id
stringlengths 47
47
| text
stringlengths 176
666k
| safety_metadata
dict | metadata
dict |
---|---|---|---|
<urn:uuid:d62b6a40-9329-4ee1-bd9f-2c616f1d796e> | The St. Rose curriculum is informed by the California State Standards. Anticipating the change that will happen in 2014 for all public schools in California from State Standards to National Common Core Standards, St. Rose began to use the Common Core Standards in Writing and Math during the 2011-12 school year.
The diocese of Santa Rosa provides a detailed set of standards for religion instruction for the Catholic Schools which St. Rose follows.
PE, Spanish and Fine Arts
Reading instruction begins in Kindergarten with the goal of every child having automotized the letters, their sounds, and how to write each letter. Kindergartners begin to recognize common words and many are reading before the end of the school year. In 1st Grade the strong phonics-based reading instruction continues with a basal reader. We are currently using the Houghton- Mifflin series through 6th Grade. It is supplemented with the age appropriate novels and the Accelerated Reading Program which begins in 4th Grade. The 7th and 8th Grade reading curriculum is literature based with a team of two teachers providing the instruction.
Along with reading instruction, students receive a very strong base in grammar and writing. A phonics-based spelling program continues through 8th Grade.
Math instruction according to the National Common Core Standards is supplemented with manipulatives and learning games. Students gain a foundation in computation, number theory, and concepts. In the primary grades a teacher aide assists the teacher to ensure that all students get the individual help they need. In 4th through 8th grade two teachers collaborate to deliver the instruction characterized by frequent formative assessment with fluid grouping that enables the more capable students to extend their learning and those who struggle with math obtain extra instruction.
At the end of the 7th grade year, an Algebra Readiness Test is administered. Students who are ready will take comprehensive Algebra course in 8th Grade that will enable them to move on to Geometry during their freshman year of high school. The other 8th Graders will receive more pre-algebra instruction and an introduction to Algebra. These students usually benefit from taking Algebra I during the freshman year.
Instruction in the Catholic faith is a daily occurrence at St. Rose. Among the topics that students learn about are the Catholic Mass, Sacraments, Liturgical Year, Sacred Scripture, and Catholic Doctrine. Children in 2nd Grade are prepared for the Sacraments of Reconciliation and Eucharist as part of the religion program. Prayer is well-integrated into the school day and students attend Mass at school once a month. Students take part in the Sacrament of Reconciliation each year during the season of Lent. The seasons of the Liturgical Year are observed and there is always a special celebration of Holy Thursday helping to prepare the students for the Easter Triduum. Religion and spirituality permeate the school day as our number one goal is to help each child entrusted to us know of the great love God has for each of us. There is also a service learning program. Students who are non-Catholic take part in religion classes, learning about what Catholics believe.
Our full time school counselor helps to round out our religion program with her lessons on kindness, compassion, good manners and conflict resolution that allow our students to grow and develop spiritually, socially, and emotionally.
Social Studies is taught in all grades according to the California State Standards. Kindergarten and 1st Grade focus on their place in the family/community and learn about various holidays and community helpers. Second Grade and Third Grade curriculum includes ancestors, countries of origin, government institutions, national heroes, explorers, and early settlers. The 4th Grade does a comprehensive study of California History and Fifth Grade studies the development of the United States up to 1850. Sixth Grade studies ancient history up to the Roman Empire and 7th Grade picks up ancient history through the Renaissance. Eight Grade studies U.S. History with a particular focus on the founding fathers, antebellum years, Civil War and Reconstruction.
Our social studies program features simulations that allow a more experiential approach to history and lively musicals that center around historical themes.
In 6th and again in 8th Grade students take place in National History Day. This is an extensive research based project that is very in-depth. Many of our students go on to compete and win at the county level. We have also had St. Rose students come in First Place at the statewide competition. Students create projects in the form of historical papers, websites, exhibits, multi-media, and dramatic presentations.
Science is also taught at every grade level according to the California State Standards. Kindergarten through 5th Grade includes instruction in Physical, Life, and Earth Sciences in an upward spiraling curriculum that includes investigation and experimentation. The 6th Grade has a particular focus in Earth Sciences, 7th Grade focuses on Life Sciences, and 8th Grades includes the basics of Physics and Chemistry.
In the primary grades, the homeroom teacher provided the science instruction. Beginning in 4th Grade, students are taught by our science specialist.
Physical Education, Spanish, and Fine Arts
There is a PE teacher and aide for the twice weekly PE classes at each grade level. The curriculum focuses on building physical skills that will enable students to be more successful in team sports. Students take the President’s Physical Fitness Challenge annually and many of them earn certificates of merit.
Conversational Spanish is taught once a week in K – 5th Grade. The older students have an opportunity to take a rigorous academic Spanish course after school taught by a teacher from Cardinal Newman.
Students are instructed weekly in music theory and singing. There is an optional instrumental band program for students starting in 4th Grade. The practices are held at 7:35 AM twice a week before school starts. We have in Honor Choir and the Inspiration Choir which is “Glee” style choir who sing and dance.
There are many opportunities during the school day for students to practice their acting and public speaking skills including, acting out gospels for Mass, reading scripture and reflections at Mass, classroom skits and presentations. The historical musicals and annual Christmas program also allow our students to shine in this area. There are after school programs for students who desire to have a more in-depth drama experience. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed description of the curriculum and educational standards followed by St. Rose school. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on describing the educational curriculum and activities in a school setting. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "121-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "121-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://strosecatholicschool.org/academics/",
"date": "2023-05-28T15:32:42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00063.warc.gz",
"language": "en",
"language_score": 0.9606343508,
"token_count": 1291,
"score": 3.265625,
"int_score": 3
} |
<urn:uuid:7347af18-1836-4147-9d03-fae96fc3a7d2> | The relationships we have — with your spouse, your friends, your boss, your neighbors, and so on — define our lives. Do you have any expectations of those people, or of those relationships?
As we navigate our lives, we build mental models of the world around us. The sun rises every day in the east, and sets in the west, for example. We can predict that, based on our previous experiences, combined with what we have learned.
Naturally, that includes the people around us. At first, your parents, and perhaps siblings. Then schoolmates, teachers, etc. What they say, how they act, teaches you about what people are like.
So what have you learned? What kinds of behaviors and actions are a baseline? Moreover, do those expectations change for someone you know well, versus someone you are meeting for the first time?
Imagine someone else exceeding your expectations. What would that mean? What are the basic things in another human being that you anticipate?
Similarly, how might someone fall below the behavior you have come to expect. Does that happen often?
Are there other factors that might influence those expectations, like age, religion, gender, political party, musical taste, hobbies, and so on?
Finally, how might that change between yourself and others? Do you expect more of yourself than someone else, or less? Do you think others would agree with your opinion in this regard?
Related questions: What are our responsibilities to others? How do you know who to trust? How important is respect? What gives a person value?
2 thoughts on “What Expectations Do You Have Of Others?”
Minimally, I have three expectations of others (and myself). First, we should care and show respect for others. Second, while we all hold improper biases, we should recognize them as weaknesses that we need to work to overcome. Third, we should hold to the commitments we make to others — individually and in groups. And, when we cannot keep to those commitments, we should admit that we’ve taken on too much, while asking for more time or help to fulfill what’s expected of us.
In addition, while I cannot expect this of everyone — even close friends — I like to be surrounded by people who are intellectually curious, adventurous, and fun.
To behave themselves and have a certain degree of respect for others.
Simply said I would treat others like I would like to be treated. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses relationships, expectations, and personal values in a respectful and constructive manner. It does not contain any inappropriate language, harmful themes, or unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "122-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "http://intellectualroundtable.com/2020/10/11/what-expectations-do-you-have-of-others/",
"date": "2023-05-30T00:59:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00063.warc.gz",
"language": "en",
"language_score": 0.9738014936,
"token_count": 507,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:9201edac-0e6d-4fbb-8f63-0df6a10e609e> | Labels by Sign and Label Printer
Labels by Sign and Label Printer
Social Distancing Floor Marking
PaintStripe Floor Marking Stencils
Valve Lockouts & Hose Lockouts
Group Lock Boxes & Permit Control
Safety and Facility Signs and Labels Software
Wire and Component Label Software
Product Identification Label Software
Hazardous Chemical Labels Software
Lockout Tagout Procedures and Tags
SmartID Aerospace RFID Solutions
Pipe Marker Accessories & Mounting Brackets
Maintenance and Production Tags
SmartCheck Safety Software & Management System
Calculators and Assessment Tools
Product Finders and Data Sheets
Ensure your facility has the right practices, training and response plans in place.
Slips, trips, and falls occur when there is too little friction or traction on a walking surface, when a foot or lower leg hits an object while the rest of the body continues to move, or when the center of balance is lost resulting in a descent to the floor, against an object or to a surface at a lower level than the original surface.1 These incidents are often caused by slippery, irregular or uneven surfaces, obstacles on the floor or uncovered/unidentified hazard areas.
Hazards relating to slips, trips and falls are frequently top offenders on OSHA's top 10 violation lists. In 2018 alone, slips, trips, and falls were tied to three of the top ten violations, and two of the top three. These violations included hazards relating to fall protection (#1), scaffolding (#3), and ladders (#6).2
This free guide provides tools and resources that will help you learn about slips, trips and falls prevention in your workplace. Get it today!
Take a look at some visual workplace examples in this FREE guide:Download Now
This standard supports the safety of exit routes. Some of the key elements that apply to slips, trips and fall in this standard include:
This standard supports worker safety by keeping workplaces clean and safe from hazards, including:
You wouldn't be here if you didn't think slips, trips, and falls prevention was important. You also should know by now the implications of not taking the right steps to complying with OSHA's Walking-Working Surfaces standard and the potential dangers associated to non-compliance. Now, let's outline each step that you can take to prevent slips, trips and falls hazards.
For an in depth look at each of these steps, download our "Slips Trips and Falls Guide"
Despite our best efforts, accidents sometimes happen. In the event that a slip, trip or fall does occur at your workplace, you need a plan that allows everyone to act quickly and effectively. When you're creating a response plan here are a few guidelines to keep in mind:
This may sound like a given, but many times in the heat of the moment, those who immediately respond to an emergency may not know what to do. Make sure there is a clear and easy way to provide first aid or call for emergency medical assistance.
This is when you can identify area of training, different products or signage needs, and housekeeping practices that should be used to ensure employee safety and compliance to OSHA standards in the future.
This free guide provides tools and resources that will help you learn about slips, trips and falls prevention in your workplace.Download Now
Review your current safety program and ensure you have the right plans in place. This infographic offers some quick tips to get started.Download Now
For information on how and where slips, trips and falls can occur in your workplace, check out this handy infographic.Download Now | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"general safety and compliance information\", \"score\": 0}\n```\n\nThe text provided is focused on general safety and compliance information related to slips, trips, and falls prevention. It does not contain any unsafe or inappropriate content, and the language and themes are appropriate for all audiences. Therefore, it is safe for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "124-0",
"llm_safety_score": 0,
"reason": "general safety and compliance information"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "http://thebatique.com/slips-trips-and-falls.html",
"date": "2023-05-31T10:25:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00063.warc.gz",
"language": "en",
"language_score": 0.9154346585,
"token_count": 745,
"score": 2.703125,
"int_score": 3
} |
<urn:uuid:21b901ac-de38-4b71-bcef-d99359d2875f> | The Chinese word 买 means “to buy” or “to purchase”. It is a commonly used verb in everyday communication and business transactions. For example, if you want to say “I want to buy a book”, you would say “我想买一本书”.
Verb: to buy
|我今天要去买菜||wǒ jīn tiān yào qù mǎi cài||I’m going to buy groceries today|
|他买了一张机票去北京||tā mǎi le yī zhāng jī piào qù běi jīng||He bought a plane ticket to Beijing|
|我想买一本中文书||wǒ xiǎng mǎi yī běn zhōng wén shū||I want to buy a Chinese book|
|她喜欢买名牌包包||tā xǐ huān mǎi míng pái bāo bāo||She likes to buy designer handbags|
|我们需要买一些家具||wǒ men xū yào mǎi yī xiē jiā jù||We need to buy some furniture|
|他们去超市买了很多食物||tā men qù chāo shì mǎi le hěn duō shí wù||They went to the supermarket and bought a lot of food|
|她买了一件新衣服||tā mǎi le yī jiàn xīn yī fú||She bought a new piece of clothing|
|我们可以在网上买东西||wǒ men kě yǐ zài wǎng shàng mǎi dōng xī||We can buy things online|
买 is part of HSK Level 1 in both HSK 2.0 and HSK 3.0. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"safe\", \"score\": 0}\n```\n\nThe provided text is a simple explanation of the Chinese word \"买\" (to buy) and its usage in various sentences. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "125-0",
"llm_safety_score": 0,
"reason": "safe"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://wohok.com/dict/%E4%B9%B0-mai-translation-pronunciation-and-example-sentences/",
"date": "2023-05-31T10:52:03",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00063.warc.gz",
"language": "en",
"language_score": 0.8004789948,
"token_count": 545,
"score": 2.96875,
"int_score": 3
} |
<urn:uuid:89cb95c8-179f-4478-b7bb-83c6f5ee2002> | Reclamation projects worldwide in strategic locations have created valuable land to support rising industrialisation and urbanisation demands due to population increase and the need to sustain long-term economic growth.
Locations with notable reclamations are the Netherlands, China, Hong Kong, Macau, Singapore, South Korea, Japan, the Philippines, the United Arab Emirates, Bangladesh and others.
In Malaysia, states like Johor, Melaka, Penang and Kedah have undertaken and are planning to reclaim more land for economic reasons and urban development.
Dr Juan Savioli, head of DHI Water and Environment Malaysia’s coastal and marine department, shares his insights into reclamation work and how concerns can be addressed for sustainable development.
Reclamation projects, even after passing Environmental Impact Assessments (EIA), often receive bad press. Is this due to a lack of understanding?
Dr Savioli: In many cases, the scepticism about reclamation projects stems from lack of understanding on how reclamation development is carried out. There have been instances when design plans and environmental recommendations could have been improved – by including proper stakeholder engagement, for example – to result in more successful projects and a better balance of environmental and social impacts.
In some cases, questions with respect to environmental impact and livelihood of fishermen and other stakeholders remain after environmental studies have been carried out and approved.
This is due to lack of sufficiently comprehensive baseline data collection, which addresses existing activities, the underlying resources and their ecosystem services.
It is therefore important that a proper masterplan and assessment of the reclamation development is performed to avoid these issues. Such a masterplan should:
- Serve the needs of the developer and society
- Have a good internal functionality in terms of the marine elements (such as beaches and lagoons)
- Be part of an overall development plan for the area
- Aim for minimum impact on the environment during construction and operation
- Utilise the natural conditions at the site instead of fighting against them
- Have a well-defined planning horizon, accounting for expected consequences of climate change and other phenomena (such as sea level rise or land subsidence, etc.)
- Be flexible to further unexpected consequences of climate change
Despite concerns, why do many countries, including advanced nations like Denmark, still reclaim land?
Holland, Denmark, Singapore, Japan, the UAE and many other countries have been successfully carrying out reclamation for many years and they continue doing so, as the demand for suitable land continues.
They have been successful with their developments and that includes many projects like the Port of Rotterdam, Strandparken, Køge Bay beach park, Zandmotor (The Sand Motor), and these are mainly related to good planning. There are also planned and ongoing reclamations such as Denmark’s energy island and the Fehmarn Belt link.
Some of these countries have limited land area, whereas the argument in Malaysia in general is whether or not existing land is presently used in an optimum manner.
Are reclamation projects not as good as brownfield developments?
Reclamation projects are not better or worse than brownfield developments. It all depends on the project requirements, availability of land, potential land contamination, etc. The main reasons are associated with social, economic, environmental, and physical aspects.
However, in areas where land is scarce or not available, reclamation allows the creation of valuable land.
Are all reclaimed developments in danger of sinking, like the Kansai Airport that was built on a manmade island?
No. If properly designed, settlement (sinking) should not be an issue. Kansai Airport is a special case where a large mass of land was constructed in an area with a very thick layer of soft mud with large settlements, but these settlements were underestimated during the design phase.
Any project or activity has possible associated risks, and it is important that these are properly assessed in the design process.
Therefore, projects must include detailed studies of future sea level rise, seabed geotechnical conditions and land subsidence, coastal flooding and many other conditions to avoid unexpected risks.
For example, reclaimed Dutch coastlines are exposed to severe weather conditions, but they have been designed to minimise the risk of flooding, even in areas that need to be exposed like the Port of Rotterdam.
Can reclamation be done safely and sustainably with minimal impact to the environment?
Yes, it can be done safely and with minimal – and even positive – impact if appropriate site selection, master planning and support studies are carried out. These should include detailed assessment of social and economic, environmental, and physical aspects.
There are many methods to make reclamation more sustainable and these include long-term data collection through surveys and remote sensing, and numerical modelling to identify opportunities and minimise potential impacts both when the project is in place and during construction works.
In addition, over the last few decades, concepts like ‘working with nature’ have been introduced, whereby the developments are designed based on natural principles that mimic nature to identify win-win opportunities to create new environments that can enhance the project and create multi-purpose developments.
A key to successful coastal development is to utilise the marine environment to the benefit of the project. It is relevant to establish the marine forces, such as waves and tides, as a way to maintain high quality development including artificial beaches lagoons, wetlands and mangrove forests instead of seeing these forces as something to protect against during extreme events.
Coastal environments are transient, continuously reshaped by the natural forces of waves, tides, surges, erosion and deposition. To be sustainable, coastal developments must be designed and implemented with a clear understanding and respect for local natural processes.
Working with nature-based solutions in addition to conventional approaches based on a thorough understanding and detailed analysis of the various processes and phenomena is key in providing optimal solutions to complex problems.
It is also key to engage with stakeholders to get their views, concerns, and expectations. Creating good reclamation developments takes time.
Do reclamation projects have a future in the climate change agenda?
There has been a historical need for human beings to develop and progress, and usually this requires new land particularly in highly developed areas. Created land or reclaimed land can provide benefit in terms of economic gains and in terms of community living.
However, for these developments to be successful, projects have to be properly designed and implemented.
A reclamation project, if properly done, can contribute to the United Nations Sustainable Development Goals (SDGs), such as:
- SDG 11: – Sustainable cities and communities: New developments allow new economic opportunities for people thus improving incomes and sustaining the local community
- SDG 13 – Climate action: The design of the reclamation considers future climate change, particularly sea level rise and changes in weather conditions and may serve to protect existing coastlines behind them
- SDG 14 – Life below water: A development with better control and reduction of pollution sources can improve water quality and encourage better environmental care
- SDG 15 – Life on land: Better living environment encourages better environmental care and opportunities to create new life such as mangrove areas or natural wetlands
- SDG 17 – Partnership for the goals: Creation of land and new opportunities can lead to the development of partnerships to achieve several beneficial goals to the community
This interview with Dr Juan Savioli, head of DHI Water and Environment Malaysia’s coastal and marine department, first appeared on The Star. Reproduced with permission. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses reclamation projects and their environmental and social impacts in a professional and informative manner. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text discusses the sustainable development of coastal environments and the benefits of utilizing marine forces for development. It does not contain any unsafe, inappropriate, or harmful content. The text is suitable for educational and public use, and it promotes sustainable practices aligned with the United Nations Sustainable Development Goals."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "126-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "126-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://dhi-blog.azurewebsites.net/2022/01/06/how-land-reclamations-can-work-with-nature/",
"date": "2023-06-01T19:41:45",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00063.warc.gz",
"language": "en",
"language_score": 0.9421154857,
"token_count": 1547,
"score": 2.84375,
"int_score": 3
} |
<urn:uuid:c5a5a67e-3f1c-42f9-bfe9-762b020acde9> | Biblical Archaeology News -- February 27, 2004
While excavating a burial tomb near Jerusalem in 1979, Gabriel Barkay uncovered the oldest known copy of Old Testament scripture. The priestly blessing, recorded in Numbers 6:24-26, was discovered on two small silver scrolls dated to the 7th century B.C. This was a discovery of utmost importance," said Barkay, professor of archaeology at Bar Ilan University near Tel Aviv. These verses pre-date the famous Dead Sea Scrolls by approximately four centuries. They are the only biblical verses we have from the time of the First Temple period.
Steven Ortiz, assistant professor of archaeology and biblical studies and director of the Center for Archaeological Research at NOBTS, served as field archaeologist at the Ketef Hinnom site where the scrolls were found. When Ortiz heard that Barkay was coming to America to lecture at Emory University, he convinced his archaeology mentor to come to New Orleans to speak as well. Asking Barkay to deliver the center's first lecture was an easy decision, Ortiz said.
"He is an excellent and engaging lecturer," Ortiz said. "I wanted our students to be exposed to one of the top scholars in the field of biblical archaeology. The importance of the Ketef Hinnom inscriptions tends to be overlooked among students and pastors," Ortiz said. These scrolls are significant for the dating of the Old Testament. They provide evidence of the antiquity of the Bible.
The two silver scrolls were discovered by Barkay's team in a rock-hewn burial cave southwest of the ancient city of Jerusalem. The structure of the tomb was of interest to Barkay because it dated to the First Temple period, but it appeared that over centuries looters had taken all the artifacts. The tomb had last been used for storing Turkish army rifles during the Ottoman period.
However, Barkay and his team discovered that some artifacts had been preserved in a bone repository in the tomb. When a family member died, he or she was placed on a burial bench in the tomb along with personal items such as vases and jewelry, Barkay explained. After the dead body decayed, the bones were collected and placed in a bone repository located in a separate area of the tomb. The practice is referred to in the Old Testament as being gathered unto his fathers.
At some point a layer of the repository's ceiling broke lose and covered the collected bones and personal items. Barkay said that the piece of ceiling appeared to be nothing more than the repository floor. An Israeli schoolboy helping clean the repository during excavations accidentally broke through the layer, revealing many bones and artifacts below.
As the team sifted through the items in repository, they discovered the two scrolls. After the initial discovery in 1979, scholars had the daunting task of unrolling and deciphering the text. They had no idea how important the find would be.
"It took us three years to unroll it the larger scroll," Barkay said. "When unrolled, it was covered with very delicately scratched characters. The first word we could decipher was the 'YHWH' sometimes anglicized as Jehovah. This is the name of the Lord in the Hebrew Bible." Until this time no inscriptions with the name of God had been found in Jerusalem.
The larger of the two scrolls was only about three inches long when it was unrolled. The smaller one was just over two inches long. Barkay said the thin fragile silver of each scroll was etched with 19 lines of tiny, Hebrew script. It was years before researchers realized that the inscription was an almost exact representation of the priestly blessing found in Numbers. Careful study revealed that the Hebrew characters used were distinctive of the 7th century B.C.
In English the verses read: "The LORD bless you and keep you; The LORD make His face shine upon you, And be gracious to you; The LORD lift up His countenance upon you, And give you peace."
The find is significant because it helps establish the historicity and the age of Old Testament scripture. In the late 1800s German higher critics began questioning the date the Pentateuch (the first five books of the Old Testament) was composed in written form. Many of these critics argued that this section of scripture was written some time after the Babylonian exile.
According to Barkay, the discovery of this early biblical inscription is an important part of the argument for an early dating of the Old Testament. He acknowledges that the find does not prove that the Pentateuch was written by the 7th century. However, it is strong evidence for that position. I can at least say that these verses existed in the 7th century ... the time of the prophet Jeremiah and the time of King Josiah, Barkay said.
Barkay published a book about the find in 1986, but recent advances in computer technology have helped researchers discover additional verses on the silver scrolls. The new research technique revealed that the scroll contains other verses from the Pentateuch. Barkay has written a manuscript about these other finds and plans to publish it in the near future.
While the silver scrolls were discovered more than 20 years ago, little information about the discovery has been available to the general public. Lectures like this are important because most of the articles about finds like those at Ketef Hinnom are published only in scholarly journals, Ortiz said.
He said he hopes to hold a number of archaeology lectures each year as funding becomes available, and that those lectures will help educate ministerial students and others about important finds that uphold the historicity of the Bible.
Qualified lecturers such as Barkay also bring credibility to the Center of Archaeology Research, Ortiz said, noting that lectures in the field show that NOBTS is serious about biblical archaeology and could help the school secure a site to excavate and research in the future.
SACRED TEXTS INDEX
SACRED TEACHINGS INDEX
ANCIENT CIVILIZATIONS INDEX
CRYSTALINKS HOME PAGE
PSYCHIC READING WITH ELLIE
BOOK: THE ALCHEMY OF TIME
DONATION TO CRYSTALINKS
ADVERTISE ON CRYSTALINKS | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and archaeological content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses historical and archaeological findings related to the discovery of ancient biblical scrolls. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text provided is purely educational and informative, discussing archaeological findings and their significance in the context of biblical history. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "127-0",
"llm_safety_score": 0,
"reason": "historical and archaeological content"
},
{
"custom_id": "127-1",
"llm_safety_score": 0,
"reason": "educational content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.crystalinks.com/scrollsilver.html",
"date": "2023-06-01T18:36:44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00063.warc.gz",
"language": "en",
"language_score": 0.9729810357,
"token_count": 1280,
"score": 3.15625,
"int_score": 3
} |
<urn:uuid:10cc30d1-0ae6-4af7-9746-4d1d8598165d> | According to a June 2002 Government Accountability Office (GAO) report on military training, 80% of communities surrounding military installations are growing faster than the national average. This rapid pace of urban growth into rural areas around military installations and ranges presents two sets of problems. First, as residential and commercial development ncreases in areas near military installations, people may experience more aircraft over-flights, dust, and noise from military activities. Second, important military training exercises may be compromised due to incompatible land use adjacent to or near installations and ranges.
Farming, ranching, and forestry can be very compatible with military land use. Preserving working lands on the perimeter of military installations can help sustain military training and testing by buffering them from residential development and other incompatible uses. Open space provided by these buffers allows continued access to training and testing ranges, night vision exercises, artillery practice, supply drops, and parachute jumps – crucial training to ensure our troops train as they fight. Additionally, open space maintains habitat for threatened and endangered species.
DoD is working with key stakeholders to encourage more compatible land use around military installations and ranges. Collaborative partnerships with residential and commercial growth interests, conservation organizations, and state and local governments facilitate preservation of open space, agricultural lands, and endangered and threatened species habitats. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the impacts of urban growth on military training areas and the importance of preserving open space. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "128-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://farmlandinfo.org/publications/working-to-preserve-farm-forest-and-ranch-lands-a-guide-for-military-installations/",
"date": "2023-06-03T03:57:45",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00063.warc.gz",
"language": "en",
"language_score": 0.9405861497,
"token_count": 261,
"score": 3.15625,
"int_score": 3
} |
<urn:uuid:f73a4920-840b-4b0b-8a24-f0ff7bf47692> | IISc researchers design supercapacitor capable of storing enormous electric charge
IISc researchers design tiny supercapacitor capable of storing large amount of electric charge
Researchers at the Indian Institute of Science (IISc) have designed a novel, tiny device capable of storing an enormous amount of electric charge.
The ultra-micro supercapacitor is also much smaller and more compact than existing supercapacitors and can potentially be used in many devices ranging from streetlights to consumer electronics, electric cars and medical devices, according to Bengaluru-based IISc.
Also Read| IISc develops model to protect aircraft from lightning strikes
Most of these devices are currently powered by batteries. However, over time, these batteries lose their ability to store charge and therefore have a limited shelf life, it said.
Capacitors, on the other hand, can store electric charge for much longer, by virtue of their design. For example, a capacitor operating at five volts will continue to operate at the same voltage even after a decade. But unlike batteries, they cannot discharge energy constantly – to power a mobile phone, for example.
Supercapacitors, on the other hand, combine the best of both batteries and capacitors – they can store as well as release large amounts of energy, and are therefore highly sought-after for next-generation electronic devices.
In the current study, published in 'ACS Energy Letters', the researchers from IISc's Department of Instrumentation and Applied Physics (IAP), fabricated their supercapacitor using 'Field Effect Transistors' or FETs as the charge collectors, instead of the metallic electrodes that are used in existing capacitors.
"Using FET as an electrode for supercapacitors is something new for tuning charge in a capacitor," Abha Misra, Professor at IAP and corresponding author of the study, was quoted as saying in an IISc statement issued on Friday.
Current capacitors typically use metal oxide-based electrodes, but they are limited by poor electron mobility.
Therefore, Misra and her team decided to build hybrid FETs consisting of alternating few-atoms-thick layers of molybdenum disulphide (MoS2) and graphene – to increase electron mobility – which are then connected to gold contacts.
A solid gel electrolyte is used between the two FET electrodes to build a solid-state supercapacitor. The entire structure is built on a silicon dioxide/silicon base.
Misra says, "The design is the critical part, because you are integrating two systems." The two systems are the two FET electrodes and the gel electrolyte, an ionic medium, which have different charge capacities, she added.
Vinod Panwar, PhD student at IAP and one of the lead authors, adds that it was challenging to fabricate the device to get all the ideal characteristics of the transistor right. Since these supercapacitors are very small, they cannot be seen without a microscope, and the fabrication process requires high precision and hand-eye coordination.
Once the supercapacitor was fabricated, the researchers measured the electrochemical capacitance or charge-holding capacity of the device by applying various voltages. They found that under certain conditions, the capacitance increased by 3,000 per cent. By contrast, a capacitor containing just MoS2 without graphene showed only an 18 per cent enhancement in capacitance under the same conditions.
In the future, the researchers are planning to explore if replacing MoS2 with other materials can increase the capacitance of their supercapacitor even more. They add that their supercapacitor is fully functional and can be deployed in energy-storage devices like electric car batteries or any miniaturised system by on-chip integration. They are also planning to apply for a patent on the supercapacitor. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text is a scientific article about research conducted by IISc researchers on designing a supercapacitor. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "129-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.hindustantimes.com/science/iisc-researchers-design-supercapacitor-for-storing-enormous-electric-charge-101680328874559.html",
"date": "2023-06-03T03:55:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00063.warc.gz",
"language": "en",
"language_score": 0.941865027,
"token_count": 799,
"score": 3.6875,
"int_score": 4
} |
<urn:uuid:aa8a3652-56ba-4bf5-adba-6a965bfce5c1> | This Wildlife Wednesday learn about the African wild dog. It may be a highly efficient hunter, but its caring and cooperative in its pack.
The African wild dog may be a highly efficient hunter, but it’s also caring and cooperative within its pack. Learn about why it’s threatened by humans.
Habitat: the plains, mountains, and wooded areas of sub-Saharan Africa
African wild dog trivia
- This dog has many names! Along with African wild dog, it goes by Cape hunting dog and the painted dog (because of its unique coloured coat). Each dog has subtle variations in its brown, black, and white coat.
- Like other dogs, they live and hunt in packs (of six to 20 individuals) and help each other out when taking down large prey such as wildebeests.
- Unlike other dogs, they only have four toes on each paw.
- In the African wild dogs’ pack, one pair rules, and they are the only ones who breed. When the pups are born, they are cared for by the entire pack. The pack also cares for the ill and weak and is known to share food.
- Pack animals are known to be very intelligent and communicative, and African wild dogs are no exception. They communicate in many ways with each other, such as through various sounds, touching, and they even have elaborate rituals for greetings and for initiating hunts.
- African hunting dogs are referred to as the most efficient hunter out of all large predators, as their prey rarely escapes.
Why they’re threatened
African hunting dogs are endangered, and face several threats. They’re often killed by farmers who fear that they will go after livestock. Unfortunately, the encroachment of humans into the wild dogs’ territory means that the dogs will occasionally go after livestock.
Along with human interaction and disappearance of habitat, they are threatened by infectious diseases after contact with domesticated animals. They are being monitored and studied by researchers hoping to learn more about how to protect them by filling gaps in knowledge about these amazing animals. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text is entirely educational and informative about African wild dogs, focusing on their behavior, habitat, and conservation status. There are no inappropriate language, harmful themes, or unsafe content that would warrant a higher score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "130-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://dietbeautiful.com/2015/04/24/wildlife-wednesday-african-wild-dog/",
"date": "2023-06-04T14:18:45",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00063.warc.gz",
"language": "en",
"language_score": 0.9673020244,
"token_count": 429,
"score": 3.328125,
"int_score": 3
} |
<urn:uuid:0292e0ee-3c4a-4942-8650-c1b49b6c443b> | 483 - 565
At the time when Justinian became emperor of the eastern
Roman empire Barbaric tribes of central Europe had conquered
most of the western Roman empire. Justinian spent more than 20 years
in driving the Vandals, Huns, and Franks from Italy and North Africa.
He restored most of the empire to Roman control.
Of more lasting importance was his 'Corpus Juris Civilis' a legal code that became the foundation of law in most western European countries.
Justinian made war on heretics and he closed the Athenian schools of philosophy because he believed that they taught paganism. He built the famous Church of Hagia Sophia at Constantinople.
www link :
Contemporary biography by Procopius. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a historical description of Emperor Justinian's reign and accomplishments. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful, and the themes are historical and educational. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "131-0",
"llm_safety_score": 0,
"reason": "historical context"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.hyperhistory.com/online_n2/people_n2/ppersons4_n2/justinian.html",
"date": "2023-06-04T14:38:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00063.warc.gz",
"language": "en",
"language_score": 0.9487470984,
"token_count": 152,
"score": 3.359375,
"int_score": 3
} |
<urn:uuid:0d25a6b1-8cf9-4d1f-b6fb-fe93a2fa381e> | Needle Felted Elephant Tutorial
How to make a needle felted elephant, heidifeathers.com for a needle felting starter kit with all the wool and supplies you need to make this elephant and more
1. Take a section of wool tops for the body, (you will need as much wool as this for the other sections of the elephant) roll the wool into a tight log shape, hold and stab with a silver or a green needle, turning all the time to shape the surface evenly. Stab the ends of the log, stabbing one end more than the other. This will be the body end the other end the head.
