, and sends them out to avoid the sins that destroyed their predecessors. Gort - The Day The Earth Stood Still (1951) The Day The Earth Stood Still1 is a science fiction classic. It was made when most sci-fi movies were about evil aliens (read: Communists) trying to take over the Earth (read: America and the Western world), yet this film was refreshingly different. A traveller from outer space arrives on Earth with his robotic companion Gort. He plans to warn humanity about toying with nuclear weapons and that war would not be tolerated if humanity wanted to take part in intergalactic exploration and communication2. Unfortunately a panicky soldier shoots the traveller and Gort starts attacking. Gort's primary function is to protect and serve his master. Gort does not display overt intelligence, but he is capable of understanding spoken commands. The main point in the story is the female lead telling Gort: Klaatu Barada Nikto which presumably means 'Stop blowing things up.' The Gort suit was made of two overlapping suits to give a seamless look. It also made it very heavy, and in some scenes it is possible to see the actor swaying about as the suit's weight affects his balance. Asimov's Robots (1954 - 1992) Asimov wrote many stories about robots, far too many to list them all here, but the two most commonly referenced and most highly regarded works are The Naked Sun and I, Robot, a collection of short stories. The Naked Sun is a murder-mystery set off-world. The basic plot is that a prominent scientist is brutally murdered in his home, surrounded by robots that must not allow any harm to come to him. The only witness to the murder is a robot that can no longer function and has been destroyed. The only other human on the estate is his wife, a woman he can barely stand to be with. The final scene is when all the suspects are rounded up in the library and the detective reveals who killed the scientist and how. The I, Robot series of stories features several classics of science fiction. The story Runaround is a masterpiece of science fiction. It involves two astronauts and a robot stationed on Mercury. They send it out to collect selenium from the sun side3. The robot becomes stuck in a logic loop, due to the three laws of robotics trapped between the second law (requiring him to obey orders) and the third law (which insure self preservation). The essence is that it is overheating. As it overheats, it aborts and turns around, heading back to the base, but on the way, it cools down, the self preservation mechanism turns off and it resumes its course. It is trapped in this logical loop. It is an interesting story because Asimov (who invented the three laws) is showing that they can cause problems. Little Lost Robot deals with a robot that is told to 'get lost' and being a robot, it obeys in a very clever way. Evidence and its sequel The Evitable Conflict feature a character called Steven Beyerly. In the first story he is a politician and is accused of being a robot, the second concerns a conspiracy that the machines (computers with positronic brains) are firing robot-hostile managers and replacing them with more friendly managers. One common theme that Asimov uses time and again is how the robots are not just in the society, but are part of the society. They are everywhere; One cannot swing a dead cat without hitting a robot or finding the robot programmed to swing the dead cat. Another common theme is that of a human making a flippant or poorly thought out remark to a robot, who then obeys and does something stupid, but in a clever, robotic way. But possibly the most interesting concept is in Catch That Rabbit which involves a lazy robot that only works if it is being watched. Asimov was great at introducing human concepts like sloth and boredom to robots, something few other authors had done previously. Asimov invented the word 'robotic' and the principle of 'robotics'. Few authors can claim to have invented a word which went into common usage. Other robot characters are R Daneel Olivaw in the Robot novels and some of the Foundation novels and R Landar in The Naked Sun. Asimov also wrote a lot of android stories. See Androids in Science Fiction for more information. For those who are interested, Asimov.com holds a wealth of information of Asimov's work. Robbie - The Forbidden Planet (1956) Perhaps the most famous of all science fiction robots, Robbie was built by professor Morbius on Altair IV, otherwise known as The Forbidden Planet. He was used as a household servant, and is programmed with Asimov's Laws of Robotics, in fact he nearly burns out while trying to kill the monster, as he must obey the order but also must not kill living things. He also makes dresses for Altaira, Morbius's daughter. Robbie has a human personality, though he does not possess emotions. He is conversant in 188 languages and has an internal chemical analyser. He can synthesise almost any chemical required. He is one of science fiction's most beloved robots, and manages to look almost cute, even though he is a huge black lumbering monolith of a robot. As the robot suit was so expensive to build at the time, it was re-used as often as possible in several other science fiction films. Many people recognise a similarity between this Robbie and the Robbie in Lost in Space, and in one notable episode of the family sci-fi series, Robbie made a guest appearance. They are indeed reasonably similar. Both