fineweb
Collection
8 items
β’
Updated
text
stringlengths 166
634k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
The opinions expressed by columnists are their own and do not represent our advertisers
Monday, July 04, 2016
When the Revolutionary War came to Norfolk
The Revolutionary War comes to Norfolk
Fall of 1775
Virginia is under the control of the Colonial Governor Lord Dunmore, who was using Norfolk as his land base of operations in the region. The population of Norfolk, once the largest borough in the province, has been greatly reduced. Patriots are leaving to join the militia and their families are scattering to nearby counties for safety.
Norfolkβs printing press seized
John Holt, a printer and editor of a local newspaper, uses his publication to urge the remaining citizens of Norfolk to fight for their liberties and to put up a struggle against Lord Dunmore. In late September 1775, Dunmore sends his troops to Norfolk and seizes Holtβs printing press. In response to the citizens who protest the act, Dunmore states, βI could not have done the people a greater service than by depriving them of the means of having their minds poisoned and of exciting in them the spirit of rebellion and sedition.β
British routed at battle of Great bridge
December 9, 1775
The British engage in battle against the patriots, attempting to gain control of the village of Great Bridge in Norfolk County. When they lose to the Americans, the Brits retreat to their ships anchored in the Norfolk harbor. Hundreds of Tory sympathizers from Norfolk and the adjoining areas also take shelter aboard the ships. The borough of Norfolk is now under the control of Virginia forces. | <urn:uuid:46145728-6519-48c4-8b1c-0721ff1a1635> | {
"dump": "CC-MAIN-2019-51",
"url": "http://sbynews.blogspot.com/2016/07/when-revolutionary-war-came-to-norfolk.html",
"date": "2019-12-10T23:07:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529006.88/warc/CC-MAIN-20191210205200-20191210233200-00159.warc.gz",
"language": "en",
"language_score": 0.9682015776634216,
"token_count": 321,
"score": 3.125,
"int_score": 3
} |
Care at CNSO β Understanding Sciatica
he sciatic nerve is a large cable of nerves formed by smaller nerve roots that merge together after exiting the lumbar spine (lower back). Within the sciatic nerve, electrical information travels back and forth between your spinal cord and your legs, allowing your brain to control leg muscles, and to receive sensory information from the joints, tissues, and skin of the legs.
The term βsciaticaβ refers to unpleasant sensations in the leg caused by pinching of one of the nerve roots in the lumbar spine (lower back) that make up the sciatic nerve. These sensations, such as numbness, tingling, or pain, are typically felt along the back and sides of the leg, often including the feet, along the pathway of the sciatic nerve. In severe cases, sciatica can be more than just pain, and can include weakness of muscles in the leg.
The most common cause of sciatica is wear and tear (arthritis) of the joints and ligaments in the lumbar spine. As these arthritic joints become misshapen, or lose their alignment, they can cause pressure on nearby nerves traveling within the spinal column, that make up the sciatic nerve.
Approximately 2-5% of the general population will experience sciatica at some point. However, certain individuals are at higher risk. Risk factors include advanced arthritis in the spine, family history, tobacco use, frequent trauma (collision sports), heavy labor, obesity, and sedentary lifestyle.
Most cases of sciatica are not severe, and are self-limited. Symptoms will usually resolve by 6 to 8 weeks. Unfortunately, patients who have experienced sciatica once are likely to experience symptoms again unless certain preventive measures are taken. Usually, this means eliminating risk factors such as obesity and tobacco use, engaging in routine and frequent core exercises, and observing proper postural techniques at all times.
When treatment is required, it is crucially important to seek the help of experienced, qualified spine specialists who prioritize conservative care over surgical intervention. These specialists must understand the complexities of diagnosing sciatica, especially because very few of a patientβs sciatica complaints can be measured. Leg pain can have a great many causes, such as hip or knee arthritis, or muscle injuries that have nothing to do with the spine. To further complicate matters, sciatica can never be diagnosed by Xray or MRI alone, because most adults, after the age of 35, have abnormal findings on MRI that are incidental, and do not cause symptoms (beware of doctors who provide remote MRI reviews).
A spine specialist evaluating your sciatica must be willing to spend a great deal of time listening to you in order to gather clues about where your pain is coming from. He or she must also ask a lot of questions: Where is the pain located and where does it travel? What type of pain is it? What brings on the pain? What positions make you feel better? Finally, he or she must conduct a detailed physical and neurological examination that differentially focuses on the possible pain generators. It is only then that the spine specialist can determine whether your leg pain represents sciatica, from a pinched nerve in the spine, or from another source.
This is an important point to make. The primary reason that spine patients become dissatisfied by treatment results is not the quality of treatment, but rather the accuracy of the initial diagnosis. For instance, a patient may undergo well-executed discectomy surgery for a herniated disc, but still have the same leg pain postoperatively. Why? It is not because the surgery went badly. Rather, it is because the disc herniation seen on MRI was an incidental finding (remember, most adults have painless abnormalities on MRI), and was not responsible for their leg pain. An inflamed sacroiliac joint caused the leg pain instead, for instance, or piriformis muscle in spasm, or even a bone spur in the hip. In any event, the patient could have avoided unnecessary spine surgery if enough time had been taken to establish an accurate diagnosis prior to treatment. This initial step should never be rushed.
Once an accurate diagnosis has been made, appropriate treatment can be started. Up to 95% of sciatica patients will return to normal activity without surgery. The body has a remarkable capacity for healing, and the role of your spine specialist is to guide you through this process quickly, and prevent future recurrences of symptoms.
For the rare patients who do need injections or surgery to regain normal function, the spine specialists must have a broad range of skills, from minimally invasive techniques to more extensive procedures, and a proven record of technical mastery, to assure optimal results. You owe it to yourself to get treated by the best spine specialists in the field.
It is a common symptom, as nearly 3 million Americans suffer each year from sciatic nerve pain.
NJβs Only Comprehensive, Multidisciplinary Facility to Alleviate Sciatica
The dedicated surgical and non-surgical team at Centers for Neurosurgery, Spine, and Orthopedics (CNSO) understands how neck, back, and sciatica problems can impact daily life. By working with leading board-certified neurosurgeons, orthopedic spine surgeons, interventional pain management physicians, physiatrists, rehabilitation specialists, and certified physical therapists, patients will receive comprehensive and coordinated care, so they can resume a healthy, less painful lifestyle free from disability. CNSO offers multiple convenient locations spanning across northern New Jersey, including Bergen, Passaic, Essex, Morris, and Hudson counties. Northern NJ patients can learn more about effectively treating sciatica pain by contacting the doctors at CNSO today. | <urn:uuid:3c783224-9194-4165-b6ff-e8e1bc2b588f> | {
"dump": "CC-MAIN-2020-34",
"url": "https://www.cnsomd.com/surgery-conditions/degenerative-spine-conditions/sciatica/",
"date": "2020-08-14T20:32:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739370.8/warc/CC-MAIN-20200814190500-20200814220500-00483.warc.gz",
"language": "en",
"language_score": 0.9493768811225891,
"token_count": 1193,
"score": 3.109375,
"int_score": 3
} |
The characteristics of wind profiles in a neutral atmospheric boundary layer and their dependence on the geostrophic wind speed Ug, Coriolis parameter f, and surface roughness length z0 are examined utilizing large-eddy simulations. These simulations produce a constant momentum flux layer and a log-law layer above the surface characterized by a logarithmic increase of wind speed with height. The von KΓ‘rmΓ‘n constant derived from the mean wind profile is around 0.4 over a wide range of control parameters. The depths of the simulated boundary layer, constant-flux layer, and surface log-law layer tend to increase with the wind speed and decrease with an increasing Coriolis parameter. Immediately above the surface log-law layer, a second log-law layer has been identified from these simulations. The depth of this upper log-law layer is comparable to its counterpart in the surface layer, and the wind speed can be scaled as , as opposed to just in the surface log-law layer, implying that in addition to surface processes, the upper log-law layer is also influenced by Earthβs rotation and large-scale conditions. Here is the friction velocity at the surface, and h is the boundary layer depth. An analytical model is proposed to assist in the interpretation of the log laws in a typical Ekman boundary layer. The physics and implications of the upper log-law layer are discussed.
In a neutral atmospheric Ekman boundary layer, there exists a log-law layer above the surface in which the mean horizontal wind speed increases logarithmically with the vertical distance from the surface, namely,
where U is the mean horizontal wind component in the surface stress direction (or wind speed), z is the vertical distance from the surface, z0 is the surface roughness length, is the surface friction velocity, is the surface stress, is the air density, and is the von KΓ‘rmΓ‘n constant. The so-called log law or law of the wall for pipe flow and channel flow was first proposed by Prandtl (1925) based on the mixing-length concept, later by von KΓ‘rmΓ‘n (1930) through similarity theory, by Millikan (1938) through asymptotic matching, by Buschmann and Gad-el Hak (2007) based on dimensional analysis, and by George and Castillo (1997) through asymptotic analysis of highβReynolds number flows. In a seminal paper, Monin and Obukhov (1954) generalized the mixing-length theory and log law for a neutral surface layer to stable and convective conditions by hypothesizing that mean profiles of wind speed, temperature, and other scalars in the surface layer, when properly normalized, are universal functions of the dimensionless height (i.e., z normalized by the Obukhov length, a stability-based length scale). This theory, later known as MoninβObukhov similarity theory, is generally supported by field observations over a homogeneous land surface (e.g., Businger et al. 1971) and is widely recognized as a cornerstone of modern micrometeorology (e.g., Foken 2006).
For a steady atmospheric Ekman boundary layer (EBL), the equations of motion can be written as (e.g., Tennekes 1973),
where U and V are the mean horizontal wind components, Ug and Vg are the corresponding geostrophic wind components, f is the Coriolis parameter, represent the turbulent wind components, and (, ) denote the vertical fluxes of the horizontal momentum components. The only external nondimensional parameter for this system is the surface Rossby number , where is the geostrophic wind speed. According to Blackadar and Tennekes (1968) and Tennekes (1973), in an atmospheric boundary layer (ABL), , and the system [(2) and (3)] admits two self-similar solutions (often referred to as Rossby similarity). Near the surface , and to the first order of approximation, one obtains
and in the outer layer, where , the wind profile can be asymptotically written as
where Fs and (Fx, Fy) denote well-behaved universal functions of the nondimensional altitude z/z0 and , respectively. Solution (4) suggests that the momentum flux is asymptotically constant in the surface layer (Blackadar and Tennekes 1968; Wyngaard 2010), which is also referred to as the constant-flux (CFLX) layer (Fig. 1). Tennekes (1973) suggests that the log law is valid in both the surface (i.e., constant flux) layer and beyond. The log-law layer is also referred to as a matching layer, overlap layer, or inertial sublayer (Blackadar and Tennekes 1968). However, their analysis cannot provide an upper limit for the vertical extent of the constant-flux layer or the log-law layer. Nevertheless, both the constant-flux and log-law layers in the atmospheric EBL have been documented by numerous field observations. The observed log-law layers in a neutral atmosphere range from dozens of meters to more than a 100 m. For example, observations of wind speed over homogenous surfaces under smallβRichardson number (i.e., nearly neutral) conditions by Carl et al. (1973; 150-m tower) found no significant deviations from logarithmic profiles up to 150 m. Similarly, Horiguchi et al. (2012; 213-m tower) found that under neutral conditions and with an average wind speed of 12.2 m sβ1 aloft, the observed wind speed increases with height logarithmically up to 150 m above the ground. Over the past three decades, the log-law layer has been reproduced numerically using direct numerical simulation (DNS) or large-eddy simulation (LES) codes. In DNS studies, the Reynolds number (Re) is usually substantially smaller than that for a typical atmospheric boundary layer flow (Re ~ 105β1010) as a result of the limitation in computing power [e.g., Re is equal to 1000 in Coleman (1999) and 5200 in Lee and Moser (2015)]. LES codes have problems resolving processes near the ground surface, where the scale of dominant eddies, comparable to the vertical distance from the surface, becomes too small to be well resolved. The LES-simulated mean winds tend to deviate from the well-established log-law profile near the surface as a result of the imperfection of subgrid-scale (SGS) models, a problem known as βovershootβ or βmismatchβ (Mason and Thomson 1992). This was especially a problem historically, when the LES model resolutions were much coarser. For example, Cai and Steyn (1996) find that their simulated von KΓ‘rmΓ‘n constant is dependent on the βSmagorinsky-Model Reynolds number,β which is a function of the model grid spacings, instead of a universal constant. With horizontal grid spacings between 20 and 60 m, the largest they obtained is 0.35, which is substantially smaller than the widely accepted value of 0.4. In the past 25 years, this issue has been addressed by several studies using different SGS models (e.g., Sullivan et al. 1994; Wyngaard et al. 1998; Chow et al. 2005; Brasseur and Wei 2010; Stoll and PortΓ©-Agel 2006; Kawai and Larsson 2012).
Solutions (5) and (6), also known as the velocity defect law, are valid for the outer Ekman layer. The vertical variation of the horizontal winds in an Ekman layer can also be obtained by analytically or numerically solving (2) and (3) with additional assumptions about the momentum fluxes. For example, in K theory, the momentum fluxes are assumed to be proportional to the vertical gradient of the mean wind components, that is, , where the eddy viscosity Km is constant with height or is an analytical function of z (Holton 1992). In addition, the characteristics of an EBL have been examined in a laboratory (e.g., Howroyd and Slawson 1975) and numerically using LES or DNS codes (Coleman et al. 1990; Zikanov et al. 2003). Overall, the outer EBL receives much less attention than the surface layer. This is largely due to the great importance of the surface layer, which governs the airβland, airβsea, or airβice interaction processes, and is most relevant to our daily life. Practically, there are much fewer traditional observations of the outer EBL, which is beyond the range of most meteorological towers. Also, unlike the surface layer, which is predominantly influenced by surface processes, there is additional complexity in an outer layer associated with the impact from surface processes, Earthβs rotation, and boundary layer (BL) top entrainment.
The objective of this study is to advance our understanding of the vertical wind variation in a neutral Ekman boundary layer, including both the surface layer and the outer EBL, using LESs. Particularly, the existence and implications of an elevated log-law layer, located above the surface layer (Fig. 1), are investigated. Besides the scientific merit, there are emerging demands for better understanding of the EBL winds beyond the surface layer. One such example is modern offshore wind turbines, which have hub heights and rotor diameters exceeding 100 m. Therefore, an accurate prediction of winds well above the surface layer is crucial for the wind turbine output power assessment (Jiang et al. 2008).
The remainder of this paper is organized as follows. The LES code and model configuration are described in section 2. The results from the LESs are presented in section 3. Section 4 contains a derivation of an analytical model that predicts both the lower and upper log-law layers. The results and discoveries are summarized in section 5.
2. Model configuration
In the large-eddy simulation code used in this study, the three-dimensional Boussinesq equations (e.g., Moeng 1984; Sullivan et al. 2014) are integrated forward using a third-order RungeβKutta scheme. The equations are discretized with a pseudospectral method in the horizontal coordinates (i.e., x and y) and a second-order finite-difference scheme in the vertical coordinate (i.e., z), with an SGS model outlined by Moeng and Wyngaard (1988). A further description of the numerical details of this model can be found in Sullivan et al. (2014). For the simulations presented in this study, there are 256 Γ 256 grid points in the horizontal directions with periodic boundary conditions applied along the lateral boundaries and 160 grid points in the vertical direction. The horizontal grid spacing varies between 2 and 16 m in group A simulations and is 4 m in the rest. The model top is located at 1950 m, where a radiation boundary condition is applied (Klemp and Durran 1983). The minimal grid spacing is at the first model level, and the vertical grid spacing increases gradually with altitude following , where i is the vertical model level index and is a constant stretching factor. The model is initialized with a unidirectional vertically uniform wind , where the geostrophic wind speed Ug is 5 or 10 m sβ1. The free atmosphere is in geostrophic balance with a constant Coriolis parameter f = 10β4 or 2 Γ 10β4 sβ1. The atmosphere is neutrally stratified (i.e., ) throughout the domain, and there is no sensible heat flux at the surface. The use of a neutral atmosphere has the advantage of avoiding additional complexity associated with the negative buoyancy flux in the upper portion of the BL, which introduces additional control parameters. This simplification allows us to minimize the number of control parameters to three (i.e., surface roughness length, geostrophic wind speed, and the Coriolis parameter) and to focus on the characteristics of a rotational shear boundary layer. Additional simulations have been carried out to test the sensitivity of the characteristics of the simulated EBL to the domain size with 512 Γ 512 horizontal grid points (i.e., 2.048 Γ 2.048 km2) and a deeper domain (i.e., 3 km with the number of vertical model levels increased to 256). We find that the turbulence statistics and the simulated mean profiles exhibit little sensitivity to the domain size changes (not shown).
The surface stress is computed by applying the similarity theory to the first model level with a specified surface roughness length z0 which varies from simulation to simulation. The model time step is limited by the CourantβFriedrichsβLewy (CFL) condition, and the CFL number is calculated from the ratio between the horizontal (vertical) grid spacing and the maximum horizontal (vertical) wind speed. The proper time step can be calculated for a given maximum CFL number, which is set to be 0.3 for this study, that is, , where and denote the horizontal and vertical grid spacings, respectively. The resulting time step varies with the model grid spacings and wind speed.
For each simulation the model is integrated to t = 12 h, corresponding to the nondimensional time and 8.64 for f = 10β4 and 2 Γ 10β4 sβ1, respectively. Inspection of the temporal evolution of domain-averaged variables such as the surface stress, boundary layer height, and vertically integrated turbulence kinetic energy (not shown) indicates that variations in these domain-averaged variables with time become very slow by 12 h, much slower than those in the first 4 h (Fig. 2), suggesting that a quasi-equilibrium Ekman boundary layer has been established. It is noteworthy that, strictly speaking, the BL is not in equilibrium, as the horizontal winds in the BL still rotate slowly associated with inertial oscillations [e.g., Fig. 3 in Andren et al. (1994)], the damping of which may take multiple inertial periods (inertial period ~17.5 h, for f = 10β4 sβ1). On the other hand, for ft > 2, neither the surface stress nor the BL height exhibits any noticeable oscillation (Fig. 2), suggesting that the impact of inertial oscillations on the BL height, surface-layer characteristics, and the vertically integrated BL turbulence kinetic energy (not shown) is negligible. Unless otherwise noted, the mean profiles presented in this study are averaged horizontally across the model domain and over the last hour (i.e., between 11 and 12 h).
Four groups of simulations have been carried out to explore the characteristics of the Ekman boundary layer over a range of control parameters (i.e., Ug, f, and z0). The geostrophic wind is oriented along the x direction (i.e., G = Ug and Vg =0). The model configuration and the control parameters are listed in Tables 1β4, and the results are summarized in sections 3aβc.
a. Sensitivity of simulated Ekman boundary layer to the model resolution
A number of simulations have been performed to examine the sensitivity of the simulated EBL to the model horizontal and vertical grid spacings as well as the domain size. The results from a group of five simulations (i.e., group A) are presented here with an emphasis on the model skill in reproducing the well-established logarithmic wind profiles (i.e., log law) in the surface layer, and the simulated von KΓ‘rmΓ‘n constant. The control parameters for group A simulations are Ug = 5 m sβ1, f = 10β4 sβ1, and z0 = 2 Γ 10β4 m. The model grid spacings vary from simulation to simulation (Table 1). Some parameters derived from the group A simulations are listed in Table 1, and the results are summarized in Figs. 3β5.
It is evident that these simulations capture the salient features of a typical Ekman BL, such as Ekman spirals (i.e., the clockwise rotation of the wind direction with height), strong vertical shear in the surface layer, and a supergeostrophic jet in the upper portion of the boundary layer (Fig. 3). The supergeostrophic jet becomes consistently lower and stronger with the decrease of the horizontal grid spacing . The resolved turbulence kinetic energy (TKE) is characterized by a maximum in the surface layer and a rapid decrease with height aloft (Fig. 3c). In general the TKE maximum becomes systematically larger and exhibits faster decay with height in the simulation with a finer horizontal grid spacing. We define the top of the EBL as the level where the TKE reduces to 5% of its maximum near the surface. The derived BL depth decreases substantially as the horizontal grid spacing decreases from 16 (i.e., A1) to 4 m (i.e., A4). The decrease of the BL depth is much less pronounced from A4 to A5 (i.e., decreases from 4 to 2 m), implying that the simulated BL depth tends to converge as the model horizontal grid spacing consistently decreases.