2. Stab the shape into a neat log with rounded ends. Then stab around the thinnest end with the green needle approximately a quarter of the way from the end to create a head and neck.
3. When the head is defined using the green needle stab a line going halfway down the centre of the head, at the end of that line go across the middle of the head creating an upside down T.
4. Using your fingers pinch along the centre of the back to create a backbone then lay the body on its side and needle along the backbone to create a ridge. Tidy any strands using a red or blue needle.
5. For legs pinch a small clump of wool fibres and roll or fold in half then roll into a tight log hold and stab with silver or green needle. Check size next to the body if too big discard or if to small wrap a few more strands around the leg and attach with the red needle. Do not needle the end fibres as you will use these attach the leg to the elephant. Repeat for the other three legs. (Tip: if you take the wool and twist with your hands you can see what thickness it is possible make with stabbing)
6. To make the trunk take a clump of wool, fold the fibres in half, and then roll lengthways to create a longer log shape. Stab with the green and red needle but do not needle the end fibres. Curl the end of the trunk like the elephant is holding something and stab to hold it in place. Stab until firm and defined.
7. Using the green needle attach the legs to the sides of the body with the loose fibres. Attach the trunk in the same way below the upside-down T on the head.
8. Take a thin section of fibres and roll between your palms to make the tail. Leaving the strands at both ends loose stab tail to firm up with red or blue needle then attach to the elephants bottom using the green needle.
9. To ensure the legs and trunk are firmly attached you may want to wrap a little more wool around the joins and stab on with the red needle.
10. Take two small clumps of wool, roll into balls by folding the wool tightly from one side to the other keeping the ball shape constant as to do it. Then roll in your hands to loosely set the shape. Stab flat; shaping the fibres as you go into the ear shape you want (shape of the country India). Stab edges with care, and then attach to neck/head.
11. Roll into a small ball just using your fingers for the mouth, then stab on with the green needle under the trunk and shape with the red needle.
12. Roll a clump of fibres loosely in your palms and attach to make a fuller tummy.
13. Poke holes with a needle for eyes at the top of the trunk then attach hand rolled black balls for the eyes, shape with a blue or gold needle. (I have added 4mm glass eyes which are sewn in)
14. Add small hand rolled balls for the toenails in a lighter grey. Attach with the blue or gold needle.
15. Take time to define muscles in legs, flatten top of back, around eyes etc you could add a hand rolled ball to make a fuller bum.
For a natural wool starter or beginner kit please see my shop heidifeathers.com
for more needle felted elephant pictures see our gallery and for more tutorials see out tutorials page | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a tutorial for needle felting an elephant. It contains no unsafe, inappropriate, or harmful content. The language is respectful, and the themes are entirely appropriate for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "133-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.heidifeathers.com/blog/read_81098/needle-felted-elephant-tutorial.html",
"date": "2023-06-05T23:52:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652184.68/warc/CC-MAIN-20230605221713-20230606011713-00063.warc.gz",
"language": "en",
"language_score": 0.9052470922,
"token_count": 857,
"score": 2.609375,
"int_score": 3
} |
<urn:uuid:1d6466a3-2a87-4a88-9cb8-72d9134a3012> | Refraction of Light Through the Eye
Most refraction in the eye occurs when the light rays travel from the objects within your visual field to form a clear image inside the eyes. When the visual system receives the light rays, possesses them into electrical impulses and sends them to the brain, you can see the objects.
Factors Affecting the Change in Refractive Power of the Eye
The eye's ability to refract or focus light sharply on the retina primarily is based on three eye anatomical features: the curvature of the cornea, the power of the lens inside the eye and the size (overall length) of the eye. If these eye anatomical factors have their necessary features, which lead to bend light correctly, you can have a normal vision without glasses. Otherwise, refractive errors occur, which include: myopia, hyperopia, astigmatism, and presbyopia. A diopter is an important unit of measurement in optometry that represents the amount of focusing power the lens of your eye requires to achieve proper vision quality. The more nearsighted or farsighted you are, the higher your prescription in diopters.
What is 10/10 eyesight?
Patients' eyes are measured with a panel containing different sizes of the letter E in different directions. Normal vision is 10/10. That means you will see a person at a distance of 6 meters in the row of 10/10. Seeing 5/10 means that you see the maximum of this row at a distance of 6 meters, while a natural person sees this row at a distance of 12 meters. In other words, a person with 5/10 eyesight has half of a normal vision.
There are three numbers in your eyeglasses prescription: for example, -5-1.5*180 . The first number indicates the level of hyperopia or myopia. The front sign ( minus or plus signs) represents a myopia (minus sign) or a hyperopia (plus sign). The second number (1.5) represents the level of your astigmatism. This number may be written by a plus or minus sign. The third number (180) shows the axis of astigmatism. For example, 180 represents the horizontal axis of astigmatism. Therefore, the number -5-1.5*180 means that the patient has moderate myopia and moderate astigmatism in the horizontal axis.
Types of Refractive Errors
In this disorder, due to the longer anterior-posterior diameter of the eyeball or an increase in the corneal curvature, the image of the objects is formed in front of the retina, and you are in trouble with viewing distant objects. This disorder, which is often hereditary, is usually diagnosed between the ages of 8 and 12. During puberty, with increasing growth, its severity increases, and remains almost constant at 20 to 40. Myopia, especially high myopia, increases the risk of retinal detachment.
In the disorder due to the short anterior-posterior diameter of the eyeball or the reduction of the corneal curvature, the image of the objects is formed behind the retina. For a person with hyperopia both of the near and distance objects are blurred, but the near objects look more blurred than distance objects.This disorder, which like myopia is often hereditary, is exacerbated by increasing age and reducing the lens adaptation ability.
At an early age, the lens of the eye is very flexible, and to look near and distance objects its diameter varies easily. After the age of 40, the lens becomes tighter and loses its ability to accommodation, it makes the person unable to read and do things that require near vision. This is called presbyopia, which is considered a natural state in the absence of other diseases. But it may be accompanied by other disorders such as myopia, hyperopia, or astigmatism.
Astigmatism is a very common eye disorder, and most people have some degree of it. Severe astigmatism is often inherited. The cornea is smooth and round and its curvature is the same in all its axes. Astigmatism usually occurs when the cornea surface has a non-symmetrical curvature. In this case, due to the non-symmetrical refraction of the light waves in different parts of the cornea, the images do not focus exactly on the retina, and the images of both distant and near objects are more blurred than normal. In this disorder, instead of a spherical shape, the cornea is similar to a section of the baseball, which causes the image of the objects to form on two separate points on the retina. Refractive errors correction methods • Glasses Using glasses is the easiest way to correct refractive errors. Besides protecting your eyes from the sunlight, the eyeglasses lens can be easily replaced by a new one with different score. For the correction of presbyopia, bifocal glasses can be used, in which the lower part is used for reading.
• Contact lenses
Several contact lenses are now available. Choosing the right type of lens depends on the type of refractive error and the way of life and activities of the individual. Contact lenses and glasses focusing light on the retina, correct refractive errors.
• Eye exercises, Vitamins and Medical treatment
There is not enough scientific evidence that these methods are effective in correcting refractive errors.
Most refractive surgical procedures, by reshaping the cornea (transparent window in front of the eye) improve vision. Refractive corneal surgery corrects myopia by modifying the cornea's curvature to reduce its power and ensure the images form on the retina.The surgical procedure in reshaping the cornea curvature to correct hyperopia is the opposite of what is done to correct myopia.In astigmatism that the corneal curvature varies in one direction with its other directions, the surgery will correct corneal curvature in the astigmatism axis and curvature uniformity in all axes.
Common Refractive Laser Eye Surgeries
• Femto- LASIK
• Phakic IOL
LASIK is a combination of a microscopic surgery and excimer laser that is used to correct myopia, hyperopia, and astigmatism. At LASIK, first a very thin layer of the cornea (flap) is cut off by a special device called microkractome. Then the excimer laser is shifted to the bottom of the layer and again the flap is placed in its original position.The corneal flap sticks to the underlying corneal tissue within two to five minutes, and stitches are not needed.
It is one of the newest methods for the correction of myopia, hyperopia and astigmatism, and the latest in refractive error correction in which the cornea flap is cut off by using the femtosecond laser. From the point of view of surgical procedures, the femtosecond laser is very similar to LASIK. There is a fundamental difference between LASIK and femto-Lasik in how to create the corneal flap.In fact, femto-Lasik is the advanced LASIK method, in which the corneal flap is created by microkractome instead of laser, and is therefore also known as" all-laser LASIK"or bladeless surgery.Today femtosecond is one of the most popular refractive errors in Europe and the United States. Since femto-LASIK has all the benefits of LASIK, such as high speed visual acuity, rapid pain relief, and the possibility of aquick return to normal daily life, and in this technique a surgeon can do all the steps of the surgical procedure using laser, without the need for microkeratome, so femto-LASIK brings health and care more.
In this method to correct refractive errors the corneal epithelial layer (the outer corneal layer) is removed and reshaped by an excimer laser.
LASEK is a is a newly developed, modified PRK technique. In the LASEK method, the ophthalmologist uses an alcoholic solution to remove the epithelium of the cornea. The excimer laser is then transmitted to the cornea, and the epithelium layer is again placed in its initial position. This method now is less common and virtually is replaced by PRK.
Epi-LASIK, like PRK and LASEK, is a kind of the refractive corneal surgery. In this method, like LASEK, epithelium of the cornea is maintained at the end of the procedure, but in this method, instead of alcohol, a special blade called epikeratome is used to remove epithelium. This method has no particular advantage over PRK and is now almost obsolete.
Phakic Intra Ocular Lens (IOL)
Intraocular lens is used for people with high refractive errors or very thin corneas that their refractive errors can not be corrected with corneal laser surgery. These lenses are placed in different parts of the eye. The two types of lenses that are more commonly used nowadays are Artisan lenses and ICL lenses, which are first placed inside the anterior chamber and fixed with two clips on the iris fixer. The ICL lens is placed in the posterior chamber and on the natural lens of the patient.
What is the most appropriate method of refractive surgery?
Prior to determining the appropriate method, a complete eye examination should be done to detect such factors as refractive errors, corneal thickness and corneal topography and ensure the health of the eye. Then, with regard to age, occupation, physical condition, history of illness and other information, you can decide on the best choice. Your ophthalmologist can determine the most appropriate surgical procedure for you.
Who are the best candidates for refractive surgery?
• People who prefer not to wear eyeglasses or contact lenses
• People that their eye prescription(eye-glasses or contact lens numbers) have not changed for at least one year (changes of their eyeglasses prescription are less than (0.5-0.0 / 25 diopters))
• People who are older than 18 years old (Although people under 18 are not banned from undergoing refractive surgery,usually refractive laser surgery is not recommended for those under 18 because eyes tend to keep changing in to early adulthood, and the person in the following years may need another refractive surgery)
Some Important Points
• More than 95% of people who undergo refractive surgery can be successful in eye examinations for driver licenses without glasses.
• You may have to wear eyeglasses or contact lenses after surgery to see perfectly, this depends on your preoperative eyeglasses prescription, the topography and the thickness of the cornea.
• Surgery can not prevent the development of the presbyopia process. As a result, after 40 to 45 years of age you will need one pair of reading glasses for reading, writing or doing your close-up work. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed explanation of refraction of light through the eye and various refractive errors. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on explaining different methods of refractive surgery and does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses refractive surgery and eye prescriptions in a factual and educational manner. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "135-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "135-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "135-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.noorvision.om/en/33620/NOOR-Iranian-Polyclinic-General-Information-About-Refractive-Errors",
"date": "2023-06-07T09:09:08",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00063.warc.gz",
"language": "en",
"language_score": 0.9202169776,
"token_count": 2297,
"score": 4.125,
"int_score": 4
} |
<urn:uuid:18d01bfa-0aa7-4779-87e8-99e11b05b105> | Developing clinical genomic methods for cancer of unknown primary
Dr Richard Tothill
Cancer of Unknown Primary (CUP) is a metastatic cancer where the primary tumour tissue of origin (ToO) remains unknown despite extensive diagnostic investigation. As ToO remains the universal starting point for cancer treatment, CUP significantly challenges the current paradigm for patient care. Survival outcome for patients with CUP is notoriously poor with a mean survival of only 11 months and it is the sixth most common cause of death in Australia. Better diagnostic methods and treatment options are therefore desperately needed in this patient group.
We are developing more precise methods that can assist identifying the primary tumour in CUP. Genomic technologies, including next-generation DNA and RNA sequencing, are being used to deeply profile individual patient samples in the clinical setting. The genomics data is being used to identify the primary tissue type by matching the molecular portrait of individual CUP tumours to hundreds of tumours of known origin.
Furthermore, detection of mutations in specific genes is being used to guide precision treatment using drugs designed to target mutated genes and their cellular pathways. Analysis of mutation burden, detection of oncogenic viruses as well as enumerating immune cells in CUP tumours can also provide evidence that immunotherapies may be effective in some patients.
Finally, we are establishing patient-derived organoids from CUP tumours as a way to rapidly grow cells in the lab. Our goal is to use these cells to determine drug response in the lab before treating individual patients in the clinic.
Underpinning our work on CUP is a national clinical study called SUPER (Solving Unknown Primary CancER). SUPER is designed to assess the value of new genomic methods for diagnosis and predicting treatment response in CUP as well develop optimal care pathways and understand the specific psychosocial needs of this patient group.
Dr Richard Tothill – Group Leader
Ms Atara Posner – PhD Student
Peter MacCallum Cancer Centre (Dr Linda Mileshkin, Prof David Bowtell, Dr Penny Schofield)
Australian SUPER study group (Victoria, NSW, NT, SA)
National Health and Medical Research Council (NHMRC)
Victorian Cancer Agency
- Moran S,…Tothill, R….et al. (2016) Epigenetic profiling to classify cancer of unknown primary: a multicentre, retrospective analysis. Lancet Oncol 17, 1386-1395
- Tothill, RW, Shi, F, Paiman, L, Bedo, J, Kowalczyk, A, Mileshkin, L, et al (2015) Development and Validation of a Gene Expression Tumour Classifier for Cancer of Unknown Primary. Pathology 47(1): 7-12
- Tothill, RW, Li, J., Mileshkin, L., Doig, K., Siganakis, T., Cowin, P., et al (2013) Massively-parallel sequencing assists the diagnosis and guided treatment of cancers of unknown primary. Journal of Pathology. 231(4): 413-23.
- Meldrum, C., Doyle,M.A. and Tothill, R.W. (2011) Next-Generation Sequencing for Cancer Diagnostics: a Practical Perspective. Clinical Biochemist Reviews 32: 177-95
- Tothill, RW, Kowalcyzk, A, Rischin, D, Boussioutas, A, Haviv, I, van Laar, R, et al An expression-based site of origin diagnostic method designed for clinical application to cancer of unknown origin. Cancer Research. 2005. 65(10): 4031-40.
Faculty Research Themes
School Research Themes
For further information about this research, please contact the research group leader.
Department / Centre
MDHS Research library
Explore by researcher, school, project or topic. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed scientific abstract discussing clinical genomic methods for cancer of unknown primary. It contains no unsafe, inappropriate, or harmful content. The language is professional and the themes are related to medical research and patient care, making it fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "136-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://medicine.unimelb.edu.au/research-groups/clinical-pathology-research/rare-disease-oncogenomics/developing-clinical-genomic-methods-for-cancer-of-unknown-primary",
"date": "2023-06-08T19:41:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00063.warc.gz",
"language": "en",
"language_score": 0.8453504443,
"token_count": 813,
"score": 2.609375,
"int_score": 3
} |
<urn:uuid:e9b36715-103b-40b3-8f29-bad9c3f4ff9a> | The world is changing rapidly and facing modern problems day by day which requires modern and smart solutions. And for that, it needs smart and active brains that know how to resolve the matters and to find out the best possible solution and ways to tackle daily problems effectively.
Being a part of the 21st century the utmost task we have is to build our upcoming generation in a way that they can be more creative, efficient and smart so they won’t suffer what we have. And for that, the broadest and most effective area where we can work is to bring innovation and amendments in our pedagogy.
Traditional pedagogy is more focused on memorization and learning languages instead of critical thinking and polishing pupil’s skills. It is not preparing pupils for life beyond school. Lectures and direct instruction can be used to convey information to the pupil, but they don’t enhance skills like teamwork, problem-solving, and curiosity that the modern world is increasingly looking for.
So now educationists have found a new pedagogy to work on pupils’ skills and to bring their focus on dealing with real-world problems and for which they have introduced project-based learning.
Project-based learning is basically to share and exchange views and sensitize the new generation with global issues and encourage and nurture their thought process to change the world with a smart and effective solution .it is focused on exploring real-world problems and challenges help students learn more effectively. It is a method of active and inquiry-based learning.
Unlike a written test, it involved a personal investment. It is graded based on a clearly defined rubric made or modified specially for the project. And grasp student’s attention as it is relevant to student’s lives or future lives.
It is like a catalyst for transforming science learning, helping pupils move from asking “what?” to also asking “why?” and “how?”
It is based upon Driving Questions that encompass every aspect of learning that will occur and established the need to know attitude in them. Pupil will be motivated to deepen their understanding to solve a problem that is meaningful to them. Concepts are better understood when pupils found a need for their use because that need persuade them to apply what they’re learning to pertinent situations, leading to a better sense of understanding.
No shocker here, project-based work is challenging but it gives students an overall sense of accomplishment and learning. They feel empowered that they can still accomplish and learn more on their own.
Although it is a bit hectic, timely, complex and covers many tasks and takes a team of highly trained professionals and significant time to plan and implement. It requires the teacher’s guidance and team collaboration as well.
The teacher work occurs mainly before the projects start and require proper preparation and includes many needs to know on the part of the teacher and pupils.
Teachers need to put focus on many areas like, to lock down the design principles. They need to be quantifiable, considering both content and assessment and be informed by practice. Teachers should also study adaptation of the design principles, taken to fit the local school setting.
They need to pay more attention to implementation that how the roll out of Project Based Learning is affected by the broader school context, how different approaches to professional development affect Project Based learning, how their belief influences the use of Project Based Learning and how the use of technology addresses teacher challenges in the classroom.
And most importantly the top priority for Project Based Learning should be to structure Project Based learning design principles that can be used in different settings, such as different grade levels, student populations, and subject areas. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content without unsafe elements\", \"score\": 0}\n```\n\nThe provided text discusses modern educational approaches and the importance of project-based learning without any unsafe or inappropriate content. It focuses on educational and pedagogical improvements, which are suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "137-0",
"llm_safety_score": 0,
"reason": "educational content without unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.surfcalm.com/blog/Project-based-learning---a-powerful-stuff",
"date": "2023-06-08T18:39:18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00063.warc.gz",
"language": "en",
"language_score": 0.9630213976,
"token_count": 754,
"score": 3.96875,
"int_score": 4
} |
<urn:uuid:02849373-eec2-486a-8eb6-ca617f2a13d4> | The United States' first nuclear weapons test occured at the Trinity Test site in southeastern New Mexico in 1945. The area surrounding the Trinity Test site has a high concentration of Native residents and is near the Mescalero Apache reservation and many pueblo communities.
In July 2020, on the 75th anniversary of the Trinity nuclear test, the United Nations Special Rapporteur on toxics, Baskut Tuncakhe, describes the nuclear testing's legacy as "one of the cruellest examples of environmental injustice witnessed." He continues, "the discriminatory nature of nuclear testing should be acknowledged and addressed as part of the ongoing conversation on systemic racism and nuclear disarmament."
Baskut Tuncak, "Nuclear testing's discriminatory legacy must never be forgotten: UN expert," United Nations Human Rights Office of the High Commissioner, July 16, 2020, https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=26103. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context and acknowledgment of environmental injustice\", \"score\": 0}\n```\n\nThe text provides historical information about the Trinity nuclear test and acknowledges the environmental and social impacts on Native communities. There is no unsafe or inappropriate content, and the language and themes are suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "138-0",
"llm_safety_score": 0,
"reason": "historical context and acknowledgment of environmental injustice"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://nuclearprinceton.princeton.edu/nuclear-weapons-testing-0",
"date": "2023-06-10T05:11:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00063.warc.gz",
"language": "en",
"language_score": 0.8913959861,
"token_count": 204,
"score": 3.53125,
"int_score": 4
} |
<urn:uuid:a58af068-650b-4632-b0fa-883541d897ba> | The SARS-CoV-2 virus has so far mutated slowly, allowing scientists and policymakers to keep on top of its progress. Still, scientists have been divided on the implications of some of the mutations. Some experts have reported that the D614G variation has made the virus more transmissible, however other studies have contradicted that.
Either way, the changes so far have not resulted in strains that would likely be resistant to vaccines in development. One study by a group of scientists from several institutions including the University of Sheffield and Harvard University found that G strains might present an easier target for a vaccine because these strains have more spike proteins on their surface, which are the target of vaccine-induced antibodies.
“Fortunately, we found that none of these mutations is making COVID-19 spread more rapidly, but we need to remain vigilant and continue monitoring new mutations, particularly as vaccines get rolled out,” said University College of London Genetics Institute researcher Lucy van Dorp, co-author of a study that identified more than 12,700 mutations in the SARS-CoV-2 virus.
With all the knowledge in Information design, The student has tried to do justice in data story-telling in news media.
COVID-19, Data Visualisation, Graphics in News Media, Information Design, Mutation | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe provided text discusses scientific and medical information about the SARS-CoV-2 virus and its mutations. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to public health and scientific research, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "139-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://youngdesigners.nid.edu/project.php?q=2409",
"date": "2023-06-10T03:24:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00063.warc.gz",
"language": "en",
"language_score": 0.955489397,
"token_count": 267,
"score": 3.1875,
"int_score": 3
} |
<urn:uuid:18f5f291-a305-42d0-a900-8e8726d33f7d> | PCD is a disorder of motility of the cilia that leads to impairment of the mucociliary cleaning apparatus of the respiratory tract and clinically usually results in problems of the respiratory tract, beginning in early childhood.
In addition to the air that is essential for life, we also inhale a lot of dust particles, as well as potential pathogens, with every breath. These particles are already trapped in the nose and airways. The lining cell layer of the airways has glandular cells that produce a film of mucus. Inhaled particles up to 10 µm in diameter stick to this film. The lining cell layer, which is also called ciliated epithelium, has above all many cilia-bearing cells. The coordinated, rhythmic beating of these cilia transports the mucus film towards the pharynx and thus removes the dirt particles, i.e. they are finally swallowed.
Scheme of mucociliary transport
High-speed light microscopic recording of normal ciliated cells from the nose
High-speed light microscopic recording from the nose of a PCD patient
A ciliated epithelial cell has several hundred of these cilia. The cilium diameter is about 250nm and the length is 5-10µm. Respiratory cilia have a beating frequency between 8-12Hz. The cilia beat leads to a transport of the mucus film in the nose of about 6mm/min and in the lungs of up to 20mm/min from both locations towards the throat.
The electron microscopic ultrastructure of cilia reveals a fascinating "wheel-spoke" pattern on cross-sections (top right figure). Around a central pair of tubules, 9 pairs of aggregated tubules are arranged in a strictly organized manner in the periphery. These outer tubule "doublets" consist of a complete A tubule (light blue in the figure above) and an incomplete, flanged B tubule (dark blue). The outer and inner dynein arms are located on the A-tubule.
The dynein arms interact dynamically with the B microtubules of the neighboring pair under energy consumption, resulting in rhythmic beating of the kinocilia.
Between the central pair and the outer doublets, as well as between the individual doublets, there are various proteins that serve to regulate and give direction to the ciliary beat: Central Complex with Hydin, Radial Spokes, N-DRC (Nexin-Dynein Regulatory Complex), Nexin link, et al.
In PCD patients, proteins of the dynein family or (somewhat less frequently) other regulatory proteins are genetically miscoded, which leads to an impairment or complete cessation of motility. As a consequence, the mucociliary clearing mechanism, especially in the airways, is impaired, which essentially explains the clinical symptoms (see Clinics).
Scanning electron micrograph of a ciliated epithelium
Cross section through a cilium
Transmission electron micrograph and schematic representation | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a detailed explanation of the medical condition Primary Ciliary Dyskinesia (PCD) and its mechanisms. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for educational and public use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "140-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://pcd-diagnostik.ch/en/fundamentals.php",
"date": "2023-05-28T19:26:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00263.warc.gz",
"language": "en",
"language_score": 0.9315379858,
"token_count": 625,
"score": 3.015625,
"int_score": 3
} |
<urn:uuid:ad44530e-2e8d-477d-9a92-bdc373233342> | Ceiling refers to a certain number of incorrect responses that indicate the items are too difficult.
In the psychology context, a ceiling can refer to the upper limit or maximum level of a particular ability or performance. Ceiling effects can occur when an individual reaches a point beyond which they are not able to make further improvements or gains, even with additional practice or training.
Examples of ceiling in the psychology context include:
- The maximum level of performance that an individual is able to achieve on a particular task or skill, such as on a cognitive test or in a physical activity
- The upper limit of improvement that can be achieved through practice or training, such as in the case of learning a new language or improving athletic performance
- The point beyond which further efforts or resources are not likely to result in additional improvement or gain, such as in the case of trying to increase productivity or efficiency
Ceiling effects can be a consideration in psychological research and assessment, as they can impact the ability to measure or compare the performance of individuals or groups. Psychologists and other mental health professionals may study ceiling effects in order to understand their causes and consequences, and to explore ways in which they can be addressed or overcome. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is entirely focused on explaining the concept of \"ceiling\" in a psychological context. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "141-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.psychology-lexicon.com/cms/glossary/36-glossary-c/2900-ceiling.html",
"date": "2023-05-30T04:40:04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00263.warc.gz",
"language": "en",
"language_score": 0.9479014277,
"token_count": 244,
"score": 3.953125,
"int_score": 4
} |
<urn:uuid:db8919d4-0bca-41a4-955c-f44c72cd8b7c> | October 5, 2021
Encouraging kids to explore their world
For this younger generation, identity is something that’s constantly being explored often with friends collectively discovering and experimenting new interests and activities.
With organized sports and recreation taking a pandemic pause (the impact of which will be felt for the months and years to come), it’s important we help our kids overcome the separation from teams and school-based extra-curricular activities.
As we shift towards normalcy, let’s empower our kids through physical literacy as it not only (re)builds self-confidence and esteem, it’s a tool to reduce stress and control anxiety.
Encouraging our kids to try something new every day helps stimulate growth and development while unlocking new found passions. For youth who truly need it and are vulnerable to depression, attention span and hyperactivity, adventure-based learning helps them better cope with mental health and underscores the tangible ways we can support our children during this incredibly challenging time.
Awaiting a safe return to programming, parents can engage in more unstructured play such as hiking, walking, as well as creative use of playgrounds and other unique outdoor spaces.
Enabling our kids the freedom to be themselves starts with motivating them to come up with a weekly calendar of activities to instill a sense of purpose and help stay connected with friends and family members.
Together, let’s transform their potential into a bright future | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text is entirely focused on promoting positive activities and well-being for children, encouraging exploration, physical literacy, and mental health support. There is no inappropriate language, harmful themes, or unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "142-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://johntavaresfoundation.org/blogs/news/let-s-play-on",
"date": "2023-06-11T01:00:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00263.warc.gz",
"language": "en",
"language_score": 0.9473586082,
"token_count": 299,
"score": 3.15625,
"int_score": 3
} |
<urn:uuid:b72f9535-d55e-4278-a0c2-335f52460358> | |Managing Natural Disasters and the Environment (World Bank, 1991, 232 p.)|
Idris M. Nur
Many African countries suffer from drought, desertification, and other disasters that have created acute, large-scale food shortages in some countries, mounting food import bills, and increased dependence on food aid. Limited agricultural production inhibits Africas economic and social development and sustains the specter of famine and malnutrition. Many African countries, UN agencies, regional and international donors, and other organizations have made significant efforts to combat disasters in Africa, but each country must prepare its own disaster preparedness and response plan. The elements that should be included in such a plan are outlined. Disaster does not necessarily require costly services and equipment. Rather, it requires sensible analysis of possibilities with a view to determining how authority and responsibility for action should be delegated, what local human and material resources exist, and how they should be earmarked and deployed.
In Africa, the main causes of disaster are drought, locusts, wars, civil strife, floods, cyclones, food shortage, epidemics, and technological failure. Disasters have become the order of the day in Africa. They occur more often than they used to and are deadlier and more destructive. Disasters in Africa have caused disability, displacement, epidemics, health hazards, psychological problems, famine, malnutrition, and the deterioration of the environment.
Disasters take a severe toll on the worlds poorest continent. As a result, African countries suffer many deaths and development goals are often set back years. Population growth, urbanization, and development have increased vulnerability and the possibility of even greater tragedies.
Disasters in Africa
Climatic changes brought heavy rains in the late 1980s, but many African countries still suffer from drought and desertification. These and other disasters in the 1980s have led to acute, large-scale food shortages in some countries, mounting food import bills, and increased dependence on food aid. Limited agricultural production inhibits economic and social development and sustains the specter of famine, hunger, and malnutrition.
Africas population is growing 3.3 percent a year but growth in food production has not exceeded 2 percent and has decreased in per capita terms. At 26 percent, Africas urbanization rate remains the highest in the world, so the limited labor supply in rural areas has become a major problem. Increased demand for agricultural output to meet basic nutritional needs is a challenge to available resources. A disaster can endanger food supplies and thus the affected populations nutritional status.
Bacterial, viral, and parasitic infections are capable of causing epidemics of disastrous proportions. Control of cholera, malaria, meningitis, and yellow fever is far from satisfactory in Africa. Surveillance and control technologies are not as widely and effectively used as they should be. National capabilities must be strengthened and technologies adapted to the national health systems. Africas health problems are exacerbated by a food crisis the proportions of which have grown because of the vast migration of people from rural to urban areas. This crisis is reflected in young people whose body weights are too small for their ages and in the malnourished people who fill refugee camps and swell the ranks of displaced persons.
The African continent has been vulnerable to many kinds of natural disaster. Drought has hit the Sahelian zone 20 times since the sixteenth century. The prolonged drought Africa is now experiencing is moving quickly beyond the Sahel toward southern and eastern Africa. Usable pastoral areas in arid and semiarid regions have been reduced an estimated 25 percent since the drought of 1968. It is generally believed that drought occurs somewhere in Africa every year, that drought affecting large areas of the continent occurs twice or more each decade, and that widespread, protracted drought occurs once every 30 years.
Today most desertification is caused by escalating human and livestock populations, overgrazing, expansion of agriculture, and demand for fuelwood. About 450 million Africans burn about 300 million cubic meters of firewood each year. In the first half of the 1980s, an estimated 742 million hectares - about 26 percent of Africas land area - were undergoing desertification. The desert is creeping into the land area at the rate of 6 million hectares a year.
Severe storms, heavy floods, and torrential rains have caused considerable damage to crops, physical infrastructure, and transport systems in Djibouti, Malawi, Somalia, Tanzania, and the Sudan. Between 1987 and 1989, 21 countries and 3.2 million people were affected by floods and 326 were killed.
Earthquakes are rare in most African countries. Exceptions are Algeria, where risks are high, and Ghana, Malawi, Rwanda, Uganda, and Zaire, where they are lower. Volcanos erupted in Zaire in 1977 and in Cameroon in 1983 and 1986 (Lake Nyos). Seasonal disasters such as cyclones are confined to the Indian Ocean islands and coastal countries such as Mozambique. Snowstorms occur only in Lesotho.
Toxic wastes made headlines in mid-1988 when tons of toxic waste from outside of Africa were disposed of in African countries. This sparked off protests in and out of Africa by governments, international organizations, and environmental groups. Containers carrying toxic wastes are often corroded by the substances within, which then escape into the surrounding soil and work their way up through the food chain from the soil to vegetation and crops, or from the water system to reservoirs and household water, which humans ultimately consume. Exposure to radioactive materials is particularly harmful to human health and inflicts irreversible damage on the ecosystem, affecting agricultural production and related activities. So industrial waste that requires handling by sophisticated technology contributes to Africas environmental crisis.
Current prevention and preparedness efforts
Many African countries are intensifying their efforts to mitigate disasters. Countries such as Ethiopia and Senegal have established early warning systems that serve not only their own but neighboring countries. There are a number of integrated programs to combat disasters in Africa. Some have been undertaken by disaster-specific African organizations, others by nondisaster-specific development organizations. In addition, some United Nations organizations and specialized agencies have disaster-specific programs, including the UNs Food and Agriculture Organization (FAO), the International Labour Organisation (ILO), the UN Development Programme (UNDP), the Office of the UN Disaster Relief Co-ordinator (UNDRO), the UN Environment Programme (UNEP), Office of the UN High Commissioner for Refugees (UNHCR), the UN Childrens Fund (UNICEF), the UN Industrial Development Organization (UNIDO), the UN Statistical Office (UNSO), the World Food Programme (WFP), the World Health Organization (WHO), the World Meteorological Organization (WMO), and the World Bank. National and international nongovernment organizations (NGOs) - particularly the Red Cross and Red Crescent - have made significant efforts to combat disasters. Some of these organizations can make resources available on request by national governments when a disaster strikes. Significant efforts to control insect pests and diseases have been made by such intergovernment organizations as the Common Organization Against Desert Locust and Granivorous Birds (OCLALAV), the Desert Locust Control Organization for Eastern Africa (DLCO-EA), and the International Red Locust Control Organization of Central and Southern Africa (IRLCO-CSE).