look far too awkward to be of any real use in building things, or repairing spacecraft. K9 - Doctor Who (1977) K9 is a computerised robot dog that was a faithful 'second-best friend' to Doctor Who for one of his incarnations, the fourth (Tom Baker). K9 made his first television appearance in the 1977 story 'The Invisible Enemy'. The first K9 was created in the 50th century by Professor Marius of the Bi-Al Foundation. At the end of the story, Marius gave K9 to the Doctor as a gift because Marius was going back to Earth and couldn't take K9 with him. K9 Mark 1's last appearance was on 'Invasion of Time' and stayed on the Doctor's home planet of Gallifrey with the Doctor's companion Leela. He now works with the Chancellery Guards on Gallifrey. K9 Mark 2's first appearance was in the following story 'The Ribos Operation'. This K9 was built by the Doctor himself and he made some improvements on the original, making it smarter, more humorous, and (slightly) more mobile than the old one. This version stayed with the Doctor up until the 1981 adventure 'Warrior's Gate' when it remained with Romana, another companion of the Doctor's who had decided to leave his side and set off on her own travels. During the time the Doctor had K9 Mark 2, he built a third one and gave him to an previous companion, Sarah Jane Smith. K9 Mark 3 made his first and only appearance in a one-off Christmas special called K9 and Company. Though it was hoped the special might lead to a full series, it was not to be. However, he made a cameo in a later episode of Doctor Who, 'The Five Doctors' (1983). K9 is an ever faithful companion to the Doctor, a sort of mobile computer, able to perform complex calculations and provide the Doctor with a new viewpoint to a problem. K9 does think and wishes that the Doctor would install a SREMEC, or self righting mechanism, which is something he lacks. In the novelisation of one story, we are party to K9's thoughts: I'm on my side. On a conveyor belt. Heading towards a furnace. And I can't self right. Oh well, nothing to do but wait for the Doctor to rescue me. K-9 can also defend himself with a laser mounted in his nose and has advanced sensors. Twiki - Buck Rogers in the 25th Century (1977) The cute little robot from Buck Rogers in the 25th Century who was the personal assistant of Dr Theopolis, a computer professor who was housed in a plastic box. Felix Silla played the body of Twiki, Mel Blanc provided the voice, which was a series of 'beedly beedly beddlies'. Only Dr Theopolis could translate for him. Buck befriends Twiki and later he either develops or is given better vocal capabilities. The last season also starred Jeff David as the voice of Crichton, a more advanced robot built by Dr Goodfellow, who was so smart, he refused to believe that a human had built him. More information at Buck-Rogers.com. R2-D2 - Star Wars (1977) R2-D2, pronounced Artoo-Detoo, and shortening to R2 (Artoo) is an astromech droid and made his first appearance in Star Wars (also known as 'Episode IV: A New Hope'), the first Star Wars movie made. He is a great starship mechanic and computer interface specialist and some have likened him to a futuristic Swiss army knife. His lifelong friend, C-3PO is never far from him throughout the films. they argue constantly, and R2 is not immune to mistakes, he turns up the heating in Princess Leia's chambers on the frozen world of Hoth, thus flooding the room and mistook a power outlet for a computer terminal which resulted in an electrical shock. An astromech droid's first function is the repair and maintenance of a starship, whether it is a cruiser, like Queen Amidala's royal starship or a starfighter, like a N-1 (the kind Anakin flew in Episode I) or an X-Wing. R2-D2 seems to have a taste for adventure and danger, in opposition to C-3PO's downright cowardice. R2 always manages to persuade him. Like Twiki, he cannot be understood without an interpreter. C-3PO: No, I don't think he likes you. C-3PO: No, I don't like you either. R2-D2's owners have been: Naboo Royal Fleet (Queen Amidala - Episodes I & II), Royal House of Alderaan (Leia's family - Episode IV), Owen Lars (Luke's uncle - Episode IV) and Luke Skywalker4 (Episode IV - VI). It is assumed he was constructed on Naboo, as no prior information about him is available. His silver head is in keeping with the Naboo design tastes of the time. More information on R2-D2 is available in his Star Wars.com Biography. 'I, Robot' - The Outer Limits (1998) A particularly brilliant episode from the revival of the classic 1960s anthology series sees Leonard Nimoy as a defence attorney for Adam, a robot, who is accused of killing his creator when he tries to convert Adam to military use. The episode is about Adam fighting for the right to be tried as a human. Adam's lawyer successfully argues that Adam is sentient and believes they have a good case for acquittal because Adam's creator had inserted a 'blocker' that inhibits Adam's programming, effectively bypassing his safeties, which include the preservation of human life. Adam was, therefore, not of sound mind and judgement at the time of the murder. However, the lawyer is the subject of an attempted murder by a van driver, and Adam is destroyed saving him. It is then that the lawyer realises the real value of a human life, the ability to sacrifice yourself for others. The story, although not based on any of his stories, draws heavily from Asimov's work.