The mean wind speed and momentum flux profiles are shown in Fig. 4 with the vertical distance from the surface z in a logarithmic scale. Between approximately 20 and 80 m, the wind speed increases nearly linearly with log(z) (Fig. 4a, the segment indicated by the bold line), suggesting the existence of a log-law layer below 80 m. The total x momentum fluxes (i.e., sum of the resolved and SGS fluxes) normalized by their corresponding surface stresses are shown in Fig. 4b with the normalized SGS fluxes (dashed curves) included for comparison. The total flux profiles exhibit little discrepancy between simulations. Regardless of the model grid spacings, there appears to be a nearly constant-flux layer in all the simulations. If one defines the depth of the constant-flux layer Zcflx as the depth over which the total momentum flux variation is less than 10% (Glickman 2000), then we have Zcflx = 26 Β± 2 m for the simulations in group A, which is relatively insensitive to the model grid spacing. As expected the parameterized (i.e., SGS) flux dominates near the surface and decreases sharply with the vertical distance from the surface. As the model horizontal grid spacing decreases from 16 to 4 m, the SGS fraction of the momentum flux decreases substantially (e.g., near the bottom, the SGS contribution decreases from 85% for A1 to 45% for A5), implying that a larger percentage of turbulence is resolved around the first model level. The fraction of the SGS flux decreases faster with the vertical distance from the surface in simulations with finer horizontal grid spacings. We define an SGS buffer layer as the layer where the SGS flux accounts for 10% or more in the total flux (Cai and Steyn 1996), above which energy-containing eddies are considered to be properly resolved. The depth of the SGS buffer layer Zb estimated from the group A simulations is listed in Table 1. As expected the SGS buffer layer consistently becomes thinner as the horizontal resolution increases and is relatively insensitive to the variation in vertical grid spacings (comparing A2 and A3). Near the surface the characteristic size of the energetic eddies scales with the vertical distance from the surface z (Prandtl 1925). According to the Nyquist theorem, the model grid spacing should be at least less than half the characteristic length to be resolved, that is, . More generally, we can write , and the constant coefficient is likely dependent on the SGS model. For example, is used in Senocak et al. (2007). For this group of simulations, the SGS buffer layer depth is approximately proportional to the horizontal grid spacing with .
We are more interested in the mean profiles above the SGS buffer layer, where the turbulence is explicitly resolved by the LES code. Specifically, we seek answers to the following questions: 1) Is this LES code capable of producing a log-law layer above the SGS buffer layer? 2) If it is, can the logarithmic profile be used to retrieve the surface friction velocity or von KΓ‘rmΓ‘n constant? 3) Is the surface roughness length retrieved from the log-law fitting (i.e., z10, referred to as the effective surface roughness length) consistent with the specified value?
Inspection of the mean wind profiles indicates that there exists a well-defined logarithmic layer approximately between Zb, the top of the SGS buffer layer, and ~80 m above the surface (i.e., the top of the lower log-law layer, denoted as ZLL). It is noteworthy that the log-law layer is substantially deeper than the constant-flux layer, which is consistent with the scaling argument in Blackadar and Tennekes (1968) and Tennekes (1973). Next, we perform the linear regression between the wind speed and ln(z) using the data points at each model level between Zb and ZLL for every simulation in group A. While the SGS buffer layer top Zb can be conveniently determined from the momentum flux profiles, the choice of ZLL is less straightforward without the benefit of any guidance from existing studies. Here ZLL is estimated using a trial-and-error approach, based on the assumption that the wind speed at the model levels within the log-law layer is better linearly correlated with smaller standard deviations. Specifically, we start with a first-guess ZLL based on visual inspection of the semilogarithmic wind profile and perform linear regression for the segment between Zb and ZLL. We increase the upper limit for the regression range (i.e., ZLL) gradually until the t value for the slope from the linear regression falls under the threshold value of 100. The obtained ZLL is rounded to the nearest 10 m. It is worth noting that the threshold t value used in this study is rather large and that the coefficient of determination (i.e., square of the correlation coefficient) for the linear regression is larger than 0.99 (i.e., the linear regression accounts for more than 99% of the variances).
The wind speed in the log-law layer can be written as , where the slope of the best-fit line and the intercept with W = 0 correspond to and , respectively. Here and denote the von KΓ‘rmΓ‘n constant and effective surface roughness length derived from the linear fitting, respectively. The wind speed W is used as an approximation of the wind component along the surface stress direction, as the change in the wind direction in the surface layer is usually negligible. The two parameters, and , obtained from the linear regression are listed in Table 1 for the simulations in group A. For A1, the simulated von KΓ‘rmΓ‘n constant is noticeably smaller than 0.4, and the effective surface roughness length is larger than the specified one. As the model resolution increases, converges toward 0.4 and decreases correspondingly toward z0, the specified surface roughness length. For A5, the simulation with the finest grid spacing, we have and . Also included in Table 1 is the percentage difference between the 10-m wind speed from the LES run and its counterpart derived from log law using , , and z0. It is evident that the 10-m wind speed predicted by the log law is stronger than that derived from the corresponding LES. The difference is less than 10%, and it consistently decreases with the increase in the model resolution (Table 1). The existence of the SGS buffer and log-law layers is also evident in Fig. 5, which shows the wind speed normalized by the corresponding log-law prediction, that is, as a function of the vertical distance z. Here is computed using the surface friction velocity and the derived surface roughness length. Near the surface (i.e., in the SGS buffer layer), the simulated wind speed is weaker than the log-law prediction with the largest discrepancy occurring at the surface. The log-law layer manifests itself as the layer between Zb and ~80 m, where the normalized wind speed is nearly constant (Fig. 5).
In summary, the group A simulations produce all the salient features of a typical Ekman boundary layer, including an Ekman wind spiral, a constant-flux layer, and a well-defined log-law layer located above the SGS buffer layer. In the SGS buffer layer, the energetic eddies are underresolved by the LES code and, consequently, the wind speed deviates from the log law. The depth of the SGS buffer layer decreases linearly with the decreasing horizontal grid spacing, approximately as . With the increase of the model resolution, the simulated von KΓ‘rmΓ‘n constant converges toward 0.4, while the derived surface roughness length tends toward its specified value.
These simulations show that the LES code has difficulty in correctly simulating the vertical gradient of the horizontal winds in the SGS buffer layer, a notorious problem that has been discussed in previous studies. They also demonstrate that when the model grid spacing is fine enough, even though there exists a thin SGS buffer layer where the simulated wind profile deviates from the log law, the LES code is capable of producing a well-defined log-law layer above the buffer layer with the von KΓ‘rmΓ‘n constant derived from the best-fit line close to 0.4 and a surface roughness length comparable to the specified one. In other words, these simulations suggest that as the SGS buffer layer becomes thinner, the impact of the wind speed errors in the SGS buffer layer on the interior wind profile becomes consistently smaller. Specifically, the model grid spacing and appear to be adequate for our study of the neutral Ekman layer. This pair of spacings yields an SGS buffer layer less than 10 m and a von KΓ‘rmΓ‘n constant close to 0.4, while the computational cost is acceptable.
b. The lower log-law layer and surface layer
Three additional groups of simulations (i.e., B, C, and D) have been carried out with the model configuration identical to that in A4 (i.e., , , and the vertical stretching factor ) but different control parameters (i.e., geostrophic wind speed Ug, Coriolis parameter f, or surface roughness length z0). The objectives of these simulations are threefold. First, we intend to further evaluate the skill of the LES code in reproducing the log-law wind profile in the surface layer over a broader parameter space. Second, we intend to explore the characteristics of the EBL and their dependence on the three external control parameters. Furthermore, we are interested in characterizing the wind profile beyond the surface log-law layer, and the last objective is addressed in section 3c.
Group B includes four simulations with Ug = 5 m sβ1, f = 10β4 sβ1, and z0 = 2 Γ 10β4, 2 Γ 10β3, 2 Γ 10β2, and 0.1 m, respectively; and the results are summarized in Figs. 6 and 7 and Table 2. As expected, over a rougher surface the wind speed near the surface is slower, resulting in stronger vertical wind shear and therefore more intense turbulence (Figs. 6aβc). In accordance with stronger turbulence over a rougher surface, the BL becomes deeper and the supergeostrophic wind maximum becomes progressively stronger. The depth of an Ekman boundary layer h is often scaled as u*/f (Stull 1988) or is written as , where the proportionality coefficient C1 suggested by previous studies ranges between 0.15 and 0.4 (Rossby and Montgomery 1935; Zilitinkevich 1972; Howroyd and Slawson 1975; Panofsky and Dutton 1984). It is worth noting that the BL depth may vary with the BL top definition as well. In this study we define the BL top as the level where the TKE reduces to 5% of its maximum value. Similarly, the BL top can be defined based on potential temperature, wind speed, or momentum flux profiles.
The C1 values derived from group B simulations decrease from 0.36 for B1 (i.e., z0 = 2 Γ 10β4 m) to 0.30 for B4 (z0 = 0.1 m), which is a moderate (~12%) decrease, while z0 increases by nearly three orders of magnitude. The normalized SGS momentum flux profiles appear to be rather insensitive to the surface roughness. The SGS buffer layer depth is less than 10 m and shows little change from simulation to simulation. In the meantime, the constant-flux layer depth increases substantially (Table 2). The wind profiles between Zb and approximately ZLL = 80 m are virtually linear in the log-linear plots of the wind speed for all the simulations (Fig. 7), indicative of the existence of a logarithmic layer in the simulated wind profiles. For each simulation, a pair of z10 and have been derived from the linear regression using data points between Zb and ZLL, where is used here, which corresponds to the model level immediately above the actual SGS buffer layer. The estimated upper limit of the log-law layer (i.e., ZLL) using the same trial and error method is around 80 m and tends to increase slowly with the surface roughness length. For simplicity, linear regressions of the wind profiles between Zb = 12 m and ZLL = 80 m are performed for the simulations in group B (Fig. 7). The corresponding and z10 values derived from the linear regression are listed in Table 2. A few aspects of the results in Table 2 are worth mentioning. First, the simulated von KΓ‘rmΓ‘n constant is equal to 0.4, accurate to the second decimal place for all the simulations. Second, the corresponding surface roughness length z10 is close to the specified z0. The difference becomes larger for z0 = 0.1 m, which is likely due to the relatively small ratio between the first model level and the roughness length [i.e., Ξz1/z0 = 10; Ξz1/z0 > 50 recommended by Basu and Lacser (2017)]. Furthermore, while the logarithmic (or log-law) layer is substantially deeper than the constant-flux layer, it is relatively insensitive to the increase in the surface roughness length.
Group C includes four simulations (i.e., C1βC4) identical to the simulations B1βB4 except that the geostrophic wind speed is doubled (i.e., Ug = 10 m sβ1). The SGS buffer layer depths are comparable to those derived from group B, suggesting that Zb is relatively insensitive to the surface roughness length and the geostrophic wind speed. Well-defined log-law layers (Fig. 8a) and constant-flux layers (Fig. 8b) are evident in these simulations. In general, the BL is substantially deeper with much stronger turbulence (Fig. 8c) in these simulations than in their counterpart in group B. The von KΓ‘rmΓ‘n constant obtained from the linear fitting of the wind speed profiles is close to 0.4 as in group B simulations. On the other hand, several discrepancies between groups B and C are worth noting. First, while the BL is deeper in group C, the BL depth proportionality coefficient C1 values are consistently smaller than their counterparts with a slower geostrophic wind speed (Table 3). The average value of C1 is 0.25 for group C (i.e., compared to 0.33 in group B) and tends to decrease with increasing surface roughness length. Second, the constant-flux layers are substantially deeper than those in group B but less than doubling. The log-law layer depths for group C are around 110 m, which is about 40% deeper than in group B (Fig. 9).
Simulations in group D are identical to those in group B except that the Coriolis parameter is doubled. The use of f = 2 Γ 10β4 sβ1, which is sizably larger than the Coriolis parameter at the North Pole (~1.45 Γ 10β4 sβ1), is meant to explore the dependence of the EBL characteristics on f over a broader range. Again, the SGS buffer layer depth is relatively insensitive to the Coriolis parameter (Figs. 10 and 11; Table 4), and the surface friction velocity is comparable with its counterpart in group B. The increase in the Coriolis parameter leads to a shallower BL with a reduced supergeostrophic wind maximum in the upper BL (Fig. 10a). The proportionality coefficient of the boundary layer depth C1 is around 0.43, which is substantially larger than those derived from groups B and C. In addition, the constant-flux layer becomes significantly shallower than its counterpart in group B (Fig. 10b) with the TKE maximum in the surface layer comparable to its counterpart in group B (Fig. 10c). A log-law layer is evident in each of the four simulations roughly between Zb ~ 12 m and ZLL ~ 50 m (Fig. 11), implying that the log-law layer depth is thinner than that in group B.
In summary, over the range of parameters examined, the LES code is able to produce a well-defined surface log-law layer in the mean wind profile. The characteristics of the log-law layer vary with all three control parameters. The derived von KΓ‘rmΓ‘n constant is approximately 0.4 and exhibits little variation from simulation to simulation. The depths of the BL and constant flux layer vary with the surface roughness length, geostrophic wind speed, and Coriolis parameter. In Fig. 12, the simulated BL and constant-flux layer depths are plotted versus the characteristic vertical scale . While the BL depths for all three groups appear to consistently increase with , the proportional coefficient clearly tends to decrease with the increase in . Particularly, the proportional coefficient (i.e., C1) changes from around 0.2 for the simulations with stronger wind speed (i.e., group C) to nearly 0.5 for the simulations with weaker wind speed and a larger Coriolis parameter (i.e., group D). On the other hand, the constant-flux layer depth Zcflx appears to linearly increase with and the linear regression yields
In general, the log-law layer becomes deeper under a stronger geostrophic wind speed and shallower over a higher latitude area. Higher towers observed deep log-law layers up to 150 m under neutral atmospheric conditions (Thuillier and Lappe1964; Carl et al. 1973) and the documented deep log-law layers usually occurred with moderately strong winds, in qualitative agreement with our simulations.
c. The upper log-law layer
Compared to the surface layer, the wind profile in the outer Ekman BL (referred to the portion above the surface log-law layer here) receives much less attention. A careful diagnosis of the wind profiles from our LESs suggests that there exists a second logarithmic layer, located between the top of the lower log-law layer and the midboundary layer [referred to as the upper log-law layer (ULLL)]. The segment of the wind profiles corresponding to the upper log-law layers for groups BβD is shown in Fig. 13 along with the linear regression lines. The bottom of the layer is chosen to be the level above the top of the lower log-law layer, and the top of the ULLL is derived using the same trial and error approach as for obtaining ZLL. The depth of the upper log-law layer tends to increase with geostrophic wind speed and decrease with the Coriolis parameter.
Similar to the lower log-law layer, the wind speed for the upper log-law layer can be written as and, accordingly, the characteristic velocity u2* and the length scale z20 can be derived from the linear regression of the mean wind speed over the ULLL segment. The βslopeβ ratio between the upper and lower log-law layers and z20 are listed in Tables 1β4. The ULLL has the following characteristics. First, the ULLL is found in all the simulations, with its depth comparable to that of the corresponding lower log-law layer. Second, the value obtained from linear regression is between 0.95 and 1.7 and varies with all three external parameters. Specifically, appears to be larger over a rougher surface and under stronger geostrophic winds and smaller for a larger Coriolis parameter. For both groups B and C, Ξ² is greater than unity and is close to or less than unity in group D with the Coriolis parameter doubled. Third, while the ULLL is located almost immediately above the top of the lower log-law layer, presumably there is a thin βbufferβ layer between the two (Fig. 1). The wind speed should be a smooth function of the vertical distance (Tennekes 1973). If the two layers are connected, then the slope of the two log-law layers should be the same, which requires = 1 (generally untrue). Further inspection suggests that the variation of is largely governed by a nondimensional friction velocity , where h is the BL depth. The Ξ² values derived from the three groups of simulations are plotted versus in Fig. 14, which shows that the data points from the three groups of simulations tend to collapse onto a single curve. We further assume that and that the least squares fitting using the 12 data points from the simulations from groups BβD yields (red curve in Fig. 14). Accordingly, the wind profile in the upper log-law layer can be written as
where the is a constant. A few aspects of (8) are worth mentioning. First, (8) suggests that the wind speed in the upper log-law layer is scaled as instead of just u*, implying that, as expected, in addition to the surface stress, the wind speed in the outer Ekman layer is also influenced by Earthβs rotation and the boundary layer depth. Second, assuming the depth of an Ekman BL is given by , where C1 is a constant, (8) reduces to , where the new constant . Physically, this implies that the assumption that the proportionality coefficient C1 is a constant is equivalent to assuming that the wind speed in the outer layer is also scaled as . Finally, the intercept constant z20 in (8) appears to vary with all three parameters, being more sensitive to z0 and f and less so to Ug. If we assume that the lower and upper log-law layers are nearly adjacent to each other and that the wind speed at the top of the lower log-law layer is approximately equal to that at the bottom of the upper log-law layer, then we have
Equation (9) provides a crude estimation of z20 and suggests that z20 is dependent on the surface parameters (i.e., z0 and u*), the Coriolis parameter, and the BL depth. The z20 values derived from the three groups of simulations (Tables 2β4) are qualitatively consistent with (9).
4. An analytical EBL model
Unlike the lower log-law layer, to the best of the authorsβ knowledge, the upper log-law layer has not been discussed in the literature and is not predicted by any existing theory. Here we attempt to shed some light on the vertical variation of the wind speed in the outer layer by formulating a simple analytical solution for an assumed eddy diffusivity profile.
We start from the K-theory assumption, that is,
where denotes the horizontal wind speed. Equation (12) can be written as
Here represents the total stress, is defined by , and is defined by to denote the wind and stress direction angles (from the x direction), respectively. Diagnosis of the LESs suggests that the difference in the wind and shear stress directions is relatively small in the lower half of the boundary layer. Hence, we assume that the shear stress is oriented approximately along the wind direction and, consequently, the left-hand side of (13) becomes the total stress. Based on the momentum flux profiles from the LESs, the magnitude of the left-hand side linearly decreases with the altitude in the outer layer, and therefore can be approximated by , where h represents the BL depth.
We further assume that the eddy diffusivity profile can be approximated by , where is a turbulence-related nondimensional parameter, which varies slowly with the vertical distance z. Substituting the analytical stress and Km expressions into (13), we have
If the variation of over a vertical distance between any two levels, z1 and z2, is negligible, the wind speed between z1 and z2 can be written as
where is the wind speed at the lower reference level z1.
In the surface layer, we let , , and , and (15) reduces to
which is almost identical to the well-known log law for the surface layer, except that here W is the wind speed instead of the wind component along the surface stress direction. This seemingly subtle difference is quite important. The classical theory for the log law assumes that the wind turning across the log-law layer is negligible and that the winds and the shear stress in the log-law layer are oriented along the surface stress direction. The new log law [(16)] allows for a substantial wind turning with altitude as long as the shear stress is approximately oriented along the wind direction at each level throughout the log-law layer. It is also worth noting that the assumed shear stress profile , is consistent with the traditional constant-flux layer assumption. The depth of a surface (or constant-flux) layer is around 10% of the BL depth (Glickman 2000), within which the variation of the shear stress is less than 10%. In addition, in the surface layer, where z/h βͺ 1, the assumed Km reduces to , which is identical to the mixing-length theory assumption (i.e., ) for .