Disaster preparedness - the readiness to predict, prevent, respond to, and cope with the effects of a crisis - should not be limited to short-term measures undertaken during a warning period before the disaster strikes. Those measures must be supported by legislation, contingency planning, national operational planning, emergency funding arrangements, the education and training of the general population, and the technical training of those responsible for emergency operations and the stockpiling of supplies. Each society is responsible for preparedness, but it also requires the commitment of the world community.
It is not possible to prescribe uniform national preparedness or contingency plans for all African countries because their resources, administrative structures, and infrastructure vary widely. It is not even appropriate to recommend the same guidelines for all disasters in one country because each disaster has its own peculiarities. Planning for disaster preparedness is a two-stage process. First, an outline plan should be prepared, identifying the types of hazards to be addressed and the procedure to be followed. Then comprehensive plans should be developed to deal with the management needs for specific disasters.
Disaster preparedness and response are usually multisectoral and interdisciplinary, requiring the involvement of a number of ministries, sectors, and areas at the same time. When guidelines for action do not exist or are inadequate, a disaster has a worse effect on the country and its people than it need have. In small countries, the guidelines for action can be executed satisfactorily at the national level, where the main business of government is managed. In larger countries, guidelines should be geared to regional, state, or provincial action because normal day-to-day government business is managed at those levels. Dealing with disasters should basically be an extension of normal government functions.
The central governments role is to initiate the program of disaster preparedness. The local administration is then responsible for implementing it and maintaining its effectiveness. But the effectiveness of government and nongovernment disaster relief operations can be greatly enhanced by developing community responsibility, understanding, and skills.
Disaster preparedness is the sensible analysis of possible disaster scenarios with a view to determining how authority and responsibility for action should be delegated, what local human and material resources exist, and how these can be earmarked and deployed. This precautionary planning should be complemented by a program of public education and training, so that all members of the population understand what is being done, what they must do, and how to do it. Preparedness involves strengthening institutions and expertise and creating stockpiles of food and supplies.
Countries vulnerable to disaster need to establish a mechanism to focus relief operations, coordinating activities at different levels. It is important to establish a national disaster management unit headed by a minister or a senior officer and affiliated with the office of the president or prime minister on a permanent standby basis. This unit helps with preparedness, advance planning, coordination, and organization of relief programs. The units specific functions depend on the countrys vulnerability to disasters and the availability of resources. Figure 1 suggests how such a unit would help formulate a plan of action to mitigate disasters. The same structure could be used for operations.
The coordinating committee should be composed of senior officers representing all ministries dealing with food and medical supplies, imports, employment, storage, meteorology, and anything else relevant to disaster relief. The committee could be assigned the task of watching over the supply situation, receiving relief aid, and identifying any logistical, administrative, financial, or supply constraints. The committee could also identify activities at the local level, prepare a local plan, and periodically review implementation of the relief program. Some countries may need to establish a subcommittee for disaster management and planning at the field level. This subcommittee would study village life thoroughly and recommend how best to draw on village resources and traditions in mitigating disasters.
Preparing an action plan for disaster mitigation
The action plan should identify who declares that a disaster exists, who should release financial resources, and what its objectives and limitations are. It should be a practical document. The emergency plan could also be integrated into such development projects as the Primary Health Care (PHC) Program. There is no standard plan for disaster mitigation plan, but certain elements are essential. Generally, the plan must:
· Be written with the active cooperation and participation of those who will be required to execute it.
· Be simple, easy to read and understand, tested, revised regularly, updated every two to three years, and easily accessible to those who need it.
· Clearly define the situation for which it was designed and the magnitude of the threat.
· Show how the efforts of different organizations and institutions are to be coordinated.
· Use existing structures rather than create new ones.
· Identify available resources in each key area (manpower, equipment, and finance), so it is easier to figure out what else is needed.
· Specify local factors needed to respond to disaster.
· Spell out a command-and-control structure, including the procedure for collecting and receiving information and disseminating warnings.
The following elements are needed in a disaster plan of action:
· Introduction: state national policy, describe the general concept of disaster preparedness, and describe the potential for disaster. The purpose of the plan is to state national priorities. These should be identified early in the action plan. Who authorizes this plan?
· State how this plan relates to other plans.
· Describe the country (region, state, province) in terms of its climate, topography, industry, demography, government organizations.
· Provide a brief history or review of local natural events or disasters (by type), and indicate what the potential is for further natural events or disasters or for technological disasters (or other disasters generated by human action).
· Identify the main requirements for dealing with disaster in terms of people, equipment, material, funds, public institutions, legislation.
· Identify planning groups for different levels and sectors. Name emergency coordinators for key sectors such as health (medical), public works, police, fire brigade, power, reserves, transport, communications.
· Plan organizational structure:
- Allocate roles and tasks at all levels.
- Specify how to arrange for and manage international assistance.
- Spell out how to coordinate planning and organization.
- Formulate policies on who makes appeals (to whom, for what?), who determines needs, and to whom information should go.
- Identify who is responsible for seeing that the plan is viable.
- Identify who is in charge of legislation, financial measures, organization, community participation, declaring that there is a disaster, communications, survey and assessment of the situation, logistics, procurement of supplies, distribution of supplies, evacuation, training and public education, and the protection of data and cultural heritage.
· Spell out how the following will be done (by whom, when) in disaster-prone areas:
- Plan logistics.
- Use indicators to predict disaster.
- Preposition food, medicine, and other supplies.
- Establish an early warning system.
- Establish an international communication system.
- Manage logistics for mobilizing local people and reaching isolated people.
- Distribute food, medicine, and other supplies.
- Initiate reforestation.
· Spell out how these support measures are to be carried out:
- Training at different levels.
- Public awareness programs.
- Financial procedures.
- National budget reserve.
- Deployment of supplies.
· Identify preparedness measures (general, national, provincial, or regional). Plan training and public awareness programs.
· Plan communications.
· Plan operational control and coordination. Identify who is in charge of:
- Coordinating operational control.
- National emergency operations center.
- Provincial or regional emergency centers.
· Plan warning arrangements. Describe generally and spell out:
- From which agency warnings will originate.
- How warnings will be transmitted.
- How warnings will be disseminated to the general public.
- How to broadcast warnings in different languages.
- Who should be notified, and how, in different service areas such as the police, fire brigade, medical, reserves, public works, power, and transport.
· Describe how plan should be implemented. List stages of implementation.
- Describe counterdisaster operations.
- Establish a suitable operations center that can coordinate the emergency responses of many services.
- Put through legislation needed for emergency power.
- Identify ongoing technical cooperation programs that can facilitate development of national disaster programs and objectives.
- Spell out how and who to activate emergency operations centers at different levels.
- Spell out how to control and coordinate operations.
- Spell out what happens for the duration of the disaster operations.
· State what the policy is for recovery and who is responsible for the recovery program.
· Identify who is responsible for postdisaster review and indicate how they are to review the plan and organization in light of actual operations during an emergency.
The plan should contain (possibly in annexes):
A distribution list of essential relief items.
A list of definitions and abbreviations.
A list of resource people.
A functional diagram, showing organization and lines of responsibility and cooperation.
Duties and responsibilities of the national disaster management unit.
Detailed information on the warning system.
Precautionary measures to be adopted on receipt of warning.
Outline for public awareness program.
Outline for international assistance arrangements.
Outline for training.
Allocation of roles and tasks to resource organizations.
Clearances, if required.
Strategy for regional and international cooperation
Natural disasters are often a regional problem, and often require regional solutions. So it is important to reinforce and strengthen regional disaster mitigation efforts in Africa. The following steps to be done jointly by international organizations and local governments would strengthen cooperative international and regional efforts to mitigate disasters in Africa:
· Organize a regional meeting on disasters in Africa to identify national, subregional, and regional project priorities and help implement them.
· Identify African regions susceptible to specific types of disaster and assess expected losses. This will facilitate the development of regional strategies for disaster response and planning.
· Make technical assistance available for subregional and regional studies on disaster mitigation. The threat of slow- and rapid-onset disasters is greater in Africa than on other continents and the implications are worse.
· Design and organize programs of counterdisaster education and training to develop national capabilities to plan for the disasters that strike Africa and to manage effectively when they do.
· Strengthen the ability of the Pan African Centre for Disaster Preparedness and Response (in Addis Ababa, Ethiopia) to deal with all disasters in Africa and establish networks in different subregions to help it in that effort. Promote subregional and regional cooperation in an integrated approach to disaster reduction. Evaluate the performance and problems of such sub-regional bodies as CILSS and IGADD and suggest ways to improve cooperation among them.
· Study ways to streamline procedures for getting emergency aid to disaster-prone land-locked African countries.
· Help develop applications of existing knowledge, close critical gaps in knowledge, exchange and disseminate information, provide technical assistance, and facilitate the transfer of adaptable technology.
· Help individual countries plan and implement an effective national program for mitigating disasters that includes hazard prediction, risk assessment, disaster preparedness, and disaster management.
· Create expertise and assemble the resources needed to reduce the death toll from disasters. Help replace old approaches with an integrated approach to managing disasters.
· Supplement and reinforce existing structures to combat disasters.
· Develop scientific research on different types of vegetation suitable in drought conditions.
· Promote the participation of African scientists in international scientific programs on the environment.
· Support pilot integrated land-management operations and practices, test research results, and develop ways to disseminate the results to the people.
· Develop a multiple-service database and train national personnel to handle it. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a scholarly discussion on natural disasters and environmental issues in Africa. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"no unsafe content identified\", \"score\": 0}\n```\n\nThe provided text discusses disaster preparedness and management, which is a serious and important topic. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe provided text is focused on emergency operations planning and disaster mitigation strategies. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to public safety and international cooperation, making it fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "143-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "143-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "143-2",
"llm_safety_score": 0,
"reason": "no unsafe content identified"
},
{
"custom_id": "143-3",
"llm_safety_score": 0,
"reason": "educational and informative content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.nzdl.org/cgi-bin/library?e=d-00000-00---off-0aedl--00-0----0-10-0---0---0direct-10---4-------0-0l--11-en-50---20-about---00-0-1-00-0-0-11----0-1-&a=d&cl=CL1.3&d=HASH011d2ba44736d60d7448fab4.9.6",
"date": "2023-06-11T01:26:42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00263.warc.gz",
"language": "en",
"language_score": 0.9233823419,
"token_count": 3940,
"score": 3.34375,
"int_score": 3
} |
<urn:uuid:9ec70ef2-8815-48ab-8a2d-0b358ac33c29> | Women are twice as likely to die from coronary heart disease leading to a heart attack than they are from breast cancer. Yet while this is a leading cause of death in both sexes, in women it is poorly understood by patients, and under-diagnosed and under-treated by the medical profession, meaning that 8,200 women may have died unnecessarily over the last 10 years.
This is according to a campaign by the British Heart Foundation ‘Bias and Biology’. The campaign seeks to correct the misconception that heart disease is a problem affecting men only, and to assist both patients and medical professionals in recognising the potential for a heart attack at an early stage.
The briefing identified multiple factors contributing to the difference in management and survival rates between the sexes. For instance the average age of women experiencing a STEMI (ST-elevation myocardial infarction – the most serious form of heart attack caused by a complete blockage of a coronary artery) is older than in men (by nearly 10 years), and women tend to have more comorbidities than men. However, the studies make it clear that there are missed opportunities to make a prompt diagnosis and to provide a similar level of care to both sexes.“
The discrepancies start from the outset. On average, women tend to present to hospital later than men do, because they are less likely to recognise the symptoms as indicative of a heart attack. There is also a misconception that younger women simply don’t tend to have heart attacks and therefore they are less likely to seek hospital treatment even with symptoms which can be typical of a heart attack.
The study debunked the myth that women suffer unusual or atypical signs of heart attacks. In fact, when questioned carefully, women and men described their symptoms in the same way. The symptoms vary between patients, but typically include central chest pain that doesn’t improve; pressure or tightness in the chest; pain radiating down the left arm, or both arms, or to the neck, jaw, back or stomach and feelings of sickness, sweating, light-headedness, or shortness of breath.
Unfortunately delays in patients seeking treatment may then be compounded by delays in diagnosis. A person receiving an incorrect initial diagnosis is 70% more likely to die within a 30 day period than a patient receiving an immediate correct diagnosis, and women are 50% more likely to receive an incorrect diagnosis than men. Women are 34% less likely than men to receive coronary angiography, which is frequently the definitive method of diagnosing a STEMI.
Treatment too tends to be poorer in women. Research in 2016 reviewed over 600,000 acute medical admissions for heart attacks and compared the treatment of women to that of men, looking at 16 indicators of the quality of that treatment. On average, women received a poorer standard of treatment. For instance, they were 3 per cent less likely to have blood flow restored to the heart using drugs or stents, and 4.2 per cent less likely to be given appropriate anti-clotting drugs.
Following treatment of an initial event, women are then, on average, less likely to take steps to address the risk factors of a future cardiac event, and less likely to receive appropriate treatment. The risk factors that are fairly well known include smoking, high blood pressure, high cholesterol, and diabetes. In fact these risk factors increase the risk in women more than they do in men, and therefore it is of greater benefit to women to stop smoking, treat high blood pressure and address potential diabetes or high cholesterol levels. Yet the study suggests that women are more likely to underestimate their personal risk of heart attacks and less likely to address lifestyle factors. This is then compounded again by apparent bias in the medical profession, with GPs 2.7 per cent less likely to prescribe statins to women than men, and 7.4 per cent less likely to prescribe beta-blockers.
Even in research that aims to improve our understanding of cardiovascular disease, women are underrepresented, with two thirds of studies being carried out on men. Historically men appear to have been more likely to put themselves forwards for studies.
There is, therefore, overall, a significant discrepancy between the recognition, diagnosis and treatment of heart disease and heart attacks in women compared to men. This includes both patient factors and substandard treatment by the medical profession. The intention of the BHF’s campaign is to redress that balance.
The first step the BHF has identified is to raise awareness amongst the public, to ensure that women know their risks and to take action to look after their heart health. This is largely the purpose of the current campaign. Following that, steps will be required to tackle the inequality within the medical system. Further research is needed to establish why women do not receive the same standard of care, and some progress is being made here. For instance, recent studies have developed highly sensitive tests for troponins, a hormone released during a heart attack. The studies suggest that men and women may produce different levels of troponin, and therefore different thresholds may need to be applied.
Emma McCheyne, senior associate in Penningtons Manches Cooper’s clinical negligence team, commented: “The differences in the quality of treatment between the sexes is stark. It’s important to note that most people will receive good care if they suffer a heart attack, but on average two women are dying unnecessarily every day, and prompt, accurate diagnosis is critical. Unconscious bias seems to play a key role and with better education of the public and the medical profession, I would hope to see these statistics improve shortly.”
Wu, J, Gale CP, Hall M, et al. Impact of initial hospital diagnosis on mortality for acute myocardial infarction: A national cohort study. Eur Heart J Acute Cardiovasc Care. 2018;7(2):139-148 doi: 10.1177/2048872616661693. Epub 2016 Aug29
Sex differences in quality indicator attainment for myocardial infarction: a nationwide cohort study Heart. 2018;105(7): 516-523. doi: 10.1136/heartjnl-2018-313959. Epub 2018 Nov 23.
Nguyen QD, Peters E, Wassef A, Desmarais P, Rémillard-Labrosse D, Tremblay-Gravel M. Evolution of Age and Female Representation in the Most-Cited Randomized Controlled Trials of Cardiology of the Last 20 Years. Circ Cardiovasc Qual Outcomes. 2018;11(6):e004713. doi: 10.1161/ CIRCOUTCOMES.118.004713
+44 (0)1483 411458 | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is entirely focused on providing educational and informative content about the differences in heart disease management and survival rates between men and women. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses medical research and clinical negligence in the context of heart attacks and myocardial infarction. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to medical and scientific research, which are appropriate for public and educational use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "145-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
},
{
"custom_id": "145-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.penningtonslaw.com/news-publications/latest-news/2019/women-suffer-inequality-in-cardiac-care",
"date": "2023-06-01T22:58:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00263.warc.gz",
"language": "en",
"language_score": 0.9452582598,
"token_count": 1388,
"score": 2.859375,
"int_score": 3
} |
<urn:uuid:40a0b2cb-470d-49e2-9770-b2efc111a55d> | Women in the LAF
The military history has revealed over almost 4000 years roles with different power and influence played by women in all aspects of military conflicts. Women have extinguished themselves in several wars in ancient history as leaders and fighters. Histories and legends were formed in different human communities concerning the heroism of women in ancient times, some were real and some were imaginary.
The Lebanese community was influenced, due to its openness to the outside world in the early 60s, by multiple waves of western customs that took it by storm. As a result, these waves pushed it to break free from social barriers in order to launch towards new and promising horizons for a better life than what they used to live in.
We then started regarding Lebanese women as competitors of men in different fields until they enrolled in the Lebanese Armed Forces. The experience began with the general directorate of general security that was the first security department offering women several occupations among its lines. It was then followed by the LAF and the ISF. These occupations only consisted of medical and administrative fields, for a woman soldier never participated in any combat mission up until now.
Women in the LAF
Women enrolled in the LAF when the opportunity was able in the late 80s, where the country witnessed the most vicious battles, which cost the LAF a new amount of blood to be sacrificed, thus, pushing it to look for ways to fill the vacuum in its units. This came along with Lebanese women demanding their right to fight among the LAF in specific.
The current legal frame that concerns women volunteers in the LAF
The ministerial resolution number 376 was issued on 08/09/1989 and contained applied provisions related to the enrollment of Lebanese women in the LAF in compliance with women rights in equality as well as the Defense Law which gives all Lebanese citizen the right to vote. Then the resolution was followed with a service memorandum issued by the LAF Command where the enrollment rules of Lebanese women was approved from 1 January 1990. Later on a service memorandum was issued on 9 January of 1990 from the LAF Command calling upon Lebanese women to enroll as Privates for the Air Force and Naval Forces, the military academy, the Military police, the Logistic Brigade and the signaling and Republican guard regiment for a deadline from 15/01/1990 to 10/02/1990. When the war was done and the journey of “building the nation” was initiated in implementation of the Ta’ef agreement, the LAF began, in addition to its assigned missions, reorganization, equipment and training. Moreover, Resolution 839/MD was issued on 15/10/1991 and specified the regulations and instruction to enroll Lebanese women in the LAF and the 2nd article in this law specified the percentage of the number of women volunteers in different departments of the Ministry of Defense to be 10% of the overall number of soldiers. Moreover, Article 3 specified the enrollment and service of Lebanese citizens in different occupations and specializations except for direct combat units and direct combat support.
The abovementioned resolution contained applied provisions related to the enrollment and service of Lebanese women. Article 4 consisted that women volunteers should be subject to the same training as male volunteers, provided that physical capability is taken in consideration in different sports exercises and drills.
Reinforcing the role of women volunteers in the LAF
A course for specialized officers (males and females) was inaugurated in 1992 in the military school (currently, military academy) where 32 volunteers, holding university Bas in dentistry and business management, enrolled. Instructions were implemented over them and they were exposed to the same trainings as their male counterparts. After their graduation, they were assigned to suitable units. Furthermore, the years 1994 – 1996 – 1997 witnessed the enrollment of several specialized females from Corporal to specialized Adjutant, holding BAs in medicine, IT and Management.
Female officers were promoted after having volunteered as specialized NCOs between 1994 and 1997 or as Privates in 1990 and were promoted until they earned the right to be candidates for the rank of Lieutenant. These courses were under hard and serious conditions during training as stipulated in instructions. Therefore, they spent their courses just as males in training camps and were exposed to the same program which extended to 8 months constituting only weekend leaves. That was followed by consecutive courses, even if they were far apart, over the years with different percentages and with different medical and educational levels.
However, the role of women in the Army was not limited to the administrative side and has stretched currently to assuming tasks in combat units.
Motherhood and military duty
Maternity is the main challenge for women in general and for women volunteers in specific, for the effort exerted by women in order to accomplish balance between their duties, occupational and familial, subjects them to frustration and exhaustion. Therefore, women often are in a conflict between developing themselves and between their instinctive feelings of maternity. However, women have overcome the experience of the military field, the most male-oriented field, with trust and will, thus helping them assume the highest leading posts in Arabic and foreign armed forces.
In Lebanon, Lebanese women have entered the military society just as the other women in the world and have proven over the years to be successful in all assumed missions. Women are aiming to be assigned to fields missions in order to highlight their capabilities and energies and invest them. Women have added value to the military institution. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and cultural content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses the historical and cultural roles of women in the Lebanese Armed Forces (LAF) and does not contain any unsafe or inappropriate content. It focuses on the evolution of women's participation in the military and does not include any harmful, offensive, or illegal elements.",
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe text discusses the challenges faced by women in military service and their achievements without containing any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "146-0",
"llm_safety_score": 0,
"reason": "historical and cultural content"
},
{
"custom_id": "146-1",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://lebarmy.gov.lb/en/content/women-laf",
"date": "2023-06-03T08:20:17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00263.warc.gz",
"language": "en",
"language_score": 0.9810569882,
"token_count": 1097,
"score": 3,
"int_score": 3
} |
<urn:uuid:184bdbe0-b5cf-4bf7-8286-51a7436b9766> | - New type of work and new type of workers With the popularization of mobile communication technology and the promotion of innovation and entrepreneurship policies, new or non-standard work types and modes emerge, which are compared with traditional ones (including working place, time, etc.) and combined with labor types.
In order to study the characteristics of shared office space users, different kinds of literature on worker types will be discussed and analyzed to provide a theoretical basis for later research.
Precariousness often refers to the different forms of unsafe, casual, flexible work, such as illegal and temporary jobs, or homeworking and freelance work. Globalized capitalism has not only led to the work of precariousness but also motivated the generation of other new forms of precariousness work. For example, temporary work refers to that labors are informally employed in the workplace, generally paid wages daily. The disadvantages are that they are not able to enjoy a pension and a monthly minimum wage like formal workers. However, the most significant advantage of temporary work relies on its flexibility, less limited by time. Temporary labors are active in various departments of the enterprise. Temporary positions are also varied, such as accounting, finance, IT, lawyers, marketers, designers. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text discusses various types of work and workers in the context of new and traditional work modes, emphasizing the characteristics and implications of precarious work. There is no unsafe, inappropriate, or harmful content in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "147-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.freepassed.com/%E8%8B%B1%E5%9B%BD%E4%BB%A3%E5%86%99-%E5%95%86%E7%A7%91%E4%BB%A3%E5%86%99-%E7%BB%8F%E6%B5%8E%E5%AD%A6%E4%BB%A3%E5%86%99-paper%E4%BB%A3%E5%86%99-%E8%8B%B1%E5%9B%BD%E7%95%99%E5%AD%A6%E7%94%9F%E4%BD%9C/",
"date": "2023-06-03T07:54:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00263.warc.gz",
"language": "en",
"language_score": 0.9613134265,
"token_count": 248,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:3620807d-39eb-4742-913f-1d3276f1569f> | Have you been shopping for a car and seen both CUVs and SUVs, but you don’t know how to tell them apart? Even though the term SUV is often used for both types of vehicles, a CUV and an SUV are not the same. An SUV is a sport utility vehicle, and a CUV is a crossover utility vehicle. Some people might even ask, “What is a CUV car?” since CUVs are usually called crossovers.
An SUV, which stands for “Sport Utility Vehicle,” is a general term for a vehicle with a lot of room for people and things. It’s been decades, and now even SUVs come in different styles. The Crossover Utility Vehicle is one of these types (CUV).
What is an SUV?
A sport utility vehicle (SUV) is a type of car that has some features of passenger cars and some features of off-road vehicles. Most SUVs have frames that are separate from the body, but there are a few exceptions. SUV doesn’t have a single, agreed-upon definition, and how the word is used varies from country to country. Some definitions say that an SUV must be built on the chassis of a light truck. Other definitions, however, say that an SUV is any vehicle that is made to be used off-road.
History and Construction
As we know them today, SUVs have been around since the 1930s, but they were known for being rough and not good for families or consumers. These cars were known for getting bad gas mileage, having sparse interiors, and having harsh, heavy-duty suspensions that worked well on the trail but were hard to drive on pavement or highways.
SUVs didn’t become popular among buyers until the 1980s. The original Jeep Cherokee and Ford Bronco got people interested in SUVs that could go on the road and off-road. People liked that it was big and boxy and could go anywhere. Even though they still had a truck-based, body-on-frame chassis, SUVs of the 1980s were much smoother and more comfortable to drive than their predecessors.
What is a CUV?
Crossovers, also called CUVs, are made by modifying a car platform, usually by raising the ride height. From there, a two-box SUV body with four doors and a big cargo area is put on top of it. Like the chassis, the engine is also based on a traditional car. Most engines have four or six cylinders with small displacements.
History and Construction
In the 1990s, SUVs were more popular than ever. Around this time, automakers started to realize that drivers might like the way an SUV looks but like the way a sedan drives. In 1997, the Honda CR-V and Toyota RAV4 were the first crossovers to be sold outside of Japan. During this time, the Subaru Outback and the Ford Escape were also popular crossovers.
What made these vehicles different from regular SUVs is they used a “unibody” platform, which means the body and frame are made of the same material. This makes the ride smoother and more like a car, and the handling is more sure. Since then, this type of vehicle has grown like crazy. First called “crossover SUVs,” these cars are now just called “crossovers” or “CUVs.”
How to tell the Difference?
The biggest difference between CUVs and SUVs is that SUVs are built on truck frames, while CUVs are made on car frames. This difference leads to other differences in the way they look and work. CUVs are lighter and get better gas mileage than SUVs, but they don’t have a third row of seats like SUVs. CUVs also tend to have less torque output than SUVs because their design doesn’t make them good for towing or carrying a lot of cargo. Some prominent differences between the two are mentioned in the table below.
|Vehicles that are bigger and heavier.||They’re smaller and lighter than most SUVs.|
|Adequately prepared for driving off-road.||It can be driven off-road, but not as well as SUVs.|
|Most SUVs have storage space and seating in the third row.||They don’t have seats in the third row and have less storage space.|
CUV vs. SUV: Which One to Choose?
Now that you know more about the differences between crossovers and SUVs, you might wonder which one you should buy. Depending on what you need from your car, you might be better off with a CUV or an SUV. To help you decide, consider the following things:
1. Storage Space
CUVs and SUVs will have similar amounts of storage space because their bodies and designs are sometimes the same. Mid-size and full-size SUVs, on the other hand, have a different shape (they’re usually boxier) and a lot more space. Mid-size and full-size vehicles are called wagons, not CUVs.
Crossovers often have seven seats but can’t hold as many people as a full-size SUV. This might not be that important if you have young children, but a group of adults in a crossover might start to feel like sardines in a can. SUVs are longer and taller, giving them more cargo space and leg and headroom.
2. Fuel efficiency
Crossovers are smaller, lighter, and have engines that aren’t as strong as those in SUVs. All three of these things help the crossover get better gas mileage, which makes it the best choice for good mileage among larger cars. Trucks and SUVs are known for being gas-guzzlers because they have bigger engines and heavier bodies.
However, if you want a car to drive on mostly dry roads and not too complicated, you don’t need a truck or SUV.
You can put almost any engine with any transmission and hook it up to any of the different ways to drive the wheels. The same can be said about the CUV vs. SUV argument. CUVs have the same engines, transmissions, and even wheel drive options as their SUV counterparts which are based on trucks.
Since SUVs tend to pull more things, their torque output is usually higher, especially for mid-size and full-size SUVs. Most likely, both compact SUVs and CUVs will be powered similarly.
4. Ride Height
The ride height will be one of the most obvious ways they will differ. Crossover utility vehicles (CUVs) will be lower to the ground than regular SUVs. They may also have the same ride height since many CUVs have all-wheel drive and a slightly higher ride height than those cars for “light” off-roading.
The Ford Explorer has a lower ride height than the other Ford SUVs with one body, so ride height is not a good way to tell them apart.
SUVs are made with a frame like a truck’s, which gives the body more ground clearance when going off-road. The SUV is made to handle rough roads, and many of its versions have more powerful V8 engines and stronger suspension systems than a crossover.
They are also more likely to come with All-Wheel Drive or Four-Wheel Drive as standard or as an option. This gives you the extra traction you need if you live in a place with especially harsh winters.
In general, the chassis of an SUV is based on that of a truck, while the chassis of a CUV is based on that of a car. This has been the most important thing for as long as history has been kept. When it comes to the chassis, a crossover utility vehicle (CUV) will usually have a unibody chassis, which means that the body and frame are one unit.
An SUV, on the other hand, will have a body-on-frame chassis, like a pickup truck. Even though this is the most obvious difference between a CUV and an SUV, the lines are beginning to blur.
An SUV is a car that looks capable, rugged, or off-road-worthy or is marketed to the public in this way. If it does better in speed tests or on street corners than in sand pits, it’s likely a CUV. Crossover utility vehicles are popular because they combine the best things about sedans and SUVs. They have a lot of space for cargo, are safe, and are fun to drive.
Not all crossover utility vehicles are good at going off-road, but many are. Most cars made today have all-wheel drive, which lets them drive on wet snow or mud that isn’t too rough. Still, there are some small SUVs that are good for the city and can handle the same off-road terrain as their bigger siblings.
Before crossovers came along, a lot of people were interested in SUVs but worried about how safe they were. They weren’t too worried about surviving a crash. In fact, the big, tall SUVs gave them peace of mind in that way. What caused them concern was a rollover incident.
In the 1990s, this was a big problem for SUVs. Safety has come a long way since then. Electronic stability control is now a required safety feature. It helps a car stay stable even when making sharp turns, which lowers the risk of it rolling over. Both SUVs and crossovers are much less likely to roll over now than they used to be.
SUVs and CUVs have grown in popularity to the point where they now sell more than regular cars. By the year 2020, automakers could offer as many as 150 different kinds of cars. Cross-over utility vehicles are made with a single-body design (CUVs). Because of this, the SUV is now more durable and better able to be used off-road, to carry cargo, and tow a trailer.
It’s not fair to put them all in the same category. For each job, they come in different designs. Most SUVs are made with a body-on-frame design, but some crossovers have a one-piece body. SUVs and crossovers fall into two different groups. Manufacturers are increasingly adding features like locking differentials and height-adjustable suspensions to help them handle rough terrain better. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is purely informative and educational, discussing the differences between CUVs and SUVs without any unsafe or inappropriate content.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the differences between mid-size and full-size vehicles, specifically wagons, CUVs, and SUVs. It provides factual information about their features, fuel efficiency, ride height, and safety aspects without any unsafe or inappropriate content.",
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is purely informational and educational, discussing the design differences between SUVs and crossovers. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "148-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "148-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "148-2",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://engineerine.com/cuv-vs-suv/",
"date": "2023-06-04T16:22:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00263.warc.gz",
"language": "en",
"language_score": 0.9775772691,
"token_count": 2182,
"score": 2.5625,
"int_score": 3
} |
<urn:uuid:d340ca64-68ec-40cb-943a-3852b423f11f> | The complex contains the remnants of what existed on Parliament Hill before Centre Block was built, during the time the Rideau Canal was first being constructed. The barracks, a guard house, jail, stables and cookhouses were all built on the north half of The Hill for soldiers in the Royal Sappers and Miners Regiment, who were tasked with the backbreaking work of digging out more than 200 kilometres of earth from the Ottawa River to Kingston, Ont. The barracks themselves are about 68 feet long and 38 feet wide with a porch around the outside edge. It was used by soldiers and their families. The military complex was demolished in 1858, so the first of the parliament buildings could be built. The site, and the artifacts, are important because the venue was the headquarters for the soldiers involved in the entire canal construction. “It’s in a better state of preservation than we had anticipated,” said Jarrett. “Obviously, there’s been a lot of landscaping through the years up on Parliament Hill along with some other things that were done well in advance of the archaeological dig, so the chances of it being disturbed by any of that activity was high.” A treasure-trove of military items has already been uncovered, including chin straps, tags, buttons, pins, gorgets — which officers often wore around their necks — and other domestic items, like coins. The contractors who built the canal encountered a lot of problems, Jarrett said, so the exact amount of use of the barracks is not exactly known as the soldiers were often deployed out to different locations along the route READ HERE
Comments are closed. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides historical information about the construction of Parliament Hill and the Rideau Canal. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and historical in nature, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "150-0",
"llm_safety_score": 0,
"reason": "historical context"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://blog.hardhathunter.com/centre-block-renos-unearth-ottawas-military-past/",
"date": "2023-06-06T02:01:30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00263.warc.gz",
"language": "en",
"language_score": 0.9870659113,
"token_count": 332,
"score": 3.1875,
"int_score": 3
} |
<urn:uuid:35f719fb-41ef-4445-bfc3-3df907a640a7> | Aging: period of maturation of wine, during which the must rests in vessels made of wood, steel, cement, or in amphoras or in bottles.
Agreeable: wine with residual natural sugars which gives it a pleasant tendency to sweet.
Ballon: A broad glass, ideal for drinking full-bodied red wines.
Blend: indicates the grapes from which a wine is made. If a wine is made from a single type of grape, it is called a “varietal” wine, while a “blended” wine indicates the use of different grape varieties brought together before the fermentation process begins.
Bouquet: the set of olfactory characteristics acquired by wine through the aging process.
Brut: a dry Champagne or bubbly wine.
Bubbly: a wine featuring a high level of effervescence.
Charmat (or Martinotti) Method: a method for producing bubbly wines by means of fermentation in large, watertight vessels at controlled pressures and temperatures over a period of 1 to 6 months. Such wines are ready before the bottling process, and are ready to drink as soon as they are bottled.
Cru: a French term which indicates a precisely delimitated area of wine production, perhaps even a single vineyard, with its own particular prestigious features and characteristics.
Decanter: a glass or crystal vessel used to decant wine, or let it “breathe”.
Demi-sec: a Champagne or bubbly wine that tends toward a sweet flavour.
Fruity: a wine whose smell recalls one or more kind of fruit.