<urn:uuid:cd200468-9ff2-4253-bf38-5cc9bd81732c>
CC-MAIN-2017-51
https://h2g2.com/edited_entry/A1106687
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544677.45/warc/CC-MAIN-20171214144324-20171214164324-00586.warc.gz
en
0.968289
2,980
2.6875
3
2.796672
3
Strong reasoning
Science & Tech.
Statute law and common law are the two types of laws in Australia. Statute law refers to the legislation passed in parliament. Upon approval by parliament, statute law becomes common law. Common law emanates from the judiciary, and they are laws passed by juries and judges. Australia's legal system was basically adopted from the British legal system along with common law. Most countries use Civil Law, but Common Law is used in England (Not all of the UK!), the United States, Canada, Australia, Ireland and India. Australia's legal system is based on the British legal system (as Australia is a commonwealth country). This is a distinctly different system than that originating from the Roman empire; the Civil law system. It should be noted that these SYSTEMS are different from the CATEGORIES of law in Australia; common law and civil law. For this purpose, common law refers to the law of the courts made by judges through precedent. Civil law is the type of law between individuals and citizens, as opposed to criminal law where it is the individual v the state. The parliament is responsible for statutory law making. The judiciary is responsible for making common law or 'judge-made law'. Law Council of Australia was created in 1933. The Australian Federal and State Police act as Law Enforcement agencies. The Australian Court System (judiciary) interpret statutory law and enforce Common Law. Parliament and the Gov.General develop Statutory Law. what does australia have in common with georgia Common law was law that applied to everyone. The adversarial system is inherently a trait of the common law system of England. Australia is member of the Commonwealth and was settled by the British Empire. When this occurred Australia automatically inherited British law under the doctrine of reception. So, to answer the question, the adversarial system has been used in Australia since British settlement in 1788. This is opposed to the inquisitorial system arising from Roman law and ancestry. how does the common law relate to the law in Ghana No. Connecticut does not recognize common law marriage.No. Connecticut does not recognize common law marriage.No. Connecticut does not recognize common law marriage.No. Connecticut does not recognize common law marriage. Euclyptus is most common plant in Australia. US common law formed from English common law English is the common language throughout Australia. Although Australia has no "official" language, English is the default language in Australia. It's not. Common law is suprior to statute law. The common law was created by what does australia and egypt have in common US common law formed from English common law. Australia was in many ways still part of the British legal system until the Australia Act was passed in 1986. This Act of the Commonwealth Parliament gave Australia essentially political and legal independence. This question, however, can only be answered with knowledge of Australia's past. Australia was established as a British Colony when the first fleet was sent and it was ruled that Australia was Terra Nulluis, meaning it was land belonging to no one. Immediately (according to the doctrine of reception) British laws applied to all of the Empires subjects and other primitives inhabiting the land. It is because of this doctrine of reception that Australia has typically adopted the British Common law system of law. Sharia law is not followed in Australia, and is viewed as barbaric and highly frowned upon. Common laws can only be made by the federal government. Only if the legal legislation is passed by both upper and lowers houses and by the senate. An example of common law would be a common law marriage. A common-law marriage occurs when a marriage is valid by both parties but not registered in a church registry. what are the laws on common law marriage in the philippines
<urn:uuid:5dccc441-5981-4397-8ef9-8ade42d02bf5>
CC-MAIN-2021-25
https://www.answers.com/Q/What_is_common_law_in_australia
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487613453.9/warc/CC-MAIN-20210614201339-20210614231339-00113.warc.gz
en
0.976566
782
3.453125
3
2.024594
2
Moderate reasoning
Crime & Law
Things fall apart by Chinua Achebe How and why is a social group represented in a particular way?. Things Fall Apart by the Nigerian author, Chinua Achebe, perfectly illustrates the collapse of the Igbo society and people during the british colonization of Nigeria in the early twentieth century. The author’s motif, the proper telling of the confound and inaccurate portrayal of the africans during the racist colonial era, was perfectly executed, presenting idyllic and faithful elements of the Igbo culture and customs. As a Nigerian writer himself, Achebe creates tereotypical characters for the colonialists, or «white men» as referred to in the book. The Igbo however are illustrated as complex individuals rather than savages, as depicted in alternate books on related subjects. Rather than examining the way the author’s background influences the way the natives are portrayed in the novel, I intend to consider how it represents the british colonialists in an unfavorable manner. More importantly, how