Similarly, for the upper log-law layer, we rewrite (15) as
for the upper log-law layer. This simple analytical model suggests that the difference in the wind speed scaling for the lower and upper log-law layers is due to the difference in the characteristics of the dominant eddies in the two layers, which leads to the difference in Ξ», or the eddy diffusivity profile.
In summary, this simple EBL solution is consistent with the classical mixing-length theory and the log law in the surface layer. It also predicts possible additional log-law layers in the outer layer. However, these solutions are based on strong assumptions about the momentum flux and eddy diffusivity profiles and do not provide any guidance on the adequate vertical distance ranges in which Ξ» can be treated as a constant, which is the necessary condition for (17) to be valid.
5. Concluding remarks
The characteristics of wind profiles in an atmospheric Ekman boundary layer have been revisited based on four groups of LESs. The sensitivity of the simulated wind profiles, especially the characteristics of the classical log-law layer, to the model resolution and domain size are examined utilizing a group of simulations. As the model resolution increases, the SGS buffer layer, the layer where the energetic eddies are underresolved, shrinks. While there is a noticeable deviation from the log law inside the SGS buffer layer in the simulated wind profile, a well-defined log-law layer is evident above the SGS buffer layer. In accordance with the increase in the model resolution, the von KΓ‘rmΓ‘n constant derived from the log-law wind profile consistently tends to 0.4, and the effective surface roughness length also converges toward the specified roughness length. This trend is reassuring, as it implies that the impact of the deviation of the wind speed from the log law in the underresolved buffer layer on the interior solution is minimal as long as the model resolution is adequately high.
Three additional groups of simulations have been diagnosed to explore the sensitivity of the wind profiles to three external governing parameters, namely, Ug, f, and z0. A constant-flux layer is evident in each simulation with the depth increasing linearly with over the parameters examined. The simulated BL depth, defined based on the TKE profile, tends to increase with as well, though the proportional coefficient varies with the control parameters instead of being a constant. These simulations also robustly produce wind speed profiles characterized by two separate log-law layers, the canonical log-law layer above the surface and a second log-law layer located between the lower log-law layer and midboundary layer (Fig. 1). The lower log-law layer is typically deeper than the corresponding constant-flux layer, which is consistent with the prediction by Tennekes (1973) based on a scaling argument. The log-law layer tends to become deeper with stronger geostrophic winds and shallower for a larger Coriolis parameter. In addition to the well-known lower log-law layer, a well-defined elevated log-law layer has been identified from all the simulations with a depth comparable to the lower log-law layer. An analytical model is examined based on the assumed momentum flux and eddy diffusivity profiles. This model predicts the lower log-law layer above the surface as well as the possibility of log-law layers aloft.
Several aspects of this upper log-law layer are worth noting. First, the wind speed in the two log-law layers appears to have different scaling; the lower layer is scaled with and the ULLL is scaled with . Physically, this implies that the dominant influence on the lower log-law layer comes from the surface, and other processes, such as the Coriolis effect, are secondary and negligible. The ULLL is influenced by the surface stress and large-scale processes, such as the BL depth and the Coriolis parameter. In the literature there is little discussion of the wind speed scaling for the outer Ekman layer. It has been speculated in Blackadar and Tennekes (1968) that might be a better scaling for the wind speed in the ULLL than u*, where K is any constant. This scaling may have overemphasized the importance of the surface parameters (i.e., and ) and is inadequate for the parameter space examined in this study. Second, the slope ratio between the upper and lower log-law layers, , is typically larger than unity and varies with the geostrophic wind speed, Coriolis parameter, and the BL depth. Under certain conditionsβfor example, over a higher latitude areaβthis factor may approach unity, and the two log-law layers may virtually merge into one deep log-law layer. Third, the upper log-law layer is located almost immediately above the lower log-law layer; however, they are not connected. If the two layers are connected, then both the wind speed and the vertical gradients of the wind speed in the two layers should be equal to each other at the matching (i.e., connecting) level and accordingly Ξ² must be unity, which, in general, it is not. Furthermore, the role of the EBL depth plays in the scaling of the outer layer wind speed suggests the importance of the BL depth as an independent parameter for the outer BL, especially in a real atmosphere, where multiple processes are involved in determining the BL depth.
The existence of an upper log-law layer in an Ekman boundary layer has a number of implications. First, if confirmed, the upper log law can be very useful for validating turbulence parameterizations in numerical weather prediction models. Second, from the observational perspective, the upper log-law layer is likely beyond the reach of traditional meteorological towers. However, the wind profile in the outer BL can be observed by remote sensing technologies, such as Doppler lidars and wind profilers as well as instrumented tethered balloons. The findings from this study encourage further investigation of wind profiles beyond the surface layer, especially under nearly neutral conditions. Furthermore, this study hints at the possibility of extending the current similarity theory valid for the surface layer to the midboundary layer.
This research is supported by the chief of naval research through the NRL Base Program, PE 0601153N. Computational resources were supported by a grant of HPC time from the Department of Defense Major Shared Resource Centers. | <urn:uuid:54bf0aac-61ea-4393-a4e9-7c3a25507472> | {
"dump": "CC-MAIN-2020-34",
"url": "https://journals.ametsoc.org/jas/article/75/6/1873/107256/Large-Eddy-Simulation-Study-of-Log-Laws-in-a",
"date": "2020-08-15T17:31:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740929.65/warc/CC-MAIN-20200815154632-20200815184632-00040.warc.gz",
"language": "en",
"language_score": 0.9086923003196716,
"token_count": 10121,
"score": 3.171875,
"int_score": 3
} |
a. This variation is often called by the German name Ablaut. It has left considerable traces in the forms of Latin words, appearing sometimes as a difference of quantity in the same vowel (as, u, ΓΊ; e, Γ©), sometimes as a difference in the vowel itself (as, e, o; i, ae):[In Greek, however, it is more extensively preserved.] -
18. Both Latin and English have gone through a series of phonetic changes, different in the two languages, but following definite laws in each. Hence both preserve traces of the older speech in some features of the vowel system, and both show certain correspondences in consonants in words which each language has inherited from the old common stock. Only a few of these correspondences can be mentioned here. | <urn:uuid:99758268-0a82-4404-81ee-ebaff4226b76> | {
"dump": "CC-MAIN-2019-18",
"url": "http://www.hhhh.org/perseant/libellus/aides/allgre/allgre.17.html",
"date": "2019-04-24T20:44:20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578656640.56/warc/CC-MAIN-20190424194348-20190424220348-00052.warc.gz",
"language": "en",
"language_score": 0.9634644985198975,
"token_count": 163,
"score": 3.65625,
"int_score": 4
} |
(First saw this via Social Physicist, have seen it several places since)
(First saw this via Social Physicist, have seen it several places since)
Tobacco plants could help wean the world from fossil fuels, according to scientists from the University of California, Berkeley.
In a paper in the journal ACS Nano Letters, Matt Francis and his colleagues used genetically engineered bacteria to produce the building blocks for artificial photovoltaic and photochemical cells. The technique could be more environmentally friendly than traditional methods of making solar cells and could lead to cheap, temporary and biodegradable solar cells.
βOver billions of years, evolution has established exactly the right distances between chromophore to allow them to collect and use light from the sun with unparalleled efficiency,β said Francis. βWe are trying to mimic these finely tuned systems using the tobacco mosaic virus.β
Discovery: Tobacco Plants Tapped to Grow Solar Cells
(via John Robb)
Itβs the ultimate form of solar power: eat a plant, become photosynthetic. Now researchers have found how one animal does just that.
Elysia chlorotica is a lurid green sea slug, with a gelatinous leaf-shaped body, that lives along the Atlantic seaboard of the US. What sets it apart from most other sea slugs is its ability to run on solar power.
Mary Rumpho of the University of Maine, is an expert on E. chlorotica and has now discovered how the sea slug gets this ability: it photosynthesises with genes βstolenβ from the algae it eats.
New Scientist: Solar-powered sea slug harnesses stolen plant genes
(via WTF Nature)
Above: Kassiane giving the The American Sign Language sign for βautism.β The sign, which evokes the notion of βclosed off,β raises issues in the neurodiversity community.
Kassiane, who prefers I donβt run her last name, is a neurodiversity advocate based in Portland, OR. She was born autistic & epileptic and has spoken at neurodiversity conferences around the world. She spoke to me via instant messenger. You can read her blog here.
Klint Finley: Could you give us a brief overview of what βneurodiversityβ means, or at least what it means to you?
Kassiane: Neurodiversity, the word, simply means the whole variety of different brain wirings people haveβ¦from the different kinds of normal to the different kinds of not so normal. Then thereβs Neurodiversity, the movement which is the shocking idea that people with non standard wiring are human and deserve to be treated as such without being βfixedβ first.
What conditions may be included in the movement?
Autistic/Asperger people tend to make up the base of the movement, because we latch onto things so well, but weβre really inclusiveβ¦ADHD, learning disabilities, mental health issues, cognitive conditions like Down Syndrome, epilepsy, migraines, neurotypical allies, Not Diagnosed Just Weirdβ¦weβre accepting of pretty much everyone.
Is there a point at which a line is drawn between βneurodiverseβ and disabled?
The 2 arenβt mutually exclusive. You can be different and disabled, but being disabled doesnβt keep you from being a human worthy of respect.
How did you get involved in the neurodiversity movement?
I was born autistic & epileptic, & being told Iβm broken hasnβt ever gone over well with me. When I was 16 or 17 I read autistics.org and saw there are other people who feel the same way, and it was like βHot damn! community! whee!β and it just snowballed from there.
Are you involved in any particular organizations?
Iβm involved with ASAN-Autistic Self Advocacy Network, & have done several conferences for Autism National Committee.
Can you tell us about some of the activism youβve been involved with?
Way back in the day at a big conference we petitioned to get a very abusive school kicked out of the exhibit hall of said large conference. Since the school in question doesnt believe in human rights it was big gesture, small stepβweβve been working to have them closed down for years.
ASAN has recently taken to picketing events that seek to eradicate autistic & other neurodivergent people, to show the public that eradication isnβt the only viewpoint. Weβve also done a lot of writing to congress and other important people.
I was also involved in the petitioning to have a teacher in Florida who voted a kid out of her classroom delicensed, though thatβs all still pending.
Can you be more specific than βevents that seek to eradicate autistic & other neurodivergent peopleβ? What particular organizations do you think are problematic?
Oh, Autism Speaks. They totally need to climb a rope and let go. As do Defeat Autism Now!, TACA, and and Generation Rescue.
In what way do they seek to eradicate autistic people?
Prenatal testing to prevent us from being born, specifically. And then thereβs the wackaloons who think itβs ok to kill us, who are always fun.
Who are the Wackaloons?
Itβs a generic term that here means βperson so far disconnected from realityland that Iβm not sure how to deal with themβ there are wackaloons in all those groups. They pop out of the woodwork when a kid is killed, or an adult, which happens far too often.
Gotcha. And so some wackaloons think itβs ok to kill autistic people who have already been born? What, as some sort of euthanasia? How common is that?
Well, this website is incomplete. And with every one of those in my memory, there were people defending the murderers. Not to mention the one I followed most closely in 2006 or so, where the whole town and even the newspaper were supportive of the killer.
Should neurodiversity be important to βneurotypicalsβ?
I assume that a cookie cutter world is boring to you. And many people wonβt be neurotypical forever. Besides that whole βcivil rightsβ thing, which majorities arenβt always so awesome at.
By βmany people wonβt be neurotypical foreverβ are you referring to cognitive decline people experience with age?
Cognitive decline, head injuries, infections that affect the brain, neurological diseases, strokeβ¦brains are fragile
Do you think the criminal justice system should treat people with an autism spectrum diagnoses differently than a βneurotypicalβ person?
It depends on the person, & on what they did. Like, if I go knock over the 7/11, Iβm fully capable of knowing thatβs wrong and of not doing it. But if someone has an irresistable compulsion to, say, go stare at fountains and gets arrested for tresspassing for staring at a fountain, their neurology may need to be taken into account.
Autism surely isnβt a get-out-of-jail-free card.
What do you think about use of the βr-wordβ?
Uhm. I hate it with the passion of 100,000,000 firey suns and have nearly gotten the shit kicked out of me on the bus for expressing this loathing.
To be honest I hadnβt really thought about it much before I read you ranting about it on Twitter a while back. But on further examination itβs weird how many people (myself included, unfortunately) would use the word without giving it a second thought, but would never defend the use of racial slurs.
Exactly! or they get all offended about homophobic slurs, but they throw around the r-word like a tennis ball. seriously? Itβs not ok. Itβs only remained ok because the people who itβs actually slamming are often unable to tell the ones using it to shove it.
Itβs all about the power dynamics, & lack of creativity in insults.
What about using the suffix βtardβ to create new slurs for specific groups (itards for Apple users, Paultards for Ron Paul supporters, etc.)?
Thatβs not any better. Itβs not even creative. And it still comes from a place that says itβs ok to slam people who are cognitively disabled, and from a place that says βthese people hold irrational to me beliefs because theyβre cognitively impairedβ
A year or two ago I read an article musing on the possibilities of creating pills that could temporarily βcureβ or even *cause* autism. The basic idea is that someone born with autism could take a pill to become neurotypical at a party, or a neurotypical person could take a pill to become autistic temporarily to accomplish some particular task. Scientific feasibility aside, what do you think about such a possibility.
Itβd be confusing in the extreme.
I couldnβt function in an NT brain, any more than you could function in my autistic brain. Iβm USED to hearing and seeing and taking in everything and focusing on the details. Take that all away & for the duration of the dose, Iβd be lost.
Give an NT autistic-like thought processes and perception, & they couldnt use the pattern recognition or hyperfocus or whateverβ¦theyβd be too busy looking for better earplugs and sunglasses because the lights are loud and flickering. Scientific feasability aside, thereβs no way anyone would actually use it.
You can dual boot a computer. You canβt dual boot a brain.
The Autism Rights Movement article in New York Magazine.
Autistic Self-Advocacy Network
Years ago, I had an idea for a futuristic pair of goggles that visually transformed homeless people into lovable animated cartoon characters. Instead of being confronted by the conscience-pricking sight of an abandoned heroin addict shivering themselves to sleep in a shop doorway, the rich city-dweller wearing the goggles would see Daffy Duck snoozing dreamily in a hammock. London would be transformed into something out of Who Framed Roger Rabbit.
Whatβs more, the goggles could be adapted to suit whichever level of poverty you wanted to ignore: by simply twisting a dial, you could replace not just the homeless but anyone who receives benefits, or wears cheap clothes, or has a regional accent, or watches ITV, and so on, right up the scale until it had obliterated all but the most grandiose royals.
At the time this seemed like a sick, far-off fantasy. By 2013, itβll be just another customisable application you can download to your iBlinkers for 49p, alongside one that turns your friends into supermodels and your enemies into dormice.
Futurismic: Re-skinning the city β the dark side of augmented reality
In the days before the new Apple tablet was announced the anti-DRM group Defective by Design dubbed Appleβs announcement event the βCome see our latest restrictionβ event. Since then, thereβs been a lot of chatter about the various limitations of the device β DRM, or otherwise.
I think some of these limitations could be important for the future of computing and media.
Limitations could be a feature β keeping people focused on reading. Perhaps we shouldnβt be thinking of this as a laptop or netbook alternative at all, but as an text reader and video player. Having a limited multitasking abilities and a lack of Flash might be a means to limit our level of distraction from e-mail and instant messaging. Stan Schroeder wrote for Mashable:
Then, thereβs multi-tasking. Nearly everyone Iβve talked to thinks this is a huge deal-breaker, but I think it makes sense. Although Steve Jobs was trying hard to prove to us that the iPad is a computer, it isnβt. Just like the iPod and the iPhone, its main purpose is to give the users an easy way to consume certain types of digital content. After music (iPod) and mobile applications (iPhone) comes iPad with video, photos, e-books, e-magazines, games. Apple doesnβt really want you to do complex photo editing on the iPad; youβve got your Mac or PC for that. Apple wants you to touch a button, and start consuming content (preferably paying a couple of dollars for it).
Finally, the camera. Yes, it would be nice to have video chat. But once again, Apple wants you to do that on a Mac. If you want to snap photos, you should do it on the iPhone β youβre carrying it with you all the time, anyway. Once again, it becomes clear that Apple doesnβt want to sell devices that can do everything; they want to find the best form factor to consume some types of digital content, and then focus on them. If you look at it, you can do pretty much everything on your personal computer; by that philosophy, you donβt need anything else besides a laptop. And yet, youβve now got smartphones and e-readers selling very well. Could it be that one powerful device is not as good as several less powerful, but more focused ones?
If thatβs the case, and the iPad is just another consumer device and a paradigm, then itβs no big deal.
But if theyβre letting users instal everything from the iPhone app store, then are they really designing useful limitations to keep the device focused? You can install apps that do just about anything, not just consume media. And the keyboard extension explicitly allows two-way media interaction.
Ultimately the lack of Flash or multitasking or a web cam seem trivial to me. Theyβre just features that may or may not be able to make or break the latest in consumer technology. And thatβs just not important. But thereβs a scarier possibility β that Apple is slowing easing its customers into an app-store centric world, where every app that runs on their platform on a βlegitimateβ (non-βjailbrokenβ) device has to pass their gates. It may sound conspiratorial, but I worry that Apple is trying to migrate their closed device paradigm from the mobile world (where that sort of thing is already pretty common) to the desktop world (where thatβs unheard of). Itβs strange that years after Trusted Computing became an information liberty concern, itβs been Apple, not Microsoft, leading the way to a more restrictive computing environment.
Peter Kirn at Create Digital Music has an extensive post considering the potential problems of the βclosed Appleβ world:
Apple already has a dangerously dominant position in the consumption of music and mobile software, and their iTunes-device link ensures that content goes through their store, their conduit, and ultimately their control. This means that developers are limited in what they can create for the device when it comes to media β a streaming Last.fm app is okay, but an independent music store (like Amazon MP3 on Android) is not. Now, you can add to that Apple dominating book distribution. At a time when we have an opportunity to promote independent e-book publishing, the iPad is accompanied by launch deals from major traditional publishers. What does that mean for independent writers and content? [β¦]
Apple threatens to split computing into two markets, one for βtraditional,β βrealβ computers, and another for passive consumption devices that try to play games without physical controls and let you read books, watch movies, play music, and run apps so long as youβre willing to go through the conduit of a single company.
And, of course, this wouldnβt be worth my breath if not for my real concern: what if Apple actually succeeds? What if competitors follow this broken path, or fail to offer strong alternatives? The iPad today is a heck of a lot slicker than alternatives. Itβs bad news for Linux, Windows, and Android, none of which have really workable competitors yet. Itβs especially bad for Linux, in fact, which had a real chance to make its mark on mobile devices.
Timothy Blee makes the case that restricted computing will lose out in the market. Iβm not so optimistic.
On not-so-dark note, I was disappointed at how uninnovative the iPad is. Itβs just a big iPod touch, or a really crippled tablet pc. It seems like it could be an interesting musical insturment (a nice platform for RJDJ, for instance) It doesnβt seem like as much of a game changer as something like this:
Itβs unusual for Microsoft to out innovate Apple (or rather, to beat them to stealing good ideas), but their Courier seems to do just that. Of course, itβs vaporware right now, and could continue to be so, just like its abandoned predecessor the OLPC2:
Neurons have been created directly from skin cells for the first time, in a remarkable study that suggests that our biological makeup is far more versatile than previously thought.
If confirmed, the discovery that one tissue type can be genetically reprogrammed to become another, could revolutionise treatments for conditions such as Parkinsonβs disease and Alzheimerβs, opening up the possibility of turning a patientβs own skin cells into the neurons that they need. [β¦]
The work has been hailed as a huge conceptual leap forward in fundamental biology. βThe possibility that cells could be directly reprogrammed is something that people had thought about, but to see it in black and white is still slightly shocking,β said Professor Jack Price, a neurobiologist at Kingβs College London. βThis suggests that there are no great rules β you can reprogramme anything into anything else.β
Times Online: Neuron breakthrough offers hope on Alzheimerβs and Parkinsonβs
Geologist Juan Manuel GarcΓa-Ruiz calls it βthe Sistine Chapel of crystals,β but Superman could call it home.