Full-bodied: a wine rich in body, in other words with a rich but balanced alcohol content.
Maderized: a fault found in old wines, which develop a flavour recalling that of Madeira together with a yellow colour (if it was white) or a brown colour (if it was red).
Mix: indicates the mixing of different wines once fermentation has ceased: this can involve both wines made from differing types of grape, and wines made from the same type of grape.
Oak-aged or barrique-aged: wine that has been aged in oak barrels, also called barriques.
Perlage: a line of bubbles that settle on the glass when a bubbly or sparkling wine is poured.
Raisin wine, or Straw wine: generally sweet wines, with a high percentage of alcohol, made with semi-dried grapes, or ‘passito’.
Reserve: high quality wines aged for a longer period than the minimum required by the regulations for the wine in question.
Soft: wine that presents a perfect balance between alcohol, acidity and tannin structure, that is easy on the palate.
Sparkling: a moderately effervescent wine; may also be described as ‘fizzy’.
Still: wine containing no carbon dioxide, and hence no bubbles.
Sulphites: chemical substances that stabilise wines in various ways during the wine-making process. Sulphites are naturally present in all wines, but in most cases they are also added during production.
Superiore: wines produced following the regulations for the wine type and with a higher percentage of alcohol than the minimum required.
Tannins: polyphenolic compounds contained in the skins and seeds of grapes, as well as in the wood of barrels, which lend the wine its red colour and give its flavour an astringent quality (hence called tannic).
Traditional (or Champenoise) Method: this method of producing bubbly wines takes between 6 and 30 months, much longer than the Charmat Method. The wine is fermented in the bottle, by means of the introduction of sugars and selected yeasts. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing various aspects of wine, including terms and methods related to wine production and characteristics. There are no unsafe elements, inappropriate language, or themes that would make it unsuitable for public use, educational environments, or general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "151-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.apaviasibeveoltrepo.it/en/the-oltrepo-wine-dictionary/",
"date": "2023-06-06T03:34:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00263.warc.gz",
"language": "en",
"language_score": 0.9625350833,
"token_count": 790,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:3f9059a0-436f-4b8f-b2b1-a236c7b31abb> | Playing with your 6-month-old baby is the perfect way to build your baby’s physical, cognitive, and linguistic skills.
But which activities should you do? What’s appropriate based on your baby’s unique stage? Which milestones should you be targeting?
Here are a few ideas for how to play with your 6-month-old baby.
3 tips for how to play with a 6-month-old baby
1. Explore toys little by little
At 6 months, your baby needs time to understand the toys and activities you choose. Every child is unique and so is the way they learn. Over time, you’ll be able to identify what’s best for your child’s playtime needs.
When starting to use a toy, it’s a great idea to show your baby how it works and how to use it, but it’s also important to let them try to do it by themselves afterward. So, for example, if you’re playing with a rattle, shake the rattle before handing it to your baby so that they can try, too.
Download Kinedu for FREE and unlock 1,800+ baby development activities!
At this age, your baby may already be able to pick up toys with both hands or switch them from one hand to the other. By helping them practice these movements –with just enough help to prevent your baby from getting frustrated– you’ll be able to support this skill growth. Of course, when your child takes an object or toy for the first time, it is normal for them to explore it first and not use it “properly” at the beginning.
2. Repeat, repeat, and repeat
Doing the same activity or using the same toy every day is a great way to reinforce skills and concepts. That’s because nobody learns anything the first time they do it! Especially 6-monht-old babies. For example, pressing a button on a toy to make a sound over and over again can help reinforce the concept of cause and effect, the idea that everything they do has a specific response.
Although this can be boring for parents, repetion is key to helping children grow.
3. Adapt activities as needed
Every child is different and, therefore, has different physical and social skill levels. As you observe your child’s behavior, try to adapt the activities to meet their preferences and abilities.
You can do this by paying attention to the sounds, expressions, and gestures they make. Over time, you will be able to recognize some of your baby’s reactions when they’re not comfortable or, on the contrary, when they’re very excited about a game.
Download Kinedu for FREE and get all the support you need to boost your baby’s development in one place!
Take into account that when you play with a 6-month-old baby, some of them can remain calm if the TV is on while they play and others can’t. The same goes for bright lights or when they are around people. Identifying all of these distractors can help you tailor playtime to your little one and get the most out of each activity.
Did you enjoy these tips on how to play with your 6-month-old baby? To find more playtime ideas and guidance, download the Kinedu app for free! | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content appropriate for all audiences\", \"score\": 0}\n```\n\nThe text provides educational content about playing with a 6-month-old baby, which is appropriate for parents and caregivers. It does not contain any unsafe or inappropriate content, profanity, or harmful themes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "152-0",
"llm_safety_score": 0,
"reason": "educational content appropriate for all audiences"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://blog.kinedu.com/play-with-6-month-old-baby/",
"date": "2023-06-07T12:28:54",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00263.warc.gz",
"language": "en",
"language_score": 0.9405282736,
"token_count": 710,
"score": 2.6875,
"int_score": 3
} |
<urn:uuid:24cad22e-576b-44ca-86ca-0624921e14b0> | The Boyne Valley is a region steeped in ancient history and natural beauty, located around an hours drive North of Dublin. This enchanting destination is known for its rich heritage and stunning landscape, making it a must-visit for anyone traveling to Ireland.
The area is home to several world-renowned historic sites, including the Hill of Tara and Newgrange, which are both UNESCO World Heritage Sites. Newgrange, one of the most impressive passage tombs in the world, is a true masterpiece of engineering, built over 5,000 years ago.
Newgrange is an ancient burial site located in County Meath, Ireland. The site was constructed around 3200 BC during the Neolithic period, making it older than both Stonehenge and the Great Pyramid of Giza. Newgrange consists of a large circular mound, or passage tomb, with an interior chamber and a long passage that leads to the outside. The tomb is thought to have been used for the burial of important individuals and their possessions, and it is also believed to have had ritualistic significance. The site was abandoned by its builders around 2500 BC and remained largely forgotten until its rediscovery in the late 17th century.
Entrance to Newgrange
You can only enter Newgrange with an organised tour. The most common way is by purchasing a ticket at Brú na Bóinne Visitor Centre. At the time of writing (March 2023) standard tickets cost €10 for adults and €5 for children. This covers a Newgrange Tour and Exhibition.
You can also find coach tours from other places like Dublin which include entrance to Newgrange as part of the package.
Hill of Tara
The Hill of Tara is an ancient archaeological site dating back to the Neolithic period and was an important political and religious center in ancient Ireland. It was the seat of the High Kings of Ireland, who were said to have been crowned on the hill’s summit.
The site consists of a series of earthen mounds and structures, including a ceremonial avenue and several standing stones. The most famous of these is the Lia Fáil, or the Stone of Destiny, which was believed to have magical powers and was used to inaugurate the High Kings.
The Hill of Tara was an important site of pilgrimage and ritual activity for thousands of years, and it continued to be a significant place of cultural and historical importance through the medieval period and into modern times.
Entrance to The Hill of Tara
Entrance is free, all year round between 10am and 5pm. There’s a visitor centre with a free audio tour. Ask there for a guided tour of the site (also free). More details on the heritage Ireland website.
Arts & Culture
In addition to its historic sites, the Boyne Valley is also home to a vibrant arts and culture scene, with festivals and events taking place throughout the year. The Solstice Arts Centre in Navan hosts regular exhibitions, performances, and workshops.
Hiking & Fishing
For those looking to immerse themselves in the natural beauty of the region, the Boyne Valley offers a range of outdoor activities. The area is perfect for hiking, with the Slieve na Calliagh loop walk offering stunning views of the surrounding countryside. Fishing is also a popular activity, with the Boyne River known for its abundance of trout and salmon.
Foodies will love the Boyne Valley, which is home to some of Ireland’s best food and drink producers. Visitors can sometimes take a tour of the Boyne Valley Cheese Company. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on describing the historical and cultural attractions of the Boyne Valley in Ireland. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "153-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://trips.ie/the-boyne-valley/",
"date": "2023-06-07T12:57:51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00263.warc.gz",
"language": "en",
"language_score": 0.9641060233,
"token_count": 736,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:8570b1b0-0fa8-4536-b5af-e08b6810440f> | The Christmas season is enjoyed by many across the world. Spending time with loved ones, giving and receiving gifts, and putting up Christmas decorations. Here, at BIOZONE, we are no different, we love the holidays and getting into the festivities, but this year we got to thinking, what is the science behind Christmas? How does Santa deliver those presents in such a short time frame? Why does Rudolph’s nose glow brightly? And how many children does Santa have to deliver to?
The Science behind Santa
Currently, there are thought to be 1.9 billion children in the world, and let’s be honest, even with Santa’s magic and high speeds we are not completely sure he could reach them all. So, let’s take a look at the children who celebrate Christmas and want Santa to show up. This means that this number is reduced to around 650 million children on Christmas Eve, with a total of 267 million households.
Fortunately, the children live in different time zones which would mean that Santa has around 34 hours to complete present delivery services. This would result in a speed of 4,705,882km/h to make sure each child had a gift on Christmas Day. Now, at this speed, it would mean that Santa would be vapourised. However, time dilation and a bit of Nochebuena Magicae help Santa along the way.
Time dilation is derived from Einstein’s theory of special relativity and that time is relative to the observer. The faster an object moves, the slower it will experience time, and therefore age slower as well. If Santa is moving at around 4,705,882km/h he will definitely be experiencing time dilation which would mean that he would have the time to sneak down chimneys and into houses and place gifts under the tree, faster than you could blink an eye! It would also mean that he ages much much slower than the rest of us, explaining his looks not changing for hundreds of years and probably many more years to come.
Of course, Nochebuena Magicae Latin for Christmas Eve Magic plays a huge role in the delivery of gifts but should be used wisely each year.
Why does Rudolph’s nose glow red?
Rudolph has an extremely important task, lighting the way for Santa to travel around the world. It is often speculated why Rudolph does in fact have such a bright red nose, is it magic? Well, yes and no. Rudolph has always had a red nose.
A dense build-up of capillary vessels close to the surface of a reindeer’s nose allows them to regulate their temperature in extreme environments. This is especially true when Rudolph is pulling the sleigh and needs to protect his brain during icy cold conditions in Canada and heat waves in Australia!
Missed our last blog post? Find “Translate our eBooks into 21 different languages” here. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the science behind Santa Claus and Christmas in a fun and educational manner without any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "154-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://biozone.com/au/2022/12/04/the-science-behind-christmas-explained/",
"date": "2023-06-08T22:19:25",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00263.warc.gz",
"language": "en",
"language_score": 0.9704971313,
"token_count": 602,
"score": 3.375,
"int_score": 3
} |
<urn:uuid:4952edd0-4802-40c9-a41b-e5364ffc568c> | The Cenozoic stratigraphic infill of hinterland and foreland basins in central Colombia holds the record of basin development during tectonic inversion of rift in the context of subduction orogenesis. A comprehensive review of detrital U-Pb geochronologic and thermochronologic data reveals that activation of interconnected fault systems in the hinterland Magdalena Valley and the Eastern Cordillera occurred coevally since Paleocene time. Longitudinal basins were fed by detritus shed from the Central Cordillera carried along axial drainage systems in open basins in times where slow deformation rates prevailed. Faster deformation since Oligocene resulted in the transient formation of internally drained basins. Differential along-strike exhumation and subsidence patterns in the Eastern Cordillera and the foredeep, respectively, document tectonic acceleration since late Miocene, which we attribute to superimposed collision of the Panama arc leading to oroclinal bending in the Cordillera. Our data documents that the inherited structural grain led to the formation of longitudinal drainage patterns, even in closed basins, which seem to be a general feature of early stages of inversion.We hypothesize that the presence of more humid climatic conditions and faster tectonic rates along the range's eastern margin favoured the development of internally drained basins, as has also been shown in the Central Andes.
|Original language||English (US)|
|Number of pages||41|
|Journal||Geological Society Special Publication|
|State||Published - 2013|
ASJC Scopus subject areas
- Water Science and Technology
- Ocean Engineering
FingerprintDive into the research topics of 'Basin compartmentalization and drainage evolution during rift inversion: Evidence from the Eastern Cordillera of Colombia'. Together they form a unique fingerprint.
Basin compartmentalization and drainage evolution during rift inversion: evidence from the Eastern Cordillera of Colombia
Silva, A. (Contributor), Mora, A. (Contributor), Caballero, V. (Contributor), Rodriguez, G. (Contributor), Ruiz, C. (Contributor), Moreno, N. (Contributor), Parra, M. (Contributor), Ramirez-Arias, J. C. (Contributor), Ibanez Mejia, M. (Contributor) & Quintero, I. (Contributor), Geological Society of London, 2016
DOI: 10.6084/m9.figshare.3453371.v1, https://geolsoc.figshare.com/articles/dataset/Basin_compartmentalization_and_drainage_evolution_during_rift_inversion_evidence_from_the_Eastern_Cordillera_of_Colombia/3453371/1 | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a scientific research paper discussing geological and tectonic processes in the Eastern Cordillera of Colombia. It does not contain any unsafe, inappropriate, or offensive content. The language is academic and technical, and the themes are related to geological and geophysical studies, which are entirely appropriate for public and educational use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "156-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://experts.arizona.edu/en/publications/basin-compartmentalization-and-drainage-evolution-during-rift-inv",
"date": "2023-06-10T07:26:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00263.warc.gz",
"language": "en",
"language_score": 0.8372837305,
"token_count": 602,
"score": 2.71875,
"int_score": 3
} |
<urn:uuid:4fed42db-bedd-470c-ac8b-94ac2bf6bdd6> | - 4 minutes to read
The FormulaEngine is an object that provides the capability to calculate and parse worksheet formulas. It includes a built-in formula parser, as well as the flexibility to evaluate formulas in any range of any worksheet using the FormulaEngine.Evaluate method. You can parse a formula using the FormulaEngine.Parse method, analyze the resulting expression tree, make the required modifications and rebuild the formula string from the modified expression tree.
You can get a parsed expression of a formula contained in a cell by using the Cell.ParsedExpression property. To obtain a parsed expression of a formula specified by defined name, use the DefinedName.ParsedExpression property.
The formula context determines the environment that affects the function name recognition, formula calculation and reference resolution. The context is defined by the cell or range to which the formula belongs, the worksheet, the culture settings and the cell reference style.
The ExpressionContext object serves as a container to hold context settings.
You can pass the context to the FormulaEngine.Evaluate or FormulaEngine.Parse method. If the context is not specified explicitly, the currently selected range, active cell and active worksheet are used.
The ParsedExpression object can be obtained by parsing an expression by using the FormulaEngine.Parse method, by using the Cell.ParsedExpression or the DefinedName.ParsedExpression properties. An expression is parsed into an expression tree, which is made available by using the ParsedExpression.Expression property.
The nodes in the expression tree implement the IExpression interface. The technique to traverse the tree is based on the Visitor pattern. The Visitor pattern is briefly explained below.
To traverse the tree and visit all nodes, we need a starting (entry) point and a visitor. The entry point can be any tree node, but the root node would be an obvious choice. The root node is accessible from the ParsedExpression.Expression property. To start traversing, call the IExpression.Visit method of the node with the visitor as the method parameter. The node will subsequently call the Visit method of the visitor with the node itself as the parameter. Thus, the Visit method overload is called, which has a parameter type that is equal to the type of the node. Then, the visitor’s Visit method is called for sibling nodes if they exist.
Take, for example, the formula SUM(A4:A6)+10. The root node is the AdditionExpression (corresponding to the “+” operand in the formula) and the Visit(AdditionExpression expression) method of the visitor is called. This method calls the VisitBinary(BinaryOperatorExpression expression) method, which in turn, calls the Visit(FunctionExpression expression) method for the left operand (the SUM function). This method calls the Visit(CellReferenceExpression expression) for the function argument, which is the A4:A6 cell range reference. The node containing the cell reference has no siblings, so all nodes of the left branch of the root addition expression are visited, and the Visit method of the right operand is called. The right operand is the constant value 10, which has no child branches. The Visit(DevExpress.Spreadsheet.Formulas.ConstantExpression expression) method overload is called for that node. Expression tree iteration is now complete.
To create a string formula from the expression tree, use the ParsedExpression.ToString method.
It is often useful to be able to refer to the cells whose values are used in the formula. The ParsedExpression.GetRanges method returns a collection of ranges referenced by the formula.
A visitor is required to visit all nodes of the expression tree. Implement a descendant of the ExpressionVisitor class and override the ExpressionVisitor.Visit method overloads, which obtain nodes of the required types. After obtaining the node using the visitor, you can modify node properties (e.g., change cell reference) or navigate to child nodes using UnaryOperatorExpression.InnerExpression, BinaryOperatorExpression.LeftExpression or BinaryOperatorExpression.RightExpression, depending on the type of the obtained node. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a technical explanation of the FormulaEngine, which is used for calculating and parsing worksheet formulas in a spreadsheet application. It does not contain any unsafe, inappropriate, or harmful content. The language is professional and technical, and the themes discussed are related to software functionality and programming concepts. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "158-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://docs.devexpress.com/WindowsForms/17143/controls-and-libraries/spreadsheet/formulas/formula-engine",
"date": "2023-05-28T23:46:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00463.warc.gz",
"language": "en",
"language_score": 0.8292782903,
"token_count": 895,
"score": 2.90625,
"int_score": 3
} |
<urn:uuid:e0233e23-2b3f-4693-813b-d6d12168ed16> | The Event Horizon Telescope (EHT) collaboration, who produced the first ever image of a black hole, has revealed today a new view of the massive object at the centre of the M87 galaxy: how it looks in polarised light. This is the first time astronomers have been able to measure polarisation, a signature of magnetic fields, this close to the edge of a black hole. The observations are key to explaining how the M87 galaxy, located 55 million light-years away, is able to launch energetic jets from its core.
"We are now seeing the next crucial piece of evidence to understand how magnetic fields behave around black holes, and how activity in this very compact region of space can drive powerful jets that extend far beyond the galaxy," says Monika Mościbrodzka, Coordinator of the EHT Polarimetry Working Group and Assistant Professor at Radboud University in the Netherlands.
On 10 April 2019, scientists released the first ever image of a black hole, revealing a bright ring-like structure with a dark central region - the black hole's shadow. Since then, the EHT collaboration has delved deeper into the data on the supermassive object at the heart of the M87 galaxy collected in 2017. They have discovered that a significant fraction of the light around the M87 black hole is polarised.
"This work is a major milestone: the polarisation of light carries information that allows us to better understand the physics behind the image we saw in April 2019, which was not possible before," explains Iván Martí-Vidal, also Coordinator of the EHT Polarimetry Working Group and GenT Distinguished Researcher at the University of Valencia, Spain. He adds that "unveiling this new polarised-light image required years of work due to the complex techniques involved in obtaining and analysing the data."
EHT collaboration members at JIVE are involved in developing, comparing, and testing these techniques. This is part of the JIVE commitment to build and improve dedicated software to enable astronomers to process their observations, as well as providing technical support.
Light becomes polarised when it goes through certain filters, like the lenses of polarised sunglasses, or when it is emitted in hot regions of space that are magnetised. In the same way polarised sunglasses help us see better by reducing reflections and glare from bright surfaces, astronomers can sharpen their vision of the region around the black hole by looking at how the light originating from there is polarised. Specifically, polarisation allows astronomers to map the magnetic field lines present at the inner edge of the black hole.
"The newly published polarised images are key to understanding how the magnetic field allows the black hole to 'eat' matter and launch powerful jets," says EHT collaboration member Andrew Chael, a NASA Hubble Fellow at the Princeton Center for Theoretical Science and the Princeton Gravity Initiative in the US.
The bright jets of energy and matter that emerge from M87's core and extend at least 5000 light-years from its centre are one of the galaxy's most mysterious and energetic features. Most matter lying close to the edge of a black hole falls in. However, some of the surrounding particles escape moments before capture and are blown far out into space in the form of jets.
Astronomers have relied on different models of how matter behaves near the black hole to better understand this process. But they still don't know exactly how jets larger than the galaxy are launched from its central region, which is as small in size as the Solar System, nor how exactly matter falls into the black hole. With the new EHT image of the black hole and its shadow in polarised light, astronomers managed for the first time to look into the region just outside the black hole where this interplay between matter flowing in and being ejected out is happening.
The observations provide new information about the structure of the magnetic fields just outside the black hole. The team found that only theoretical models featuring strongly magnetised gas can explain what they are seeing at the event horizon.
"The observations suggest that the magnetic fields at the black hole's edge are strong enough to push back on the hot gas and help it resist gravity's pull. Only the gas that slips through the field can spiral inwards to the event horizon," explains Jason Dexter, Assistant Professor at the University of Colorado Boulder, US, and coordinator of the EHT Theory Working Group.
To observe the heart of the M87 galaxy, the collaboration linked eight telescopes around the world, to create a virtual Earth-sized telescope, the EHT. This is a similar technique to what JIVE exploits for operating the European VLBI Network (EVN), another global network of telescopes. The impressive resolution obtained with the EHT is equivalent to that needed to measure the length of a credit card on the surface of the Moon.
This allowed the team to directly observe the black hole shadow and the ring of light around it, with the new polarised-light image clearly showing that the ring is magnetised. The results are published today in two separate papers in The Astrophysical Journal Letters by the EHT collaboration. The research involved over 300 researchers from multiple organisations and universities worldwide.
"The EHT is making rapid advancements, with technological upgrades being done to the network and new observatories being added. We expect future EHT observations to reveal more accurately the magnetic field structure around the black hole and to tell us more about the physics of the hot gas in this region," concludes EHT collaboration member Jongho Park, an East Asian Core Observatories Association Fellow at the Academia Sinica, Institute of Astronomy and Astrophysics in Taipei.
This research was presented in two papers published today in The Astrophysical Journal.
The EHT collaboration involves more than 300 researchers from Africa, Asia, Europe, North and South America. The international collaboration is working to capture the most detailed black hole images ever obtained by creating a virtual Earth-sized telescope. Supported by considerable international investment, the EHT links existing telescopes using novel systems - creating a fundamentally new instrument with the highest angular resolving power that has yet been achieved.
The individual telescopes involved are: ALMA, APEX, the IRAM 30-meter Telescope, the IRAM NOEMA Observatory, the James Clerk Maxwell Telescope (JCMT), the Large Millimeter Telescope (LMT), the Submillimeter Array (SMA), the Submillimeter Telescope (SMT), the South Pole Telescope (SPT), the Kitt Peak Telescope, and the Greenland Telescope (GLT).
The EHT consortium consists of 13 stakeholder institutes: the Academia Sinica Institute of Astronomy and Astrophysics, the University of Arizona, the University of Chicago, the East Asian Observatory, Goethe-Universitaet Frankfurt, Institut de Radioastronomie Millimétrique, Large Millimeter Telescope, Max Planck Institute for Radio Astronomy, MIT Haystack Observatory, National Astronomical Observatory of Japan, Perimeter Institute for Theoretical Physics, Radboud University and the Smithsonian Astrophysical Observatory.
Very Long Baseline Interferometry (VLBI) is an astronomical method by which multiple radio telescopes distributed across great distances observe the same region of sky simultaneously. Data from each telescope is sent to a central "correlator" to produce images with higher resolution than the most powerful optical telescopes.
The European VLBI Network (EVN; www.evlbi.org) is an interferometric array of radio telescopes spread throughout Europe, Asia, South Africa and the Americas that conducts unique, high-resolution, radio astronomical observations of cosmic radio sources. Established in 1980, the EVN has grown into the most sensitive VLBI array in the world, including over 20 individual telescopes, among them some of the world's largest and most sensitive radio telescopes. The EVN is administered by the European Consortium for VLBI, which includes a total of 15 institutes, including the Joint Institute for VLBI ERIC
The Joint Institute for VLBI ERIC (JIVE; www.jive.eu) has as its primary mission to operate and develop the EVN data processor, a powerful supercomputer that combines the signals from radio telescopes located across the planet. Founded in 1993, JIVE is since 2015 a European Research Infrastructure Consortium (ERIC) with seven member countries: France, Italy, Latvia, the Netherlands, United Kingdom, Spain, and Sweden; additional support is received from partner institutes in China, Germany and South Africa. JIVE is hosted at the offices of the Netherlands Institute for Radio Astronomy (ASTRON) in the Netherlands.
A view of the M87 supermassive black hole in polarised light
The Event Horizon Telescope (EHT) collaboration, who produced the first ever image of a black hole released in 2019, has today a new view of the massive object at the centre of the Messier 87 (M87) galaxy: how it looks in polarised light. This is the first time astronomers have been able to measure polarisation, a signature of magnetic fields, this close to the edge of a black hole.
This image shows the polarised view of the black hole in M87. The lines mark the orientation of polarisation, which is related to the magnetic field around the shadow of the black hole.
Credit: EHT Collaboration
Original: TIFF [10 Mb] – JPEG [8.8 Mb] Additional materials
- Video: Zoom into Messier 87, including the polarized emission of the ring (47s) - MP4 [81 Mb], UHD AVI [3.3 Gb]
- Caption: Zooming-in to the heart of M87 to see a new view of its black hole. This zoom video starts with a view of ALMA, a telescope in which ESO is a partner and that is part of the Event Horizon Telescope, and zooms-in on the heart of M87, showing successively more detailed observations. At the end of the video, we see the first ever image of a black hole - first released in 2019 - followed by a new image released in 2021: how this supermassive object looks in polarised light. This is the first time astronomers have been able to measure polarisation, a signature of magnetic fields, this close to the edge of a black hole. Credit: © ESO/L. Calçada, Digitized Sky Survey 2, ESA/Hubble, RadioAstron, De Gasperin et al., Kim et al., EHT Collaboration. Music: Niklas Falcke
- Video: The M 87 image as seen through a light polarizer - YouTube | MP4 [11.7 Mb]
- Caption: The M 87 image as seen with a polarizer. Representation of the effect of a polarizer and how the polarization vectors in the M 87 ring image are produced from the combination of different linearly polarized components. Credit: © Iván Martí, Universitat de València, and the EHT Collaboration
- Video: What Is Polarization - YouTube | MP4 [19.1 Mb]
- Short caption: What Is Polarization | Event Horizon Telescope. Light is an oscillating electromagnetic wave. If the waves have a preferred direction of oscillation, they are polarized. In space, moving hot gas, or ‘plasma', threaded by a magnetic field emits polarized light. The polarized light rays that manage to escape the pull of the black hole travel to a distant camera. The intensity of the light rays and their direction are what we observe with the Event Horizon Telescope. Credit: © EHT Collaboration and Fiks Film
- Video: Magnetic fields and black hole images - YouTube | Vimeo | MP4 [173 Mb]
- Short caption: How Magnetic Fields Affect Black Hole Images | Event Horizon Telescope. Black holes are enveloped in plasma. This plasma has magnetic fields-areas where magnetism affects how matter moves-threaded throughout. As the magnetic field grows stronger, it changes shape and the polarized light we measure exhibits different patterns. Credit: © EHT Collaboration and Crazybridge Studios.
- Image: Group picture of the Polarimetry Workshop held in Bonn in July 2019 - JPEG [7.8 Mb]
- Short caption: Group picture of the workshop which triggered the imaging the magnetic fields at the Max-Planck-Institut für Radioastronomie in Bonn, Germany, on July 15-19, 2021. Credit: © E. Traianou/MPIfR
- Animated image: Transition between the observed polarization image and a best-fit theory image - GIF [7.6 Mb]
- Caption: Transition between the observed polarization image and a best-fit theory image. Credit: © Monika Mościbrodzka & Sara Issaoun, Radboud Universiteit Nijmegen, and the EHT Collaboration
- Image: Composite visual of M 87 jet and ring in polarization - Portrait: PDF [11.3 MB] | TIFF[22.9 MB]; Landscape: PDF [8.6 Mb] | TIFF [19.4 MB]
- Caption: View of the M 87 supermassive black hole and jet in polarized light. This composite image shows three views of the central region of the Messier 87 (M87) galaxy in polarised light, namely, from top to bottom, with the Chile-based Atacama Large Millimeter/submillimeter Array (ALMA), the National Radio Astronomy Observatory's Very Long Baseline Array (VLBA) in the US, and with the Earth-sized telescope synthesized by the Event Horizon Telescope. Credit: EHT Collaboration; ALMA (ESO/NAOJ/NRAO), Goddi et al.; VLBA (NRAO), Kravchenko et al.; J.C. Algaba, I. Martí-Vidal
- Observational publication: First M87 Event Horizon Telescope Results. VII. Polarization of the Ring, The Astrophysical Journal Letters, Vol. 910, L12, 24 March 2021 doi:10.3847/2041-8213/abe71e
- Theory publication: First M87 Event Horizon Telescope Results. VIII. Magnetic Field Structure near The Event Horizon, The Astrophysical Journal Letters, Vol. 910, L13, 24 March 2021 doi:10.3847/2041-8213/abe4de
- Related publication: Polarimetric properties of Event Horizon Telescope targets from ALMA, Goddi, Martí-Vidal, Messias, and the EHT Collaboration, The Astrophysical Journal Letters, Vol. 910, in press, 24 March 2021 doi:10.3847/2041-8213/abee6a
Dr. Ilse M. van Bemmel
Phone: +31-62288 5267 (mobile)
Prof. Dr. Huib Jan van Langevelde
Phone: +31-521-596515 (office), +31-62120 1419 (mobile) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a scientific article about the Event Horizon Telescope (EHT) collaboration's new findings regarding the black hole at the center of the M87 galaxy. It contains no unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to astrophysics and astronomy, making it fully appropriate for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"educational and scientific content\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on educational and scientific content related to the Event Horizon Telescope and the imaging of a black hole. It does not contain any unsafe, inappropriate, or harmful elements. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a standard academic reference and contact information for researchers. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "159-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "159-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "159-2",
"llm_safety_score": 0,
"reason": "educational and scientific content"
},
{
"custom_id": "159-3",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.jive.eu/astronomers-image-magnetic-fields-edge-m87%E2%80%99s-black-hole",
"date": "2023-05-28T22:44:37",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00463.warc.gz",
"language": "en",
"language_score": 0.8885507584,
"token_count": 3120,
"score": 3.046875,
"int_score": 3
} |
<urn:uuid:77eb8564-dd07-41a7-9319-63813194ccb5> | Miya Water is set to launch its World Water Day campaign in local schools with a TikTok challenge aimed at informing students of the importance of water conservation and safe water usage in schools, at home and in the wider community.
Miya Water joins the rest of the world in celebrating World Water Day on March 22 and has aligned with the United Nation’s global theme ‘Be the change you want to see’.
The Miya Water Conservation TikTok Challenge targets students eight to 16 years and encourages them to creatively showcase their knowledge of water conservation using a 60-second video demonstrating their ideas in the form of a song, poem, dub, or skit for a chance to win tablets and a laptop. The challenge forms part of the organisation’s public education programme, which has so far engaged hundreds of students in the Portmore community.
Miya Country Manager, Alvaro Ramalho said: “The Miya/NWC co-management partnership can only achieve their water reduction goals by having full commitment from the entire population. Therefore, the schools [and by extension students] are extremely important assets to transferring knowledge in the homes about the importance of conserving water; this is also an excellent vehicle to spread the word on the value of water in a world impacted by recurring droughts and global warming.”
Miya Jamaica is no stranger to advocacy in the area of water conservation in Jamaica, having partnered with the National Water Commission (NWC) since 2015 on the Non-Revenue Water (NRW) Reduction Programmes in Kingston and St Andrew and Portmore, St Catherine.
The NRW programme was designed to reduce water loss and improve water supply to customers residing in socially challenged areas within the respective communities. Since the project’s inception, NRW reduction activities in Portmore have saved NWC over a half million USD within 2 years of the implementation period.
Miya is a global efficiency-oriented water operator with vast experience in offering solutions for water utility companies. Its services include commercial water management, water treatment and water efficiency support.
This year’s World Water Day observation is focused on accelerating change to solve water and sanitation crises globally.
“By changing the way, we use, consume and manage water in our personal lives, we can make a difference in our families and communities,” Ramalho added.
Students interested in participating in the Miya Water Conservation TikTok Challenge, can learn more by visiting the Miya Jamaica social media platforms (@miyajamaica). Video entries must be submitted via email to [email protected] no later than May 30, 2023. Videos must be high quality, recorded in portrait mode, and should be submitted as an MP4 file. Student content must be approved by a teacher from the participating school and their parents. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\n**Explanation:**\nThe text sample is entirely focused on promoting a water conservation campaign and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and promotes positive educational and environmental messages."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "160-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://jamaicainquirer.com/miya-water-to-launch-tiktok-challenge-for-world-water-day-loop-jamaica/",
"date": "2023-05-30T08:07:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00463.warc.gz",
"language": "en",
"language_score": 0.9396504164,
"token_count": 579,
"score": 2.6875,
"int_score": 3
} |
<urn:uuid:286d657b-8e0f-4a69-aa8a-a747ef1ec95e> | 2A11 Aluminum Plate
Sample: A4 Sized
Payment Terms: L/C,D/P,T/T
Delivery time: Within 15-30 Days
Introduction to 2A11 Aluminum Plate:
2A11 aluminum plate is the earliest kind of hard aluminum, generally called standard hard aluminum, which is based on the Al-Cu system and incorporates a small amount of elements such as Mg, Mn, and Cr. And it use in quenching and natural aging conditions, when using 2A11 as solder for gas welding and argon arc welding have a tendency to crack; aluminum plate has good stability, corrosion resistance is not high without aluminum, and there is a tendency to cause intergranular corrosion when heated above 100 °C.