the author’s perspective influences the way the the «white man» is represented and perceived, despite the third person narration. ! As previously stated, the story is being told from an external narrator, also known as a non-focalized point of view. This indicates that the reader has access to the thoughts, experiences and feelings of certain characters in the novel, these are the reflector characters. Okonkwo, for example, is a perfect illustration of a reflector character. The author has the authority to inform the reader about his past, story and even thoughts. Considering that an external narrator is not given a specific character, it is assumed to be a neutral voice that is simply telling a story as it is. Hence, the voice is, more often than not, viewed as void to any particular characteristics or notions. In Things Fall Apart, the narrator’s own personality begins to take over and obtrude the reading of the story. This is termed a dramatized narrator and is usually based on the author’s perceptive, whether it is the author’s intentions to do so or not. In the case of this novel by Achebe, the third person omniscient narrative tends to give the author flexibility in the distribution of knowledge and judgment. Does that give the author’s perspective opportunity to rise up into the novel and take control of the portrayal of each character? There is an obvious conflict between the Igbo and the colonialists throughout the entire book. The author, coming from a Nigerian background himself, clearly sides with his people as undeniably apparent in, not only the way they are viewed by Okonkwo, but let alone by the way they are referred to as «The White Man». In a conversation between Okonkwo and Obierika, there are several accusations against the religious new arrivals.! “Does the white man understand our custom about land? ” “How can he when he does not even speak our tongue? But he says that our customs are bad; nd our own brothers who have taken up his religion also say that our customs are bad. [… ]We were amused at his foolishness and allowed him to stay. Now he has won our brothers, and our clan can no longer act like one. He has a put a knife on the things that held us together and we have fallen apart. ” (Chapter 20) In this particular exchange, Obierika seems to voice Chinua Achebe’s own position on colonialism. Granted, we must also point out that the blame is not wholly on the side of the white man for Obierika also mentions the irrationality and weakness of their own «brothers» who have onverted to Christianity. Though the blame is a more complex assessment, the author condemns the white man for his disrespect of Igbo culture and traditions. This essential quotation represents the first mention of «things falling apart» in the book by that same title. This responsibility is put on the «white man», a nickname impoverishing the colonialists once more. As well as the nickname, the word «foolishness» is employed to further humiliate the religious men that have demounted the clan.. This fiction, based on the true story of the British colonization of Nigeria, is meant to isplay the collapse of many Igbo clans and customs after the arrival of Christianity. The barrier of this new religion, the white man, carried a majority of the blame for «things falling apart», despite the many other factors that took the blame throughout the story. Nonetheless the major conflict is between the Igbo people, namely Okonkwo, and the men converting his brothers to another, unfamiliar religion. For this reason, one party to the conflict must be confounded. Seeing that the book is written with a Nigerian Point of view, the opposing party will hold the blame and be represented as the adversary. The colonialists are then represented in a villainous way, rival to the story. The reader then finds it easy to side with the Igbo, which is one of Chinua Achebe’s motif for this novel, the proper telling of Nigerian side on the colonialist era.. There are many reasons as to why the white men are represented in a particular way throughout the book. I have mentioned how both the author’s perspective and background as well as the importance of having a conflict in which the reader can side with the protagonist can influence portrayal in the book. In order for Chinua Achebe to perfectly illustrate the collapse of he Igbo people during the british colonization of Nigeria, a social group must be denounced. For the simple reason that the author, therefore point of view, sides with the Igbo, the colonialists will be represented in an unfavorable manner.. !. Word count: 920 words. !. !. !. !. !. !. !. Bibliography:. “‘Things Fall Apart’ Quotes. ” About. com Classic Literature. N. p., n. d. Web. http:www. shmoop. comthings-fall-apartfate-free-will-quotes-5. html. SparkNotes. SparkNotes, n. d. Web. https:www. sparknotes. comlitthingsquotes. html. “Things Fall Apart Summary and Analysis. Things Fall Apart Study Guide: Summary and Analysis of Chapters 1-5. N. p., n. d. Web. http:www. gradesaver. comthings-fall-apartstudy-guidesection1. “Things Fall Apart Quotes. ” By Chinua Achebe. N. p., n. d. Web. http:www. goodreads. comworkquotes825843-things-fall-apart. “‘Things Fall Apart’ Quotes. ” About. com Classic Literature. N. p., n. d. Web. http:classiclit. about. comodthingsfallapartachebeaaa_thingsquotes. htm. “Narrative Point of View. ” Narrative Point of View. N. p., n. d. Web. http:www. qcc. mass. edubooth255ptview. html. !