A sort of south-of-the-border Fortress of Solitude, Mexicoβs Cueva de los Cristales (Cave of Crystals) contains some of the worldβs largest known natural crystalsβtranslucent beams of gypsum as long as 36 feet (11 meters). [β¦]
Modern-day mining operations exposed the natural wonder by pumping water out of the 30-by-90-foot (10-by-30-meter) cave, which was found in 2000 near the town of Delicias (Chihuahua state map). Now GarcΓa-Ruiz is advising the mining company to preserve the caves.
National Geographic: Giant Crystal Cave Comes to Light
(via, indirectly, Angadc)
This advice is geared towards journalists, but could be applied all bloggers. It sound βbiz speaky,β but I think this guy is correct. This sort of thinking could probably be applied elsewhere as well:
Look first toward creating evergreen assets that readers will continue searching for years in the future. These pieces should be written with search engine optimization in mind, and be stored at unique, easy-to-link URLs that are prominently featured in your siteβs navigation.
In 1995, I wrote a short series of one-page tutorials on statistics that continue to be read by a couple thousand people each day. Those assets helped subsidize the next websites that I started, by paying their hosting fees and for some start-up equipment (laptops, cameras, etc.) Iβd recommend that any journalist looking to establish himself or herself online start by identifying evergreen assets that he or she could create: how-to articles; sharp, concise explainers of complicated issues, smart guides to popular destinations, etc. Take what you know from your favorite beat and dive in.
Donβt fall into the trap of looking for popular search engine bait. How many people in two years will be looking for the Conan OβBrien/Jay Leno posts that so many folks wrote last week? The most valuable assets have enduring value.
Online Journalism Review: Build a better journalism career by shifting your focus from writing stories to creating assets
I found this via Jay Rosen, who notes that when he writes his longer PressThink articles he tries to make them enduring assets and cites this as a specific example.
I might cite my biopunk article as an example of an asset.
(Photo by RepΓ³rter do Futuro / CC BY 2.0)
Update: Check out this PDF guide to creating βflagship contentβ β I like the term βflagship contentβ better than βasset.β
Twitter, the internet social network, is developing technology it hopes will prevent the Chinese and Iranian governments being able to censor its users. [β¦]
Mr Williams, speaking at the World Economic Forum, said he admired Google for its decision last month to confront China over censorship and cyberattacks on its service, but said Twitter was too small to take a similar stand.
βWe are partially blocked in China and other places and we were in Iran as well,β he said. βThe most productive way to fight that is not by trying to engage China and other governments whose very being is against what we are about. I am hopeful there are technological ways around these barriers.β
Mr Williams said Twitter had an advantage in evading government censors through operating as a network of internet and mobile applications, rather than as a single website. βTwitter is a network that is accessed in thousands of ways.β
Financial Times: Twitter works on technology to evade censors in China and Iran
Β© 2023 Technoccult
Theme by Anders NorΓ©n β Up β | <urn:uuid:ced49988-b121-4412-b00b-eeead403358a> | {
"dump": "CC-MAIN-2023-14",
"url": "http://www.technoccult.net/2010/01/",
"date": "2023-03-22T00:23:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00062.warc.gz",
"language": "en",
"language_score": 0.950100839138031,
"token_count": 4697,
"score": 3.171875,
"int_score": 3
} |
The role involves measuring and mapping the world's underwater surfaces and studying the morphology (construction) of the seabed. The information is used in:
- the production of charts and related information for navigation;
- locating offshore resources (oil, gas, aggregates);
- planning dock installations.
Hydrographic surveyors are expected to work in a wide range of differing situations and applications, from inland waters and rivers, to ports and oceans. The work may be onshore or offshore, depending on the specialist area.
The role also demands an understanding of and consideration for environmental issues. | <urn:uuid:e866ad29-84af-46f7-a4c0-6d1c20c60fc2> | {
"dump": "CC-MAIN-2017-47",
"url": "http://manpower.com.ng/job-descriptions/Hydrographic-surveyor-226.html",
"date": "2017-11-19T03:22:11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805265.10/warc/CC-MAIN-20171119023719-20171119043719-00207.warc.gz",
"language": "en",
"language_score": 0.9029339551925659,
"token_count": 122,
"score": 3.09375,
"int_score": 3
} |
The Erasmus+ project GRIT aims to prevent early school leaving (ESL) for students at risk by implementing the Growth Mindset approach within secondary education. The cultivation of a growth mindset is a popular and powerful idea in the contemporary educational landscape. This project builds on Carol Dweckβs work on mindsets. According to Dweck (2006, 2012) there are two types of mindset: a growth mindset and a fixed mindset.
A fixed mindset is linked to the belief that oneβs abilities, intelligence and talents are immutable, that they are inborn traits, underlining the idea that they canβt be changed. Students may, for instance, believe that they have good grades in mathematics just because they are good at it. Students with a fixed mindset tend to avoid situations in which they may fail or struggle because these experiences undermine their idea of intelligence.
In contrast, a growth mindset refers to the belief that oneβs basic qualities and oneβs intellectual abilities can be cultivated. There is a belief in the idea of βgrowthβ; individuals with a growth mindset are convinced that they can develop and stretch themselves. Students may, for example, think that they have good grades because they work hard, ask for extra help, persevere, etc. Students with a growth mindset tend to see challenges as a way to develop themselves and look for challenging learning experiences that enable this. Those students turn failure into a βnot yetβ approach, meaning that they acknowledge their potential for growth in the foreseeable future (Dweck, 2006).
Recent research has shown that growth mindsets especially benefit students with low socio-economic status or who are academically at risk and can therefore narrow achievement gaps (e.g. Paunesku et al., 2015; Sisk, Burgoyne, Sun, Butler, & Macnamara, 2018).
The GRIT-project aims at designing:
- A toolkit for teachers and students in secondary education to practice a growth mindset in order to develop the studentsβ growth;
- A guideline for teachers to increase studentsβ resilience based on testing the toolkit;
- A handson training for teams of educators to learn this innovative pedagogical approach to enrich their professional practice;
- A guideline to train teams of educational professionals in how to implement the βgrowth mindset approachβ;
- An ebook for different stakeholders involved in the prevention of early school leaving.
Project website: (beschikbaar in februari)
- Output 1: toolkit
- Output 2: guideline of the toolkit
- Dweck, C. S. (2006). Mindset: the new psychology of success. New York: Ballantine.
- Dweck, C. S. (2012). Mindset: How can you fulfil your potential. London: Constable and Robinson, Ltd.
- Paunesku, D., Walton, G. M., Romero, C., Smith, E. N., Yeager, D. S., & Dweck, C. S. (2015). Mind-set interventions are a scalable treatment for academic underachievement. Psychological Science, 26, 784-793.
- Sisk, V. F., Burgoyne, A. P., Sun, J., Butler, J. L., & Macnamara, B. N. (2018). To what extent and under which circumstances are growth mind-sets important to academic achievement? Two meta-analyses. Psychological Science, 29(4), 549-571.
+32 3 502 28 74
- Lien Fret & Kendra Geeraerts, KdG University of applied sciences (Belgium)
- BΓ©nΓ©dicte Halba, Iriv Conseil (France)
- Agnieszka Borek, Magdalena Swat & Bartlomiej Walczak, University of Warsaw (Poland)
- Joana Alexandre, University Institute of Lisbon (Portugal) | <urn:uuid:f9b09f5e-4704-43d8-9d2f-c563a21e784f> | {
"dump": "CC-MAIN-2023-50",
"url": "https://www.kdg.be/en/node/7388",
"date": "2023-12-11T12:15:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00188.warc.gz",
"language": "en",
"language_score": 0.867622971534729,
"token_count": 840,
"score": 3.328125,
"int_score": 3
} |
Definition of 'dander'
small scales from animal skins or hair or bird feathers that can cause allergic reactions in some people
a feeling of anger and animosity; "having one's hackles or dander up"
Get this dictionary without ads as part of the
e-Tutor Virtual Learning Program | <urn:uuid:03e4da92-8678-47e7-b0be-c107f8e4363b> | {
"dump": "CC-MAIN-2018-26",
"url": "http://www.e-tutor.com/et3/dictionary/define/dander",
"date": "2018-06-25T17:58:18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267868237.89/warc/CC-MAIN-20180625170045-20180625190045-00412.warc.gz",
"language": "en",
"language_score": 0.7596564888954163,
"token_count": 62,
"score": 3.140625,
"int_score": 3
} |
Bringing learning to light: innovative instructional strategies for teaching infection control to nursing students.
Infection control practices are at the forefront of education and compliance monitoring. A university-funded grant allowed faculty and instructional designers to create an experience that increased student awareness, application, and appreciation of infection-control concepts. Computer-based instruction modules are used to provide content, and students participate in a simulation that allows them to apply their newly learned skills in a realistic, immersive environment with a biosphere used to visually depict infectious spread. Student feedback suggests the usefulness of this methodology as a teaching strategy that reinforces evidence-based practice, critical thinking, and clinical judgments.
Experiential Learning--Infection Control--Hand Hygiene
More patients die from infections acquired while hospitalized than die from AIDS, breast cancer, or motor vehicle crashes (Arrowsight Medical, 2014). One out of every 20 hospitalized patients will contract a health-care-associated infection (HAI) (Klevens et al., 2007), incurred while the patient undergoes treatment in a health care setting (Horan, Andrus, & Dudeck, 2008). Emphasis on the reduction of HAIs is a major objective of the Joint Commission's Center for Transforming Healthcare (2012).
Hand hygiene (HH) is the single most effective infection control practice, but multiple studies confirm that it is the most overlooked and poorly executed infection control intervention (Son et al., 2011). In a review of HH compliance studies, Erasmus et al. (2010) found a median compliance rate of 40 percent.
The effective teaching of infection control techniques is challenging, as there is little feedback to show outcomes. This article reports on a learning experience designed with the expectation that simulation of infectious disease spread would reinforce the need for the use of proper precautions for all patients. This approach to learning incorporates Kolb's experiential learning theory (1984) and is expected to leave a more lasting impact than traditional approaches to learning.
Kolb describes a four-staged process by which the learner grasps information and transforms it so that it is meaningful to that individual. The four stages, Concrete Experience, Abstract Conceptualization, Reflective Observation, and Active Experimentation, are listed sequentially, but the learning cycle can be entered at any stage as learning occurs in the fullness of the cycle.
The project began when nurse faculty members were awarded a competitive grant from the university's Center for Learning and Teaching. This project introduces learners to abstract concepts and principles of infection control through computer-based learning modules. Abstract theories and concepts acquired by students include discussion of infection control principles and rationales for the use of personal protective equipment (PPE). The learner actively experiences the learned skill or situation in a concrete or tangible form, for example, by donning sterile gloves or PPE. Transformation of information occurs through reflective observation, that is, organizing and processing, as well as application in a real-world or simulated setting.
The team developed a series of computer-based instruction (CBI) modules that provide content as well as visual and aural events demonstrating infection control principles. The modules are uploaded to the school of nursing's Virtual Hospital. The lessons consist of a foundational module and interactive skills-based HH and PPE modules. The faculty also developed an infection control simulation for students to complete in the clinical lab that allows for the transformation of information. The simulation is followed by faculty-led debriefing sessions for reflective observation. The use of this innovative delivery strategy has resulted in a pedagogy that shifts the instructional delivery from a teacher-centered approach focused on visual and auditory modalities, to a learner-centered, scenario-based simulation that adds a kinesthetic and tactile modality.
THE COURSE CONTENT
To successfully complete the HH CBI module, learners are directed to complete a hand washing exercise that simulates the actions taken at a hand washing station typically found in the health care setting. Following the steps learned via an aural and visual modality in the CBI, the students apply the proper hand washing steps by participating in an interactive, Adobe Flash-based practical application. The application, embedded in the CBI, animates the learner's actions.
In each step, the learner is required to determine the proper sequence while interacting with the virtual hand washing station. If the learner chooses incorrectly, there are aural and visual prompts to try again. When the learner chooses correctly, the step is written on a virtual clipboard to reinforce the correct choice, and the selected actions are animated to simulate the aural and visual feedback found in the actual environment.
The CBI then requires the learner to click and move the mouse to simulate hand rubbing for a minimum of 15 seconds as the clock tracks the elapsed time. The motion of the learner's hand interacting with the mouse closely replicates the physical motion of hand washing, serving as a bridge between a cognitive understanding of the proper hand washing steps and the tactile motor skills required in the clinical environment.
Once learners successfully complete the HH CBIs, they participate in a simulation that allows them to apply their newly learned skills in a realistic, immersive environment. Each lab station contains a mid-or high-level performance simulator headboard with equipment typically found in an inpatient setting. The station also includes a laptop. Students are expected to demonstrate appropriate HH concepts, the use of PPE, and sterile technique.
The patient care simulation includes the use of a biosphere to visually depict infectious spread. The powder is invisible to the naked eye, is easily transferable, and fluoresces under ultraviolet light (UVL). The biosphere, developed for research and educational use for our team after we encountered difficulty cleaning the manikins during pilot testing, is nontoxic and used in everyday household products, for example chewing gum and makeup. Unlike less expensive, commercially available products, this product can be wiped off porous surfaces (e.g., a manikin), and nonporous lab and equipment surfaces by using water and a paper towel.
Prior to the lab session, faculty use makeup brushes to plant the biosphere in the wounds of the manikins. The lab activity requires students to change a surgical or wound dressing for a patient using contact precautions for patients with infectious wounds but not for patients with clean surgical wounds. If students do not apply the infection control/HH knowledge and skills presented in the CBI correctly, the substance spreads as they care for the patient.
At the end of the each lab session, faculty turn off the lights and use hand-held UV lights to demonstrate the spread of the simulated infectious disease. The students are able to visualize the spread of the disease within and between the different lab stations, on PPE, computers, classroom desks, and themselves.
DEBRIEFING AND STUDENT EVALUATIONS
During debriefing, students have reflected upon the ease with which they unknowingly transmitted the SID, not only throughout the lab, but also on their hands and faces and their personal belongings, mainly their cellphones and computers. Several students have expressed concern that they would have the potential to contaminate their own children, through physical contact or through their cellphones, for example. When such comments are made, faculty steer students to also consider the ramifications in the hospital setting. When the conversation focus shifts, the need for vigilance in the health care setting is reinforced. This practical application, followed by the debriefing, completes the final step in the pedagogical design.
After the debriefing session, faculty encourage the students to provide feedback about the new instructional method and application of technology and simulation. In an initial evaluation, 61 of 79 students (77 percent) completed a three-item questionnaire rating their experiences with the CBI and with the UVL practical application. The feedback provided overwhelmingly positive comments about the impact of this project.
Using a five-point Likert scale, students rated the effectiveness of the CBI modules as a teaching method that prepared them for the lab experience with an average score of 4.53 (range 3 to 5). The students rated the UVL lab exercise as being designed for their specific level of knowledge with an average score of 4.48 (range 4 to 5).
Students responded to open-ended questions describing the experience of using UVL to detect the simulated spread of infectious disease. Their responses provided insightful feedback, such as: "I feel so dirty; can I wash my hands?" "This is one of the best ways of learning; this picture was worth more than a thousand words!" Comments included "wow!" "scary!" and "enlightening!" There were no negative comments about the CBIs or the patient care simulation, but two students felt that the 90 minutes of CBI preparation took longer than they would have otherwise spent preparing for class.
The project combined the use of an aural/visual modality in order to stimulate cognitive knowledge of the infection control practices, progressed to an aural/visual/tactile modality during the CBI simulations, and completed the transition with a kinesthetic, practical application in the lab followed by debriefing. This approach represents a pedagogical shift from passive to active learning, acknowledges the Joint Commission's Center for Transforming Healthcare goal of reducing HAIs, and responds to the call by Benner, Sutphen, Leonard and Day (2010) to transform teaching techniques.
Transformation is accomplished by focusing on essential knowledge and skills, incorporating technology, and integrating didactic content with lab and clinical experiences. Student feedback suggests the usefulness of this methodology as a teaching strategy that reinforces evidence-based practice, critical thinking, and clinical judgments.
Arrowsight Medical. (2014). Patient safety: Current statistics. Retrieved from www. patientsafetyfocus.com/patient-safety-current-st.html
Benner, P., Sutphen, M., Leonard, V., & Day, L. (2010). Educating nurses: A call for radical transformation. San Francisco, CA: Jossey-Bass.
Erasmus, V., Daha, T., Brug, H., Richardus, J., Behrendt, M., Vos, M., ... van Beeck, E. (2010). Systematic review of studies on compliance with hand hygiene guidelines in hospital care. Infection Control and Hospital Epidemiology, 310), 283-294.
Horan, T. C., Andrus, M., & Dudeck, M. A. (2008). CDC/NHSN surveillance definition of health care-associated infection and criteria for specific types of infections in the acute care setting. American Journal of Infection Control, 360), 309-332.
Joint Commission. (2012). Joint Commission Center for Transforming Healthcare. Retrieved from www.centerfortransforminghealthcare.org
Klevens, R. M., Edwards, J. R., Richards, C. L., Horan, T. C., Gaynes, R. R, Pollock, D. A.,.. . Cardo, D. M. (2007). Estimating health care-associated infections and deaths in U.S. hospitals in 2002. Public Health Reports, 122(2), 160-166.
Kolb, D. A. (1984). Experiential learning. Englewood Cliffs, NJ: Prentice-Hall.
Son, C., Chuck, T., Childers, T., Usiak, S., Dowling, M., Andiel, C., ... Sepkowitz, K. (2011) . Practically speaking: Rethinking hand hygiene improvement in health care settings. American Journal of Infection Control, 39, 716-724.
Lynn L. Wiles, PhD, MSN, RN, CEN, is assistant professor and director of technology and simulation, Old Dominion University School of Nursing, Norfolk, Virginia. Donna Rose, MSN, RN, is senior lecturer, Old Dominion University School of Nursing. Kimberly Curry-Lourenco, PhD, RN, a senior lecturer at Old Dominion University School of Nursing when this project was completed, is coordinator of instruction and technology, Tidewater Community College, Portsmouth, Virginia. Dave Swift, MS, now retired, was an instructional designer, Old Dominion University Center for Learning and Teaching. For more information, write to Dr. Wiles, [email protected]. | <urn:uuid:d7233b81-c7e6-447a-972e-fa8199e35607> | {
"dump": "CC-MAIN-2021-17",
"url": "https://www.thefreelibrary.com/Bringing+learning+to+light%3A+innovative+instructional+strategies+for...-a0417470515",
"date": "2021-04-13T10:48:17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072180.33/warc/CC-MAIN-20210413092418-20210413122418-00136.warc.gz",
"language": "en",
"language_score": 0.9145943522453308,
"token_count": 2537,
"score": 3.140625,
"int_score": 3
} |
Many school systems provide special education services based on children's Learning disabilities. For children with mathematical disorders, which are included in the definition of learning disability, mathematical learning difficulties, children are referred for assessment. As soon as they are classified as learning disabilities (LD), only a few children receive a sound assessment and remedy of their numeracy difficulties.
Relative neglect leads parents and teachers to believe that arithmetic learning problems are not common and not serious. But evidence from learning disabled adults debunks the societal myth that it's OK to be lazy in math. Approximately 6% of school-age children with significant math deficits are students who are classified as having learning difficulties due to numeracy difficulties and not due to pervasive reading problems. This does not mean that reading disabilities are always associated with an arithmetic learning problem. It means that mathematical deficits can be widespread and need appropriate attention and concern.
In today's world, mathematical knowledge and thinking skills are no less important than reading skills. For students with reading difficulties, there are math difficulties, which can range from easy to difficult. After years of schooling, the impact of mathematics failure, along with math illiteracy in later adulthood, can be a hindrance in everyday life and job possibilities.