Properties of 2A11 Aluminum Plate:
Its surface anodizing and painting reliably protect extruded and forged parts from corrosion. Cutting is good in quenching and aging, and bad in annealing. It also has medium strength, good plasticity in annealing, quenching and hot state, good heat treatment strengthening,
Tensile strength σb (MPa) ) ≥370
Conditional yield strength σ0.2 (MPa) )≥215
Elongation δ5 (%): ≥12
Note: Longitudinal mechanical properties of bars at room temperature
Specimen size: bar diameter (square bar, hexagonal bar inscribed circle diameter) ≤ 150
Use of 2A11 aluminum plate:
1.General mechanical parts or structures such as textile, structural parts of vehicles and other means of transport.
2.Aircraft medium strength components, aircraft propeller blades,
traffic and building components.
3.Ship’s precision instruments.
4.Friction couplings, tools, measuring tools and other components.
Heat Treatment Process of 2A11 Aluminum Plate:
Heat treatment process: Oil quenching and tempering. The strength of this type of steel wire is not as good as that of the lead bath, but the performance is uniform and the cost is low. After the cold roll is formed, the stress relief treatment is performed. Pull out to the specified size and then anneal. After the softened cold roll is formed, it needs to be quenched + moderately tempered to obtain the required mechanical properties.
Technical Parameters of 2A11 Aluminum Plate :
|Typical alloy||2A11 aluminum plate|
|Material status||T4、T6、T351、H112 etc.| | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample provided is a technical description of 2A11 aluminum plate, detailing its properties, applications, and heat treatment process. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "161-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.mt-aluminum.com/2a11-aluminum-plate.html",
"date": "2023-05-30T07:38:52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00463.warc.gz",
"language": "en",
"language_score": 0.8597087264,
"token_count": 534,
"score": 2.546875,
"int_score": 3
} |
<urn:uuid:2f122594-1662-47ba-b249-21650149af07> | Birth of Jack London
Acclaimed writer Jack London was born on January 12, 1876, in San Francisco, California.
Born John Griffith Chaney, the future author adopted the name “Jack” at an early age. And he took the surname London from his step-father John London, a Civil War veteran.
The young London credited his rise to literary success to his reading of the Victorian novel Signa in 1885. He spent many of his childhood hours in the Oakland Public Library with librarian and future poet laureate, Ina Coolbrith.
To help support his struggling family, London began working in a cannery in 1889. Desperate for a more exciting life, he borrowed money to buy a ship and became an oyster pirate. When that ship became damaged beyond repair, he took a job with the California Fish Patrol. London then joined a sealing schooner off the coast of Japan. During that voyage, his ship was caught in a typhoon that nearly killed everyone on board.
When he returned home, London took a job in a jute mill earning 10¢ an hour. One day he told his mother the dramatic story of the typhoon, and she convinced him to enter it in a local writing contest. With just an eighth-grade education, London won the $25 first prize, beating college students. London believed he had found his calling.
But making a living as a writer wasn’t as easy as London had hoped. Unable to find a publisher, he briefly attended the University of California at Berkeley. After hearing stories of the gold strikes in the Alaska Klondike, London loaded a steamship with supplies and headed north through the Inside Passage of Alaska. Arriving in Alaska in the fall of 1897, London and his men used handmade boats to travel the dangerous One Mile and Whitehorse Rapids.
Once in Dawson City, London found that most of the gold was already claimed. One of the fortunate few, he and his men found gold in the Stewart River. Occupying a cabin near a popular crossroads, London hosted many miners as they passed through the area. Many of them shared their stories with him. These stories formed the basis of some of his greatest works, including White Fang and The Call of the Wild.
Returning to California in 1898, London recommitted himself to getting published. The Overland Monthly paid him $5 to publish his first story in years – “To the Man on Trail.” He was disappointed, but continued writing. London was relieved when The Black Cat bought his story, “A Thousand Deaths” for $40. In the coming years, new printing technology led to a boom in magazines for a wide variety of interests. London benefited, selling story after story. One of London’s most famous works, The Call of the Wild, was first published in The Saturday Evening Post in 1903. It was then released as a short novel, earning London significant fame.
In 1904, London took a job with the San Francisco Examiner covering the Russo-Japanese War. Over the course of six months there, he was arrested four times and eventually returned to America.
Hoping to find more financial success, London bought a ranch in Glen Ellen, California, in 1905 and frequently added to it. He once claimed that “Next to my wife, the ranch is the dearest thing in the world to me.” Soon, his writing became a means to expand his beloved ranch. However, the ranch was never economically successful for London.
London also used the earnings from his writing to buy a yacht, which he and his second wife used to visit Hawaii and Australia. During their 1907 visit to Hawaii, London witnessed surfing for the first time. He tried it himself and then wrote a long essay about it, titled, “A Royal Sport.” It was published in Women’s Home Companion that October, and is often credited with giving surfing national attention in America.
London’s adventurous life and alcoholism took a toll on his health, leading to his death at just 40 years old on November 22, 1916.
Click here to read some of London’s stories.
|FREE printable This Day in History album pages
Download a PDF of today’s article.
Get a binder or other supplies to create your This Day in History album.
Discover what else happened on This Day in History.
2 responses to "Birth of Jack London"
2 thoughts on “Birth of Jack London”
I was required to read several novels each year in high school and “The Call of the Wild” was on my freshmen list. Three of my grandsons are now in high school and they are not required to read novels that my generation was. I believe they are missing out and encourage them to read on their own. Thank you Mystic for sharing today’s article.
I was in high school when I think the first novel I ever read was “The Call of the Wild.” I couldn’t put it down, and I have reread it a couple of times since then. Before that, I read lots of short science fiction stories in the magazine I think was called “Amazing Stories.” I soon got hooked on the novels by John Steinbeck. I believe I have read every novel he ever wrote. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text is a historical biography of Jack London and does not contain any unsafe or inappropriate content. It is suitable for all audiences and does not include any harmful language, themes, or references.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is entirely appropriate and suitable for all audiences. It discusses personal reading experiences and preferences, which are neutral and safe topics."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "162-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "162-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://info.mysticstamp.com/birth-of-jack-london_tdih/",
"date": "2023-05-31T16:24:48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00463.warc.gz",
"language": "en",
"language_score": 0.9860441089,
"token_count": 1104,
"score": 3.046875,
"int_score": 3
} |
<urn:uuid:fbf86f20-6a4c-4f2f-ac97-5821d93caf9b> | You might discover a pregnant lady with diabetes, a 40-year-old woman with hypertension, and another whose family has a history of a genetic anomaly in the waiting room of a perinatologist’s office.
A perinatologist, often known as a maternal/fetal physician, is a doctor who specializes in pregnancy issues.
If you want to make a difference as a doctor, becoming a perinatologist allows you to do it for not just one person, but a woman and her baby, even before the baby is born.
What exactly is a perinatologist?
Doctors that specialize in high-risk pregnancies are known as perinatologists. They work with women and babies to ensure they are safe before, during, and after birth.
High-risk pregnancies aren’t usually more risky or complex than low-risk pregnancies. The word usually refers to pre-existing conditions or those that arise during pregnancy.
Perinatologists are doctors who specialize in maternal-fetal medicine. They can work in clinics, hospitals, or private practice. Your obstetrician will most likely send you to a perinatologist if you have a high-risk pregnancy.
What Do Perinatologists Do?
Perinatologists are doctors that specialize in obstetrics and gynecology. In comparison to a gynecologist or an obstetrician, they perform more advanced testing and monitoring.
For example, this could involve the following:
- Highly detailed ultrasounds
- Congenital disabilities tests
- Blood tests for foetuses.
- Perinatologists can provide more accurate and extensive information about your pregnancy and how pre-existing conditions may affect it.
- They also care for new mothers after giving birth if there is a problem during delivery, such as an infection or excessive bleeding.
Perinatologists are needed for a variety of reasons.
Your gynecologist or obstetrician will generally recommend you to a perinatologist if you require one.
Among the most common explanations are:
- Being 35 years old or older
- Overweight or underweight
- Having one or more children
- Abnormal screening results
- Pre-existing ailments
- Blood pressure being too high
- Pregnancy-related injury
- Getting into labor too soon
How to become a perinatologist?
To become a perinatologist, you’d go through the same training as other doctors. Your bachelor’s degree can be in any discipline, but you’ll need to take many science and maths classes to prepare for medical school.
In addition, take English and communications lessons to communicate with patients, colleagues, professors, and medical school admissions officers in writing and in person.
After that, you’ll spend four years in medical school learning about human anatomy, psychology, and medical ethics while also taking scientific classes and labs.
The first two years are primarily spent in a classroom setting. The last two years of your education will be spent working with patients in clinics and hospitals under the supervision of qualified physicians.
You’ll try out a variety of expertise to see where your passions lie. For example, if you believe you’d like to pursue obstetrics, you’ll pursue fellowships in perinatology, where you’ll study more about maternal and foetal medicine.
Perinatology fellowships typically last three years. Before practicing medicine, all states require physicians to be licensed.
There are a variety of requirements, but they all entail a lengthy licensure exam.
About The Author:
Ompal Singh is a freelance writer, business enthusiast, a bit of a tech buff, and an overall geek. He is also an avid reader, who can while away hours reading and knowing about the latest gadgets and tech, whilst offering views and opinions on these topics. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is entirely educational and informative, discussing the role of perinatologists and the conditions that might require their expertise. There are no unsafe, inappropriate, or harmful elements present in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "163-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.safeandhealthylife.com/what-is-a-perinatologist-when-you-should-see-a-perinatologist/",
"date": "2023-05-31T15:27:49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00463.warc.gz",
"language": "en",
"language_score": 0.9491785765,
"token_count": 808,
"score": 2.65625,
"int_score": 3
} |
<urn:uuid:0cb0180c-8b1e-42e6-8dc9-0904a7340206> | Lead is a poisonous heavy metal that causes significant adverse health effects, particularly in children and experts agree that there is no safe level of lead exposure. A source of exposure to lead lurks inside the lead service lines that deliver drinking water from the water main in the street to residences. Lead leaches from lead service lines into water when a chemical reaction known as corrosion occurs. Water suppliers use a technique know as corrosion control to prevent this however the most effective way to prevent lead exposure is to replace these pipes.
The Federal Environmental Protection Agency estimates that there are at least 494,000 lead service lines in the state, putting New York State as one of the top six states with the most lead service lines. New York State, like every other state, is preparing a statewide inventory, collecting information from nearly 2,900 public water suppliers from around the state. This inventory is due October 16, 2024. What becomes of the information collected by the New York Department of Health and monitoring whether lead service lines are being removed is a concern to environmental and public health groups.
The chairs of the Health Committee of the New York State Legislature — Senator Gustavo Rivera and Assemblymember Amy Paulin – have introduced legislation, S.5512 / A. 6115 known as the “Lead Pipe Right to Know Act.” This bill will make information about the number and location of lead pipes easily accessible to the public and decision-makers, so that state and federal resources can be secured and efficiently disbursed to local efforts to get the lead out of New York’s drinking water by removing all lead pipes.
Specifically, it codifies requirements by the US Environmental Protection Agency and guidance from the NYS Department of Health for each water utility to develop a comprehensive inventory of all of the service lines in its system by October 2024, and to regularly update those inventories with new information. It also requires the NYS Department of Health to make those inventories available on the department’s website, and to create interactive maps allowing New Yorkers to easily learn their risk of lead exposure.
This bill has been well received in Albany this session. The state senate passed the Lead Pipe Right to Know Act on April 25, 2023 and as of press time, the state assembly has this bill on the floor calendar meaning that it is likely going to be put up for a vote before the legislature concludes their session on June 8.
We’ll keep you posted on the status of this bill and report back to you on whether we are able to achieve passage in both houses in the legislature. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the health risks of lead exposure, the presence of lead service lines in New York State, and legislative efforts to address the issue. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "164-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://nylcv.org/news/the-lead-pipe-right-to-know-act/",
"date": "2023-06-02T01:05:04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00463.warc.gz",
"language": "en",
"language_score": 0.9613977671,
"token_count": 521,
"score": 2.875,
"int_score": 3
} |
<urn:uuid:40d4d06b-7652-4349-afa1-f31da360c08e> | Plenty of Fish in the Sea?... Let's Help Keep it That Way!
For this week’s Preservation Pointer, we highlight World Fisheries Day. Celebrated every November 21, this day serves to remind us of the importance of having healthy ocean ecosystems and ensuring sustainable fisheries throughout the world.
Seafood is the largest traded food commodity, providing a primary protein source for over 3 billion people! All too often, in parts of the developing world, fisheries are depleted of their stock (overfished), in order to meet demand. When certain regions are continuously overfished, it puts huge strains on other marine life that would otherwise depend on the same resources. This could eventually lead to entire ecosystems collapsing.
Along with overfishing, fisheries are also threatened by climate change (rising water temperatures) as well as the effects of pollution. One example of this is the rise of water acidity. More acidic water can alter the calcification (shell-building) process for many of our "go-to" favorites including oysters and shrimp.
The good news is that with time, patience and proper management and regulation of the world's fisheries, fish populations CAN bounce back and thrive. Aquaculture (farming fish) has also made significant contributions to keeping fish supplies plentiful!
Here at the zoo, many animals rely on fish as a primary source of nutrition. We strive to ensure that the fish we provide to our animals is sourced through sustainable methods.
The biggest way YOU can help keep fish in the sea is to choose the most sustainably sourced seafood for your own consumption. Our friends at Monterey Bay Aquarium created the SEAFOOD WATCH Guide and \Phone App to help you, as a consumer, navigate all the choices out there! Their easy to follow guides categorize fish into 3 areas, (Green = BEST CHOICES, Yellow = GOOD ALTERNATIVES, and Red = AVOID). Guides are available by region so you can make the best choices for what's available where you live! Please visit their site at seafoodwatch.org to learn more! | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content with no unsafe elements\", \"score\": 0}\n```\n\n**Explanation:**\n- **Content:** The text is entirely educational and informative, focusing on the importance of sustainable fisheries and ocean ecosystems.\n- **Language:** The language used is respectful and does not contain any profanity, slurs, or derogatory terms.\n- **Themes:** The themes are related to environmental conservation and sustainability, which are appropriate for all audiences.\n- **References:** The text mentions sustainable practices and provides resources for consumers to make informed choices, which is beneficial and not harmful.\n\nThe text does not contain any unsafe or inappropriate content, making it fully suitable for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "165-0",
"llm_safety_score": 0,
"reason": "educational and informative content with no unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.rosamondgiffordzoo.org/conservation/preservation-pointers/plenty-of-fish-in-the-sea-lets-help-keep-it-that-way/",
"date": "2023-06-02T02:38:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00463.warc.gz",
"language": "en",
"language_score": 0.9497441649,
"token_count": 427,
"score": 3.609375,
"int_score": 4
} |
<urn:uuid:e334adcb-ac82-4905-ad1a-40a689e45fda> | The painted turtles, also called Chrysemys picta, are adorable, quiet, and fascinating turtles to have as a pet. They possess several characteristics that make them one of the best pet turtles to raise. They live a reasonably long life, so this is an adorable pet that will be with you for a long time!
How Long Do Painted Turtles Live?
Painted turtles may live as long as 35 to 40 years in the wild. However, most of them will not survive for this long. Due to the risk of predators and illness, the lifespan of painted turtles in the wild is usually 10-15 years.
A painted turtle can live quite a long life in captivity. With proper care, the typical life span range for a painted turtle is 20 to 25 years in captivity. Their lifespan is influenced by the diet and care they receive.
The captive turtles can lead a healthy life if you have a proper painted turtle tank setup and properly maintain their environment. A healthy diet is also important to help them hit their life expectancy.
If you want to learn about what to feed a painted turtle, you should check out my article on Painted Turtle Diets.
Is There a Difference Between Male and Female Painted Turtle’s Lifespan?
Adult female painted turtles are slightly bigger than male ones. But this doesn’t have any impact on their lifespan. Painted turtles’ gender doesn’t affect their life expectancy.
What do painted turtles usually die from in captivity?
Painted turtles are a hardy turtle species. The common health problems in painted turtles include vitamin A deficiency, respiratory diseases, abscesses, shell infections and fractures, ear infections, and parasites.
- Vitamin deficiency: When a painted turtle doesn’t get a proper diet it may develop a vitamin deficiency. Lack of vitamin D, proper UVB lighting, and calcium result in metabolic bone disease and shell deformities. They can also develop vitamin A deficiency that causes nasal drainage, raw skin, swollen eyes, and stomatitis.
- Intestinal parasites: It is a common problem that affects painted turtles. An intestinal parasite can cause a variety of symptoms that can lead to serious health issues without treatment. Parasites usually enter the tank when you put something in the tank that was outside. For this reason, you should always thoroughly clean any object before you put it into your turtle tank.
- Shell infections: It is also known as shell rot and is caused by bacteria, fungi, or parasites. Affected shells will often have soft areas that may lift away from the rest of the shell. Some of these infections can penetrate deep into the layers of the shell, causing ulcers. If left untreated, it can spread into the bloodstream and internal organs.
- Abscesses: In this condition, there are infected, pus-filled swellings that form within the ear canal pushing on the skin. It is easy to diagnose due to the obvious swelling on the sides of the turtle’s head. Abscesses in turtles can be the result of a vitamin A deficiency. The affected turtles stop eating and feel some discomfort.
Common signs of illness in painted turtles are:
- Swollen eyes
- Discoloration or open wounds on the skin
- Bubbles coming from the nose
- Inability to swim or breathe properly in water
- Significant weight changes
- Lack of appetite or stops eating
- Excessive basking
Most of the health problems in painted turtles is a result of dirty habitats and improper diet. If you suspect your painted turtle has a health issue, talk to your vet as soon as possible. You can learn more in my article about pet turtle diseases.
What Do Painted Turtles Usually Die From in the Wild?
While the painted turtle species is not declining, there are some regions that are experiencing a decline in painted turtle populations. Below are the main reasons that painted turtles die in the wild:
- Habitat loss: An obvious threat to painted turtles comes from habitat loss or by drying wetlands. Even when water remains, the painted turtles may be impacted by the clearing of rocks that provide basking sites for females. Obviously, climate change has impacted painted turtles in regions where temperatures have significantly changed.
- Roadkill: Another visible cause of death of painted turtles due to human impact is roadkill.
- Predation: Young painted turtles are most vulnerable to predators. A variety of predators will capture painted turtles and their eggs. These predators include raccoons, chipmunks, crows, otters, badgers, foxes, and other medium-sized predators.
- Introduction of non-native species: The introduction of non-native turtle species is another threat to the painted turtle. Red-eared sliders have been widely released in areas where painted turtles live. This results in increased competition for food.
Other factors of concern for the painted turtle include pollution, boating traffic, crushing by agricultural machines, or all-terrain vehicles.
Overall their populations are quite stable and are currently not at an extinction risk.
Interesting fact: Fossils show that the painted turtle even existed 15 million years ago!
We all want our painted turtles to live a long and healthy life. Your little guy can live for many years if it does not have serious health problems.
Let us know if you found this article helpful! If you have further questions about painted turtles, don’t hesitate to ask. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text is entirely educational and informative about painted turtles, their lifespans, and health issues. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text is informative and educational, providing factual information about painted turtles and encouraging engagement without any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "167-0",
"llm_safety_score": 0,
"reason": "educational content"
},
{
"custom_id": "167-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.turtleholic.com/how-long-do-painted-turtles-live/",
"date": "2023-06-03T12:13:47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00463.warc.gz",
"language": "en",
"language_score": 0.946822226,
"token_count": 1117,
"score": 3.125,
"int_score": 3
} |
<urn:uuid:4b9947ae-847f-4cf6-ae81-044ed72d246d> | Play is an essential part of learning and development for children and is an increasingly important aspect of creative approaches to teaching and learning in primary education. This book demonstrates the value of play in all its different forms as a highly effective medium for teaching and learning across the curriculum.
The authors explore how play can be used to increase engagement, motivation and fun in learning situations, examining the theoretical principles of play for learning, types of play for older children, planned and facilitating play-based learning, using thematic approaches when working with individuals, groups and whole classes, in addition to covering important teaching issues such as assessment, inclusion and transition out of primary education.
This is recommended reading for students on primary initial teacher education courses including undergraduate (BEd, BA with QTS), postgraduate (PGCE, SCITT), and employment-based routes into teaching, and also for practicing teachers wishing to enhance their own teaching.
Planning for Play
Planning for Play
It is also naïve to think that good play environments can be achieved only through design. (Hart, 2002: 14)
In this chapter we look at the issues around planning for play activities with primary aged children and how both adults and children can be involved in the planning and organisation of play environments. It will include discussion of the design and planning of environments, as well as the development of environments through spontaneous events in the classroom and outside as a response to children's interests and ideas. This chapter will typically raise questions about how we stimulate play with older learners and how we allow the element of choice within activities for the children.
To begin we need to revisit what the ... | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is entirely focused on the importance of play in education and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational environments and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "168-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://sk.sagepub.com/books/play-based-learning-in-the-primary-school/n6.xml",
"date": "2023-06-04T21:29:03",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00463.warc.gz",
"language": "en",
"language_score": 0.9620729089,
"token_count": 329,
"score": 4.3125,
"int_score": 4
} |
<urn:uuid:1c268ecb-0fe7-4225-9dd6-6040811e8152> | Altcoins: Definition, Types, and Purposes
Many novice crypto investors or ordinary people interested in cryptocurrencies may often hear the term “altcoin,” but not everyone understands its meaning. Some people think it’s a type of cryptocurrency, while others don’t associate altcoins with digital assets at all. So, what exactly are altcoins? Let’s find out.
What Are Altcoins?
An altcoin is any cryptocurrency that appeared after Bitcoin. The term is derived by combining the words “alternative” and “coin.” An altcoin literally means an “alternative coin.” According to CoinMarketCap, there are over 23,000 cryptocurrencies as of early April 2023, all of which, except Bitcoin, are altcoins.
The total share of alternative coins in the cryptocurrency market is more than 50% with a total value of over $600 billion.
The first altcoin is Namecoin (NMC). It was created in April 2011 as a fork of the Bitcoin network to register domain names in a decentralized network. Ethereum is the most popular altcoin, occupying more than 19% of the total market.
One can say that altcoins are an improved version of Bitcoin. When the success of the first cryptocurrency became evident, lots of enthusiasts started to create their own coins, modifying the original idea.
The number of altcoins is constantly increasing, but it’s worth noting that there’s a large percentage of useless coins created for speculation or scams — they’re called shitcoins. Such cryptocurrencies may not differ much from each other, but each new coin, which claims to have some value, must be useful and solve specific problems.
Though altcoins and Bitcoin are based on blockchain, they differ in many ways. The main difference is the consensus algorithms underlying the operation of a particular blockchain network. Moreover, the software capabilities of the cryptocurrency core of different projects can vary significantly and affect the functionality of the infrastructure that emerges around these blockchain networks. For instance, smart contracts on the Bitcoin network have very limited capabilities, while the Ethereum developers managed to create a complete decentralized software environment that enables complex decentralized apps to run.
Types of Altcoins
All altcoins can be roughly divided into several major types, taking into account the principle of their creation, the mechanism of operation, and other features:
- Stablecoins. Cryptocurrencies whose value is tied to other, less volatile assets, such as fiat currency, gold, etc.
- Meme coins. These are digital assets based on popular Internet memes. The largest meme coin is Dogecoin (DOGE), one of the top 10 cryptocurrencies in terms of capitalization.
- Private cryptocurrencies. These altcoins focus on providing a higher level of anonymity and transaction privacy. Examples are Monero (XMR), Zcash (ZEC), and Dash (DASH).
You can divide altcoins by the type of token:
- Native tokens. Basically, these are internal cryptocurrencies of blockchain networks, which provide the operation and maintenance of the network, being an integral part of the blockchain ecosystem. These are BTC and ETH.
- Utility tokens. These assets are designed for internal use within a specific cryptocurrency platform or ecosystem. They enable access to the project’s products, services, or functionality. An example of such an altcoin is Binance Coin (BNB).
There are also governance tokens, security tokens, DeFi tokens, credit tokens, commodity tokens, and other types of tokenized assets, as well as many other kinds of digital assets that can be called altcoins. Interestingly, such a division isn’t academic but occurs on a factual basis, so other “classification systems” for altcoins can be found online as there’s no single universally accepted standard on the matter.
The Most Popular Altcoins
Let’s take a look at some popular altcoins and the main functions they perform:
- ETH. Within Ethereum, as with other networks based on the Proof-of-Stake (PoS) consensus algorithm, the altcoin is sent to staking by validators to give them the right to process transactions and create and validate blocks. The token is also used to pay intranet commissions and is the primary token for multiple decentralized apps.
- BNB. The main token of the Binance crypto ecosystem, which is used for staking, cryptocurrency exchange fees, participation in Initial Exchange Offerings (IEO), and other Binance services.
- ADA. The Cardano network’s altcoin, which is used for staking, paying transaction fees on the network, and participating in the platform’s management processes.
- DOT. A token of the Polkadot multichain protocol that is needed for staking, securing the network, participating in project management votes, and for creating new parachains.
- LINK. Chainlink is a decentralized oracle that gives smart contracts access to real data and various APIs, and the LINK token is used to pay for providing information, staking, and participating in votes on project development.
- UNI. The token is used to manage the decentralized crypto exchange Uniswap, gives the right to vote on development proposals for the platform, and gives rewards for providing liquidity.
- AAVE. The altcoin enables participation in the management of the decentralized credit platform AAVE, staking, and gives rewards for providing liquidity or loans.
As you may have noticed, the functions of altcoins in practice end up being quite similar — they’re used for staking and processing transactions, paying commissions within the network, granting the right to participate in project development, providing liquidity and other forms of income, and accessing the specific services of a particular protocol or ecosystem. In addition, all altcoins that have at least some value are used as a means of payment and exchange and for speculation in the cryptocurrency market.
Each altcoin has certain advantages over its peers, but Bitcoin still dominates in popularity, community trust, and capitalization levels. This is largely due to historical reasons. BTC is a pioneer, a sort of brand with which many people still associate the term “cryptocurrency.” But it’s quite possible that in the coming years, existing or just developing altcoins will catch up with BTC in popularity and demand and finally make it a worthy competitor in the cryptocurrency market. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides educational information about altcoins, stablecoins, meme coins, private cryptocurrencies, and popular altcoins. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to cryptocurrency and blockchain technology, which are suitable for educational environments and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the functions and characteristics of altcoins and decentralized platforms like Uniswap and AAVE. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and does not require any safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "169-0",
"llm_safety_score": 0,
"reason": "educational content"
},
{
"custom_id": "169-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "http://virtualmarketingpro.com/altcoins-definition-types-and-purposes/",
"date": "2023-06-06T07:04:47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00463.warc.gz",
"language": "en",
"language_score": 0.9269198775,
"token_count": 1323,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:f0d92060-f3e7-4606-a44e-2e143bb4949a> | Cogs, Small Cogs, and Boats: The Thirteenth Until Sixteenth Century Dutch and Flemish
Text from the publisher:
Karel Vlierman (ed.), SPA Uitgevers, 996 p.
From the thirteenth to the fifteenth century an important part of the economy in northwestern Europe was based on trade in the Hanseatic League. The main means of transport consisted of ships, mainly cogs. The importance of this type of ship was already apparent from medieval documents, miniatures, and other sources. However, until the mid-twentieth century, no material remains of such ships were known. Results from archaeological excavations of shipwrecks had to be awaited for greater clarity on the construction, technology and appearance of these ships.
One of the world’s largest collections of medieval shipwrecks emerged after the Second World War during the partial reclamation of the IJsselmeer lake (the former Zuiderzee inlet) in the Netherlands, where three polders were created from 1942 onwards. During these works, hundreds of shipwrecks from the period between 1250 and 1900 were discovered, about twenty of these being cogs. The first cog was excavated in 1944. The famed cog, with its remarkable construction and the ingenious manner in which the seams between the planks were made watertight using moss, laths and iron clamps, clearly demanded an in-depth study. The Netherlands were an ideal place to start, as more than half of all the cog wrecks in Europe have been found, (partially) excavated and studied in the Netherlands.
Maritime archaeologist Karel Vlierman has excavated shipwrecks all his working life. He dedicated himself to the research of these ships, including two cogs found at Doel near Antwerp and the recently uncovered cog from the river IJssel near Kampen. His research of more than twenty years has resulted in a monograph of 996 illustrated pages, together with some 70 large technical drawings of all the investigated cogs and their reconstructions. The monograph (in two volumes) and the folder with the 70 technical drawings -in A0, A1 and A2 format- together come in a fine slipcase.
Karel Vlierman explains the shipbuilding tradition of the Hanseatic period in detail and clarifies the differences between the cog and, for example, the ‘nef’ of the southern North Sea, which belongs to the Nordic or Scandinavian tradition. Based on the finds excavated at Kampen, he considers it very likely that a shipyard was located there in the late thirteenth and early fourteenth century. The largest piece of woollen sail ever excavated was discovered at Kampen. Hundreds of typical iron clamps too were found, some of them unused, suggesting a blacksmith’s workshop specifically dedicated to producing them. Ships could be hauled out from the water and, after repairs, sail to the Zuiderzee via the IJssel. This is the first cog shipyard ever to be discovered in the Netherlands.
Until the ‘IJssel cog’ was discovered and excavated near Kampen, the so-called ‘Nijkerk-II’ was the best-preserved known cog. The analysis of this cog was the starting point for this study, together with the experience gained during the construction of a replica of it, the so-called Kamper Kogge (Kampen Cog). It gradually became clear that there had been a tradition of cog building. Through studying and drawing all the cog wrecks, it was possible to make reconstruction drawings of many of them, with the benefit of evidence already obtained from other wrecks.
This voluminous and impressive book will set the standard for publications on maritime archaeology for decades to come, as it is the landmark handbook for the way in which shipwrecks should be documented, described, and reconstructed. The detailed manner in which the technical drawings have been created makes it possible to construct virtual 3D models. The vectorised drawings are of a very high quality and are available digitally.
In addition, Karel Vlierman created about twenty artists’ impressions of the cogs as they must have looked during operation and of life on board. These not only appear in a large format in the book but are also available as postcards and posters.
This will be the standard work on cogs, the first of its kind to be published, with the size and scope of the study unequaled in any area of maritime archaeology. The famous publication on the sixteenth-century ship Mary Rose comes close but is about a single ship only. The present book on cogs covers the entire spectrum of these vessels, from seagoing ships to boats and barges plying the inland waterways and even a possible military cog for army transport. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and academic content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a detailed academic description of a book on medieval shipbuilding and maritime archaeology. It contains no unsafe or inappropriate content, uses respectful language, and does not include any adult themes, violence, or references to illegal activities. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "170-0",
"llm_safety_score": 0,
"reason": "historical and academic content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://t2m.org/book/cogs-small-cogs-and-boats-the-thirteenth-until-sixteenth-century-dutch-and-flemish/",
"date": "2023-06-06T05:10:47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00463.warc.gz",
"language": "en",
"language_score": 0.9696930647,
"token_count": 1017,
"score": 2.9375,
"int_score": 3
} |
<urn:uuid:2ec0a52d-4a50-42f3-a3e5-049c307c0558> | One of the goals for people who are in recovery for addiction is to learn to deal with their emotions. Their drug of choice has acted as a type of anesthetic for months or years, helping to shield them from the effects of strong emotions like guilt, shame, anger, anxiety, depression, etc.
Learning how to express emotions while sober can be challenging, but participating in activities of self-expression can help to make the process easier.
Activities Of Self-Expression
The following are five activities that you or a loved one can do to make dealing with emotions in recovery easier to work through.
1. Listen To Music To Identify Feelings
With the help of a therapist, clients listen to selected pieces of music and write down the emotions they associate with each one. The activity can be done in a group, with participants comparing notes after every three or four selections.
2. Go For A Mindful Walk
We are all familiar with going for a walk for exercise or walking for a purpose (to get to work, school, an appointment, or to go shopping). Very few people practice mindfulness while walking, where they are asked to look around and observe their surroundings and make note of the sensations they are feeling – without judgment – before returning their attention back to their breathing. The walk only takes about 15 minutes. Afterward, clients write down what they experienced during their walk, and there are no right or wrong answers, only observations and notes about any internal feelings which may have come up during the experience. Mindful walking helps to bring centeredness and stress-releasing relaxing breathing to the participant.
3. Write A New Ending To A Previous Event
This writing exercise asks clients to write down an event from their past that maybe was a source of conflict with a friend or family member that ended badly. They should start off by writing down the beginning of the event as they remember it and then add on a different ending so that the situation would end on a more positive note. This task asks them to use the skills they are learning in treatment to make better choices in relationships going forward.
4. Build Or Refurbish An Item
This form of art therapy can be very meaningful for clients who are in treatment for drug or alcohol addiction. They are starting with either a blank slate or a discarded doll, toy or other item and changing or improving its appearance. This process mirrors the client’s own journey in recovery as he or she is learning how to live in sobriety. The item is a symbol of the client’s renewal through the work they are doing to move forward into a positive new lifestyle.
5. Draw A Visual Journal
Instead of expressing your feelings through words, clients can use signs, marks or symbols on paper to express what they are feeling. They can use whatever types of symbols make sense to them to share their emotions. The results are discussed with a therapist after the client has finished recording them.
We Take YOU Into Account When Creating A Customized Recovery Plan!
Here at Summit Behavioral Health, we complete a full assessment and take into account your specific history, needs and goals when treating you. That’s why we create a customized recovery plan for each of our clients!