<urn:uuid:78cc713f-ed68-4fee-b2ef-022e0124fb56>
CC-MAIN-2023-06
https://freebooksummary.com/things-fall-apart-by-chinua-achebe-how-39729
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00799.warc.gz
en
0.940934
1,513
3.578125
4
2.98871
3
Strong reasoning
Literature
The thought of living a healthy lifestyle sounds great but can also seem time-consuming and challenging, especially to parents. However, the increase of obesity and the decline of physical activity has received widespread attention in the last few years, for good reason. In fact, 13.7 million children and adolescents (ages 2 to 19) are obese. As the concern regarding obesity in both childhood and adulthood is on the rise, it is crucial to educate children about healthy choices and get them excited about making such decisions independently. Although, we must not only ensure that we are promoting our child’s physical health but keep our own health in mind as well. The Rise of Obesity In 2018, the U.S. government issued fitness guidelines for an age group never given guidelines before. These guidelines were for children ages 3 to 5 and expressed children in that age group should be engaged in active play for at least 3 hours a day. Ultimately, individuals of all age groups tend to spend most of their time completing sedentary activities, either sitting in front of the computer or watching television. In 2016, about 62% of children ages five to eleven spent two or more hours watching television or videos every day. It is crucial that parents pay attention to how much time their children spend with technology in comparison to their time on other activities. Children are not the only age group that is not getting their recommended amount of physical activity each day. Currently, more than 23% of adults and 80% of adolescents are not getting a sufficient amount of physical activity. As the issue of a lack of physical activity affects all age groups, the best way to change this trend is to work together to improve. Although many may know that they need to make healthier choices, they tend to be aware that they will struggle to stick to better physical habits. As a result, some adults look to find a friend who has similar weight loss goals to workout with at the gym. In some cases, this will motivate both individuals to exercise more. Therefore, if you are thinking about getting your child involved in a sport, look to find friends with children of a similar age range who can sign up for the same activity. This might motivate your child to want to go to the activity because they get to see their friends. The easiest way to stick to better habits is to work together to improve physical health as a family. For example, aim to eat a healthy dinner each night or take a walk together. It is easiest to avoid temptation and stick to eating healthy meals if everyone adjusts to eating healthier together. It is particularly important that adults begin teaching children about healthy habits as children who are overweight/obese are likely to be overweight/obese into adulthood. Additionally, there are several other negative health effects that result from being overweight/obese and not getting enough physical activity. Some of the negative effects resulting from obesity include diabetes, cardiovascular disease, cancer and high blood pressure. By educating children about the importance of a balanced diet and physical activity, adults can have a long lasting impact on the child’s behaviors. Furthermore, if parents are to get involved in their child’s healthy habits early on, they can save them from serious medical problems in the future. 5 Tips for Physical Wellness It is easy to find excuses why now is not the best time to think about altering such behavior. However, as May is physical wellness month, it is a perfect time to transition into talking to your child about how they can become healthier. 1) Start With Small Changes The idea of making a lifestyle change can be both overwhelming and exciting. Although it is easy to find motivation in the beginning, many struggle to incorporate new habits into their daily life in the long term. One of the best ways to get on the right track with adapting to a new routine is to implement changes slowly. First, consider thinking of ways to incorporate physical activity into your day that won’t alter your established routines drastically. This includes thinking about things such as where you drive to that you can instead walk or take a bike ride to with your child. This will not only make a new habit easier to incorporate but will give ideas on other simple ways to make changes. Another way to implement changes slowly is instead of starting by expecting yourself to provide three healthy meals for your family a day, start with one. If you are going to begin exercising, start by just taking a walk ten to fifteen minutes a day and increase gradually. This will likely keep you from feeling overwhelmed and thinking that the new habit takes up too much time and energy. One way to eliminate some of the stress of getting your family to live a healthier lifestyle is to ask for help. For example, get your child involved in the decision-making to help establish new habits. If it is a nice day outside, ask them if they would rather take a bike ride or take a walk. This will help your child look forward to the activity because they had a choice. 2) Take a “T.V. Timeout” How many hours does your child sit in front of the television or computer or spend scrolling on their phone per day? The negative effects of screen time on children has been thoroughly discussed and studied, especially recently. Though the advancement of technology assists busy parents who use it as a distraction or a “pacifier” for their children, it negatively impacts the advancement and health of children in several ways. It has been reported that too much screen time can affect a child’s social skills, fine motor skills as well as emotional skills. Although not everyone agrees about the negative effects that screen time has on children, screens do tend to keep people from being active. As mentioned above, new guidelines on physical activity have recently been given for children that are ages 3 to 5. These guidelines are focused on the belief that children need to get better sleep and have more time for play as opposed to spending time sitting and watching screens. One way that children can get better sleep is by not being on technology close to bedtime. Overall, children will get better sleep when they use their energy throughout the day instead of being at rest with sedentary activities. If your child is used to a lot of television time, they can be very hesitant towards getting away from technology to exercise, especially in the beginning. If the thought of limiting your child’s television time at first seems impossible, first work physical activity into your child’s screen time. For example, if they are watching television, have them do exercises during the