There is no evidence that all children have different disabilities in maths. The research attempts to classify these types of disabilities in mathematics are validated and generally accepted, but caution is needed when describing different degrees of mathematical disability. It seems obvious that students experience not only different intensities of mathematical dilemmas of different kinds but also different classrooms, which must emphasize adaptation and different methods.
Many students with learning disabilities have persistent difficulties in memorizing basic figures, facts, and four operations with enough understanding, despite the great efforts made to do so. Although they know 5, 7, 12, 4x6, and 24, they still count fingers, pencil marks, doodling circles for years and seem incapable of developing efficient memory strategies on their own. In such cases, some present their remarkable difficulties in learning math, and it is vital not to prevent them from knowing their facts. You may use pocket-sized facts and graphs to continue with complex calculations, applications, and problem-solving.
The addition and multiplication charts should be used for subtraction and division. Students should prove speed and reliability to know the number of facts before being removed from the personal horoscope. For the use of basic fact references, a portable fact reference diagram on the back of a pocket format for older students is preferable to an electronic calculator.
A complete set of answers is valuable, and finding the same answer in the same place and time can help in remembering. Use cardboard cutouts in a reverse L shape for children who are having trouble obtaining solutions at vertical or horizontal crossings.
Blackened facts can be mastered, but over-reliance on graphs is discouraged, and motivation to learn increases.
Students with learning difficulties are unable to master basic facts and figures. They have an excellent understanding of mathematical concepts but are contradictory in their arithmetic. They are unreliable when it comes to paying attention to operational signs, borrowing, and performing complex operations. Pupils with difficulties may be tutors in mathematics in primary school years when calculation accuracy is less stressed, and later in higher grades, where their conceptual skills are in demand.
If these pupils are not accepted into upper secondary maths classes, they will continue to exhibit reckless mistakes and inconsistent numeracy skills, and they will be denied access to the higher maths skills they are capable of. Mathematics is more than the question of whether the right answers are reliable and can be calculated accurately, and it is important to access the wide range of mathematical skills and not to judge intelligence and understanding by observing weak or low abilities. Joint partnerships with students can develop self-monitoring systems with sophisticated payment while providing full and enriched scope for math teaching.
Many young children with difficulties in elementary mathematics are brought to school with a strong foundation of informal mathematical understanding. But, they find it difficult to combine this informal knowledge with the formal procedures, language, and symbolic notation systems of school mathematics. In fact, it is a complex feat to depict a new world in mathematical symbols, to know the world of magnitudes and actions, and at the same time to learn the special language we use to speak about arithmetic. The collision between their informal skills and those of school mathematics is as coherent and rhythmic as a child's experience of writing music is different from that of a child.
To make the connections strong and solid, students must have a lot of practice with a variety of concrete types. Concrete materials can be moved, held together, grouped, and separated and make them a more vivid teaching tool than pictorial representations. When images and semi-abstract symbols are introduced, they confuse the delicate connections that arise between the existing concepts of the new language of mathematics and the formal world of written numerical problems. Teachers exacerbate the difficulty in this phase of learning by asking students to match images and groups of numbers with sentences before they have enough experience to relate the variety of physical representations and the different ways in which we string mathematical symbols together and the different ways in which we call them words.
There is research showing that students who use concrete materials develop more precise and comprehensive mental representations and show more motivation, tasks, and behavior to understand and apply mathematical ideas in life situations. Structured concrete resources, on the other hand, are beneficial in the conceptual development phase of mathematical themes at all grade levels. Structured concrete materials can be used to develop concepts that explain early number relationships, place-value calculations, fractions, decimals, measures, geometry, money, percentages, number bases, history problems, probabilities, statistics, algebra, etc. Different types of concrete materials are suitable for different educational purposes (see Annex A for a selected list of material dealers).
Students have particular difficulty in arranging mathematical symbols in conventional vertical, horizontal, and multi-level algorithms, and need a great deal of experience to translate from one form to another. Workbooks with ditto pages loaded with problem-solving can help students retain their uncertainty with the norms of written mathematical notation. In these workbooks, students learn to act as problem solvers and demonstrators of mathematical ideas. The materials are not taught by themselves, but they work through teacher guidance, student interaction, and repeated demonstrations and explanations by teacher and student.
It can be helpful to structure pages with boxes of different shapes. For example, a teacher could specify the answer to an addition problem in a double box next to which it can be translated into two related subtraction problems. The teacher can dictate to the students the problem solutions that they should translate from the picture form (vertical notation) into the horizontal notation.
In pairs, the students give the answers to the problem on individual maps, and they alternate their demonstrations and examples of evidence with bundles of materials or sticks to solve the problem. You then work in pairs to translate the answers in two different ways: read the answers in 20 / 56 (1.120) and then read twenty times fifty-six (corresponding to one thousand one hundred twenty), and then multiply that number by one thousand, one hundred twenty.
These proposals are designed to free young people from the shackles of thinking that maths is all about getting the right answer. They also help to create an attitude of mind that combines understanding with symbolic representations linked to appropriate language variations. For LD students who are handicapped due to terminology confusion, difficulties in following verbal explanations, or weak verbal skills in the linguistic aspect of mathematics, every step of a complex calculation (e.g. Instead of adding "A" and "Z" to the solutions, the goal is to find the "bad eggs.".
Teachers can help by slowing the pace of their transmission, maintaining the normal timing of phrases, and providing information in individual segments. Questioning, delivering instructions, explaining theories, and providing explanations all need slower amounts of spoken information. The time in mathematics should be filled with explanations from teachers, rather than with silent written exercises. This is especially important when asking students to verbalize their actions.
Letting students play with the teacher is not only fun but also necessary to learn the complexity of language and mathematics. Children with language deficits respond to math problems on the page by signaling that meaningful sentences need to be read for comprehension. Students with language confusion must provide specific material to explain what they are doing, regardless of age or level of math, not in the first grade. Understanding children tend to be better when they need to explain, elaborate, and defend their position than when others are burdened with doing so, which is an extra impetus for those who need to connect and integrate their knowledge in a critical way.
It's because they avoid verbalizing. Young and older students need to develop a habit of reading what is being said about the problem rather than calculating it. By engaging in these simple steps of self-verbalization, they can pay more attention to their attentive slip-ups and reckless mistakes. Listen to me and ask if anything makes sense.
Students with limited conceptual understanding and significant motor impairment are thought to have right hemisphere dysfunction. In a small number of LD students, disorders in visual, spatial, and motor organization lead to poor understanding of concepts, poor numerical sense, specific visual difficulties, uncontrolled handwriting, and confused arrangement of numbers and characters on one page. Adolescents with language impairments undertake repeated teacher modeling, patient remembering, and a lot of practice with stitch cards and visual reminders.
This small subgroup requires a strong emphasis on a precise and clear verbal description. In fact, they need to be corrected in the areas of image interpretation (e.g. Diagrams, graphs), reading, and non-verbal social cues. They seem to enjoy replacing verbal constructions with the intuitive, spatial, and relational understanding that they lack. Illustrative examples and diagrammatic explanations can confuse them, and they should not be used when trying to teach or clarify concepts.
To develop an understanding of mathematical concepts, it is useful to use concrete teaching materials (e.g. Stars, Cuisenaire bars) and conscientious attention to developing stable verbal reproductions of quantity (5), relation (5 less than 7), and action (5 + 2 = 7 ). For example, students should learn to recognize a triangle by holding a triangular block and saying to themselves, "This is a triangle with three sides. Understanding visual connections and organization can be difficult for some students, so it is important to anchor verbal constructions through repeated experience with structured materials that feel seen and moved when spoken about. | <urn:uuid:28d29c57-243d-4518-8480-fc942c49eda6> | {
"dump": "CC-MAIN-2022-05",
"url": "https://praadisedu.com/blog/learning-disability-in-math-higher-education",
"date": "2022-01-23T18:08:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304309.5/warc/CC-MAIN-20220123172206-20220123202206-00532.warc.gz",
"language": "en",
"language_score": 0.9478141665458679,
"token_count": 2150,
"score": 3.5625,
"int_score": 4
} |
A key factor in Oklahomaβs ability to detect, monitor and control antimicrobial resistance is its public health laboratory capacity. Across the nation, increasing cases of antimicrobial resistance are currently swamping the ability of each state's public health laboratory to keep pace. There has been limited funding in the past for antibiotic resistance education programs and surveillance, and even this limited funding is on the decrease. Approximately only half of state public health labs can provide some basic resistance testing. Like many states, Oklahoma lacks the targeted technical ability to detect and characterize emerging resistance patterns promptly in a range of pathogens. Therefore, such resistant organisms continue to spread unrecognized and unimpeded throughout the state.
1 Dr. Fred Tenover, quoted in βThe Bacteria Fight Backβ Science, July 18, 2008. 2 R. Monina Klevens et al. βInvasive Methicillin-resistant Staphylococcus aureus Infections in the United States,β JAMA, October 17, 2007: 1763-1771.3 Elixhauser, A. and Steiner, C. Infections with Methicillin-Resistant Staphylococcus Aureus (MRSA) in U.S. Hospitals, 1993β2005. HCUP Statistical Brief #35. July 2007. Agency for Healthcare Research and Quality.4 2006 Annual Summary of Infectious Disease, Oklahoma Department of Health.5 CDC MMWR βGuidance for Control of Infections with Carbapenem-Resistant or Carbapenemase-Producing Enterobacteriaceae in Acute Care Facilitiesβ March 20, 2009 / Vol. 58 / No. 106 K. F. Anderson, et al.; Evaluation of Methods To Identify the Klebsiella pneumoniae Carbapenemase in Enterobacteriaceae; Journal of Clinical Microbiology, August 2007, p. 2723-2725, Vol. 45, No. 87 Public Health Fact Sheet on Pneumococcal Disease, Oklahoma Department of Health, October 2005.8 CDC Wonder Death Certificate Data, cited in a July 28, 2008 communication to Senator Sherrod Brown9 Healthcare Cost and Utilization Project (HCUP) State Inpatient Databases (SID), Agency for Healthcare Research and Quality, http://www.hcupnet.ahrq.gov/, cited in a July 28, 2008 communication from CDC to Senator Sherrod Brown
Oklahoma AR Fact sheet
1300 Wilson Boulevard Suite 300 Arlington, VA 22209 | Phone: (703) 299-0200 | Fax: (703) 299-0204
| HIVMA | Contact Us
Β© Copyright IDSA 2014 Infectious Diseases Society of America | <urn:uuid:d84aa2db-0ebb-49d7-9088-b3160eb9b556> | {
"dump": "CC-MAIN-2014-41",
"url": "http://www.idsociety.org/AR_Oklahoma/",
"date": "2014-09-23T18:21:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657139395.59/warc/CC-MAIN-20140914011219-00006-ip-10-234-18-248.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8575180768966675,
"token_count": 556,
"score": 3.046875,
"int_score": 3
} |
Give us Feedback!
Set the category for this topic
Arts & Culture
Biology & Nature
Business & Companies
Food & Drink
Geography & Travel
Health & Medicine
History & Events
Religion & Philosophy
Society & Politics
Technology & Computing
Transportation & Vehicles
Phase I environmental site assessment
- Created 2012-03-03
In the United States, an
environmental site assessment
is a report prepared for a real estate holding that identifies potential or existing environmental contamination
. The analysis, often called an
, typically addresses both the underlying land as well as physical improvements to the property. A proportion of contaminated sites are "
s. " In severe cases, brownfield sites may be added to the
National Priorities List
where they will be subject to the U.S. Environmental Protection Agency's
The actual sampling of soil, air, groundwater and/or building materials is typically not conducted during a Phase I ESA. The Phase I ESA is generally considered the first step in the process of environmental
. Standards for performing a Phase I site assessment have been promulgated by the US EPA and are based in part on
in Standard E1527-05.
If a site is considered contaminated, a Phase II environmental site assessment may be conducted, ASTM test E1903, a more detailed investigation involving chemical analysis for hazardous substances and/or petroleum hydrocarbons.
from Wikipedia (last updated: 06 December), licensed under
What do you know about this topic?
Please make sure to only add personal information and experiences about this topic that complements the article above. Comments or opinions should be posted at the bottom of the page by clicking
. Thanks alot for contributing!
...or create an Experience Page
Currently no applications. Add an application using the contribute box to the right.
Let People Vote
Ask a Question
EPA Standards and Practices for All Appropriate Inquiries -Final Rule
ASTM official site
Certified Hazardous Materials Manager
Add new image
Add image by copy and paste a link:
Add external link
Links to external pages
Add related topic
Links to related topics
Copyright 2011 Β© Empedia.com BETA
Forgot your password? | <urn:uuid:42542ab4-aa8c-48e5-94ab-5cd031c068e3> | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.empedia.com/topic/phase-i-environmental-site-assessment?id=941b0ff8-eafa-4cf0-b613-ba3892a122d4",
"date": "2013-12-08T14:16:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065880/warc/CC-MAIN-20131204131745-00026-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8132095336914062,
"token_count": 457,
"score": 3.046875,
"int_score": 3
} |
Social media has literally altered the way we live and interact with our friends and communities. Nowadays children are busy using their phones, instead of enjoying their company. Sadly for them, they are missing all the fun and the memories they could make in this beautiful period of their childhood. Excessive usage of these sites became enormously common, especially among youngsters. It has detrimental effects on both individuals and society including physical, mental, and social health. The upsurging of this phenomenon is an alarming bell for many families.
Social Platforms such as Facebook and Instagram are playing such roles in forming the lives of our children today. Nearly all people have active accounts on these websites, making their users more glued and addicted; controlling their thoughts and emotions. Their negative impacts have mostly been observed in teenagers, who are the weakened ones among other age groups. To illustrate, studies showed that more than 3 billion internet users and 2 billion social media users with 1.6 billion active mobile social accounts. In today's life, young people lack health and tend to be obese due to their reliance on their mobile phones doing their activities instead of exercising and working out. This addiction threatens their quality of life of them.
Concerning their effect on mental health, using this hypothecal network causes depression, increases self-isolation, and lowers self-esteem. In addition, users can develop an inferiority complex when their friends get more comments and likes. In particular, an investigational survey found that 55% of youths who were considered to be higher online users, were less involved in their real life. The sheer size of social networks makes it difficult to monitor and moderate all of their content. Internet users - especially naive ones - who share personal photos, expose themselves and their information to be exploited by hackers, and cause some serious security issues. For example, thousands of fake identities and profiles are widespread through these online platforms. Undoubtedly, the educational system is the one that is negatively affected by the misusage of these sites among students. The student is currently suffering from self-distraction and hardness in absorbing the lessons. Learners are currently trying to imitate famous bloggers and influencers. To illustrate, most young learners follow famous footballers, singers, and bloggers rather than follow teachers, professors, and scientists.
Making social media as beneficial as possible can be and this role puts a huge responsibility on individuals and society. Some of the corrective actions that should be taken in this approach are: Firstly, According to the quote, βThe first step in solving any problem is recognizing there is one (Zig Ziglar 6), so admitting is the first milestone for the solution. Therefore, some simple settings a person can adjust to tell themselves about how long they have been online. It can be like a Facebook alert popup feature notifying users who have been online for two hours and beyond. Since I believe banning these sites is not the point because they are useful; limiting them will be more efficient. Secondly, encouraging teens to have hobbies and do sports. These social activities showed how they are advantageous to the personβs relationship and personality. Besides, their health benefits, having face-to-face interaction with real mates, boosts oneβs self-confidence and builds priceless memorable experiences. As an example, children in the past used to play soccer with each other, unlike today, they rather sit at home to play online video games. Thirdly, marketing those ideas through promotion campaigns, media, and paper advertisements is crucial to raise awareness for the audience. Such as informing youngsters - about how is advantageous to do sport for their safety, and health - could have positive feedback on their behavior. Finally, cities around the world should be built in a way to promote this healthy culture in their population. Therefore governments should replan and move forward to establish separate cycles and walking lanes.
Despite the advantages of using social platforms, their drawbacks are indeed too obvious to ignore, overshadowing their benefits. The world should strive to take huge steps to solve this global issue - by promoting health and awareness through using technology and the media to further protect our children from this cultural and habitual invasion.
Share This Post On
Leave a comment
You need to login to leave a comment. Log-in | <urn:uuid:b68705df-9e2a-4382-a75e-0303a666a18c> | {
"dump": "CC-MAIN-2022-49",
"url": "https://thesocialtalks.com/health/social-media-addiction-in-young-generation/",
"date": "2022-12-09T16:14:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711417.46/warc/CC-MAIN-20221209144722-20221209174722-00545.warc.gz",
"language": "en",
"language_score": 0.9629030227661133,
"token_count": 858,
"score": 3.09375,
"int_score": 3
} |
What did the Indians use from the buffalo?
Natives & Whites
The Indians used almost every piece of the buffalo in one way or another.
βIt gave its life so Indians could live. The buffaloβs generosity provided Indians with food and shelter. Indian people modeled the buffaloβs generosity, and it became fundamental to the economy of the American Indian.β
Richard B. Williams ~Oglala Lakota
BONES β Knives-Awls-Quirts-Tableware-Tools-Shovel β Scrapers-Pipes-Saddle Tree- Fleshing Tool- Paint Brush-Splints- Arrowheads- War Clubs- Game Dice- Toys- Tools- Shields- Fertilizer-Sleds-Saddle Tree-Scrapers-Jewelry
Thaβkahintβna, saw β fiddle men under Kiowa Apache ) . Thak -a -i-nin β: β Hayden, Ethnog, and Philol. Mo. Val . , 326 , 1862 ( people who play on bone instruments,β that is, a pair of buffalo ribs, one notched, over which the other is rubbed: Arapaho name).
RAWHIDE β Containers-Shields-Buckets-Moccasins-Drums-Splints-Mortar-Cinch-Ropes-Sheath-Saddle Tree-Stirrups-Bull Boats-Masks-Par Fleche-Ornaments-Straps(Sewing)-Caps-Quirt-Snowshoes-Water Trough
Then they take a buffalo green hide, covered with its winter curls, and having properly shaped it to the frame, they sew it with large thongs of the same skin, as tight and secure as need be; when it is thoroughly dried, it appears to have all the properties of a cuirass saddle.
HORNS β Arrow Points-Cups-Fire Carrier-Powder Horn-Spoons-Ladle-Headdress-Signal-Toys-Medication-Scoop-Comb [According to Arlene Fradkinβs Cherokee Folk Zoology (N.Y.: Garland, 1990), the horns were made into surgical instruments for curing swellings from boils and toothaches as well as for war trumpets. ]
HIDE/BUCKSKIN β Winter Robe- Tipi Liners- Tipi Cover βTapestries- Sweat Lodge Cover- Shirts βBackrest-Quivers -Moccasin Top βLeggings- Dresses- Cradles- Bridles- Belts βBedding- Bags- Trade/Money- Leggings- Dresses-Backrest- tapestries-Dolls-Mittens
Bull neck hides were for bullet and arrow proof shields.
Buffalo calf hides used as blankets for young children.
HAIR/WOOL- Pillows- Medicine Ball-Doll Stuffing-Ropes-Hair Piece-Ornaments-Moccasin Lining-Pad Filler-Halters-Bracelets-Headdress-Necklaces/Jewelry. (spun)
The Indian women spin buffalo wool on a spindle and from the yarn make bags to carry the smoked or dried meat. βThey sometimes dry their meat in the sun. Frequently they keep meat three or four months; for although they have no salt, they cure the flesh so well that it does not spoil at all.β Louis Hennepin
James Adair β Southern Tribes 1740-1760 Indian females continually wear a beaded string round their legs, made of buffalo-hair, which is a species of coarse wool; and they reckon it a great ornament, as well as a preservative against miscarriages, hard labour, and other evils.
The women bore small holes in the lobe of their ears for their rings, but the young heroes cut a hole round almost the extremity of both their ears, which till healed, they stretch out with a large tuft of buffaloβs wool mixt with bearβs oil: then they twist as much small wire round as will keep them extended in that hideous form.