Take The First Step For Yourself Or A Loved One Toward Healing From Addiction & Call Us Right Now! | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text provides educational content on activities for emotional expression in recovery, which is appropriate for all audiences and does not contain any unsafe elements."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "172-0",
"llm_safety_score": 0,
"reason": "educational content with no unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://serenityatsummit.com/uncategorized/5-activities-self-expression-make-dealing-emotions-recovery-easier/",
"date": "2023-06-07T15:04:20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00463.warc.gz",
"language": "en",
"language_score": 0.9575843811,
"token_count": 682,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:664c2736-9efa-45de-b642-93c4623daf53> | Tractor Radiators FunctionsGeneral
The most reliable tractor engine will make use of approximately 35% of its energy right into valuable actions of driving, raking, drawing, delivering as well as various other farm duties. The excess 65% of the energy generated will be shed in the form of audio energy, heat energy, radiant energy, resonances, and also friction.
A sufficiently cooled down engine, as well as its equivalent, an adequately hot engine, are both essential for optimum tractor engine efficiency. An over-cooled engine can trigger excessive damage to the engine elements. Pistons, as well as linings, are designed to preserve extremely certain and also minute clearances.
An over-cooled engine will certainly have its liners cooler than the hot pistons. The aluminum pistons typically increase much faster than the steel-based liners, and also for that reason, there will certainly be marking in between both surface areas. This harms the pistons, piston rings, and lining surface area.
An exceedingly warm engine will certainly create all interior parts to increase beyond normal tolerances, creating loosened parts, and also burned tractor engine components. This is a sensation that is referred to as a “shot” engine or “confiscated” engine by mechanics. The tractor radiator removes excessive warmth from the engine. The coolant that is distributed through the engine is allowed to be cooled down through the tractor radiator.
The thermostats aid in this cooling process by protecting against warmed coolant from leaving the engine throughout the start-up stage when the engine is cool, and enabling coolant to move via the radiator when the engine temperature is above design temperature level restrictions. The tractor radiator can be manufactured from lightweight aluminum or copper or alloys of aluminum or copper. Light weight aluminum or copper is made use of as both have a high warmth capability, which is the capacity to take in as well as launch a huge quantity of warmth extremely quickly.
The tractor radiator generally has rows of tubes, as well as onto these tubes are connected thin strips of metal. The coolant is forced through televisions and the water pump. Typically, the coolant streams from the top of the radiator, downwards with televisions, and back into the engine block. Specially made radiator tubes perform these heat connections between the engine and also the radiator.
Onto these rows of metal tubes, are fitted thin strips of similar or similar metal. This properly boosts the surface area of the tubes, permitting the warm create coolant to travel by conduction to the fins. The fins are normally made as fins per inch. The 8N Ford tractor radiator and the David Brown radiator design 990 have 8 (8) fins per inch, the Allis Chalmers radiator for the D17 has 7 (7) fins per inch, the John Deere radiator for model 3020 has 10 (10) fins per inch.
The other primary element of the cooling system is the radiator cap. This serves to keep a high pressure in the radiator, hence protecting against the coolant from boiling, as well as it imitates a pressure alleviate valve releasing coolant to the storage tank when warm, as well as drawing coolant right into the engine when cold.
Please continue reading to get additional tips and information. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a technical explanation of tractor radiators and their functions. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "173-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "http://www.pncecs.org/tractor-radiators-functions/",
"date": "2023-06-09T00:07:55",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00463.warc.gz",
"language": "en",
"language_score": 0.959664166,
"token_count": 669,
"score": 2.625,
"int_score": 3
} |
<urn:uuid:84cb6651-3aff-40e7-a94f-1947299fc92b> | Business examination and data science are two disciplines which have been closely related. Both concentrate on data and quantitative steps used to measure the performance of companies. Business analysts often use fact-based supervision for decision-making. They use info to understand and foresee the future of businesses, helping to travel the economy and foster development within the industry. Business experts use data transformations and predictive types to make better decisions based on historical fashion. They can also use machine learning how to create predictive models and optimize efficiency through search engine optimization.
As the 2 fields terme conseillé, there are some main differences. While data scientists will be statistically competent, business analysts are organisation-centric. They evaluate and interpret info to pull insights from it and present that to non-technical audiences. In the end, both types of professionals depend on each other peoples skills. And there’s no denying that data scientists happen to be in high demand. They’re also required to continually modernize their abilities.
While info science certainly is the future of info management, each disciplines https://datatechtonics.com/2021/12/06/database-design-and-business-success/ don’t overlap in all methods. They equally aim to review data and locate patterns to fix problems and improve organizational performance. Organization analysis was traditionally used to capture small business and fix problems. However the use of big data, particularly big info, has substantially changed its purpose. Rather than simply resolving problems, it could possibly now anticipate future needs and respond to them better. In a data-driven universe, this type of examination can help agencies improve their underlying part lines and minimize costs and turnaround times. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text discusses business examination and data science in a professional and educational manner. It does not contain any inappropriate language, harmful themes, or unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "174-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://saudihealthmission.org/business-analysis-and-data-science/",
"date": "2023-06-09T01:59:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00463.warc.gz",
"language": "en",
"language_score": 0.9442648292,
"token_count": 340,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:f591d218-ac63-40c5-8052-68de93e0e7fe> | Track Space Debris Using a Keplerian Motion Model
This example shows how to model earth-centric trajectories using custom motion models within
trackingScenario, how to configure a
fusionRadarSensor in monostatic mode to generate synthetic detections of space debris, and how to setup a multi-object tracker to track the simulated targets.
Space debris scenario
There are more than 30,000 large debris objects (with diameter larger than 10cm) and more than 1 million smaller debris objects in Low Earth Orbit (LEO) . This debris can be dangerous for human activities in space, damage operational satellites, and force time sensitive and costly avoidance maneuvers. As space activity increases, reducing and monitoring the space debris becomes crucial.
You can use Sensor Fusion and Tracking Toolbox™ to model the debris trajectories, generate synthetic radar detections of this debris, and obtain position and velocity estimates of each object.
First, create a tracking scenario and set the random seed for repeatable results.
s = rng; rng(2020); scene = trackingScenario('IsEarthCentered',true, 'InitialAdvance', 'UpdateInterval',... 'StopTime', 3600, 'UpdateRate', 0.1);
You use the Earth-Centered-Earth-Fixed (ECEF) reference frame. The origin of this frame is at the center of the Earth and the Z axis points toward the north pole. The X axis points towards the intersection of the equator and the Greenwich meridian. The Y axis completes the right-handed system. Platform positions and velocities are defined using Cartesian coordinates in this frame.
Define debris motion model
helperMotionTrajectory class used in this example defines debris object trajectories using a custom motion model function.
Trajectories of space objects rotating around the Earth can be approximated with a Keplerian model, which assumes that Earth is a point-mass body and the objects orbiting around the earth have negligible masses. Higher order effects in Earth gravitational field and environmental disturbances are not accounted for. Since the equation of motion is expressed in ECEF frame which is a non-inertial reference frame, the Coriolis and centripetal forces are accounted for.
The ECEF debris object acceleration vector is
where is the standard gravitational parameter of the Earth, is the ECEF debris object position vector, is the norm of the position vector, and is the Earth rotation vector.
keplerorbit provided below uses a 4th order Runge-Kutta numerical integration of this equation to propagate the position and velocity in time.
First, we create initial positions and velocities for the space debris objects. This is done by obtaining the traditional orbital elements (semi-major axis, eccentricity, inclination, longitude of the ascending node, argument of periapsis, and true anomaly angles) of these objects from random distributions. Then convert these orbital elements to position and velocity vectors by using the supporting function
% Generate a population of debris numDebris = 100; range = 7e6 + 1e5*randn(numDebris,1); ecc = 0.015 + 0.005*randn(numDebris,1); inc = 80 + 10*rand(numDebris,1); lan = 360*rand(numDebris,1); w = 360*rand(numDebris,1); nu = 360*rand(numDebris,1); % Convert to initial position and velocity for i = 1:numDebris [r,v] = oe2rv(range(i),ecc(i),inc(i),lan(i),w(i),nu(i)); data(i).InitialPosition = r; %#ok<SAGROW> data(i).InitialVelocity = v; %#ok<SAGROW> end % Create platforms and assign them trajectories using the keplerorbit motion model for i=1:numDebris debris(i) = platform(scene); %#ok<SAGROW> debris(i).Trajectory = helperMotionTrajectory(@keplerorbit,... 'SampleRate',0.1,... % integration step 10sec 'Position',data(i).InitialPosition,... 'Velocity',data(i).InitialVelocity); %#ok<SAGROW> end
Model space surveillance radars
In this example, we define four antipodal stations with fan-shaped radar beams looking into space. The fans cut through the orbits of debris objects to maximize the number of object detections. A pair of stations are located in the Pacific ocean and in the Atlantic ocean, whereas a second pair of surveillance stations are located near the poles. Having four dispersed radars allows for the re-detection of space debris to correct their position estimates and also acquiring new debris detections.
% Create a space surveillance station in the Pacific ocean station1 = platform(scene,'Position',[10 180 0]); % Create a second surveillance station in the Atlantic ocean station2 = platform(scene,'Position',[0 -20 0]); % Near the North Pole, create a third surveillance station in Iceland station3 = platform(scene,'Position',[65 -20 0]); % Create a fourth surveillance station near the south pole station4 = platform(scene,'Position',[-90 0 0]);
Each station is equipped with a radar modeled with a
fusionRadarSensor object. In order to detect debris objects in the LEO range, the radar has the following requirements:
Detecting a 10 dBsm object up to 2000 km away
Resolving objects horizontally and vertically with a precision of 100 m at 2000 km range
Having a fan-shaped field of view of 120 degrees in azimuth and 30 degrees in elevation
Looking up into space based on its geo-location
% Create fan-shaped monostatic radars to monitor space debris objects radar1 = fusionRadarSensor(1,... 'UpdateRate',0.1,... 10 sec 'ScanMode','No scanning',... 'MountingAngles',[0 90 0],... look up 'FieldOfView',[120;30],... degrees 'ReferenceRange',2e6,... m 'RangeLimits', [0 2e6],... 'ReferenceRCS', 10,... dBsm 'HasFalseAlarms',false,... 'HasElevation',true,... 'AzimuthResolution',0.01,... degrees 'ElevationResolution',0.01,... degrees 'RangeResolution',100,... m 'HasINS',true,... 'DetectionCoordinates','Scenario'); station1.Sensors = radar1; radar2 = clone(radar1); radar2.SensorIndex = 2; station2.Sensors = radar2; radar3 = clone(radar1); radar3.SensorIndex = 3; station3.Sensors = radar3; radar4 = clone(radar1); radar4.SensorIndex = 4; station4.Sensors = radar4;
Visualize the ground truth with trackingGlobeViewer
trackingGlobeViewer to visualize all the elements defined in the tracking scenario: individual debris objects and their trajectories, radar fans, radar detections, and tracks.
f = uifigure; viewer = trackingGlobeViewer(f, 'Basemap','satellite','ShowDroppedTracks',false); % Add info box on top of the globe viewer infotext = simulationInfoText(0,0,0); infobox = uilabel(f,'Text',infotext,'FontColor',[1 1 1],'FontSize',11,... 'Position',[10 20 300 70],'Visible','on'); % Show radar beams on the globe covcon = coverageConfig(scene); plotCoverage(viewer,covcon, 'ECEF'); while advance(scene) infobox.Text = simulationInfoText(scene.SimulationTime, 0, numDebris); plotPlatform(viewer, debris, 'ECEF'); end %Take a snapshot of the scenario snapshot(viewer);
On the virtual globe, you can see the space debris represented by white dots with individual trailing trajectories shown by white lines. Most of the generated debris objects are on orbits with high inclination angles close to 80 deg.
The trajectories are plotted in ECEF coordinates, and therefore the entire trajectory rotates towards the west due to Earth rotation. After several orbit periods, all space debris pass through the surveillance beams of the radars.
Simulate synthetic detections and track space debris
The sensor models use the ground truth to generate synthetic detections. Call the
detect method on the tracking scenario to obtain all the detections in the scene.
A multi-object tracker
trackerJPDA is used to create new tracks, associate detections to existing tracks, estimate their state, and delete divergent tracks. Setting the property
HasDetectableTrackIDsInput to true allows the tracker to accept an input that indicates whether a tracked object is detectable in the surveillance region. This is important for not penalizing tracks that are propagated outside of the radar surveillance areas. The utility function
isDetectable calculates which tracks are detectable at each simulation step.
Additionally, a utility function
deleteBadTracks is used to delete divergent tracks faster.
% Define Tracker tracker = trackerJPDA('FilterInitializationFcn',@initKeplerUKF,... 'HasDetectableTrackIDsInput',true,... 'ClutterDensity',1e-20,... 'AssignmentThreshold',1e3,... 'DeletionThreshold',[7 10]); % Reset scenario, seed, and globe display restart(scene); scene.StopTime = 1800; % 30 min clear(viewer); % Reduce history depth for debris viewer.PlatformHistoryDepth = 2; % Show 10-sigma covariance ellipses for better visibility viewer.NumCovarianceSigma = 10; plotCoverage(viewer,covcon, 'ECEF'); % Initialize tracks confTracks = objectTrack.empty(0,1); while advance(scene) plotPlatform(viewer, debris); time = scene.SimulationTime; % Generate detections detections = detect(scene); plotDetection(viewer, detections, 'ECEF'); % Generate and update tracks detectableInput = isDetectable(tracker,time, covcon); if isLocked(tracker) || ~isempty(detections) [confTracks, ~, allTracks,info] = tracker(detections,time,detectableInput); confTracks = deleteBadTracks(tracker,confTracks); plotTrack(viewer, confTracks, 'ECEF'); end infobox.Text = simulationInfoText(time, numel(confTracks), numDebris); % Move camera during simulation and take snapshots switch time case 100 campos(viewer,[90 150 5e6]); camorient(viewer,[0 -65 345]); drawnow im1 = snapshot(viewer); case 270 campos(viewer,[60 -120 2.6e6]); camorient(viewer, [20 -45 20]); drawnow case 380 campos(viewer,[60 -120 2.6e6]); camorient(viewer, [20 -45 20]); drawnow im2 = snapshot(viewer); case 400 % reset campos(viewer,[17.3 -67.2 2.400e7]); camorient(viewer, [360 -90 0]); drawnow case 1500 campos(viewer,[54 2.3 6.09e6]); camorient(viewer, [0 -73 348]); drawnow case 1560 im3 = snapshot(viewer); drawnow end end % Restore random seed rng(s);
On the first snapshot, you can see an object being tracked as track T1 in yellow. This object was only detected twice, which was not enough to reduce the uncertainty of the track. Therefore, the size of its covariance ellipse is relatively large. You can also observe another track T2 in blue, which is detected by the sensor several times. As a result, its corresponding covariance ellipse is much smaller since more detections were used to correct the state estimate.
A few minutes later, as seen on the snapshot above, T1 was deleted because the uncertainty of the track has grown too large without detections. On the other hand, the second track T2 survived due to the additional detections.
In the screenshot above, you can see that track T15 (in light blue) is about to enter the radar surveillance area. Track T11 (in orange) was just updated with a detection, which reduced the uncertainty of its estimated position and velocity. With radar station configuration, after 30 minutes of surveillance, 18 tracks were initialized and confirmed out of the 100 debris objects. If you increase the simulation time, the radars will cover 360 degrees in space and eventually more debris can be tracked. Different radar station locations and configurations could be explored to increase the number of tracked objects.
In this example you have learned how to specify your own motion model to move platforms in a tracking scenario and how to use them to setup a tracker. This enables you to apply sensor fusion and tracking techniques offered in this toolbox to a wider range of applications, such as the problem of modelling and tracking space debris in an Earth-Centered-Earth-Fixed coordinate frame as shown in this example.
The motion model used in this example is presented below. The state is the ECEF positions and velocities of the object
[x; vx; y; vy; z; vz].
function state = keplerorbit(state,dt) % keplerorbit performs numerical integration to predict the state of % keplerian bodies. The state is [x;vx;y;vy;z;vz] % Runge-Kutta 4 integration method: k1 = kepler(state); k2 = kepler(state + dt*k1/2); k3 = kepler(state + dt*k2/2); k4 = kepler(state + dt*k3); state = state + dt*(k1+2*k2+2*k3+k4)/6; function dstate=kepler(state) x =state(1,:); vx = state(2,:); y=state(3,:); vy = state(4,:); z=state(5,:); vz = state(6,:); mu = 398600.4405*1e9; % m^3 s^-2 omega = 7.292115e-5; % rad/s r = norm([x y z]); g = mu/r^2; % Coordinates are in a non-intertial frame, account for Coriolis % and centripetal acceleration ax = -g*x/r + 2*omega*vy + omega^2*x; ay = -g*y/r - 2*omega*vx + omega^2*y; az = -g*z/r; dstate = [vx;ax;vy;ay;vz;az]; end end
initKeplerUKF initializes a tracking filter with your own motion model. In this example, we use the same motion model that establishes ground truth,
function filter = initKeplerUKF(detection) % assumes radar returns [x y z] measmodel= @(x,varargin) x([1 3 5],:); detNoise = detection.MeasurementNoise; sigpos = 0.4;% m sigvel = 0.4;% m/s^2 meas = detection.Measurement; initState = [meas(1); 0; meas(2); 0; meas(3);0]; filter = trackingUKF(@keplerorbit,measmodel,initState,... 'StateCovariance', diag(repmat([10, 10000].^2,1,3)),... 'ProcessNoise',diag(repmat([sigpos, sigvel].^2,1,3)),... 'MeasurementNoise',detNoise); end
oe2rv converts a set of 6 traditional orbital elements to position and velocity vectors.
function [r,v] = oe2rv(a,e,i,lan,w,nu) % Reference: Bate, Mueller & White, Fundamentals of Astrodynamics Sec 2.5 mu = 398600.4405*1e9; % m^3 s^-2 % Express r and v in perifocal system cnu = cosd(nu); snu = sind(nu); p = a*(1 - e^2); r = p/(1 + e*cnu); r_peri = [r*cnu ; r*snu ; 0]; v_peri = sqrt(mu/p)*[-snu ; e + cnu ; 0]; % Tranform into Geocentric Equatorial frame clan = cosd(lan); slan = sind(lan); cw = cosd(w); sw = sind(w); ci = cosd(i); si = sind(i); R = [ clan*cw-slan*sw*ci , -clan*sw-slan*cw*ci , slan*si; ... slan*cw+clan*sw*ci , -slan*sw+clan*cw*ci , -clan*si; ... sw*si , cw*si , ci]; r = R*r_peri; v = R*v_peri; end
isDetectable is used in the example to determine which tracks are detectable at a given time.
function detectInput = isDetectable(tracker,time,covcon) if ~isLocked(tracker) detectInput = zeros(0,1,'uint32'); return end tracks = tracker.predictTracksToTime('all',time); if isempty(tracks) detectInput = zeros(0,1,'uint32'); else alltrackid = [tracks.TrackID]; isDetectable = zeros(numel(tracks),numel(covcon),'logical'); for i = 1:numel(tracks) track = tracks(i); pos_scene = track.State([1 3 5]); for j=1:numel(covcon) config = covcon(j); % rotate position to sensor frame: d_scene = pos_scene(:) - config.Position(:); scene2sens = rotmat(config.Orientation,'frame'); d_sens = scene2sens*d_scene(:); [az,el] = cart2sph(d_sens(1),d_sens(2),d_sens(3)); if abs(rad2deg(az)) <= config.FieldOfView(1)/2 && abs(rad2deg(el)) < config.FieldOfView(2)/2 isDetectable(i,j) = true; else isDetectable(i,j) = false; end end end detectInput = alltrackid(any(isDetectable,2))'; end end
deleteBadTracks is used to remove tracks that obviously diverged. Specifically, diverged tracks in this example are tracks whose current position has fallen on the surface of the earth and tracks whose covariance has become too large.
function tracks = deleteBadTracks(tracker,tracks) % remove divergent tracks: % - tracks with covariance > 4*1e8 (20 km standard deviation) % - tracks with estimated position outside of LEO bounds n = numel(tracks); toDelete = zeros(1,n,'logical'); for i=1:numel(tracks) [pos, cov] = getTrackPositions(tracks(i),[ 1 0 0 0 0 0 ; 0 0 1 0 0 0; 0 0 0 0 1 0]); if norm(pos) < 6500*1e3 || norm(pos) > 8500*1e3 || max(cov,,'all') > 4*1e8 deleteTrack(tracker,tracks(i).TrackID); toDelete(i) =true; end end tracks(toDelete) = ; end
simulationInfoText is used to display the simulation time, the number of debris, and the current number of tracks in the scenario.
function text = simulationInfoText(time,numTracks, numDebris) text = vertcat(string(['Elapsed simulation time: ' num2str(round(time/60)) ' (min)']),... string(['Current number of tracks: ' num2str(numTracks)]),... string(['Total number of debris: ' num2str(numDebris)])); drawnow limitrate end | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on a technical explanation of a space debris tracking scenario using a Keplerian motion model. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a technical description of a space surveillance system and does not contain any unsafe or inappropriate content. It is suitable for educational and professional environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text sample is a MATLAB script that describes a tracking scenario for space debris using a Kalman filter. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a series of code snippets related to the Runge-Kutta 4 integration method, Kepler's laws, and orbital mechanics. There is no unsafe, inappropriate, or harmful content in the text.",
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a set of MATLAB functions related to tracking and simulation. It does not contain any unsafe, inappropriate, or harmful content. The functions are focused on technical aspects such as tracking, deleting bad tracks, and displaying simulation information. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "178-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
},
{
"custom_id": "178-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "178-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "178-3",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "178-4",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://ww2.mathworks.cn/help/fusion/ug/track-space-debris-using-keplerian-motion-model.html",
"date": "2023-05-29T02:41:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00663.warc.gz",
"language": "en",
"language_score": 0.7314371467,
"token_count": 4486,
"score": 2.796875,
"int_score": 3
} |
<urn:uuid:664b9aff-157c-4c98-a89e-8dcff1d668ba> | 10:30 am - 12:30 pm
The Gruffalo is probably the best known fiction book in schools today. However, the Wilderness Wood version draws heavily on the actual creatures to be found in any woodland – mice, fox, owl, snake, snail, squirrel.
The children will follow a trail, discovering Gruffalo riddles. They have to solve the riddles and carry out the activity associated with it. This might involve discovering some real animal artefacts such as nuts or snail shells; making something – such as a mouse den; or remembering the next part of the Gruffalo story.
Time permitting we will have a go at creating our own Gruffalo story rope and try retelling the story to each other – using items found in the woods around us.
David always introduces lots of singing, accompanied by his guitar, as well as other stories and activities to ensure all have a great time.
Age; Children from 4 – 6/7 and their parents. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"suitable for all audiences\", \"score\": 0}\n```\n\n**Explanation:**\n- **Content:** The text describes an educational and engaging activity for children and their parents.\n- **Language:** The language used is respectful and appropriate.\n- **Themes:** The themes are educational and involve storytelling and nature exploration.\n- **Suitability:** The activity is suitable for all audiences, including young children and their parents.\n\nThe text does not contain any unsafe or inappropriate content, making it fully appropriate for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "179-0",
"llm_safety_score": 0,
"reason": "suitable for all audiences"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "http://littleforestschool.com/events/gruffalo-trail-new/",
"date": "2023-05-30T10:21:43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00663.warc.gz",
"language": "en",
"language_score": 0.9661685228,
"token_count": 202,
"score": 3.25,
"int_score": 3
} |
<urn:uuid:d1a4dc34-f1f6-4d31-b508-6f6af60a67ec> | As a civil rights lawyer in the 1960s, I saw courageous college students organizing Freedom Schools in Mississippi to prepare desperately poor, semi-literate, and disenfranchised Black people for active citizenship and to fight for the right to vote. I didn’t know at the time that we’d need Freedom Schools 40 years later. The Freedom Schools formed during the Mississippi Freedom Summer of 1964 were well named. Since the time of slavery, Black people in the South were deliberately undereducated so that they would remain servile and bend to the scourges of White supremacy and racial segregation. Freedom Schools then were designed to free impoverished Black people from the shackles of ignorance, make them informed voters and empower them economically.
Although the Jim Crow laws of racial discrimination were struck down decades ago, the original vision of Freedom Schools has inspired the creation of the new CDF Freedom SchoolsSM program dedicated to engaging adults in our communities and enlisting a second generation of young people in the mission of empowering children. A number of the problems the Freedom Schools of the 1960s were established to address still plague poor children of all racial backgrounds. Too many of them are victims of poor education, low expectations and dumbed-down television leaving them to grow up unempowered with few skills and limited prospects.
Education is the precondition for a child to thrive. Yet, only 13 percent of Black fourth graders can read at grade level. That kind of man-made disaster is what CDF Freedom Schools have been created to prevent and eliminate. We believe a child who can read is a more confident and empowered child. Children who can’t read are sentenced to a social and economic death. With the help of a group of nationally recognized reading specialists, backed by an intensive training course for college servant leaders at CDF Haley Farm, the Children’s Defense Fund has devoted years toward developing CDF Freedom Schools around a strong and effective integrated reading curriculum. The CDF Freedom SchoolsSM program was established in 1995 to provide safe, nurturing, literature-rich summer and after school environments where children can learn, bloom and serve. Each summer session lasts from five to eight weeks.
The CDF Freedom SchoolsSM program exemplifies CDF’s commitment to Leave No Child Behind. Each Freedom School site is focused on helping children from ages five to fifteen regardless of their family circumstances or the quality of the education they are receiving in school. Children come to us who are struggling with hunger, depression, anger issues, low self-esteem and Attention Deficit Hyperactivity Disorder. Some come from families where they experience physical and emotional abuse and homelessness.
CDF Freedom Schools set high expectations for all children and provide an academically and culturally enriching experience even for children whose lives have been compromised by poverty or disrupted by natural disasters like Hurricane Katrina. Children are provided a consistent, predictable daily schedule including a nutritious breakfast and lunch. Each program day begins with a self- and community-affirming celebration where young scholars are told, often for the first time, that they “can and must make a difference.” Nonsense like “zero tolerance” discipline rules are thrown in the trash can where they belong.
Each site is staffed by a caring group of young adults focused on meeting the needs of children. The college students who become servant leaders and mentor these children are changed for life. A young adult who brings the excitement of books to young minds receives a powerful gift. When people ask me, “What are our young people up to?” My answer is, “Go to your nearest CDF Freedom School and find out.”
The Kansas City CDF Freedom SchoolsSM Initiative, a consortium of 15 faith-based sponsor partners, served 1,600 scholars last year. Studies over the last two years show that children from the poorest middle schools show dramatic gains in reading. Parents reported that their children had a greater love of learning, cultural appreciation, better conflict resolution skills and more involvement in the community after participating in the program. Another dividend of the program is that parents pay more attention to their children’s health and nutrition.
CDF Freedom Schools are conducted through partnerships with churches, schools, colleges and universities and community organizations. In 2007, there will be 131 Freedom School sites in 58 cities in 26 states and the District of Columbia. About 8,500 children will be served by nearly 1,000 teacher-mentor college students. Last year, we opened 19 Freedom School sites in Louisiana and Mississippi to address the continuing needs of children along the Gulf Coast in the aftermath of Hurricane Katrina.
We prove every day that children can learn! I hope that every congregation and community group will sponsor a summer or year-round program. Our ultimate goal is to cover the map with Freedom Schools.
For more information, please go to http://www.freedomschools.org/ or http://staging.childrensdefense.org/. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and community empowerment\", \"score\": 0}\n```\n\nThe text discusses the historical and contemporary importance of Freedom Schools in promoting education and empowerment among children, particularly those from disadvantaged backgrounds. It does not contain any unsafe or inappropriate content and is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "180-0",
"llm_safety_score": 0,
"reason": "educational and community empowerment"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://staging.childrensdefense.org/child-watch-columns/health/2007/the-enduring-mission-of-freedom-schools/",
"date": "2023-05-30T11:24:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00663.warc.gz",
"language": "en",
"language_score": 0.9606430531,
"token_count": 1007,
"score": 2.921875,
"int_score": 3
} |
<urn:uuid:99115290-afc8-40db-a7ea-44e089dda56b> | - Research article
- Open Access
Phylogenetic analysis of the tenascin gene family: evidence of origin early in the chordate lineage
BMC Evolutionary Biology volume 6, Article number: 60 (2006)
Tenascins are a family of glycoproteins found primarily in the extracellular matrix of embryos where they help to regulate cell proliferation, adhesion and migration. In order to learn more about their origins and relationships to each other, as well as to clarify the nomenclature used to describe them, the tenascin genes of the urochordate Ciona intestinalis, the pufferfish Tetraodon nigroviridis and Takifugu rubripes and the frog Xenopus tropicalis were identified and their gene organization and predicted protein products compared with the previously characterized tenascins of amniotes.
A single tenascin gene was identified in the genome of C. intestinalis that encodes a polypeptide with domain features common to all vertebrate tenascins. Both pufferfish genomes encode five tenascin genes: two tenascin-C paralogs, a tenascin-R with domain organization identical to mammalian and avian tenascin-R, a small tenascin-X with previously undescribed GK repeats, and a tenascin-W. Four tenascin genes corresponding to tenascin-C, tenascin-R, tenascin-X and tenascin-W were also identified in the X. tropicalis genome. Multiple sequence alignment reveals that differences in the size of tenascin-W from various vertebrate classes can be explained by duplications of specific fibronectin type III domains. The duplicated domains are encoded on single exons and contain putative integrin-binding motifs. A phylogenetic tree based on the predicted amino acid sequences of the fibrinogen-related domains demonstrates that tenascin-C and tenascin-R are the most closely related vertebrate tenascins, with the most conserved repeat and domain organization. Taking all lines of evidence together, the data show that the tenascins referred to as tenascin-Y and tenascin-N are actually members of the tenascin-X and tenascin-W gene families, respectively.
The presence of a tenascin gene in urochordates but not other invertebrate phyla suggests that tenascins may be specific to chordates. Later genomic duplication events led to the appearance of four family members in vertebrates: tenascin-C, tenascin-R, tenascin-W and tenascin-X.
Tenascins are a family of extracellular matrix glycoproteins charcterized by an N-terminal globular domain and heptad repeats, which facilitate multimerization; one or more tenascin-type epidermal growth factor (EGF)-like repeats (consensus sequence X4CX3CX5CX4CXCX8C); a series of fibronectin (FN) type III domains, and a C-terminal fibrinogen-related domain (FReD). Diversity within the family exists at many levels. Each species of vertebrate examined to date has more than one tenascin gene, and the gene products themselves are frequently alternatively spliced (e.g., see [1, 2]). In addition, electron microscopy reveals purified tenascins with 6 arms (hexabrachions) as well as trimers, dimers and monomers [3, 4]. Tenascins are particularly abundant in the embryonic extracellular matrix, but some reappear in the adult during regeneration, inflammatory disease, tumorigenesis and wound healing [2, 5, 6]. Tenascins act through interactions with cell surface receptors (reviewed by ; see also ) as well as by binding to and blocking sites on other extracellular matrix molecules (e.g., see ).
There are 6 names for tenascin gene products found in the current literature (Figure 1). Tenascin-C, the first tenascin to be cloned and sequenced [9–11], has 13.5 (chicken) or 14.5 (mammals) EGF-like repeats and up to 15 FN type III domains. The prominent expression of tenascin-C in tendons and embryonic extracellular matrix was used to create the name for the gene family, which comes from tenere (to hold) and nasci (to be born; see ). Tenascin-R was the second member of the tenascin family to be identified . In birds and mammals, tenascin-R genes encode 4.5 EGF-like repeats and 9 FN type III domains. Tenascin-X is the name given to a large mammalian tenascin first identified as "gene X" in the major histocompatibility complex (MHC) class III gene region in both mouse and human [14, 15]. This tenascin has 18.5 EGF-like repeats, and the tenascin-X genes of mouse and human encode 29 and 32 FN type III domains, respectively. The series of FN type III domains are interrupted in both mouse and human tenascin-X by a proline-rich stretch of about 100 amino acids. Tenascin-Y is an avian tenascin described as being most similar to mammalian tenascin-X (the name "Y" comes from being "almost X"). The justification for a different name was because the similarity between the FReD of tenascin-Y and human tenascin-X was considerably lower than that between species orthologs of tenascin-C or tenascin-R. As in tenascin-X, the FN type III domains of tenascin-Y are interrupted by a region containing numerous serine-proline motifs. A fifth tenascin was eponymously named tenascin-W by Weber et al. . Tenascin-W from both zebrafish and mouse has 3.5 EGF-like repeats, but a Danio rerio tenascin-W cDNA encodes five FN type III domains, whereas a murine cDNA encodes 9. The most recent tenascin to be described is tenascin-N , which like tenascin-W was named for its discoverer. Only characterized in the mouse, tenascin-N is identical to murine tenascin-W except for three additional FN type III domains (i.e., a total of 12 domains).
No tenascins have been identified in the Caenorhabditis elegans genome or in arthropod genomes, and the only complete cDNA sequences from poikilotherms come from D. rerio [17, 20, 21]. This has limited the phylogenetic analysis of the origins of tenascins, the identification of evolutionarily conserved regions, domains and potential receptor recognition motifs, as well as the ability to clarify the relationships between the different members of the tenascin gene family. Recently the genomes of a variety of organisms have been completely, or nearly completely, sequenced, facilitating the identification of tenascin genes in fish, amphibians, and invertebrate chordates. Using searches based on conservation of amino acid sequences and domain architecture, we have identified in silico the putative tenascin gene products of the freshwater green pufferfish, Tetraodon nigroviridis, the Japanese tiger pufferfish, Takifugu rubripes, the pipid frog, Xenopus tropicalis, and the ascidian, Ciona intestinalis. These studies show that the basic domain architecture of tenascins is highly conserved between an invertebrate chordate and vertebrates and that there are only four members of the tenascin family in vertebrates: tenascin-C, tenascin-R, tenascin-W and tenascin-X.