commercials. Parents can either have their children do a list or choose one exercise such as jumping jacks that they must do until their show comes back on the television. This will not only get them up from the couch and doing something physically active, but will give their eyes a rest from looking at the screen in some cases. In fact, to help eye strain, those who are using the computer should take a 20-second break every 20 minutes. By encouraging physical activity, you can help your child to prevent eye strain as well, no matter what device they are using for entertainment. One of the primary things to think about when encouraging your child’s physical wellness is to think about their food choices. Both adults and children alike will often sit down to watch television with their favorite snack. While this can make the activity more enjoyable, it is highly not recommended for many reasons. One reason is that as children and adults become interested in what they are watching, they may become engrossed in the program and there is a likelihood that they may eat more than necessary. 3) Focus on Individual Interests What activities do you find it is easiest to get your child to do? It is most likely the activities that they have the most fun doing. Therefore, if you want your child to enjoy being active, think about their personality and interests. - Is your child highly competitive? - Do they enjoy playing on a team sport? - Would they rather play baseball or basketball? What about both? This can be one of the most important things that determine your child’s future interest in physical activities. If they enjoy what they are doing, they are more likely to complete the physical activity on their own. Similarly, if they feel that their teammates don’t think they play well, they will instead find comfort in being in front of the television. If you decide getting your child involved in team sports is the best way to get your child engaged in physical activity, be aware of your own attitudes. While it is easy to get carried away, stress should not be placed on winning the game. What matters most is that your child is trying their best, having fun and developing skills. This will keep your child excited about engaging in the activity because they won’t feel pressured to perform well. Also, think about ask your child what activities they can come up with to get themselves up and moving. This will give you a list to work through with possible ideas, especially when your child is bored. 4) Discuss the Changing Habits How often do you take the time to talk to your child about making healthy diet choices or staying active? You are most likely familiar with telling your child to do something and then them asking why. It is necessary to discuss with your children why they should do things that you want them to do, so that they understand why it is important. While sometimes it can be difficult to explain to your child why, the importance of eating healthy and exercising is crucial to go in depth about. Once you come to the conclusion that a healthier lifestyle is necessary for your family, have an open discussion about why. If you have a younger child, you can start off a discussion with something basic, such as : - “We need to eat healthier and exercise so that we can live longer.” - “We need to eat more vegetables because they give us energy. The energy you’ll gain from eating vegetables will help you perform well in your soccer game.” - “We need to drink more milk because it has calcium and calcium helps with strong bones.” For older children, explain certain benefits of different physical activities and different fruits / vegetables. - “We need to eat more broccoli because it has calcium which helps us develop strong bones.” - “We are going to take walks more because walking will help make our hearts strong.” - “Make sure you eat all your celery - it helps you get the water you need daily.” Another way to educate older children or gauge their knowledge is by asking if they know of other benefits that certain fruits/vegetables can bring them. For example, “what other vegetables do people eat that give them the calcium that they need?” Overall, talk to your child about a balanced diet such as by discussing with your child the impact of eating a lot of sweets or drinking too many sugary drinks. By discussing the subject, they will come to know why their diet needs to be that way. 5) Let Your Child Experiment For some parents, it is easy to figure out what activities their child will like or dislike, especially if they are older. But if that isn't an easy question to answer for you, it is nothing to be ashamed about. Instead, take this as an opportunity to learn more about your child and experiment. Consider looking into park district classes in the local community and have your child experience a few different things. Be open to what your child wants to do but pick out some things as well so that they can have a lot of different experiences. If this doesn’t fit your budget, look for parents with children of similar ages and having them spending time playing outside to see what your child gravitates toward or avoids. Most importantly, make the experience of trying new activities, choosing different foods and learning about the importance of fruits and vegetables as well as a good diet fun. If you tend to buy the same things at the grocery store, consider changing up your shopping list (especially if most of the “healthy” foods go uneaten in your house). If your family does not eat fruit often, think about trying a fruit which no one has tried before. A curiosity regarding the taste might be enough to make family members consider eating that fruit. Occasionally choosing to pick out a new fruit or vegetable at the grocery store can make the thought of eating well exciting. Let your child take the responsibility of picking out something new for the family to eat. This will increase their excitement because they get to select what looks interesting to them which in turn increases their sense of independence and decision-making skills. Ultimately, if your family might be apprehensive to try something new, the best way to make sure what you purchase doesn't go to waste is to look up recipes which incorporate the new fruit/vegetable you decide to buy. One method that you can use to motivate your child at the grocery store is to have them find something of a specific color, as different colored fruits have different benefits. For example, oranges have vitamin A which helps keep the immune system functioning so there is a less likelihood of getting sick. When parents give their children the ability to make decisions regarding their own physical wellness and make it fun, children may be less resistant. By working together to become more active, we will become healthier individuals and happier families. - - - - - Sarah Strobel is a Play Coordinator and Staff Writer for the Children's Museum in Oak Lawn. Contact her at [email protected].