FAT βTallow-Hair Grease-Cosmetic Aids-Soaps-Pemmican Wasa-Lubricant-Candle Tallow-Back Fat (Special)
The buffalo were always very fat and this fat was used by the hunters for all cooking purposes. It was whiter than beef tallow, and when cold was not nearly so hard. It had a mild pleasant taste and in cold weather, we drank it hot like broth or soup.
1893-The Kickapoo Indian Salve is made by the Kickapoo Indians from the best buffalo tallow. It is specific for skin diseases, soothing, and excellent for erysipelas, eczema, boils, piles, burns, etc. It also sells for 25 cents per box
White Buffalo: in the days when the bison abounded in the United States a pure white specimen was on rare occasions captured by an Indian hunter, and its skin, priceless to the captor, was devoted to religious uses. (not all Natives)
βThe Buffalo was part of us, his flesh and blood being absorbed by us until it became our own flesh and blood. Our clothing, our tipis, everything we needed for life came from the buffaloβs body. It was hard to say where the animals ended and the human began.β
John (Fire) Lame Deer, Oglala- Lame Deer Seeker of Visions, with Richard Erdoes, 1972
CHIPS -Fuel-Smoke Signals-Early Tanning-Ceremonial Incense-Stacked for Barrier/ppl-Marking Sites-Powdered-Absorbent- Site Markers
TAILβ Medicine Switch-Decorations-Whips-Fly Brush-Game Wheel
HOOVES & DEW CLAWS β Glue-Rattles-Spoons-Wind Chimes-Ceremonies Buffalo hoofs were sometimes worn on warriorsβ feet during war expeditions so as to deceive the enemy. Steeping high to avoid beating down the grass.
βThe Indians keep their hoofs, dry them, and attach them to switches, which they shake and rattle to accompany the changing postures and steps of the singers and dancers. This contrivance somewhat resembles a Basque tambourine. β Louis Hennepin
MUSCLE β Glue-Bows-Thread-Arrow Ties-Cinches-Webbing Snowshoes-Jerky
SCROTUM β Containers-Rattles
The Daily Republican, June 19, 1885
KILLED FOR THEIR HIDES
(extract) Read More
At nearly every station on the railroad, last year could be seen piled up for shipment the chaotic anatomy of thousands of buffaloes. Cattlemen were paid $2 and $3 a wagon load for them Cowboys with little else to do, and even lazy Indians with an eye to the almighty dollar went into the scavenger business and collected buffalo bones for lucre. For months car load after car load, to the number of thousands, passed eastward to Minnesota, Indiana, and Illinois, where they were turned to account as fertilizers. Even the skulls and bones that surveyors have stood up as sighting points have been picked up and carted off, such is the demand for them. Delivered at the factories the farmers are worth $25 a ton, the freight charges ranging from $8 to $10 per ton. Horns alone bring $40 a ton and are extensively used by makers of umbrellas and fans. From a portion of the head, glue is obtained, and the neck bones and shoulder blades are worked up into the popular buffalo horn buttons. A great many of our buffalo bones, horns, and hoofs are annually shipped to England, and, after being turned over once or twice by the cutlery factories of Sheffield, come back to us in the shape of fine knife handles and other articles of finished cutlery. England also imports great quantities of beef shanks for the manufacturing of fertilizers.
TENDONS β Sewing-Bowstrings- Musical Instrument Strings. (resembled a banjo, but larger 5β² long and 1β² wide at the head, and had eight strings) Hooves and Tendons boiled made glue.
BEARD β Ornaments-Dolls-Mittens
SKULLβ Sun Dance-Medicine Prayers-Rituals, Markers (Signal Stations)
TONGUE β Prime Meat-Comb (rough side)- Special Treat
GALL β Yellow Paints-Bile β Condiment (mustard)
PAUNCH (Rumen) -Wrappings (Meat)- Buckets-Collapsible Cups-Basins-Canteens
BLOOD β Soups-Puddings-Paints β In 1901 The American Naturalist published a section on plants used by American Natives. Blackfeet β Berries: esteemed a delicacy when boiled in buffalo blood. (pudding?)
Early Years on the Southern Arapaho Reservation
There were approximately 1,650 Southern Arapaho in 1871, when they settled on the reservation with the Cheyenne. For the first few years in present-day Oklahoma, the tribe was able to hunt some bison that still ranged near the reservation, and the Quaker agency on the reservation did not force farming or ranching on the tribe but taught by example. (source)
Raw morsels of the meat would have been snacked on while the butchering was taking place. Raw liver, kidney, eyes, belly fat, testicles, parts of the stomach, marrow from leg bones, gristle from snouts, hoofs of unborn calves, and tissue from the sack they had been in.
LIVER β Tanning-Eating
STOMACH β Eaten Raw-Boiled-Roasted-Parts Dried
KIDNEYS β Fat Source-Medicine
STOMACH CONTENTS β Medicines-Paints
BUFFALO CIDER.β A liquid found in the stomach of the buffalo, which has sometimes served the hunter in good stead, when far removed from water.
STOMACH LINER β Water Container- Cooking Vessel
INTESTINES β String-Jewelry-Eating Fresh-Storage Cont.- Sausage Skins
For the Indians, this animal was sacred and they honored the buffalo through, dance and prayer ceremonies. Giving back to what they had been given. their whole way of survival and life.The buffalo means everything to the Indians. He was their house, their food, their clothing, their implements of warβ-hide, flesh and bone, he belonged to them. Their horses were picketed with buffalo thongs and buffalo hair halters; their saddles were of buffalo skin pads, while the stirrups were of the same material. The Indian used his stomach as a cooking utensil. Making a hole in the ground, this organ was set in and filled with hot stones. No other animal of the plains served the Indian so well. He entered so vitally Info their daily routine that a buffalo dance was devised to perpetuate his memory and show what the Indians have gone through in the chase. Instead of bragging with their tongues, as does the white man, they use pantomimes; In the dance, they imitate the sneaking process of stalking game and dragging it home. Today on every reserve in the west, buffalo skulls and bones adorn the tepees and lodes of the red men.
HEAD HIDE β Bowl
HEAD HAIR β The hide hunters as a rule do not remove the skin from the buffaloβs head, which was covered with long coarse hair that never shed; This hair was gathered up by the bone pickers and was sold for $.75 a pound. It was used principally for stuffing cushions and mattresses.
HEART β Sack (for dried meat)- Special Treat
CALF β Fetal Calf (stew type dish)
βWhen buffalo cows have been killed by the Indians, the little calves follow the hunters, licking their hands and fingers. The Indians sometimes take them to their children and after the children have played with them, the calves are killed with a club and eaten.β Louis Hennepin
BLADDER β Medicine Bags-Pouches
HIND LEG SKIN β Pre-shaped Moccasins
BRAIN β Hide Tanning-Food
MEAT β Immediate Use-Sausage-Cached Meat-Jerky-Pemmican-Wasna-Trade/Money
Chicago Tribune, Illinois Nov. 30, 1877
How the Is Condensed Made and Eaten.
Food How Pemmican Tastes Flavors of Tallow Candles and Sola Cushions.
The Liquor Trade Among the Indians β An Indianβs Method of Treating His Friends.
Correspondence New York Evening Post-Winnipeg, Manitoba, Nov. 1. The autumn trade along the line of the Hudsonβs Bay Companyβs posts in the Saskatchewan or Plain districts is reported to be more than usually light. This is partly owing to the failure of the autumn buffalo hunts, the entire proceeds of which have heretofore, with little exception, found their way into the forts of the Fur Company; and in part to the establishment of fur-trading stations throughout the Indian country. With the exception of dealings in buffalo-robes and provisions, but little valuable trade reaches the Saskatchewan district. Indeed, the entire line of southern forts would probably have been abandoned long since, had the Company considered merely the question of profits upon the trade of the district; which, I am given to understand, has not paid expenses for several years. Unfortunately, the Plain districts furnish a species of provision unattainable in any other portion of the territory, and to secure this the Company are forced to maintain many expensive establishments and a large force of men. This provision is manufactured from the flesh of buffalo and is almost the sole article of food issued by the Company to its thousands of voyageurs, hunters, and traders. A scarcity of this staple threatens the vast transport service of the corporation with direct consequences. Take from the regular army ration flour and pork, and you would produce about the same effect as that produced by the subtraction of pemmican from the daily supplies of the vast force of the Companyβs servants, a force equal to more than half your standing army. It is the national dish, so to speak, of a population composed of many nationalities; and, like everything else in this peculiar country, is a wonderful mixture. It is a difficult matter to tell at all times exactly where the half-breed ends and the white man or Indian begins; correspondingly difficult is it to tell where the buffalo terminates and the pemmican begins.
It is only of late years that pemmican has come into public notice as a condensed food value to the commissariat upon long expeditions. Hitherto it has been a provision peculiar to British America, and particularly to the service of the Hudsonβs Bay Company. Notwithstanding the vast annual slaughter of buffaloes south of the forty-ninth parallel, no pemmican is made there; the meat being used in the fresh or green state, or in the form of jerked beef. The pemmican of the English Arctic expeditious differs from the real article in being made of beef mixed with raisins and spices and preserved from decay by being hermetically sealed. Buffalo pemmican may be said to keep itself, requiring no spices or seasoning for its preservation, and may be kept in any vessel and under any conditions, except that of dampness, for an unlimited time. It is one of the most perfect forms of condensed food known and is excelled by no other provision in its satisfying quality. The amount of it-used throughout the territory is almost incredible, as, besides the enormous quantity consumed in the Companyβs service, it appears, when attainable, upon the table of every half-breed in the country. So essential is it to the wants of the voyageurs, as the staple article of food upon the long voyages made in the transportation service of the Fur Company, that its manufacture is stimulated in every way by the agents of that corporation, and every available pound is bought up for its use.
HOW PEMMICAN IS MADE.
Pemmican forms the principal product of the summer buffalo bunt, when, to preserve from decay the large quantities taken, some artificial process is necessary. A considerable amount is also made in the earlier part of the autumn hunt, though the major part of the product of this chase is preserved by frost in a fresh condition. To manufacture pemmican the flesh of the buffalo is first cut up into large lumps, and then again into flakes or thin slices, and hung up in the sun or over the fire to dry. When it is thoroughly desiccated it is taken down, placed upon raw-hides spread out upon the prairie, and pounded or beaten sometimes by wooden flails, again between two stones, until the meat is reduced to a thick flakey substance or pulp. Bags made of buffalo hide, with the hair on the outside, about the size of an ordinary pillow or flour sack, say two feet long, one and a half feet wide, and eight inches thick, are standing ready, and each one is half-filled with the powdered meat. The tallow or fat of the buffalo having been boiled by itself in a huge caldron is now poured hot into the oblong bag in which the pulverized meat has previously been placed. The contents are then stirred together until they have been thoroughly mixed: the dry pulp being soldered down into a hard solid mass by the melted fat poured over it. When full the bags are sewed up as tightly as possible, and the pemmican allowed to cool. Each bag weighs 100 pounds, the quantity of fat being nearly half the total weight, the whole composition forming the most solid description of food that man can make. It is the traveling provision used throughout the North, where, in addition to its already specified qualifications, its great facility of transportation renders it extremely valuable. There is no risk of spoiling it, as, if ordinary care be taken to keep the bags free from mold, there is no assignable limit to the time pemmican will keep. It is estimated that on average the carcasses of two buffaloes are required to make one bag of pemmican β one filling the bag itself, the other supplying the wants of the wild savage engaged in hunting it down.
A DAINTY DISH
The best form of pemmican, made for table use, generally has added to it ten pounds of sugar and saskootoom or serviceberries, the latter acting much as currant jelly does with venison, correcting the greasiness of the fat by a slightly acid sweetness. Sometimes wild cherries are used instead of the saskootoom. This berry-; berry-pemmican is considered the best of its kind and is very palatable.As to the appearance of the commoner form of pemmican, take the scrapings from the dryest outside corner of a very stale piece of cold roast, add to it, lumps of tallowy, rancid fat, then garnish all with long human hairs, on which string pieces, like beads upon a necklace, and short hairs of dogs or oxen, or both, and you have a fair imitation of common pemmican. Indeed, the presence of hairs in the food has suggested the inquiry whether the hair on the buffaloes from which the pemmican is made does not grow on the inside of the skin. The abundance of small stones or pebbles in pemmican also indicates the discovery of a new buffalo diet heretofore unknown to naturalists. In fact, I have seen men who were only prevented from taking a sieve and fine-tooth comb to the table when pemmican formed the principal dish by a certain delicate respect for their hostβs feelings. But these men did not like pemmican. Carefully made pemmican. flavored with berries and sugar, is nearly as good; but of most persons new to the diet it may be said that, in two senses, a little of it goes a long way. Nothing can exceed its sufficing quality: it is equal or superior to the famous Prussian sausage, judging of it as we must. Two poundsβ weight, with bread and tea, is enough for the dinner of eight hungry men. A bag weighing 100 pounds, then, would supply three good meals for 130 men. A sled-dog that will eat from four to six pounds of flesh per day, when at work, will only consume two pounds of pemmican if fed upon that food alone. I have often seen hungry men laugh incredulously at the small handful of pemmican placed before them as sufficient for a meal; yet they went away satisfied, leaving half of it. On the other hand, I have seen half-breeds and Indians eat four pounds of it in a single day: appetites like that, however, do not count in ordinary food estimates.
THE FLAVOR OF PEMMICAN.
The flavor of pemmican depends much on the fancy of the person eating it. There is no other article of food that bears the slightest resemblance to it, and as a consequence, it is difficult to define its peculiar flavor by comparison. l have heard it likened to sawdust, oak chips, and tallow candles, again to tallow candles, elm chips, and the stuffing of sofa cushions,- the candle flavor being the only point common to all descriptions of its taste. Pemmican may be prepared for the table in many different ways, the consumer being at full liberty to decide which is the least objectionable. The method largely in vogue among the voyageurs is that known as βpemmican straight.β that is, uncooked, But there are several ways of cooking it which improve its flavor to the civilized palate. There is rubeiboo, which is a composition of potatoes, onions, or other esculents, and pemmican boiled up together, and, when properly seasoned, very palatable. In the form of richot, however, pemmican is best liked by persons who use it, and by the voyageurs. Mixed with a little flour and fried in a pan, pemmican in this form can be eaten, provided the appetite be sharp, and there is nothing else to be had. This last consideration is, however, of importance.
Another form of provision, also the product of the summer hunts and extensively used, is dried meat. In its manufacture the flesh of the buffalo undergoes the same treatment as in the preparatory stages of pemmican making, when it has been cut into thin slices it is hung over a fire, smoked, and cured. It resembles sole leather very much in appearance. After being thoroughly dried, it is packed into bales weighing about sixty pounds each, and shipped all over the territory. The fresh or green meat supplied by the late autumn hunt is generally consumed in the settlements and is not much used as a traveling provision. The serious decrease in the number of buffaloes, which has been observed year by year, threatens to produce a very disastrous effect upon the provision trade of the country; and the time cannot be far distant when some new provision must be found to take the place of the old. I recollect very well when pemmican, which now can be procured with difficulty for one shilling and three pence a pound, could be had at two pence, and dried meat formerly costing two pence now costs ten pence. This is a fact which threatens to revolutionize in a manner the whole business of the territory, but more particularly the transport service of the Company.
HOW THE INDIANS DRINK
So requisite to the successful prosecution of the fur trade is pemmican considered to be by the Company that, until a comparatively late year, it was the only article embraced in the trade-lists for which liquor was bartered. Spirits never at any time form a medium of exchange for furs in the Companyβs service, and their importance into the northern districts for any purpose whatever is strictly prohibited. In the Plain districts, however, the trade-in liquor was first suggested as a stimulant to the manufacture of provisions; the amount given being limited to a small quantity to each Indian at the termination of a trade. Even then no drinking was permitted within a mile of the forts, a course doubtless suggested by the fact that an intoxicated Indian is about the most irrepressible being a quiet man can possibly have about him. Unfortunately for the moderate use of this incentive to pemmican-making, on the part of the red man, his acute intellect instantly conceived the idea of utilizing this particular provision as a perpetual legal-tender for liquor. So he withheld his pemmican until the food supply ran short among the forts of the corporation, and forced compliance with his own terms. For all the other wants of his savage life, he had furs and robes to trade. The scenes that occurred in the Indian rooms of the forts during the progress of a liquor and pemmican trade were not circulated to impress one favorably with the moral status of either his white or red brother. The spirit used was generally rum, which, although freely diluted with water, soon reduced the assemblage to a state of wild hilarity, quickly followed by stupidity and sleep. The strength of the firewater dealt out was varied according to the capacity or hardheadedness of the different tribes. The liquor for the Cress, as living in the neighborhood of the forts and supposed to be capable of standing more, was composed of three parts of water to one of spirit; that of the Blackfeet, a distant tribe, who had access to liquor infrequently, seven of water to one of spirit. So great, however, is the power which alcohol in any form exercises over the red man that the Blackfeet, even upon their well-diluted liquor, were wont to become hopelessly intoxicated.
QUEER SCENES AT A LIQUOR SALE
A liquor trade generally began with a present of fire-water all round. Then business went on apace. After an Indian had taken his first drink it was a matter of little difficulty to obtain all he had in exchange for spirits. Horses, robes, tents, provisions, all would be proffered for one more dram of the beloved poison. As the trade advanced it degenerated into a complete orgie. Nothing could exceed the excitement inside the room, except it was the excitement outside, for only a limited number of the thirsty crowd could obtain entrance at a time. There the anxious braves could only learn by hearsay what was going on within. Now and then a brave, with an amount of self-abnegation worthy of a better cause, would issue from the fort, with his cheeks distended and his mouth full of rum, and going along the ranks of his friends he would squirt a little of the liquor into the open mouths of his less fortunate brethren. There were times, however, when matters did not go on so peaceably. Knives were wont to flash and shots to be fired, and the walls of the Indian rooms at many of the forts show many traces of bullet marks and knife hacking, done in the wild fury of the intoxicated savage. Some seventeen years ago this baneful distribution was stopped by the Company in the Plain districts, but the fur-traders still continue to employ liquor as a means of acquiring the furs belonging to the Indians. Great as was the quantity of pemmican obtained from the Indians during these trades β more than 30,000 bags being stored in the Companyβs forts at one time, it is still small as compared with the amount produced in a favorable year by the semi-annual buffalo hunts of the nomadic hall-breeds. H. M. K.
The Weekly Republican
Cherryvale, Kansas Jul 22, 1887The Buffalo Dance
Among the Indians of the northern plains is a custom called βdancing the buffalo.β It is resorted to when the hunters have great difficulty in finding the buffalo β a difficulty which has been growing more pronounced every year, until of late the poor Indian finds his βbuffalo medicine danceβ fails universally and he has all but lost faith in it. And yet it has but rarely failed before, for the peculiar strength of the βmedicineβ lies in the fact that when the medicine dance is one started it is Up religiously night and day until the outsiders discover buffalo, and as the Indians reasons, the dance brought them. The Crows had a dance recently. They believe that the Great Spirit has secluded the buffalo temporarily, but that as soon as he recovers from his sulk he will send them back again. The Crow dance did bring a half-dozen old bulls to the Crow hunters; not much meat, to be sure, but a sure sign of the strength of the medicine. Ten or a dozen men dance at a time, and as they grow weary and leave their places, others take them, and so keep up the ceremony. They wear the head or mask of a buffalo, which each warrior is supposed to keep in his outfit; the tails are often attached to these by a long piece of hide. Drums are beaten, rattles shaken, and the usual Indian yelling is kept up. The hunters all have their arms ready, and the outlying hills are patrolled. These dances have been kept up in certain villages for two or three weeks on a stretch without stopping an instant. When a man becomes fatigued he signifies it by bending quite low, when another draws a bow and hits him with a blunt arrow. He falls to the ground, and is dragged off by the spectators, who proceed to butcher him in play, much after the fashion of children; for the Indian in his sportive moods is for all the world like an overgrown boy. In all the different dances the Indians have a special step. It reaches the zenith of muscular exertion and extravagance in the war dance, and is very quiet in certain medicine dances, the bodies seemingly scarcely to move. In the buffalo dance, they follow around in a circle, lifting their feet and undulating their bodies. Alas for the buffalo, and alas for the poor Indian, too, the buffalo dance will no more bring the countless thousands of bison to the site of the hunter, and the only meat he will ever eat ranges between Government steers and sage hens.