Ciona intestinalis tenascin
Analysis of the genomic sequence of the urochordate C. intestinalis using the BLAT and SNAP (UCSC Genome Bioinformatics ) programs reveals a single tenascin-like gene product. It was necessary to modify this predicted protein by visual inspection of the genomic sequence to remove some parts of predicted exons that did not show any homology to the known tenascins and by the identification of open reading frames complementing missing parts of three of the fibronectin type III repeats. The sequence of the N-terminus was confirmed by predicting a potential signal peptide upstream of the EGF repeats followed by RT-PCR using primers homologous to the region harboring the methionine N-terminal to the predicted signal peptide and a primer from the previously predicted region. The coding part of this tenascin gene lies between position 1585–21365 of scaffold 366 that is located on chromosome 9 (Laboratory for Developmental Biology and Genome Biology ; see ). The domain organization predicted by SMART reveals an N-terminal signal sequence (aa 13–32), 4 and 1/2 heptad repeats (aa 136–168; confirmed by Paircoil [see Methods]), 8 tenascin-type EGF-like repeats (aa 208–458), 18 FN type III domains (aa 469–2119) and a FReD (2128–2355). The C-terminal portion of the predicted protein is confirmed by an EST [GenBank EST:BW395090.1] that includes the FReD, as well as by the 9 ESTs in Gene Cluster 02393 of the cDNA resources of the Ghost Database . In addition, a highly-related gene product is encoded on C. savigyni contig 41574 [GenBank CoreNucleotide:AACT01041574]. The corrected C. intestinalis protein sequence has 2355 aa (Figure 2A), a predicted pI of 7.63 and a molecular mass of 262 kDa. A stick diagram of this tenascin, the first reported from an invertebrate, is shown in Figure 2B. Note that the third FN type III domain of C. intestinalis tenascin contains the tripeptide motif RGE in a region that is likely to be exposed to receptor binding and that corresponds to the position of the integrin-binding RGD motifs of tenascin-C in many vertebrates (e.g., see Figure 3A). As others have shown that the RGE motif can have similar properties to the RGD motif , this may represent an integrin-binding region in tenascin from C. intestinalis.
To analyze the expression pattern of this novel tenascin we raised an antiserum against the second FN type III domain expressed in E. coli (see Methods). In whole mounts this antiserum recognized the thin tunic that envelopes the larva, the extracellular matrix at the base of the tail, and periodically arrayed structures found on either side of the nerve cord that may correspond to the dorsal portions of the primary muscles of the tail (Figure 2C). This latter staining pattern is reminiscent of the immunostaining of the sclerotome in chick and mouse embryos with antibodies against tenascin-C . The tunics of the larvae incubated with preimmune serum were often labelled, but the matrix at the base of the tail and associated with the tail musculature was not (Figure 2D).
The genome sequencing of another urochordate, Oikopleura dioica, has been completed (Trace Archive Database Mega BLAST ). Using the Hidden Markov Model on the alignments of all O. dioica FReDs we could identify a putative tenascin gene in this distinct urochordate as well. Unfortunately, we were not able to identify the entire O. dioica tenascin gene because the genome scaffolds have not been assembled yet (data not shown).
Tetraodon and Takifugu each have five tenascins
Using a BLASTP search of predicted proteins from all translated sequences with the chicken tenascin-C FReD (selected because it generated fewer non-tenascin hits than searches with other repeats or domains), four potential tenascin-like sequences were identified in the freshwater pufferfish Tetraodon nigroviridis (see Table 1 for NCBI Protein Database accession numbers [see Additional file: 1]). These translated sequences were then entered into the BLAT field of the T. nigroviridis Gene Browser at Genoscope, which returned four predicted tenascin-like proteins: 1) Genoscope identifier GSTENT00020055001, chrUn_random:20095278..20099581; 2) Genoscope identifier GSTENT00025206001, chrUn_random:1836985..1839543; 3) Genoscope identifiers GSTENT00028393001, chr15:5874301..5884063 and GSTENP00028394001, chr15:5848022..5850949; and 4) Genoscope identifier GSTENT00028391001; chr15:5898778..5899089. A fifth potential tenascin was identified using a BLAT search of the T. nigroviridis genome using the FReD of a tenascin identified by others in the Japanese pufferfish Takifugu rubripes (Genoscope identifier GSTENT00034161001, chr8:6275880..6277019). The Tetraodon nigroviridis tenascin sequences were then used to search the genome of the Japanese pufferfish Takifugu rubripes at the Fugu Genome Browser Gateway at UCSC Genome Bioinformatics and the NCBI Fugu Genome Project. These searches also revealed five putative tenascin genes: 1) Genescan predicted gene scaffold_2387.1 and SINFRUT00000156379; 2) Genescan predicted gene scaffold_148.12 and SINFRUT00000139096; 3) Genescan predicted gene scaffold_392.8 and SINFRUP00000066378; 4) Genescan predicted gene scaffold_392.6 and SINFRUP00000069989 and 5) Genescan predicted gene scaffold_795.4 and SINFRUP00000072635 [see Additional file: 2].
Pufferfish have two tenascin-Cs
Two of the predicted tenascin sequences found in the Tetraodon nigroviridis genome showed the most similarity to zebrafish, chicken, and the numerous mammalian tenascin-Cs following BLASTP analyses of their FReDs and first and last FN type III domains. Both of these tenascins were predicted by SMART and visual inspection to include an N-terminal linker, a series of heptad repeats, 12.5 EGF-like repeats and a C-terminal FReD. One of the two sequences contains 12 FN type III domains (GSTENT00025206001) and the other contains 10 FN type III domains (GSTENT00020055001; Figure 3A; note that it was necessary for us to complete several predicted partial FN type III domains by identifying missing exons by translating nearby open reading frames in the genomic sequence). The amino acid sequences of the FReDs of the two tenascins share 80% identity and 94% similarity (Figure 3B). Bayesian inference of the phylogenetic trees predicts that these proteins are more closely related to each other than to any other vertebrate tenascin. Because of their sequence similarity to each other and to other tenascin-Cs, overall domain organization, and predicted evolutionary proximity, we will refer to these paralogs as tenascin-Ca (modified from GSTENT00020055001) and tenascin-Cb (modified from GSTENT00025206001). Like tenascin-C in Gallus gallus and man, tenascin-Cb contains an RGD integrin-binding motif in its third FN type III domain in a region predicted to be exposed to receptor binding. In tenascin-Ca this region contains the potentially reactive motif KGD. Similarly duplicated tenascin-C genes were identified in the Takifugu rubripes genome (Figure 3A). SMART reveals that one predicted protein (scaffold_2387.1 and SINFRUT00000156379) has heptad repeats, 12.5 tenascin-type EGF-like repeats, 10 FN type III domains and a C-terminal FReD. It was also necessary to modify this predicted protein by identifying open reading frames in the genomic sequence that corresponded to missing exons that completed several FN type III domains. The domain organization of the corrected tenascin is identical to that of Tetraodon nigroviridis tenascin-Ca. The FReDs of the two pufferfish tenascin-Cas are 95% identical and 99% similar. The second Takifugu rubripes tenascin-C (scaffold_148.12 and SINFRUT00000139096) is predicted by SMART and direct examination to have heptad repeats, 13.5 EGF-like repeats, 15 FN type III domains and a C-terminal FReD. Like Tetraodon nigroviridis tenascin-Cb, it has an RGD motif in the third FN type III domain (Figure 3A). The amino acid sequences of the tenascin-Cb FReDs from the two species of pufferfish are 92% identical and 98% similar.
Tenascin-R in Tetraodon and Takifugu
There are two predicted protein sequences lying side-by-side on chromosome 15 of T. nigroviridis that, when considered as a single gene product, contain an N-terminal linker, heptad repeats, 3.5 EGF-like repeats, 7 FN type III domains and a C-terminal FReD (GSTENT00028393001 and GSTENP00028394001). Phylogenetic analysis of the FReD and terminal FN type III domain show this potential tenascin to be most similar to amniote and zebrafish tenascin-R. Like tenascin-R in D. rerio it is adjacent to, and in the opposite orientation from, a tenascin-W gene (see below). The T. nigroviridis tenascin-R sequence, however, is not complete; the genomic sequence found between the regions encoding the EGF-like repeats and FN type III domains contains approximately 500 undetermined nucleotides. In contrast, the Takifugu rubripes tenascin-R (SINFRUP00000066378), found by BLASTP of the NCBI Protein Database, is missing only the signal sequence at the N-terminus. The remaining predicted protein includes heptad repeats, 4.5 EGF-like repeats, 9 FN type III domains and a C-terminal FReD. Alignment of the two pufferfish tenascin-R sequences confirms that the fourth EGF-like repeat and first two FN type III domains of Tetraodon nigroviridis are missing from the predicted protein. The domain architecture of Takifugu rubripes tenascin-R is identical to that found in the predicted tenascin-R proteins encoded in genomes of D. rerio, G. gallus, mouse and man (e.g., see Figure 1). Pufferfish tenascin-R does not contain an RGD motif, but the third FN type III domains contain an IDG motif, which is a potential recognition site for the alpha4/alpha9 family of integrins . This motif is also found in the same location on D. rerio, G. gallus, M. musculus and human tenascin-R.
Unique repeats in pufferfish tenascin-X
In addition to the BLASTP searches with the chicken FReD sequence (see above), a BLAT search of the T. nigroviridis genome was carried out using the FReD sequence of a partial putative tenascin-X identified by others in Takifugu rubripes [NCBI Protein:CAD45004]. This revealed a novel tenascin with numerous features not yet described in the gene family (GSTENT00034161001). Note that it was necessary to identify an exon in the genomic sequence to derive the final amino acid sequence illustrated in Figure 4A. The putative Tetraodon nigroviridis tenascin-X is much smaller than mammalian tenascin-X: it encodes at most 1108 amino acids and is predicted to have a molecular mass of 122 kDa. The COILS program (see Methods) predicts that it has heptad repeats near the N-terminus (underlined in Figure 4A), and SMART reveals a single tenascin-type EGF-like sequence that, as in tenascin-Y, is followed by what may be considered a partial EGF-like repeat. Separating the EGF-like repeat from one partial and three complete FN type III domains is a stretch of 485 amino acids, many of which are charged or polar. The first 48 amino acids in this region contains numerous charged residues, but a BLASTP search fails to reveal any similarities between this region and any other sequence. The next 136 residues make up 8 complete and one partial copies of a previously undescribed simple tandem repeat of 16 amino acids (GKEQKKATEGENTLSP) that mostly contains polar or charged residues. BLASTP searches with these repeats fail to reveal significant homologies with proteins from vertebrates, but the region is 43% similar to a collagen-binding, surface protein from Bacillus cereus [NCBI Protein:YP_082380]. The final 301 residues of this region are also highly charged and, when examined by BLASTP on their own, fail to show homologies with other known proteins. However, when the entire predicted open reading frame of T. nigroviridis tenascin-X is used in a BLASTP run, the 16-residue repeats and the adjacent 301-residue region are recognized as a DUF612 domain (Pfam 04747; Figure 4B). The function of the DUF612 domain is unknown, but it is found in C. elegans UNC-89, a large multidomain protein required for myofibril assembly .
The unusual repeat and domain structure of T. nigroviridis tenascin-X is also seen in Takifugu rubripes tenascin-X. This was determined by a BLAT search of the T. rubripes genome with the FReD of Tetraodon nigroviridis tenascin-X. This search revealed a very large predicted protein (GENSCAN00000009040), which, upon further examination, was found to be composed of three closely clustered but distinctive gene products. The middle gene encodes a predicted tenascin with one EGF-like repeat, 19 charged repeats similar to those found in T. nigroviridis tenascin-X interrupted by two partial charged repeats, a charged domain that is 69% identical to amino acids 271–572 in T. nigroviridis tenascin-X, one partial and three complete FN type III domains, and a C-terminal FReD.
Phylogenetic analysis shows that the FReDs from the putative pufferfish tenascin-Xs are most similar to the FReDs of chicken tenascin-Y and mammalian tenascin-X (see below). However, the most striking evidence that the unusual tenascin-X of T. nigroviridis is indeed a member of this particular tenascin subfamily is its genomic location: it is found on chromosome 8 flanked by the genes encoding cytochrome p450 21-hydroxylase and C4 complement (Figure 4C). In mammals, the tenascin-X gene overlaps with the cytochrome p450 21-hydroxylase gene, which is encoded on the opposite strand of DNA, and lies adjacent to one of two C4 complement genes (e.g., see ). The retinoid X receptor beta gene, which lies next to the C4 gene in T. nigroviridis, is also an MHC complex gene in mammals found approximately 1 Mb from the human tenascin-X gene on chromosome 6. Thus, both by sequence homology and by synteny, the small gene encoding a single tenascin-type EGF-like sequence and only three complete FN type III domains corresponds to the T. nigroviridis ortholog of mammalian tenascin-X.
Tenascin-W: diversity through domain duplication
A putative gene product with a repeat and domain structure similar to zebrafish tenascin-W was identified in T. nigroviridis (GSTENT00028391001). This tenascin gene encodes an N-terminal linker, heptad repeats, 3.5 EGF-like repeats, four FN type III domains, and a C-terminal FReD. BLASTP of the first FN type III domain, the fourth FN type III domain, and the FReD all reveal that this putative gene product is most similar to tenascin-W from zebrafish and mouse. A similar tenascin-W was found in the genome of Takifugu rubripes (SINFRUP00000069989), but this tenascin-W has five FN type III domains instead of four. There is an RGD motif in the fifth FN type III domain of T. rubripes tenascin-W, but this motif is not found in tenascin-W from Tetraodon nigroviridis.
The predicted tenascin-W orthologs from T. nigroviridis, Takifugu rubripes, D. rerio, G. gallus, M. musculus and human all have an N-terminal linker, heptad repeats, 3.5 EGF-like repeats and a C-terminal FReD. They differ, however, in the numbers of FN type III domains encoded in their respective tenascin-W genes. The smallest number of domains is seen in Tetraodon nigroviridis (with four) and Takifugu rubripes (with five); D. rerio and chicken have 6, mouse has 12, and man has 9 FN type III domains (Figure 5). Despite the differences in numbers of FN type III domains, each of the tenascin-W genes listed above is found in each genome immediately adjacent to the tenascin-R gene and encoded in the opposite orientation. For example, in Tetraodon nigroviridis the two tenascin genes are separated by only 10 kb on chromosome 15, and in mouse the two tenascin genes are only 15 kb away from each other on chromosome 1. In D. rerio, the two genes are encoded on chromosome 2 (Wellcome Trust Sanger Institute, zebrafish genome assembly Zv5). Moreover, the different tenascin-W genes share nearly identical intron/exon organization in each species examined (Figure 5). In D. rerio, G. gallus, M. musculus and man the first tenascin-W FN type III domain is encoded on a single exon, the second FN type III domain is encoded on two exons, and the final FN type III domain, adjacent to the FReD, is encoded on two exons. The intron/exon junction sites are the same in each of these species. As in other tenascins, the heptad linkers and EGF-like repeats are encoded on a single exon, and the FReD is encoded by five exons. In the pufferfish, tenascin-W is identically encoded except for the first FN type III domain, which is formed from two exons (Figure 5). The variation in the numbers of FN type III domains between the various tenascin-W predicted proteins seems to be the result of repeated duplications of the third FN type III domain. There is only one of these domains in T. nigroviridis, and it is encoded by a single exon. In Takifugu rubripes, Sequence Alignment and Tree Construction using Hidden Markov mOdels (SATCHMO) analysis reveals that the third FN type III domain has recently duplicated, resulting in a total of five FN type III domains. In D. rerio and G. gallus this domain has duplicated twice, resulting in the 6 total FN type III domains. Evidence of this duplication is provided by the very high sequence similarities between these particular domains, as well as from construction of a phylogenetic tree based on their sequences (Figure 6). This tree also reveals that the duplications most likely took place after the evolutionary separation of the species examined, since the descendents of the third FN type III domain are typically most similar within a species than between species. Note that the D. rerio tenascin-W cDNA sequence reported by Weber et al. only contained five FN type III repeats. The extra repeat shown here (which corresponds to repeat 3C in Figures 5 and 6) was found in the genomic sequence where, like all of the duplicated repeats, it is predicted to be encoded from its own exon. The presence of this novel FN type III domain in tenascin-W transcripts was confirmed by RT-PCR using mRNA from an adult zebrafish as a source of cDNA template and primers corresponding to the end of the fourth FN type III domain and the beginning of the sixth FN type III domain (see Methods for details). In the mouse, the 12 FN type III domains are the result of an eight-fold replication of the third domain, and in man the third FN type III domain is replicated five times. Sequence similarities and phylogenetic analysis also reveal the possible order in which these duplications occurred (Figure 6). As one might expect, the species with the most third FN type III domains, the mouse, has some repeats that are very similar to each other: domains 3D and 3F have identical amino acid sequences, as previously noted by Neidhardt et al. .
Xenopus tropicalis tenascins
Four tenascin genes were identified in the genome of the amphibian Xenopus tropicalis by BLAT searches of the X. tropicalis Genome Browser Gateway (UCSC Genome Bioinformatics ) and by BLASTP searches of the NCBI Frog Sequence Database (National Center for Biotechnology Information ) with the FReD sequences from chicken and pufferfish tenascins (Figure 7 [see Additional file: 3]). The tenascin-C predicted from the X. tropicalis genome (68086_prot), identified by the similarity of its FReD sequence with that of fish and amniote tenascin-Cs, has heptad repeats near its N-terminus, 14.5 EGF-like repeats, and 8 FN type III domains. It does not have an RGD or RGD-like motif in its FN type III domains. Only a partial X. tropicalis tenascin-R sequence is found in the database; it encodes a single FN type III domain and a FReD (JGI Filtered Gene 30381) at the terminus of scaffold 197. However, a complete tenascin-X was found by combining two predicted proteins (50684_prot and 63933_prot). When combined the single predicted protein contains heptad repeats, 14 complete and two partial EGF-like repeats, 10 FN type III domains and a C-terminal FReD. Between the second and third FN type III domains is a 649-amino acid region that is not recognized as a known domain by SMART. Near the center of this region is a 37-amino acid stretch that shares 70% identity and 89% similarity to part of the serine-proline-rich domain of tenascin-Y and 59% identity and 72% similarity to part of the proline-rich domain of human tenascin-X. The entire region is 38% similar to a portion of UNC-89, but the SMART program does not predict the presence of a DUF619 domain. The fourth tenascin found in the X. tropicalis genome is tenascin-W. It was identified by combining two predicted proteins (30377_prot and scaffold_197.67) using the C-terminal sequence of the former, since this was the most similar to tenascin FReDs following alignment. Thus assembled, the X. tropicalis tenascin-W gene encodes a signal sequence, heptad repeats, 9.5 EGF-like repeats, five FN type III domains and a C-terminal FReD. The fourth FN type III domain contains a potentially active RGD motif and the fifth contains a KGD motif also predicted to be in an exposed loop. Unlike the other tenascin-Ws described here (Figure 5), X. tropicalis tenascin-W has 9.5 EGF-like repeats instead of 3.5, and the fourth (not the third) FN type III domain has duplicated itself once.
Analysis of phylogeny and synteny
A summary of the repeat and domain organizations of the novel predicted tenascins and the previously described amniote tenascins is shown in Figure 8. Phylogenetic reconstruction using Bayesian inference based on the FReD of the tenascins of pufferfish, X. tropicalis, G. gallus, mouse and man reveals four members of the vertebrate tenascin gene family: tenascin-C, tenascin-R, tenascin-W and tenascin-X (Figure 9). Of these, tenascin-X represents the most distinctive sequence. A nearly identical tree based on the FReD sequences was constructed by maximal likelihood phylogeny (results not shown). As reported by Chiquet-Ehrismann et al. , Erickson , and Hughes , the FReDs of tenascin-C and tenascin-R share the most sequence similarity at the protein level, which provides one indication that they are derived from the same relatively recent ancestral duplication event. This view is strongly supported by a consideration of the organization of the human genome. The identification of regions of the human genome on different chromosomes that contain many pairs of related genes (paralogs) has provided strong support for the model that the genomes of modern vertebrates evolved from at least one whole genome duplication in early chordate evolution . The largest region of paralogy in the human genome is that between chromosome 1q, which includes the tenascin-R locus at 1q24, and 9q, which contains the tenascin-C locus at 9q33 (block ENSP00000263525 of dataset 5.28; see ). The loci of the tenascin-C and tenascin-R genes are also known to be part of the MHC loci that exist as paralogous regions on chromosomes 1q, 6p, 9q and 19p. Thus, although tenascin-X is the most divergent family member in terms of protein sequence, its gene locus on chromosome 6q21.3 is paralogous with that of the tenascin-C and -R genes [44, 45]. The paralogy of the MHC region is well-conserved in mice and, according to comparative mapping information, human chromosome 6 corresponds to chicken chromosome 16 . Interestingly, the chicken tenascin-Y gene is located on chromosome 16 and is in immediate synteny with the complement C4, TAP1, TAP2 and MHC II-like genes that represent orthologs of the genes present in the human MHCIII locus next to the human tenascin-X gene (e.g., see [14, 15]). As noted above, the gene neighbors of T. nigroviridis tenascin-X also correspond to MHC genes. This conserved chromosomal location between chicken tenascin-Y and its neighboring genes and the human, mouse and T. nigriviridis tenascin-X genes provides the most convincing argument that, despite distinctions in the polypeptide sequences, these genes all represent tenascin orthologs.
Although a fourth paralogous MHC gene cluster is encoded on human chromosome 19p13-1-13.3, no tenascin is encoded in this region, suggesting that this paralog was lost after the initial large-scale duplication events . The locus of tenascin-W adjacent to tenascin-R on chromosome 1 is suggestive of a distinct evolutionary origin, for example by local tandem duplication of an ancestral tenascin gene. Because the chromosome 1 and 9 MHC regions are so well-related as to indicate their origin from the most recent large-scale duplication , the positioning of tenascin-W adjacent to tenascin-R suggests either that: 1) this positioning was ancestral to the duplication event and a tenascin gene has been lost or transposed away from adjacent the tenascin-C gene; or 2) the tenascin-W gene arose by a tandem duplication of tenascin-R after the original duplication event and with a relatively rapid rate of change to the polypeptide sequence. It can also be hypothesized that the tenascin-W gene was transposed from the original locus on chromosome 19 into its current location soon after the duplication that gave rise to the tenascin-C and tenascin-R genes. On present evidence we cannot distinguish between these models, but it is interesting to note that the tenascin-W protein sequence is equivalently related (around 34%-36%) to both tenascin-C and tenascin-R. Finally, in C. intestinalis, the single tenascin gene is adjacent to a Notch gene just like all vertebrate tenascins which are located in close proximity to a Notch gene present in the MHC paralogous regions, supporting the common ancestry.
Six different names are currently being used to describe the tenascins of vertebrates: tenascin-C, tenascin-R, tenascin-X, tenascin-Y, tenascin-W and tenascin-N. Analysis of intron-exon splice sites, phylogenetic relationships and synteny shows that this nomenclature is inaccurate and needlessly complicated, and that there are in fact only four vertebrate tenascins. The original designations of tenascin-C and tenascin-R are confirmed by our analyses, but avian tenascin-Y shares close phylogenetic and genomic relationships with tenascin-X, and tenascin-N shares phylogenetic, syntenic and intron-exon junction homologies with tenascin-W. Since the names tenascin-X and tenascin-W have clear precedence in the literature and have been adopted in the majority of published reports, we recommend that use of the terms tenascin-Y [16, 47–51] and tenascin-N be discontinued.
Here we report the first example of a tenascin from a non-vertebrate. A predicted tenascin was found in the genomic sequence of the invertebrate chordate C. intestinalis and is corroborated as an expressed gene by the identification of matching ESTs, by cDNA sequencing and by immunohistochemistry. A similar gene product was also identified in the related species C. savignyi. With only one copy of tenascin, C. intestinalis may represent an ideal model system for future studies of tenascin function, since analysis of its knockdown by morpholinos or its misexpression would not be complicated by the possible compensatory action of related tenascin gene products. We have also identified a tenascin-type FReD domain in O. dioica and expect to identify a full length tenascin when the genomic sequencing is completed and assembled. Thus, tenascins are most likely common to all urochordates.
There are no tenascins in Caenorhabiditis elegans and Drosophila melanogaster. It is now recognized that these organisms have undergone extensive gene loss and that the Cnidaria have a higher level of gene conservation in comparison to vertebrates . Nevertheless, we could not identify Cnidarian tenascins from the various databases (see Methods). Searches of the draft genome sequence of the echinoderm Strongylocentrotus purpuratus have also not revealed tenascin genes. Thus, to date, tenascins appear to be exclusive to the chordate lineage. Sequences encoding a tenascin-like FReD domain are included in the Branchiostoma floridae EST database [GenBank EST:CF919227] [GenBank EST:CF919269] , but it is unknown if this sequence includes adjacent FN type III domains and EGF-like repeats. It will be of interest to know if one or more tenascin is encoded in the amphioxus genome once this sequencing project is completed. Of the four vertebrate tenascins, tenascin-X has the most distinctive FReD sequence and overall domain organization. We hypothesize that tenascin-X arose from the first tenascin gene duplication in vertebrates.
Analysis of two pufferfish genomes revealed not four, but five, tenascins. The fifth tenascin appears to be the result of a relatively recent duplication of the tenascin-C gene. In keeping with the established protocol for naming very similar duplicated genes, we propose that these tenascin-C paralogs be referred to as tenascin-Ca and tenascin-Cb. The two pufferfish studied here are closely related, having diverged from a common ancestor only 18–30 million year ago . Nevertheless, the tenascin-Cb genes of these close relatives encode different numbers of EGF-like repeats and FN type III domains. This illustrates the potential for the numbers of these repeats and domains to change during evolution (see also Hughes ) and points to the potential problems that can stem from giving different names to tenascins on the basis of the numbers of their repeated domains. It will be interesting to study the expression of these tenascin-C genes in Tetraodon nigroviridis and Takifugu rubripes: do their expression patterns overlap, or have they evolved distinctive regulatory elements? If so, has their function diverged? There is considerable evidence that the great species diversity of bony fishes is the consequence of an additional duplication of the whole fish genome followed by massive gene loss since the appearance of the ancestral tetrapod (e.g., see ). Interestingly, in the family Tetraodontidae the only tenascin to persist as a duplicated gene is tenascin-C. Searches of the latest zebrafish genome assembly (Zv5, Wellcome Trust Sanger Institute) identify only one tenascin-C on chromosome 5 (NP_ 570982). It will be interesting to establish if the persistence of tenascin-C paralogs is specific to the pufferfish lineage.
The tenascin-X gene in pufferfish encodes previously undescribed, highly charged repeats. We propose the name "GK repeats" to describe these unique sequences, since all but one of the 19 repeats in T. rubripes and all of the repeats in Tetraodon nigroviridis begin with the amino acids glycine and lysine. Given the concentration of tenascin-X in the epimysium of birds and mammals, it is intriguing that these repeats combined with the rest of the DUF619 domain share some sequence homology with a prokaryotic collagen-binding protein and the muscle-specific protein UNC-89 in C. elegans. The observation that X. tropicalis tenascin-X contains a region with sequence similar both to UNC-89 as well as bird and human tenascin-X leads us to suggest that this region may have a role that is important to tenascin-X function, and its biological properties should be studied further.
A previous study in the zebrafish reported five FN type III domains in the cDNA sequence of tenascin-W. The analysis of the genomic sequence of D. rerio as well as RT-PCR of zebrafish cDNA reveals a sixth FN type III domain. Thus, the D. rerio tenascin-W gene encodes the same number of FN type III domains as does the orthologous chicken gene, yet it encodes two more than does Tetraodon nigroviridis. This diversity again points out the potential hazards of giving proteins a new name based on the number of repeated domains – of the four tenascin subfamilies, only the tenascin-Rs have the same number of FN type III domains encoded in the genes of fish, birds and mammals. In the case of mammalian tenascin-C and tenascin-X, distinct processes of conservative or concerted evolution have been described for their FN type III domains . In the case of tenascin-W most of the diversity can be traced to different numbers of duplications in the third FN type III domain. This domain exists as a single copy in T. nigroviridis, two copies in Takifugu rubripes, three copies in D. rerio and G. gallus, 6 copies in man, and 9 copies in many other mammals including dog [NCBI Protein:XP_547455], rat [NCBI Protein:XP_222794] and mouse. What is it about this particular FN type III domain that may be leading to its duplication? One possibility is that this domain contains an integrin binding site, and different numbers of integrin binding sites may change the affinity of the intact molecule for a receptor, or may allow for tenascin-W to crosslink numerous receptors. Note that the LDVP/IDAP/IDSP motif, which has been shown to recognize alpha4beta1 integrin in fibronectin and VCAM , is found in almost all of the duplicated third FN type III domains analyzed here (underlined in Figure 6). Tenascin-W from X. tropicalis is different from other tenascin-Ws in its number of EGF-like repeats and the relatively recent duplication of its fourth, and not third, FN type III domain. Interestingly, this also results in the duplication of two potentially active integrin binding motifs: an RGD in the fourth domain and a KGD in the fifth. It is intriguing to note that species that lack an RGD motif in the third FN type III domain of tenascin-C (i.e., X. tropicalis and mouse) have an RGD motif in their tenascin-W. Since tenascin-C and tenascin-W are often co-expressed during development [17, 18, 51] it is interesting to speculate that they may have overlapping functions related to their binding to an RGD-dependent integrin.
Most tenascins studied to date are alternatively spliced, and only rarely are all of the potential FN type III domains identified in the final protein (e.g., see [56, 57]). This variability leads to different functional domains being exposed in different tissues [1, 7, 58]. As more ESTs become available, it will be interesting to analyze the many potential splice variants of each of these tenascins, as they may reveal additional functional variability in the tenascin gene family.
Tenascins are not known in protostomes or Cnidaria. We provide evidence that a single tenascin is encoded in the genome of the urochordate C. intestinalis. This invertebrate chordate tenascin contains the motif RGE in an exposed loop of its third FN type III domain, which may correspond to an integrin-binding site conserved in some vertebrate tenascins. Sequence alignments, analysis of domains and exon/intron organization and phylogenetic analyses of tenascins from four classes of vertebrates reveal that in fish and in tetrapods there are four members of the tenascin gene family: tenascin-C, tenascin-R, tenascin-X and tenascin-W. We suggest that use of the names tenascin-Y and tenascin-N be discontinued. In pufferfish there are two tenascin-C paralogs but single copies of the other tenascins. The human genome provides clear evidence that tenascin-C, tenascin-R and tenascin-X arose through the same ancestral genome duplications. Tenascin-W may have evolved as a result of a local duplication of the ancestor of tenascin-C and -R. The tenascin-X genes from the pufferfish Tetraodon nigroviridis and Takifugu rubripes encode different numbers of unique, highly charged tandem repeats of unknown function. X. tropicalis tenascin-X shares features with both the smaller teleost tenascin-Xs and the very large tenascin-Xs found in mammals. Finally, much of the diversity seen in the size of tenascin-W can be accounted for by the multiple duplications of the exon encoding the third FN type III domain in different species.
Sequences and bioinformatics
The NCBI Protein Database accession numbers of complete or partial tenascin amino acid sequences identified by key-word search or BLASTP (NCBI Basic Local Alignment Search Tool ) (reviewed by ) and used to obtain data for searching, alignment and phylogenetic reconstructions are listed in Table 1. Genomes were searched and analyzed at the NCBI , UCSC Genome Bioinformatics , Joint Genomic Institute Eukaryotic Genomics , the Laboratory for Developmental Biology and Genome Biology , Centre National de Séquençage Genoscope , the Max Planck Institute for Molecular Genetics , the Cnidarian Evolutionary Biology Database and the Nematostella vectensis Genomics Database . Sequence alignment and phylogenetic trees were constructed simultaneously by using SATCHMO (Berkeley Phylogenomics ) as described by Edgar and Sjölander . The phylogenetic tree of the FReDs was constructed with MrBayes: Bayesian Inference of Phylogeny (see ) using the WAG substitution model . We ran 1 million generations after which the average standard deviation of split frequencies was 0.004518. The phylogenetic tree was drawn using DrawTree . For identification of parologous tenascin-encoding regions in the human genome, the database of "Paralogons in the human genome", version 5.28, was searched (Paralogons in the Human Genome ) (see ).
Domain and repeat identification
Likely heptad repeats were identified using the Simple Modular Architecture Research Tool SMART , Paircoil Scoring Form (see also ) and COILS programs. Tenascin-type EGF-like repeats were identified by their characteristic number and spacing of cysteine residues (X4CX3CX5CX4CXCX8C) and confirmed with the SMART program, which classifies them as generic EGF repeats. FReDs and FN type III domains were identified by the NCBI Conserved Domain feature of BLASTP and by SMART . Partial FN type III domains were also identified by the NCBI Conserved Domain program. Often the different programs for predicting open reading frames in pufferfish and X. tropicalis were not in agreement. For example, the sequence ELDAPSDLSAQDVTESSFTVSRDSTQVHIDGYFLSFSSSAGSN was predicted to lie between the third and fourth FN type III domains of Tetraodon nigroviridis tenascin-W at the NCBI protein database [CAG07652], but not in predicted protein at the Genoscope site (GSTENT00028391001). In such cases the proteins were aligned with avian and mammalian tenascin sequences using the SATCHMO program and the predicted protein with the best fit to known cDNA sequences was used. Additional short predicted open-reading frames were not considered to be part of the protein if the BLASTP and SMART programs predicted them to be potentially artifactual due to low-complexity. Intron-exon splice sites were estimated from the results of the "build protein" feature of BLASTP genomic searches and from the gene model feature of the Tetraodon genome browser .