<urn:uuid:0e861cf8-f715-4ade-850a-630f5ab504c3>
CC-MAIN-2023-14
https://www.cmoaklawn.org/blog/archives/05-2019
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00440.warc.gz
en
0.971998
2,797
3.359375
3
2.621197
3
Strong reasoning
Health
Multiway Degree-Day Calculator View or download multiple degree-day accumulations for up to 24 locations in Wisconsin. You may replace the default set of commonly-used parameters with your own. Click the "-" button to remove an existing set, and the "+" button to add a new one. For each set: - Select the method: - "Simple": the daily average temperature [(max - min) / 2.0] minus base temperature, with a floor of 0 - "Sine": calculates a sinewave approximation of the temperature - "Modified": coerces min and max to within the base and upper threshold values, then performs a "Simple" calculation. - Enter the base temperature (and for the "sine" and "modified" methods, the upper-threshold temperature) - Enter the date range (default: Jan. 1 to today). More information on Degree Days Degree days totalize the amount of heat available above a threshold temperature since a given day. The number of degree days accumulated over some period of time is often related to the phenological development of plants and insects, and so can be used to estimate when pests will be at a life stage vulnerable to control. The base, or lower threshold temperature is that below which the organism does not grow or develop. The cap, or upper threshold is the maximum temperature at which organismal development occurs. Some specific examples can be found at our European Corn Borer and Alfalfa weevil web pages. For more information, see: - Degree Day Concepts (UC-Davis) - Weather and Modeling (UC-Davis) (has videos on how to use DD). - Cullen Field Crop Entomology Lab (UW-Madison) Note: These parameters are usually specific for a particular crop and pest. Make sure you are using the right ones for your particular situation. Some values for common pests in our area are listed below. |Pest||Method||Base Temp||Upper Temp||Biofix| |Apple Scab||Simple||32F||None||Bud break| |Alfalfa Weevil (DD Map)||Sine||48F||86F||January 1| |Cabbage Maggot||Simple||43F||None||January 1| |Colorado Potato Beetle||Simple||52F||None||When eggs are first scouted| |Common Asparagus Beetle||Simple||50F||None||January 1| |Corn plant development (DD Map)||Modified||50F||86F||Emergence| |Corn Rootworm Adults||Simple||50F||None||January 1| |Cranberry plant development DD Map||Modified||45F||86F||Ice off| |European Corn Borer (DD Map) (Sweet corn, Field corn) |Seedcorn Maggot (DD Map) (Beet, Cole crops, Potato) |Imported Cabbageworm||Simple||50F||None||January 1| |Onion Maggot||Simple||40F||None||January 1| |Squash Vine Borer||Simple||50F||None||January 1| |Stalk Borer (DD Map) (Sweet Corn, Field Corn, Potato, Snap Bean) |Tree and shrub pests (DD Map)||Modified||50F||86F||January 1| |Western Bean Cutworm (More information)||Simple||50F||May 1|
<urn:uuid:f5d9ab80-4e45-4e2b-858b-85360b41e3b8>
CC-MAIN-2015-11
http://agwx.soils.wisc.edu/uwex_agwx/thermal_models/many_degree_days_for_date
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464123.82/warc/CC-MAIN-20150226074104-00063-ip-10-28-5-156.ec2.internal.warc.gz
en
0.756184
739
2.578125
3
2.214612
2
Moderate reasoning
Science & Tech.