βBuffalo Danceβ Buffalo Dance is an 1894 American 16-second black and white silent film shot in Thomas Edisonβs Black Maria studio.
It was produced by William K. L. Dickson with William Heise a cinematographer and features three Sioux warriors named Hair Coat, Parts His Hair and Last Horse dancing in a circle while two other Native Americans accompany them with drums. | <urn:uuid:6986d25e-9d09-4f7c-8ca6-fcfa27436789> | {
"dump": "CC-MAIN-2023-06",
"url": "https://allaboutbison.com/what-part-of-the-bison-was-used/",
"date": "2023-01-31T16:40:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499888.62/warc/CC-MAIN-20230131154832-20230131184832-00488.warc.gz",
"language": "en",
"language_score": 0.9590083360671997,
"token_count": 6579,
"score": 3.40625,
"int_score": 3
} |
The Labour Partyβs Elizabeth McCombs became New Zealandβs first woman Member of Parliament, winning a by-election in the Lyttelton seat caused by the death of her MP husband James McCombs (one of the first Labour members, who had held the seat since 1913). Read more about Elizabeth here.
Although New Zealand women had famously won the right to vote in 1893, they were not allowed to stand for Parliament until 1919. A handful of women had contested elections, including the well-known Ellen Melville in Auckland, and McCombs herself in 1928 and 1931. Although James had won Lyttelton by just 32 votes in 1931, Elizabeth achieved a majority of 2600. Sadly, she died less than two years later.
The McCombs family tradition continued after Elizabethβs death: she was succeeded by her and Jamesβ son Terence, who was MP for Lyttelton until 1951, and from 1947 to 1949 Minister of Education. His defeat in the snap βwaterfront disputeβ election ended his familyβs 38-year hold on the seat. The second woman MP was Labourβs Catherine Stewart, who was elected for Wellington West in 1938.
Image: Elizabeth McCombs | <urn:uuid:56b9c357-2ef4-4378-9219-906f701d2a96> | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.nzhistory.net.nz/elizabeth-mccombs-elected-as-nzs-first-woman-mp",
"date": "2013-06-20T01:27:37",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709337609/warc/CC-MAIN-20130516130217-00067-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9863378405570984,
"token_count": 253,
"score": 3.3125,
"int_score": 3
} |
When Horace Walpole wrote The Castle of Otranto in1764, he launched literary movement steeped in mystery that gained immediate popularity and numerous imitators. Even today, these novels generally include an isolated, vulnerable heroine; a dark, sardonic hero whose actions make him suspicious; and paranormal elements such as family curses, omens, and ghosts. Although the movement began with a man, the novels and their readers have primarily been women, and provided a vehicle for some of the first women to earn their living by writing: Ann Radcliffe and Charlotte BrontΓ«, for example. Modern gothic novelists have taken the genre further, adding vampires and werewolves to the mix, and empowering the heroine.
Chegg is for students
See what's inside! | <urn:uuid:106a0122-eb9f-417d-bbd3-089571f96aaf> | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.chegg.com/homework-help/definitions/gothic-literature-41",
"date": "2013-05-18T09:32:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382185/warc/CC-MAIN-20130516092622-00018-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9609923362731934,
"token_count": 159,
"score": 3.59375,
"int_score": 4
} |
How Does A Moon Phase Watch Work
It seems that weβre always keen to understand the movement of the sun, the moon and the constellations.
Back in the days, horologists made progress from the sundial to gear and hand, which included tracking the lunar cycle. Even though the sunβs arc is essential on days and seasons, the moon told us about the passing of months.
We count 29 and half days from new moon to full moon, which gives us a regular cycle, a life cycle for so many centuries.
The moon phase
A moon phase watch tells you in fact about the current phase of the moon, just the way you see it in the sky. A watch like this show you in an opening of the dial how the moon passes across the sky. Itβs one of the most fundamental watches due to its graphical representation of the time passing. This is why itβs so different from the watches that feature accurate and yet, dull hands and numbers of other watches.
The βmoon phaseβ is the lighted area of the moon that we may see as it travels all around the Earth. The movement of the Earth and the moonβs position tells us that we always seeing them from a different view. Astronomers do use all sorts of names for moonβs phases, but there are only 4 of them that count for most of us.
When the moon and sun are aligned on the same side of the Earth so we practically donβt see a moon at all, we talk about the βnew moonβ. The βfirst quarterβ happens when the right-hand side of the moon is in the sunβs light.
As the entire surface is lit up, we get to notice the βfull moonβ, whereas the βlast quarterβ happens when the left-hand side is easy to see by us.
All of these phases take around 29 and half days, which is the average length of a calendar month. It sorts of makes sense that the modern calendar is related to the phases of the moon. It was the Roman political and religious fuss that added/subtracted days to some months, which is why not all months are 29 and a half days.
Why is it important for time telling?
The moon has always been important for a manβs existence so keeping its track became essential for all. At some point, the moon phases appeared in the sophisticated pocket watches late in the 19th and early 20th century. In addition, when the pocket watch turned into the wristwatch, the moon phase migrated to the wrist as well.
The moon phase shows us in fact the link between the watchmaker and the time itself.
The mechanism behind
A typical moon phase watch has behind its dial a disc with two identical moons on it. The disc rotates a whole cycle for 29 and a half days, with the waxing and waning face of the moon explained by the curved edges of the dial opening. A 59-tooth gear drives the moon disc, whereas itβs moved forward by a mechanical finger every 24 hours. This gives us one complete rotation for the entire lunar cycle. Well, almost, anyways.
As the real lunar cycle is in fact 29 days, 12 hours and 44 minutes (29.53 days for more precision J), the moon isnβt that helpful after all. Sure, this accuracy works for many of us, but a watchmaker needs a lot more than that and donβt just settle for anything less.
When youβre off by .03 days per month, it means the whole moon phase cycle is off by one full day every two years, seven and a half months.
In order to surpass this difference between the measured lunar cycle and the moon phases per say, us needed a more complicated mechanism. This mechanism features a 135-tooth gear that drives the moon disc. This little detail increases the precision of the movement so that the moon phaseβs intricacy is of by only a day once every 122 years. Therefore, itβs not up to you, by to your grandson to make some small adjustments, way ahead into the feature.
Our life doesnβt depend that much on the moonβs orbit anymore and the wristwatch isnβt just what it used to be anyways. Within all of these various smartwatches, smartphones, the moon phase watches have their charm, reminding us how little we are in this Universe.
It all depends on you which way you want to go when getting a watch. If you want it to keep you connected at all time with all of your friends, donβt hesitate to get a smartwatch. If youβre only for the time telling, stay true to your beliefs and get a moon phase watch. After all, time flies just the same! | <urn:uuid:a7c62e8a-cc4e-4c44-8751-a1c2cceed03c> | {
"dump": "CC-MAIN-2018-05",
"url": "https://www.12x30.net/the-moon-phase/",
"date": "2018-01-24T03:23:22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893300.96/warc/CC-MAIN-20180124030651-20180124050651-00081.warc.gz",
"language": "en",
"language_score": 0.9452586770057678,
"token_count": 1014,
"score": 3.234375,
"int_score": 3
} |
What is machine learning?
Machine learning allows businesses to enable the data to teach the system how to solve the problem at hand with machine learning algorithmsβand how to get better over time.
Todayβs enterprises are bombarded with data. To drive better business decisions, they have to make sense of it. But the sheer volume coupled with complexity makes data difficult to analyze using traditional tools. Building, testing, iterating, and deploying analytical models for identifying patterns and insights in data eats up employeesβ time. Then after being deployed, such models also have to be monitored and continually adjusted as the market situation or the data itself changes. Machine learning is the solution.
To learn more about machine learning, read about Google Cloudβs AI Platform.
Machine learning is a subset of artificial intelligence that enables a system to autonomously learn and improve using neural networks and deep learning, without being explicitly programmed, by feeding it large amounts of data.
Because machine learning allows computer systems to continuously adjust and enhance themselves as they accrue more βexperiences,β the more data thatβs put into them, the more accurate the results will be.
In effect, machine learning applications automate the job of building statistical models. Python machine learning is a great machine learning example, in that it learns from data, identifies patterns, and makes decisions with minimal human intervention.
Robotic process automation (RPA)
RPA combined with machine learning creates intelligent automation thatβs capable of automating complex tasks, such as processing mortgage applications.
Customer data can train machine learning algorithms for customer sentiment analysis, sales forecasting analysis, and customer churn predictions.
Machine learning applications include chatbots and automated virtual assistants to automate routine customer service tasks and speed up issue resolution.
Machine learning helps enterprises improve their threat analysis capabilities and how they respond to cyberattacks, hackers, and malware.
Machine learning enables marketers to identify new customers and to offer the right marketing materials to the right people at the right time.
Machine learning helps credit card companies and banks review vast amounts of transactional data to identify suspicious activity in real time.
AI building blocks
Contact Center AI
Build and use AI | <urn:uuid:c31ff13d-e49d-40b3-a8ba-761319edd8ab> | {
"dump": "CC-MAIN-2022-21",
"url": "https://cloud.google.com/learn/what-is-machine-learning?utm_source=forbes&utm_medium=display&utm_campaign=2021-thought-leadership-forbes-brand-voice&utm_content=forbes_cyclica_story_machine_learning_solution_page&utm_term=-",
"date": "2022-05-29T10:04:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663048462.97/warc/CC-MAIN-20220529072915-20220529102915-00788.warc.gz",
"language": "en",
"language_score": 0.9081188440322876,
"token_count": 446,
"score": 3.203125,
"int_score": 3
} |
Discussion in 'Science & History' started by Kazmarov, Aug 18, 2008.
Here's a new what if:
What if the Treaty of Versailles had much lower monetary demands for Germany?
I'd say just lower monatery demands would not have made much difference. The Versailles Treaty's demands regarding annexations, military and so on would have still been enough to make the Germans feel disgraced. And the impact on the economy would not have been all that big either; the huge 1923 inflation and the generally bad state of the economy was not so much due to the Versailles Treaty, but mostly due to the depts made by the German government during WW1, which the new government had to pay back (and they then just printed money in order to do so).
So I'd say just lower monetary demands would not have changed much.
But assuming the Allies had been much more lenient when Foreign Minister Stresemann (1924-29, Weimar's relatively stable years) attempted to revise the Treaty by peaceful means, also regarding the question of lost territories and military regulations, thus allowed him a huge diplomatic success, that would have probably been a major push for the democratic parties and the Republic in general. The Nazis would have had a much, much harder time to rally so many Germans behind them in the late 20s and early 30s.
Stresemann (from the pro-republican DVP, German People's Party) would have become a national hero, and many Germans who later joined the Nazi Party would have likely rather stayed republicans.
There was only a short window for the Nazis taking power: Their peak of popularity had been reached in early 1932 already, when they won 37% in the elections. Their popularity was about decreasing already, they won only 33% in November 1932 (their first loss of votes compared to an election before), when President Hindenburg named Hitler Chancellor. Had the Republic persisted only a few more years, there is a good chance the Nazis would have fallen down to a minor faction once again.
More lenience by the Allies in the 20s might have been just the push the Republic needed.
Separate names with a comma. | <urn:uuid:aec94a3d-a3bc-4375-b57a-b002c9d60ae7> | {
"dump": "CC-MAIN-2017-34",
"url": "https://www.popmalt.com/forums/t/what-if-part-two.45241/",
"date": "2017-08-23T15:27:44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886120573.75/warc/CC-MAIN-20170823152006-20170823172006-00004.warc.gz",
"language": "en",
"language_score": 0.9826198220252991,
"token_count": 454,
"score": 3.625,
"int_score": 4
} |
Some people may state that human life began some where in northeasterly Asia. As life began the worlds started to travel over the ice transition and they came into this new land. The new land was called north America and they adapted to the new environment. So as clip past by they was know as the native Americans and they was running natural state with life. At this point of clip they was the lone 1s on this new land. Some people may state that but β I can state this America is non named after Chris Columbus, but after β Amerigo β Vespucci, who was named after the bunch of stars in the celestial spheres above which is suiting as our flag of stars β .
β Actually, Amerigo may non hold discovered the America βs first, harmonizing to findings the Chinese adventurers may hold discovered the Americas in 1418 as they have an antediluvian map which shows North and South America, as with a north pole and all of the continents though non accurate in dimensions β .
β Around 1000 a.d Vikings began explorering North America, they left grounds in the signifier of Rune rocks with written messages, and besides other artefacts such as coins dating back to 1080 a.d.
Mummified organic structures of Vikings some every bit tall as 10 pes, many Native American narratives refering combating againts giants have been proven true with these organic structures of ruddy hairy skeletons β .
β One of my favourite claims is dated to around the clip of King Solomon, King of Israel written about in the Holy Bible. Around 990 b.c. King Solomon had hired Phoenicians who were adept mariners to convey back gold and animate beings, and wealths. I believe this claim as I was fortunate to hold been in contact with New England univeristy βs who were researching near east surveies β .
β I connected the Phoenician ships discovered embedded in the clay on the seashore of cardinal America with King Solomon and the Hagiographas in the Bible, what they did with that information I do nβt cognize my notes and their letters, unfortunatly burned in a house fire.
Some of what I do retrieve is that one of the artefacts had a written message refering King Solomon and a Phoenician King, dating these ships back to the clip of King Solomon βs reign and the land of Ophir β .
β Since first reading about the lost continent of Atlantis, have believed the Americas are this lost continent mentioned in the Plato βs Hagiographas around 360 b.c which he told of this lost continent which existed around 9600 b.c β . When holding first brushs at that place some jobs to fall that.The native Americans had metropoliss, with roads and constructions, authoritiess and trade with other civilisations across the America βs. The Cherokee βs had an bing authorities which had spanned several provinces, as with most east seashore folks. Before the invasion of settlers, from Spain, England and European imperiums.
Most believe that all the Native American folks lived in Tipi βs and travaled the fields, they were mobile. Merely the fields Indians were nomadic following the seasons.
When in fact most lived in metropoliss and towns, non what you see in the history books of the folks unorganised and barbarian are the leftovers of scattered peoples who βs civilisations were destroyed by 400 old ages of warfare and disease killed more than half the populations, as they became scattered and unorganised.
Expression at ancient Central and South America with great metropoliss and pyramids and mariners. Most of the first brushs was really bad.
β The Europeans and the native Americans force at that place mundane lives on each other. The Europeans and the native Americans had different faith and civilization. β Puritanism in this sense was founded by some Marian expatriates from the clergy shortly after the accession of Elizabeth I of England in 1559, as an activist motion within the Church of England. The appellation β Puritan β is frequently falsely used, notably based on the premise that hedonism and Puritanism are antonyms: historically, the word was used to qualify the Protestant group as extremists similar to the Cathari of France, and harmonizing to Thomas Fuller in his Church History dated back to 1564. Archbishop Matthew Parker of that clip used it and β precisian β with the sense of stickler. T. D. Bozeman therefore utilizations alternatively the term precisianist in respect to the historical groups of England and New England β .the Europeans had a strong belief in there faith they was seeking to alter anybody life around that was non a puritan.In confederation with the turning commercial universe, the parliamentary resistance to the royal privilege, and in the late 1630s with the Scots Presbyterians with whom they had much in common, the Puritans became a major political force in England and came to power as a consequence of the First English Civil War. After the English Restoration of 1660 and the 1662 Uniformity Act, about all Puritan clergy left the Church of England, some going unconformist curates, and the nature of the motion in England changed radically, though it retained its character for much longer in New England. β but the native Americans had other programs they had there ain. β Traditional Native American faiths exhibit a great trade of diverseness, mostly due to the comparative isolation of the different folks that were spread out across the full comprehensiveness of the North American continent for 1000s of old ages, leting for the development of different beliefs and patterns between folks.
Native American faith is closely connected to the land in which Native Americans dwell and the supernatural. While there are many different Native American spiritual patterns, most address the undermentioned countries of β supernatural concern β : an omnipresent, unseeable β cosmopolitan force β , β tabu β , refering to the β three βlife crises β of birth, pubescence, and decease β , β liquors β , β visions β , the β priest-doctor β and β communal ceremonial
Native American spiritualty is frequently characterized by pantheism, a strong accent on the importance of personal spiritualty and its interconnectivity with one βs ain day-to-day life, and a deep connexion between the natural and religious βworlds β .
Most disciples to traditional American Indian ways do non see their religious beliefs and patterns as a β faith β ; instead, they see their whole civilization and societal construction as infused with βspirituality β β an built-in portion of their lives and civilization β . this cause so many jobs with these two different civilization wars and podiums kill off one state.
There was an out semen with these two over clip the wars and the illness of the people kill about all of the native Americans. β From the 16th through the 19th centuries, the population of Native Americans declined in the undermentioned ways: adventurers and settlers, every bit good as between folks ; supplanting from their lands ; internal warfare, captivity ; and a high rate of intermarriage.Most mainstream bookmans believe that, among the assorted lending factors, epidemic disease was the overpowering cause of the population diminution of the American indigens because of their deficiency of unsusceptibility to new diseases brought from Europe. With the rapid diminutions of some populations and go oning competitions among their ain states, Native Americans sometimes re-organized to organize new cultural groups, such as the Seminoles of Florida and Mission Indians of Alta California. β
β Chicken syphilis and rubeolas, although by this clip endemic and seldom fatal among Europeans ( long after being introduced from Asia ) , frequently proved lifelessly to Native Americans. Smallpox proved peculiarly fatal to Native American populations.Epidemics frequently instantly followed European geographic expedition and sometimes destroyed full small town populations. While precise figures are hard to find, some historiographers estimate that at least 30 % ( and sometimes 50 % to 70 % ) of some Native populations died after first contact due to Eurasiatic variola. One theory of Columbian exchange suggests adventurers from the Christopher Columbus expedition contracted pox from autochthonal peoples and carried it back to Europe, where it spread widely. Other research workers believe that the disease existed in Europe and Asia before Columbus and his work forces returned from exposure to autochthonal peoples of the Americas, but that they brought back a more deadly signifier β .
β In 1618-1619, smallpox wiped out 90 % of the Massachusetts Bay Native Americans.Historians believe many Mohawk Native Americans in contemporary New York were infected after contact with kids of Dutch bargainers in Albany in 1634. The disease swept through Mohawk small towns, making Native Americans at Lake Ontario by 1636, and the lands of the western Iroquois by 1679, as it was carried by Mohawk and other Native Americans who traveled the trading paths. The high rate of human deaths caused dislocations in Native American societies and disrupted generational exchanges of civilization.
β Between 1754 and 1763 many Native American folks were involved in the Gallic and Indian War/Seven Years War with Gallic forces against British colonial reserves. Native Americans fought on both sides of the struggle. The greater figure of folks fought with the Gallic in the hopes of look intoing European enlargement. The British had made fewer Alliess, but had some folks that wanted to turn out assimilation and trueness in support of pacts. They were frequently defeated when these were subsequently overturned. In add-on, the folks had their ain intents, utilizing their confederations with the European powers to conflict traditional Native enemies β . they both had some jobs but the native Americans was the 1 on the short terminal of the stick.
The sixteenth century has had some good yearss and some bad 1s but over all they had to hold some peace. Though cultural characteristics, linguistic communication, vesture, and imposts vary tremendously from one folk to another, there are certain elements which are encountered often and shared by many civilizations. America has had her ups and her downs but over all we came together as one at the terminal. We all are household we had war between the household we got each other ill but we are america. | <urn:uuid:7dfae53c-ac78-450c-ada0-5f29852b15c8> | {
"dump": "CC-MAIN-2019-22",
"url": "https://essaylead.com/everyday-life-for-an-native-american-history-essay-1005/",
"date": "2019-05-25T17:31:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258147.95/warc/CC-MAIN-20190525164959-20190525190959-00231.warc.gz",
"language": "en",
"language_score": 0.9685449600219727,
"token_count": 2199,
"score": 3.09375,
"int_score": 3
} |
Heading Into Spring
"Wait! Did that just move?!" A group of kids were simultaneously trying to get as close as possible while keeping their bodies calm and not disturbing the eggs. As we looked at each egg illuminated by a bright light, we could see the shape of the developing embryos and watch them float from one side of the shell to the other. Kids noticed veins and darker and lighter patches. A number of them commented on how the eggs felt heavier to them than ones they have used for cooking. All week they have been reminding each other to jump gently, to not run, and to be careful around the eggs. I am grateful that they have this chance to watch this process.
Morgan's PK and K Class * Worked with spring stencils and markers. They were excited to learn they could trace the outside of the stencils as well and reuse them for their play dough creations. * Worked with each other to create paintings on different sized paper. * Explored shaving cream with food coloring. The children were excited to make predictions and observe what happened as they mixed them together. * Read spring and chicken books! * Took turns at guessing the different nature items in the magnifying glass blocks. Some of the items were easy to identify while others were a little harder. The children also enjoyed finding small objects to put in the blocks as well. * Built with Legos and blocks of various sizes. * Learned about the letter of the week - V. Practiced making upper and lower case Vv. * Looked for signs of spring outside by finding bugs and worms, played in the stream, popped bubbles, and climbed trees! * Participated in the last mini class for the month of March. * Looked at the chicken eggs in a dark room with the little light on top of the incubator to see which of the eggs are fertilized! This is called "candling". Many of the children were excited to see dark shadows or the veins in the chicken eggs.
Tracy's 1st-3rd Grade Class
In math, we have been noticing that are lots of different ways to get to the correct answer. Our first grade class has been working on knowing ten more and ten less of a given number. They can do this by using a number grid, by modeling it (or notating it) with base ten blocks. or by looking at the tens place and simply changing it one more or one less. I love it when kids make a case for why their way is more efficient. The second graders are working on developing comfort with two and three digit subtraction. The third graders are learning about order of operations and parentheses. They were intrigued to find that the same set of numbers and mathematical symbols could give two different answers depending on what part of the problem is done first.
In writing, we are working on figuring out the differences between opinions and facts. Like Theresa's class, we used a "Smash Boom Best" episode on Pancakes vs. Waffles to help us learn about some debate techniques. Each child is developing arguments for a debate, and we are looking for supporting facts.
In reading, we have really been working on using context and meaning clues to help us figure out the meaning of unknown words. We also continue to focus on a few useful word patterns each time we read. When I am checking for understanding, we often use made up words to make sure that the rules are being applied correctly (ex: zame or grupping).
Theresa's 4th-6th Grade Class
It was a mellow week at Country Classroom. Between the storms and the sunshine, we managed to do some learning.
In math, the eldest kids are working on surface area and volume of different shapes. It has been a refreshingly easy unit, after one that was more challenging. The 4th and 5th graders are continuing to work on decimals, fractions and percents.
In writing, we are doing a study of debate. The kids are listening to debates on the podcast "Smash Boom Best." We are talking about how strong arguments need reasons and examples. The podcast uses a lot of gimmicks to keep the listener's attention. Those gimmicks have their place, but they cannot be the argument. We have been looking for the topic sentences and supporting reasons in each of the arguments.
We are reading from the American History Book, "A History of US." We are reading about the Civil War, which Tracy is also studying in the afternoons. We are talking about strategies for reading non-fiction, such as summarizing and paraphrasing. We are also talking about the difference between primary and secondary sources. The book is full of images of primary sources, and they have inspired many of our conversations. One of the most wonderful things about teaching your kids is how utterly appalled they are by the injustices of the world. They have a strong sence of riht and wrong, and they are able to discuss it. | <urn:uuid:16252e0f-773a-4880-9be8-8c8fc2ec79d3> | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.countryclassroom.org/single-post/heading-into-spring",
"date": "2023-05-31T01:22:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00752.warc.gz",
"language": "en",
"language_score": 0.9770259857177734,
"token_count": 1023,
"score": 3.421875,
"int_score": 3
} |
Children are not generally exposed to lead from paint while the paint is still in the can or when the paint is being newly applied to a previously unpainted or uncoated surface. Rather, lead exposure generally occurs after the lead paint has already dried on the wall or on the article that has been painted.
Lead in Paint
IPEN has demonstrated that leaded paints for home use continue to be widely produced, sold and used in developing countries despite the fact that most highly industrial countries banned leaded house paints more than 40 years ago. IPENβs global campaign to eliminate leaded paint raises awareness that childhood exposure remains a serious problem and has catalyzed national activity in a number of developing countries to eliminate leaded paint and protect children. | <urn:uuid:f0617d44-05c1-4de8-8341-dfb8ba80439f> | {
"dump": "CC-MAIN-2017-51",
"url": "http://ipen-china.org/tags/lead-paint?page=22",
"date": "2017-12-11T20:38:26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948514051.18/warc/CC-MAIN-20171211203107-20171211223107-00772.warc.gz",
"language": "en",
"language_score": 0.9700139760971069,
"token_count": 150,
"score": 3.234375,
"int_score": 3
} |
Gondi Language Phrase Book. A Book Of Commonly ...
This is the result of a language shift from Gondi to regional languages in the majority of the Gondi population, especially those in the northern portion of their range. By the 1920s, half of Gonds had stopped speaking the language entirely. The language is under severe stress from dominant languages such as Hindi, Chhattisgarhi, Marathi and Odia due to their use in education and employment. In order to improve their situation, Gond households adopt the more prestigious dominant language and their children become monolingual in that language. Already in the 1970s, Gondi youth in places with increased contact with wider society had stopped speaking the language, seeing it as a relic of old times. The constant contact between speakers of Gondi and Indo-Aryan languages has resulted in massive Indo-Aryan borrowing in Gondi, found in vocabulary, grammar and syntax. In one survey in Anuppur district for instance, it was found the dialect of Gondi spoken there, known as dehati bhasha ('rural language'), was actually a mixture of Hindi and Chhattisgarhi rather than Gondi. However, the survey also found younger Gonds had a positive attitude towards speaking Gondi and saving the language from extinction. Another survey from areas throughout the Gond region found younger Gonds felt developing their mother tongue was less important, but there were still large numbers willing to help in its development. Some attempts at revitalization have included children's books and online videos.
Gondi Language Phrase Book. A book of commonly ...
In the early 1970s, the linguist David McAlpin produced a detailed proposal of a genetic relationship between Dravidian and the extinct Elamite language of ancient Elam (present-day southwestern Iran). The Elamo-Dravidian hypothesis was supported in the late 1980s by the archaeologist Colin Renfrew and the geneticist Luigi Luca Cavalli-Sforza, who suggested that Proto-Dravidian was brought to India by farmers from the Iranian part of the Fertile Crescent. (In his 2000 book, Cavalli-Sforza suggested western India, northern India and northern Iran as alternative starting points.) However, linguists have found McAlpin's cognates unconvincing and criticized his proposed phonological rules as ad hoc. Elamite is generally believed by scholars to be a language isolate, and the theory has had no effect on studies of the language. In 2012, Southworth suggested a "Zagrosian family" of West Asian origin including Elamite, Brahui and Dravidian as its three branches.
Linguist Asko Parpola writes that the Indus script and Harappan language are "most likely to have belonged to the Dravidian family". Parpola led a Finnish team in investigating the inscriptions using computer analysis. Based on a proto-Dravidian assumption, they proposed readings of many signs, some agreeing with the suggested readings of Heras and Knorozov (such as equating the "fish" sign with the Dravidian word for fish, "min") but disagreeing on several other readings. A comprehensive description of Parpola's work until 1994 is given in his book Deciphering the Indus Script.
Because most of the account-book manuscripts in this collection are distinct and separately-bound items, with diverse contents, most have received individual catalog records. These detailed records can be found in the library's online catalog, Franklin. The entire group of manuscripts may also be searched with the phrase "Gondi-Medici Business Records."
Our tutors create the best language lessons for students and buyers from around the world. Lessons and learning materials uploaded on Justlearn are optimized for language learning. You can always book lessons and buy learning materials anytime, anywhere.
In the human host, the parasites form tissue cysts, most commonly in skeletal muscle, myocardium, brain, and eyes; these cysts may remain throughout the life of the host. Diagnosis is usually achieved by serology, although tissue cysts may be observed in stained biopsy specimens . Diagnosis of congenital infections can be achieved by detecting T. gondii DNA in amniotic fluid using molecular methods such as PCR .
Koby's story, along with other seventeen stories revealed in a new book, reveals not only fascinating stories but also photos and authentic recipes of Persian food given by the heroes of this book. Actually one can fix a whole meal out of the book, starting with the first dish and ending with the dessert. Especially on the rich and tasty Persian cuisine, makes me thinking about Iran's race for the atomic bomb. I was wondering whether the Iranian leadership will be smart enough to change its strategy to cop the world. Sometimes the road to control someone goes thru his stomach, thru his desire for good food. 041b061a72 | <urn:uuid:25e574b7-5afd-4b84-bb82-263fe44ab45f> | {
"dump": "CC-MAIN-2024-10",
"url": "https://www.judogeneve.ch/group/mini-dragon-group-ages-6-7/discussion/0d63824a-0919-4702-869d-41d29b64d53d",
"date": "2024-02-23T03:01:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00737.warc.gz",
"language": "en",
"language_score": 0.9631199240684509,
"token_count": 1026,
"score": 3.546875,
"int_score": 4
} |
Grinding Wheel Guide
What is a Grinding Wheel?
A grinding wheel is also known as the consolidated grinding wheel. All grinding wheels are similar in the aspect of construction, which are mostly circular shaped with a through hole in the center.
A grinding wheel is comprised of abrasives that are consolidated into certain shapes by a bonding agent, which guarantees certain strength. It is often use for various grinding (i.e., abrasive cutting) and abrasive machining tasks. These wheels are specifically used in grinding machines.
The grinding wheel is the one with the most widely used grinding equipment with a extremely broad range of use. It can rotate at high speed during use, and can rough, semi-finish and fine-grind the outer circle, inner circle, flat surface and various profiles of metal or non-metal workpieces. It is also capable of slotting, cutting, etc.
Construction of Grinding Wheels
Grinding wheels are typically made from an assorted materials comprising coarse-particle aggregate, which are pressed then bonded (using the so-called cementing matrix) to form a circular, solid shape.
Grinding wheels can also be made from aluminum or steel disc with particles bonded to the surface. Most of the grinding wheels we see today are made with artificial composites derived from artificial aggregates. As a matter of fact, grinding wheels in the early days were made with natural composite stones, just as those used for millstones.
Manufacturing for Grinding Wheels
Despite the look, the manufacturing process for a grinding wheel is actually a highly precise and controlled precise, mainly attributed to its inherently hazardous nature (e.g., the spinning disc). Also, precision is also required because every discs need to be produced with uniform parameters to prevent the disc from exploding because of the high stressed generated on rotation.
As an essential part of a grinding machine, grinding wheels are consumables, meaning that they have limited life span. The life span can largely vary depending on how the grinding machine is used, ranging from less than a day to multiple years. As the wheel performs the cutting, grains of abrasives are released, typically attributed to the growing dullness as the drag pulls them out of the bond. Then, the next cycle begins as new grains are exposed in this wear process. Fortunately, the rate of wear for grinding wheels is very predictable, knowing its expected life span given the intended application is very important to yield good performance.
Common Types of Grinding Wheels
There a great many types of grinding wheels in its development history. While they come in a variety of different sizes and structure, some of the most common types of grind wheels in the market are listed below for your reference:
1. Straight Grinding Wheels:
This is the most common grinding wheels that is easily found in workshops across the world. These are known for sharpening tools, such as chisels and lawnmower blades.
2. Large Grinding Wheels:
Imagine this type of grinding wheel the larger version of the straight grinding wheels. This type of grinding wheels excels at grinding down the outer portion of the objects, like carbide blanks. They are also widely used in oil and thermal spray industry for OD grinding. The diameter of a large grinding wheel can be as long as 36 inches.
3. Cup Wheel:
This type of grinding wheel is mostly used for polishing concrete or stones. They are however capable of more delicate operations like adhesive removal, given a smaller grit is used. Cup wheels excel at finishing and re-sharpening applications in general.
4. Dish Wheel:
This type of wheel has a thinner surface edge. The narrow and shallow nature enable dish wheels to fit into tight space other types of grinding wheels would otherwise be able to reach.
5. Segmented Grinding Wheel:
They key feature of this type of grinding wheel is the fact that the abrasives are segmented instead of having a continual abrasive rim. When this type of wheel is used with lubrication or cooling fluids, a large amount of materials can be removed rapidly without damaging the surface of the workpiece. Centrifugal force is utilized to carry the fluids to the intended area, with the canal created by each segment.
6. Cutting Face Wheel:
Cutting face grinding wheels are capable of cutting through workpieces by grinding away material. The grinding edge of this type of wheel is relatively narrow compared to other types, allowing it to take a lot of material off at once. This type of a grinding wheel is versatile in a sense that it gets used for many things from shaping saw teeth to cutting tiles.
Need help searching for your next Grinding Wheel ?
IMTS Exhibition includes manufacturers from around the world. Send us a message with your requirements and our IMTS Experts will happily help you with your questions. | <urn:uuid:a8a712f8-d553-4d30-a14c-1f463bbbed8d> | {
"dump": "CC-MAIN-2022-27",
"url": "https://www.imts-exhibition.com/components-and-accessories/grinding-machine-tools/grinding-wheel.html",
"date": "2022-06-26T22:38:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103322581.16/warc/CC-MAIN-20220626222503-20220627012503-00326.warc.gz",
"language": "en",
"language_score": 0.9499325752258301,
"token_count": 985,
"score": 3.3125,
"int_score": 3
} |
You've probably heard about the microbiome in your gut.
It's the collection of trillions of tiny microorganisms thought to have a powerful effect on your health and wellbeing.
But did you know that a similarly complex and important ecosystem of bacteria, fungi and viruses exists in the female reproductive tract?
It's known as the vaginal microbiome, and it plays a key role in keeping women healthy.
So how does it work?
A balance of bacteria
Just like the gut, the vagina consists of trillions of microorganisms β mostly bacteria, plus some fungi and viruses. Together, these populations make up the vaginal microbiome.
"Particular types of lactobacilli have functions that keep the environment very acidic, that interact with our host cells and keep the right mucus production going," says Associate Professor Willa Huston from the University of Technology Sydney.
"This is what we would consider to be the healthiest type of microbiota for the vagina."
But the relationship is complicated: not all types of lactobacilli are good, and there is at least one strain that puts women at a higher risk of acquiring a sexually transmitted infection.
On the other hand, women who lack a dominant lactobacillus in their microbiome are also at a higher risk of acquiring STIs and other conditions including bacterial vaginosis.
"It depends on the type of lactobacillus, it might depend on the function of that lactobacillus β¦ and perhaps how it's interplaying with the genome type of the woman," Dr Huston says.
Disruptions to the microbiome
The vaginal environment experiences all kinds of disturbances on a regular basis, which in turn disrupts the microbiome.
"It's a really dynamic space," Dr Huston says.
Sexual activity, lubricants, and semen can all change the composition of the microbiome, as well as hormonal contraceptives, menstruation and antibiotics.
"Antibiotics, just like in gut bacteria, can basically eliminate lactobacillus and give the opportunity to other bacteria that are not very welcome to grow and thrive," Professor Jacques Ravel from the University of Maryland told The Health Report.
Disruption of the microbiome can cause an imbalance of bacteria, which may lead to bacterial vaginosis. It can also trigger the overgrowth of the fungus, Candida.
The impact of diet is less clearly understood, Professor Ravel says, but it can also cause changes.
"It's something that we are still investigating. We don't fully understand the link that exists between the bacteria that lives in our gut and those that live in a vagina, but there is certainly a link between the two," he says.
The ever-changing vaginal microbiome is also largely age-dependent, Dr Huston says.
"As your reproductive status changes and your reproductive physiology changes, there's a lot of evidence that the microflora, as well as other functions, change in the reproductive tract," she says.
Connection to disease and fertility
There is an established link between a woman's vaginal microbiome and her risk of acquiring sexually transmitted infections and other conditions.
"We know that microbiotas that have particular types of lactobacillus, or don't have a good lactobacillus composition, are more at risk of developing STIs, bacterial vaginosis, and pelvic inflammatory disease," Dr Huston says.
"What we don't know yet is how much your vaginal microbiome or your upper reproductive tract microbiota can influence whether or not you get pregnant."
Research into IVF has found the type of microorganisms present in the uterus at the time of embryo transfer interplay into the outcome of pregnancy.
"So we do know from preliminary evidence that the composition of the microflora in your whole reproductive tract is likely to be really important for your ability to have a successful pregnancy, or even to conceive.
"But we don't know enough yet about that β¦ And there's a lot more work to be done."
What researchers do know is that women with pelvic inflammatory disease β which usually occurs when sexually transmitted bacteria spread from the vagina to the uterus, fallopian tubes or ovaries β are more at risk of becoming infertile.
"So [the microbiome] certainly interplays into developing infertility which might be tubal damage, but whether it interplays exactly into fertility outcome at the time is less understood," she says.
"I think that's the next frontier of microbiome research β¦ a better understanding of the microbiome in the upper reproductive tract and how that impacts on pregnancy and fertility."
The best thing you can do for your vaginal microbiome is to do nothing at all, Dr Huston says.
She warns against douching and using other vaginal cleaning products, which tend to upset the balance of bacteria.
"Unless something's wrong and you've got symptoms that are uncomfortable, it's best to leave your vagina microflora to look after itself," she says.
If you do have symptoms, it's worth making an appointment at the GP.
"You know your body the best. If something's not right or it just feels a bit different, don't have any hesitation in going to the doctor. And don't have any hesitation having a frank conversation with your doctor about your vagina," Dr Huston says. | <urn:uuid:417dc67a-4f78-42d7-8b10-399d2d166bbf> | {
"dump": "CC-MAIN-2018-43",
"url": "https://www.abc.net.au/news/health/2017-11-22/vaginal-microbiome-why-it-is-important-for-womens-health/9176782",
"date": "2018-10-19T12:01:20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512395.23/warc/CC-MAIN-20181019103957-20181019125457-00359.warc.gz",
"language": "en",
"language_score": 0.9580798149108887,
"token_count": 1079,
"score": 3.375,
"int_score": 3
} |
The skeleton of an 82ft-long dinosaur has been found in a personβs yard in central Portugal.
Palaeontologists from Spain and Portugal engaged on the positioning within the metropolis of Pombal consider it might be the stays of the largest sauropod dinosaur to be present in Europe.
Sauropods are plant-eating, four-legged dinosaurs characterised by lengthy necks and tails.
The excavation started when the landowner first seen fragments of bones on his property in 2017 throughout development works.
Researchers say in current weeks theyβve unearthed the vertebrae and ribs of a potential brachiosaurid sauropod, or brachiosaurus, that might have stood about 39ft (12m) tall and been about 82ft (25m) lengthy.
The Brachiosauridae group is made up of enormous species that lived from the Upper Jurassic interval to the Lower Cretaceous, round 160 to 100 million years in the past.
βIt is not usual to find all the ribs of an animal like this, let alone in this position, maintaining their original anatomical position,β Elisabete Malafaia, a postdoctoral researcher on the University of Lisbon, mentioned.
βThis mode of preservation is relatively uncommon in the fossil record of dinosaurs, in particular sauropods, from the Portuguese Upper Jurassic.β | <urn:uuid:3c897058-8af0-4351-ae58-f3ad5bfe0b7b> | {
"dump": "CC-MAIN-2022-40",
"url": "https://nanoconductor.org/skeleton-of-82ft-long-dinosaur-found-in-mans-backyard-in-portugal-world-news/",
"date": "2022-10-07T00:11:45",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00713.warc.gz",
"language": "en",
"language_score": 0.9250041246414185,
"token_count": 286,
"score": 3.546875,
"int_score": 4
} |