The cashew apple is the fleshy portion of the cashew fruit attached to the cashew nut. In botanical terms, the cashew apple is an accessory fruit that grows on the cashew seed (which is the nut). The cashew apple can be consumed fresh, cooked in curries, or turned into vinegar, as well as an alcoholic drink. It is also used to make preserves, chutneys, and jams in some countries such as India and Brazil. In many countries, especially in South America, the cashew apple is used to flavor drinks, both alcoholic and nonalcoholic. Cashew nuts are more popularly traded than cashew apples, because the apple, unlike the nut, is simply bruised and has a very limited shelf life. Cashew apple juice, however, may be used for manufacturing blended juices. Health Benefits Cashew Apple - Helps treatment of Diabetes - Enhance Heart Functioning - Keeps the brain healthy and enhances its functionality - Prevent Gallstones in the body - Great for Preventing Cancer - Helps blood flow - Helps in Weight Loss (Treats Obesity) - Enhances Eye Health and Vision Clarity - Keeps the Blood Healthy - Keeps the Hair Shiny - Catalyst for Digestion - Keeps the skin fresh and healthy - Strengthen and tones Bones - Keeps the Teeth and Gums healthy - Great for Preventing Headaches Minerals found in Cashew Apple According to a study carried out by R. Bhakyaraj and K. Singaravadive, The cashew tree (Anacardium occidentale L.) is a tropical tree native of Brazil and is being widely grown in India, East Africa and Vietnam (Muniz et al., 2006). The main product from the cashew tree is cashew nut (true fruit), which is rich in fat and protein. After picking the nut from the peduncle (cashew apple-pseudo fruit) (Garruti et al., 2006) cashew apple becomes biowaste. The cashew apple is used as a treatment for chronic dysentery and for sore throat in Cuba and in Brazil (Morton, 1987). Most of the fruit by-products could be used as functional ingredients when designing healthy foods, especially non-digestible carbohydrates (dietary fiber) and bioactive compounds (ascorbic acid and flavonoids) (Laufenberg et al., 2003). The cashew apple juice was found to contain a total of nine minerals at different levels. Minerals like magnesium, sodium, iron, calcium, copper, sodium, and zinc were also present at a significant level of 279.70, 204, 133.9, 80.42, 1.17, 204.0, and 16.48 ppm, respectively in cashew apple juice (Table 1). Among the various minerals, potassium was observed at a high level (3337 ppm) followed by phosphorous (440.20 ppm). Potassium (K) is a very essential element to prevent bone demineralization which is by controlling calcium loss in the urine (Tucker et al., 1999; He and MacGregor, 2001). Nagaraja (2009) also reported that some varieties of cashew apple are rich in potassium. Copper is an essential and beneficial element in human metabolism and the average daily dietary requirement for copper in the adult human has been estimated as 2 mg and for infants and children at 0.05 mg kg-1 b.wt. (Browning, 1969; WHO, 2004). The NRC (1980) reported that safe and adequate daily dietary intake of copper ranging from 0.5-0.7 mg day-1 for infants of 6 months age or less up to 2-3 mg day-1 for adults. The copper content of 1.07 ppm observed in the cashew apple juice is within the safe prescribed limits of infants. Sodium is the principal extracellular cation and is used for osmoregulation in the intermodular fluid of the human body. The recommended daily allowance of sodium is 115-75000 ppm for infants, 324-975 mg kg-1 for children, and 1100-3300 ppm for adults (Crook, 2006). Enzymes are involved in macronutrient metabolism and cell replications are mainly Zn dependent (Hays and Swenson, 1985; Arinola, 2008). Zinc is widely distributed in plant and animal tissues and present in all living cells. In cashew apple juice 16.48 ppm of Zinc was observed. Magnesium is an active element in several enzyme systems in which thymine pyrophosphate is a cofactor. Oxidative phosphorylation is greatly reduced in the absence of magnesium. It also activates pyruvic acid carboxylase, pyruvic acid oxidase, and the condensing enzyme for the reactions in the citric acid cycle (Murray et al., 2000). Even though the value obtained in the cashew apple juice is low as compared to the standard value, it can be used as natural sources of minerals with other food and beverages to rectify the child malnutrition. The cashew apple color varied from bright red, orange, or yellow with a soft and fibrous fleshy. As variations in minerals and other nutrient content of apples are observed, in the present study, cashew apple available in the southern part of India are analyzed for minerals and bioactive compounds.
<urn:uuid:2cc6000c-7282-45be-915d-7d64be343819>
CC-MAIN-2020-45
https://myhealthpost.com/benefits-cashew-apple/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876500.43/warc/CC-MAIN-20201021122208-20201021152208-00336.warc.gz
en
0.932043
1,129
3.203125
3
2.064615
2
Moderate reasoning
Health