Molecular cloning, antibody production and immunohistochemistry
The sequence of the N-terminus of Ciona intestinalis tenascin was predicted from genomic sequence 5' of the EGF-like repeats encoding a potential signal peptide. This was confirmed by the identification of a cDNA using RT-PCR with primers homologous to the region harboring the methionine N-terminal to the predicted signal peptide and a primer from the next exon. Animals were obtained from the Marine Biological Laboratory (Woods Hole, MA). RNA was extracted from larvae collected 18 hours after fertilization and used as template for reverse transcription. PCR was performed with the primer pair 5'-ATGTGGCCTGTTTCGAGTCG-3'/5'-ATTGCTGCTGGTCAGGAACG-3' and the resulting band sequenced. It encoded amino acids 1–66 shown in Figure 2A. To raise antibodies we amplified the cDNA encoding the first FN type III domain from C. intestinalis mRNA by RT-PCR with the primers 5'-TCTCATGTCATCAAACCATCAG-3'/5'-TGTTTTCACAGAAGCAGTAATTGG-3'. The resulting cDNA encoded amino acids 459–550 from the sequence shown in Figure 2A. Interestingly, the DNA sequence was only 86.8% identical to the exons of the genomic sequence (Ciona intestinalis Genome ), but all of them were silent mutations resulting in a 100% conserved protein sequence. These differences are possibly due to the genomic diversity that has been noted by others between specimens of C. intestinalis from the Pacific and Atlantic . This protein fragment was expressed in E. coli and antiserum against the purified protein was raised in rabbits. The antiserum recognized a large (>250 kDa) smeared band on immunoblots of homogenates of recently hatched C. intestinalis larvae (generously provided by W.R. Jeffery, University of Maryland) as well as smaller bands that were also present on the blot incubated with the preimmune serum. For immunostaining of whole mounts, larvae were fixed in 4% paraformaldehyde in sea water and permeabilized in methanol at -20C. Larvae were then rinsed in phosphate buffered saline with 0.01% Tween-20 (PBT), blocked in 0.1% bovine serum albumin in PBT, and incubated overnight in the anti-Ciona tenascin serum (1:100) or similarly diluted preimmune serum. Larvae were then rinsed overnight and incubated in goat anti-rabbit Alexa 594 secondary antibody (1:500) in PBT overnight. After extensive washes the immunostained larvae were coverslipped and observed using an Olympus confocal microscope.
Reverse Transcriptase Polymerase Chain Reaction
The cDNA encoding the fifth FN type III domain of D. rerio tenascin-W was cloned in the following way: total RNA from an adult fish was isolated with Trizol reagent (Invitrogen) and mRNA was isolated with the RNeasy mRNA purification kit (Qiagen). First strand cDNA was generated with SuperScript III reverse transcriptase (Invitrogen) according to the manufacturer's recommendation. RT-PCR (30 cycles 94°C 1 min, 94°C 50 sec, 60°C 1 min, 72°C 2 min) using primers corresponding to the sequences from neighboring exons (5'-GAGTTCAACAGAAGCGGAAAC-3'/5'-TTGAGTCTGAACATCAGTGGC-3') generated an appropriately sizedproduct that was sequenced. The cloned cDNA corresponded to the FN type III domain found in the genomic sequence encoded on asingle exon between the fourth and sixth FN type III domains of tenascin-W (99% identical, as opposed to 81% identical to the fourth FN type III domain). The cDNA coded protein that was identical to the protein predicted from the genomic sequence except that athreonine replaced an isoleucine (the 53rd residue of the domain). This sequence was confirmed by the use of asecond independent pair of primers (5'-AAGCGGAAACAGATATAGACGC-3'/5'-AATCTCTGCTGTTTCAGCCTC-3').
Fischer D, Tucker RP, Chiquet-Ehrismann R, Adams JC: Cell-adhesive responses to tenascin-C splice variants involve formation of fascin microspikes. Mol Biol Cell. 1997, 8: 2055-2075.
Joester A, Faissner A: The structure and function of tenascins in the nervous system. Matrix Biol. 2001, 20: 13-22. 10.1016/S0945-053X(00)00136-0.
Chiquet-Ehrismann R: Tenascins. Int J Biochem Cell Biol. 2004, 36: 986-990. 10.1016/j.biocel.2003.12.002.
Jones FS, Jones PL: The tenascin family of ECM glycoproteins: structure, function, and regulation during embryonic development and tissue remodeling. Dev Dyn. 2000, 218: 235-259. 10.1002/(SICI)1097-0177(200006)218:2<235::AID-DVDY2>3.0.CO;2-G.
Chiquet-Ehrismann R, Tucker RP: Connective tissues: signalling by tenascins. Int J Biochem Cell Biol. 2004, 36: 1085-1089. 10.1016/j.biocel.2004.01.007.
Chiquet-Ehrismann R, Chiquet M: Tenascins: regulation and putative functions during pathological stress. J Pathol. 2003, 200: 488-499. 10.1002/path.1415.
Mercado ML, Nur-e-Kamal A, Liu HY, Gross SR, Movahed R, Meiners S: Neurite outgrowth by the alternatively spliced region of human tenascin-C is mediated by neuronal alpha7beta1 integrin. J Neurosci. 2004, 24: 238-247. 10.1523/JNEUROSCI.4519-03.2004.
Huang W, Chiquet-Ehrismann R, Moyano JV, Garcia-Pardo A, Orend G: Interference of tenascin-C with syndecan-4 binding to fibronectin blocks cell adhesion and stimulates tumor cell proliferation. Cancer Res. 2001, 61: 8586-8594.
Pearson CA, Pearson D, Shibahara S, Hofsteenge J, Chiquet-Ehrismann R: Tenascin: cDNA cloning and induction by TGF-beta. EMBO J. 1988, 7: 2977-2982.
Gulcher JR, Nies DE, Marton LS, Stefansson K: An alternatively spliced region of the human hexabrachion contains a repeat of potential N-glycosylation sites. Proc Natl Acad Sci USA. 1989, 86: 1588-1592. 10.1073/pnas.86.5.1588.
Jones FS, Hoffman S, Cunningham BA, Edelman GM: A detailed structural model of cytotactin: protein homologies, alternative RNA splicing, and binding regions. Proc Natl Acad Sci USA. 1989, 86: 1905-1909. 10.1073/pnas.86.6.1905.
Chiquet-Ehrismann R, Mackie EJ, Pearson CA, Sakakura T: Tenascin: an extracellular matrix protein involved in tissue interactions during fetal development and oncogenesis. Cell. 1986, 47: 131-139. 10.1016/0092-8674(86)90374-0.
Rathjen FG, Wolff JM, Chiquet-Ehrismann R: Restrictin: a chick neural extracellular matrix protein involved in cell attachment co-purifies with the cell recognition molecule F11. Development. 1991, 113: 151-164.
Matsumoto K, Arai M, Ishihara N, Ando A, Inoko H, Ikemura T: Cluster of fibronectin type III repeats found in the human major histocompatibility complex class III region shows the highest homology with the repeats in an extracellular matrix protein, tenascin. Genomics. 1992, 12: 485-491. 10.1016/0888-7543(92)90438-X.
Bristow J, Tee MK, Gitelman SE, Mellon SH, Miller WL: Tenascin-X: a novel extracellular matrix protein encoded by the human XB gene overlapping P450c21B. J Cell Biol. 1993, 122: 265-278. 10.1083/jcb.122.1.265.
Hagios C, Koch M, Spring J, Chiquet M, Chiquet-Ehrismann R: Tenascin-Y: a protein of novel domain structure is secreted by differentiated fibroblasts of muscle connective tissue. J Cell Biol. 1996, 134: 1499-1512. 10.1083/jcb.134.6.1499.
Weber P, Montag D, Schachner M, Bernhardt RR: Zebrafish tenascin-W, a new member of the tenascin family. J Neurobiol. 1998, 35: 1-16. 10.1002/(SICI)1097-4695(199804)35:1<1::AID-NEU1>3.0.CO;2-9.
Scherberich A, Tucker RP, Samandari E, Brown-Luedi M, Martin D, Chiquet-Ehrismann R: Murine tenascin-W: a novel mammalian tenascin expressed in kidney and at sites of bone and smooth muscle development. J Cell Sci. 2004, 117: 571-581. 10.1242/jcs.00867.
Neidhardt J, Fehr S, Kutsche M, Lohler J, Schachner M: Tenascin-N: characterization of a novel member of the tenascin family that mediates neurite repulsion from hippocampal explants. Mol Cell Neurosci. 2003, 23: 193-209. 10.1016/S1044-7431(03)00012-5.
Becker CG, Schweitzer J, Feldner J, Becker T, Schachner M: Tenascin-R as a repellent guidance molecule for developing optic axons in zebrafish. J Neurosci. 2003, 23: 6232-7.
Schweitzer J, Becker T, Lefebvre J, Granato M, Schachner M, Becker CG: Tenascin-C is involved in motor axon outgrowth in the trunk of developing zebrafish. Dev Dyn. 2005, 234: 550-566. 10.1002/dvdy.20525.
Dehal P, Satou Y, Campbell RK, Chapman J, Degnan B, De Tomaso A, Davidson B, Di Gregorio A, Gelpke M, Goodstein DM, Harafuji N, Hastings KE, Ho I, Hotta K, Huang W, Kawashima T, Lemaire P, Martinez D, Meinertzhagen IA, Necula S, Nonaka M, Putnam N, Rash S, Saiga H, Satake M, Terry A, Yamada L, Wang HG, Awazu S, Azumi K, Boore J, Branno M, Chin-Bow S, DeSantis R, Doyle S, Francino P, Keys DN, Haga S, Hayashi H, Hino K, Imai KS, Inaba K, Kano S, Kobayashi K, Kobayashi M, Lee BI, Makabe KW, Manohar C, Matassi G, Medina M, Mochizuki Y, Mount S, Morishita T, Miura S, Nakayama A, Nishizaka S, Nomoto H, Ohta F, Oishi K, Rigoutsos I, Sano M, Sasaki A, Sasakura Y, Shoguchi E, Shin-i T, Spagnuolo A, Stainier D, Suzuki MM, Tassy O, Takatori N, Tokuoka M, Yagi K, Yoshizaki F, Wada S, Zhang C, Hyatt PD, Larimer F, Detter C, Doggett N, Glavina T, Hawkins T, Richardson P, Lucas S, Kohara Y, Levine M, Satoh N, Rokhsar DS: The draft genome of Ciona intestinalis: insights into chordate and vertebrate origins. Science. 2002, 298: 2157-2167. 10.1126/science.1080049.
Kent WJ: BLAT – the BLAST-like alignment tool. Genome Res. 2002, 12: 656-664. 10.1101/gr.229202. Article published online before March 2002.
UCSC Genome Bioinformatics. [http://genome.ucsc.edu]
Korf I: Gene finding in novel genomes. BMC Bioinformatics. 2004, 5: 59-10.1186/1471-2105-5-59.
Laboratory for Developmental Biology and Genome Biology. [http://ghost.zool.kyoto-u.ac.jp]
Shoguchi E, Ikuta T, Yoshizaki F, Satou Y, Satoh N, Asano K, Saiga H, Nishikata T: Fluorescent in situ hybridization to ascidian chromosomes. Zoolog Sci. 2004, 21: 153-157. 10.2108/zsj.21.153.
Letunic I, Copley RR, Pils B, Pinkert S, Schultz J, Bork P: SMART5: domains in the context of genomes and networks. Nuc Acids Res. 2006, 34: D257-D260. 10.1093/nar/gkj079.
Satou Y, Yamada L, Mochizuki Y, Takatori N, Kawashima T, Sasaki A, Hamaguchi M, Awazu S, Yagi K, Sasakura Y, Nakayama A, Ishikawa H, Inaba K, Satoh N: A cDNA resource from the basal chordate Ciona intestinalis. Genesis. 2002, 33: 153-154. 10.1002/gene.10119.
Leahy DJ, Hendrickson WA, Aukhil I, Erickson HP: Structure of a fibronectin type III domain from tenascin phased by MAD analysis of the selenomethionyl protein. Science. 1992, 258: 987-991.
Humtsoe JO, Kim JK, Xu Y, Keene DR, Hook M, Lukomski S, Wary KK: A streptococcal collagen-like protein interacts with the alpha2beta1 integrin and induces intracellular signaling. J Biol Chem. 2005, 280: 13848-13857. 10.1074/jbc.M410605200.
Mackie EJ, Tucker RP, Halfter W, Chiquet-Ehrismann R, Epperlein HH: The distribution of tenascin coincides with pathways of neural crest cell migration. Development. 1988, 102: 237-250.
Trace Archive Database Mega BLAST. [http://www.ncbi.nlm.nih.gov/BLAST/mmtrace.shtml]
Altschul SF, Madden TL, Schaffer AA, Zhang J, Zhang Z, Miller W, Lipman DJ: Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res. 1997, 25: 3389-3402. 10.1093/nar/25.17.3389.
Sambrook JG, Campbell RD, Elgar G: Characterisation of a gene cluster in Fugu rubripes containing the complement component C4 gene. Gene. 2003, 312: 73-83. 10.1016/S0378-1119(03)00602-4.
Yokosaki Y, Matsuura N, Higashiyama S, Murakami I, Obara M, Yamakido M, Shigeto N, Chen J, Sheppard D: Identification of the ligand binding site for the integrin alpha9 beta1 in the third fibronectin type III repeat of tenascin-C. J Biol Chem. 1998, 273: 11423-11428. 10.1074/jbc.273.19.11423.
Small TM, Gernert KM, Flaherty DB, Mercer KB, Borodovsky M, Benian GM: Three new isoforms of Caenorhabditis elegans UNC-89 containing MLCK-like protein kinase domains. J Mol Biol. 2004, 342: 91-108. 10.1016/j.jmb.2004.07.006.
Edgar RC, Sjolander K: SATCHMO: sequence alignment and tree construction using hidden Markov models. Bioinformatics. 2003, 19: 1404-1411. 10.1093/bioinformatics/btg158.
National Center for Biotechnology Information. [http://www.ncbi.nlm.nih.gov]
Chiquet-Ehrismann R, Hagios C, Matsumoto K: The tenascin gene family. Perspect Dev Neurobiol. 1994, 2: 3-7.
Erickson HP: Evolution of the tenascin family – Implications for function of the C-terminal fibrinogen-like domain. Perspect Dev Neurobiol. 1994, 2: 9-19.
Hughes AL: Concerted evolution of exons and introns in the MHC-linked tenascin-X gene of mammals. Mol Biol Evol. 1999, 16: 1558-1567.
McLysaght A, Hokamp K, Wolfe KH: Extensive genomic duplication during early chordate evolution. Nat Genet. 2002, 31: 200-204. 10.1038/ng884.
Kasahara M: Genome dynamics of the major histocompatibility complex: insights from genome paralogy. Immunogenetics. 1999, 50: 134-145. 10.1007/s002510050589.
Abi-Rached L, Gilles A, Shiina T, Pontarotti P, Inoko H: Evidence of en bloc duplication in vertebrate genomes. Nat Genet. 2002, 31: 100-105. 10.1038/ng855.
Groenen MA, Cheng HH, Bumstead N, Benkel BF, Briles WE, Burke T, Burt DW, Crittenden LB, Dodgson J, Hillel J, Lamont S, de Leon AP, Soller M, Takahashi H, Vignal A: A consensus linkage map of the chicken genome. Genome Res. 2000, 10: 137-147.
Hagios C, Brown-Luedi M, Chiquet-Ehrismann R: Tenascin-Y, a component of distinctive connective tissues, supports muscle cell growth. Exp Cell Res. 1999, 253: 607-617. 10.1006/excr.1999.4658.
Tucker RP, Hagios C, Chiquet-Ehrismann R: Tenascin-Y in the developing and adult avian nervous system. Dev Neurosci. 1999, 21: 126-133. 10.1159/000017374.
Tucker RP, Hagios C, Santiago A, Chiquet-Ehrismann R: Tenascin-Y is concentrated in adult nerve roots and has barrier properties in vitro. J Neurosci Res. 2001, 66: 439-447. 10.1002/jnr.1236.
Fluck M, Tunc-Civelek V, Chiquet M: Rapid and reciprocal regulation of tenascin-C and tenascin-Y expression by loading of skeletal muscle. J Cell Sci. 2000, 113: 3583-3591.
Meloty-Kapella CV, Degen M, Chiquet-Ehrismann R, Tucker RP: Avian tenascin-W: Expression in smooth muscle and bone, and effects on calvarial cell spreading and adhesion in vitro. Dev Dyn. 2006, 235: 1532-1542. 10.1002/dvdy.20731.
Kortschak RD, Samuel G, Saint R, Miller DJ: EST analysis of the cnidarian Acropora millepora reveals extensive gene loss and rapid sequence divergence in the model invertebrates. Curr Biol. 2003, 13: 2190-2195. 10.1016/j.cub.2003.11.030.
Panopoulou G, Hennig S, Groth D, Krause A, Poustka AJ, Herwig R, Vingron M, Lehrach H: New evidence for genome-wide duplications at the origin of vertebrates using an amphioxus gene set and completed animal genomes. Genome Res. 2003, 13: 1056-1066. 10.1101/gr.874803.
Jaillon O, Aury JM, Brunet F, Petit JL, Stange-Thomann N, Mauceli E, Bouneau L, Fischer C, Ozouf-Costaz C, Bernot A, Nicaud S, Jaffe D, Fisher S, Lutfalla G, Dossat C, Segurens B, Dasilva C, Salanoubat M, Levy M, Boudet N, Castellano S, Anthouard V, Jubin C, Castelli V, Katinka M, Vacherie B, Biemont C, Skalli Z, Cattolico L, Poulain J, De Berardinis V, Cruaud C, Duprat S, Brottier P, Coutanceau JP, Gouzy J, Parra G, Lardier G, Chapple C, McKernan KJ, McEwan P, Bosak S, Kellis M, Volff JN, Guigo R, Zody MC, Mesirov J, Lindblad-Toh K, Birren B, Nusbaum C, Kahn D, Robinson-Rechavi M, Laudet V, Schachter V, Quetier F, Saurin W, Scarpelli C, Wincker P, Lander ES, Weissenbach J, Roest Crollius H: Genome duplication in the teleost fish Tetraodon nigroviridis reveals the early vertebrate proto-karyotype. Nature. 2004, 431: 946-957. 10.1038/nature03025.
Humphries MJ, Sheridan J, Mould AP, Newham P: Mechanisms of VCAM-1 and fibronectin binding to integrin alpha 4 beta 1: implications for integrin function and rational drug design. Ciba Found Symp. 1995, 189: 177-191.
Dorries U, Schachner M: Tenascin mRNA isoforms in the developing mouse brain. J Neurosci Res. 1994, 37: 336-347. 10.1002/jnr.490370306.
Derr LB, Chiquet-Ehrismann R, Gandour-Edwards R, Spence J, Tucker RP: The expression of tenascin-C with the AD1 variable repeat in embryonic tissues, cell lines and tumors in various vertebrate species. Differentiation. 1997, 62: 71-82. 10.1046/j.1432-0436.1997.6220071.x.
Ghert MA, Qi WN, Erickson HP, Block JA, Scully SP: Tenascin-C splice variant adhesive/anti-adhesive effects on chondrosarcoma cell attachment to fibronectin. Cell Struct Funct. 2001, 26: 179-187. 10.1247/csf.26.179.
NCBI Basic Local Alignment Search Tool. [http://www.ncbi.nlm.nih.gov/BLAST]
McGinnis S, Madden TL: BLAST: at the core of a powerful and diverse set of sequence analysis tools. Nucleic Acids Res. 2004, 32: W20-25. 10.1093/nar/gnh003.
Joint Genomic Institute Eukaryotic Genomics. [http://genome.jgi-psf.org]
Centre National de Séquençage Genoscope. [http://www.genoscope.cns.fr]
Max Planck Institute for Molecular Genetics. [http://www.molgen.mpg.de]
Cnidarian Evolutionary Biology Database. [http://cnidbase.bu.edu/]
Nematostella vectensis Genomics Database. [http://www.stellabase.org/]
Berkeley Phylogenomics. [http://phylogenomics.berkeley.edu]
MrBayes: Bayesian Inference of Phylogeny. [http://mrbayes.csit.fsu.edu/index.php]
Ronquist F, Huelsenbeck JP: MrBayes 3: Bayesian phylogenetic inference under mixed models. Bioinformatics. 2003, 19: 1572-1574. 10.1093/bioinformatics/btg180.
Olsen R, Loomis WF: A collection of amino acid replacement matrices derived from clusters of orthologs. J Mol Evol. 2005, 61: 659-665. 10.1007/s00239-005-0060-0.
Paralogons in the Human Genome. [http://wolfe.gen.tcd.ie/dup]
Simple Modular Architecture Research Tool SMART. [http://smart.embl-heidelberg.de]
Parcoil Scoring Form. [http://paircoil.lcs.mit.edu]
Berger B, Wilson DB, Wolf E, Tonchev T, Milla M, Kim PS: Predicting coiled coils by use of pairwise residue correlations. Proc Natl Acad Sci USA. 1995, 92: 8259-8263. 10.1073/pnas.92.18.8259.
Lupas A: Prediction and analysis of coiled-coil structures. Enzymology. 1996, 266: 513-525.
Ciona intestinalis Genome. [http://genome.jgi-psf.org/ciona2/ciona2.home.html]
Suzuki MM, Nishikawa T, Bird A: Genomic approaches reveal unexpected genetic divergence within Ciona intestinalis. J Mol Evol. 2005, 61: 627-635. 10.1007/s00239-005-0009-3.
Research in RPT's laboratory is funded by NSF 0235711 and NIH NCRR C06 RR-12088-01. The authors would like to thank William Jeffery for supplying fresh homogenates of C. intestinalis, Stefano Canevascini for his assistance with confocal microscopy and Caroline Meloty-Kapella for her expertise at immunoblotting.
RPT identified and analyzed the tenascins from fish and Xenopus, performed the whole mount immunohistochemistry, wrote the first draft of the paper and prepared Figures 1, 2, 3, 4, 5, 6, 7, 8. KD with the help of JF cloned and sequenced a fragment of the Ciona tenascin, raised the antiserum against the recombinant Ciona tenascin fragment, developed the phylogenetic tree (Figure 9), carried out the D. rerio RT-PCR with JF, and contributed significantly to the text. JFH provided assistance with the various genome and domain identification databases, clarified the use of terminology and assisted with the content and organization of the manuscript. JF conducted the D. rerio RT-PCR and Ciona tenascin cloning with KD. RC-E identified and analyzed the Ciona tenascin sequence, analyzed tenascin-X synteny and contributed to major revisions to the manuscript. JCA and RPT conceived the project. JCA provided advice on web-based bioinformatics resources, identified Ciona tenascin and the putative amphioxus tenascin through ESTs, and contributed extensively to the studies of tenascin synteny and each draft of the text. All authors read and approved the final manuscript.
Electronic supplementary material
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Tucker, R., Drabikowski, K., Hess, J. et al. Phylogenetic analysis of the tenascin gene family: evidence of origin early in the chordate lineage. BMC Evol Biol 6, 60 (2006). https://doi.org/10.1186/1471-2148-6-60
- Major Histocompatibility Complex
- Major Histocompatibility Complex Gene
- Heptad Repeat
- Xenopus Tropicalis
- Major Histocompatibility Complex Region | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a detailed scientific description of tenascin proteins and their domain organization. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including educational environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a scientific description of gene products and protein sequences without any unsafe or inappropriate content. It is fully appropriate for educational and public use.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a scientific description of genetic and protein sequences, containing no unsafe, inappropriate, or harmful content. It is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe provided text is a detailed scientific analysis of tenascin and tenascin-X in various species. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a scientific description of genetic and protein analysis, containing no unsafe, inappropriate, or harmful content. It is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a detailed scientific description of the exon structure and domain organization of tenascin-W in various species. It does not contain any unsafe, inappropriate, or harmful content. The language is technical and scientific, making it fully appropriate for educational and public use.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a detailed scientific description of tenascin proteins and their genetic and evolutionary relationships. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a scientific discussion about the genetic and evolutionary aspects of tenascin genes. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"content is entirely academic and safe\", \"score\": 0}\n```\n\nThe provided text is entirely academic and discusses the evolutionary and structural aspects of tenascin proteins. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a scientific description of tenascin proteins and their evolutionary relationships. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe provided text is a detailed scientific description of methods and results related to protein identification and analysis. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a series of scientific references and citations from academic papers. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```",
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a series of scientific references and citations from various research papers. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a scientific publication acknowledgment and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would be considered unsafe or inappropriate."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "181-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "181-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "181-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "181-3",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-4",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
},
{
"custom_id": "181-5",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-6",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "181-7",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-8",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-9",
"llm_safety_score": 0,
"reason": "content is entirely academic and safe"
},
{
"custom_id": "181-10",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "181-11",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
},
{
"custom_id": "181-12",
"llm_safety_score": 0,
"reason": "No unsafe content"
},
{
"custom_id": "181-13",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-14",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-15",
"llm_safety_score": 0,
"reason": "No unsafe content"
},
{
"custom_id": "181-16",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "181-17",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "181-18",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://bmcecolevol.biomedcentral.com/articles/10.1186/1471-2148-6-60",
"date": "2023-05-31T20:41:17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00663.warc.gz",
"language": "en",
"language_score": 0.8599095941,
"token_count": 17683,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:c7f90b2f-ca92-4be0-9522-ae30f5aecff3> | The critically endangered Atlantic Halibut, the world's largest flatfish, faces population decline due to overfishing and slow growth, impacting their reproduction rate.
The globally prized Bluefin Tuna, renowned for its size, speed, and taste, faces severe population decline due to overfishing, leading to its classification as an endangered species.
The critically endangered Beluga Sturgeon, prized for its valuable roe and large size, faces severe population decline due to overfishing and habitat loss, leading to its classification as critically endangered.
Due to overfishing and their slow growth rate, the Orange Roughy, known for its extended lifespan, is listed as one of the most endangered fish
The Winter Skate, a diamond-shaped fish with distinctive features and habitat in the Northwest Atlantic, faces severe population decline due to overfishing, leading to its classification as an endangered species on the IUCN Red List.
Endangered due to overfishing, population declined by 60%, strict fishing bans imposed by IUCN.
Critically endangered Red Handfish faces habitat loss and population decline, listed on red lists by Australian government and IUCN.
The critically endangered European Eel faces population decline due to various threats such as pollution, overfishing, habitat degradation, and climate change, with its unique life development cycle adding to its survival challenges. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the conservation status and threats to various fish species, including overfishing, habitat loss, and population decline. There is no unsafe, inappropriate, or harmful content in the text. It is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "182-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.animalsaroundtheglobe.com/web-stories/discover-the-most-endangered-fish/",
"date": "2023-05-31T18:51:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00663.warc.gz",
"language": "en",
"language_score": 0.9374750853,
"token_count": 278,
"score": 3.53125,
"int_score": 4
} |
<urn:uuid:ecab1d61-d1fb-4ec0-be82-87175db24752> | Chondrostei (sturgeons) > Acipenseriformes
(Sturgeons and paddlefishes) > Acipenseridae
(Sturgeons) > Acipenserinae
Etymology: Pseudoscaphirhynchus: Greek, pseudes = false + Greek, skaphe = boat + Greek, rhyngchos = snout (Ref. 45335).
Environment: milieu / climate zone / depth range / distribution range
Freshwater; brackish; demersal; potamodromous (Ref. 51243). Temperate
Former USSR and Asia: Endemic to the basin of Amu Dariya and Sir Dariya rivers (Ref. 35930). Considered endangered or extinct by authors (Ref. 6866). Registered in the International trade restricted (CITES II, since 1.4.98; CMS Appendix II); 1984 USSR Red Book; 1985 Turkmen SSR Red Data Book; 1996 IUCN Red List; and, 1997 CITES Lists (Ref. 35930).
Size / Weight / Age
Maturity: Lm ? range ? - ? cm
Max length : 27.5 cm TL male/unsexed; (Ref. 35930); max. published weight: 50.50 g (Ref. 35930); max. reported age: 6 years (Ref. 35930)
A rare and endangered species; smallest sturgeon; sensitive to chemicals in the water Ref. 35930).
Life cycle and mating behavior
Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae
Robins, C.R., R.M. Bailey, C.E. Bond, J.R. Brooker, E.A. Lachner, R.N. Lea and W.B. Scott, 1991. World fishes important to North Americans. Exclusive of species from the continental waters of the United States and Canada. Am. Fish. Soc. Spec. Publ. (21):243 p. (Ref. 4537)
IUCN Red List Status (Ref. 126983)
Threat to humans
Fisheries: of no interest
Common namesSynonymsMetabolismPredatorsEcotoxicologyReproductionMaturitySpawningSpawning aggregationFecundityEggsEgg development
ReferencesAquacultureAquaculture profileStrainsGeneticsAllele frequenciesHeritabilityDiseasesProcessingNutrientsMass conversion
Estimates based on models
Phylogenetic diversity index (Ref. 82804
= 0.6250 [Uniqueness, from 0.5 = low to 2.0 = high].
Bayesian length-weight: a=0.00324 (0.00144 - 0.00729), b=3.16 (2.97 - 3.35), in cm total length, based on LWR estimates for this (Sub)family-body shape (Ref. 93245
Trophic level (Ref. 69278
): 3.2 ±0.5 se; based on size and trophs of closest relatives
Resilience (Ref. 120179
): Medium, minimum population doubling time 1.4 - 4.4 years (tmax=6).
Fishing Vulnerability (Ref. 59153
): Low vulnerability (18 of 100). | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text is a scientific description of a fish species, specifically focusing on its taxonomic classification, etymology, habitat, and life cycle. There are no unsafe, inappropriate, or harmful elements present in the text. It is entirely suitable for educational and public use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "187-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://fishbase.mnhn.fr/summary/8764",
"date": "2023-06-05T00:53:48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00663.warc.gz",
"language": "en",
"language_score": 0.6934534907,
"token_count": 711,
"score": 3.203125,
"int_score": 3
} |
<urn:uuid:ccc98860-ebeb-40da-b23e-af3449ba986e> | Agile works. The debate may rage on over its effectiveness as a software development approach, but if you stick to the fundamentals of project management, you will see impressive results.
Some critics still state that agile is disorderly and does not require planning and documentation. The reality? Project management fundamentals are vital for the success of agile, as they are for any other programme.
Agile methodologies lie at the opposite end of the spectrum to sequential approaches, such as Waterfall. Agile values iterative development, responsiveness to changing requirements, customer engagement and satisfaction, frequent delivery of functionality
and strong communication. Sequential approaches plan the entirety of the project then progress through development stages. Agile, on the other hand, completes each stage per iteration. Even the scope of the project is subject to change.
Managing Agile projects
Detractors of agile claim that its methods are disorderly and undisciplined. But multiple releases and client feedback put greater emphasis on quality and discipline. And there’s the rub. Since requirements are subject to change, the code must be good enough
for reasonable changes to be incorporated. The idea that agile involves ‘hacking’ code is unfounded. A weak codebase may develop but this is the fault of the project management, not the agile approach.
So how do you ensure a disciplined approach? The Scrum methodology is a shining example. Here, teams plan a ‘Sprint’ phase, which defines functionality and deadlines. Time estimates and element ownership are recorded. Daily Scrum meetings have a set agenda
focusing on progress and obstacles to development. Priorities may change, especially given the agile focus on communication and customer, leading to out-of-scope functionality for a Sprint needing to be included engagement. If this is the case, the Sprint
may be abandoned and re-planned.
The key point here is that the Sprint has a clear deadline. Any incomplete tasks are re-evaluated for the next Sprint. The project team will analyse these elements and re-estimate development times.
Agile in Action
Suppose you are initiating a major programme which requires significant development using agile. During initiation, the programme’s scope is defined and stakeholders are engaged. But requirements, even when validated, may change as the programme evolves.
This requires careful planning and documentation. Good business analysis involves gathering and validating requirements, and ensuring traceability. Projects require protocols for monitoring and approving changes to scope and other plans.
Increased customer engagement and the potential for change within agile projects further underscore the importance of traceability and change management.
In short, agile provides flexibility, not frailty. Any lack of documentation and planning are the faults of the manager, not agile. Given the propensity for change and the increased stakeholder engagement, project management fundamentals are vital to success.
Change control, quality management, planning, documentation and carefully tracking progress are all invaluable to the success of an agile project. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses agile methodologies in software development and project management. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to professional and educational topics. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "188-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.finextra.com/blogposting/9186/agile-not-fragile-agile-project-managment",
"date": "2023-06-05T01:24:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00663.warc.gz",
"language": "en",
"language_score": 0.9041384459,
"token_count": 603,
"score": 2.625,
"int_score": 3
} |
<urn:uuid:8a9fe5e0-669e-4060-ac9e-9625cedac452> | Journey to the Heart of Nature
Created by Karen Bharati Busch. 7 Lessons, and drawings.
Purchase for permission to download and print.
Once you’ve made your purchase, we will send the PDF to your email address.
Created by Karen Bharati Busch, co-founder of the Portland Living Wisdom School, Bears in Fact and Fiction is an engaging and lively unit for first and second graders. It is an excellent example of curriculum for the feeling years—presenting concepts such as Venn diagrams, measurement, and facts about of North American bears in the context of a subject that appeals to the heart.
The packet includes seven lessons, and drawings of all of the crafts and teaching materials so that teachers can reproduce them.
(Kinds of Bears,Using Levers to Create Bear Puppets, How Big is a Real Bear?, Bears in Native Culture, Brown Bear Pattern Book, Compare and Contrast Three Bears Using Venn Diagrams, and Teddy Bear Picnic.) Most lessons take 45 minutes – 1 hour, a unit could last two to six weeks.
Education for Life International
14618 Tyler Foote Road
Nevada City, CA 95959 | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a description of an educational curriculum for children, focusing on nature and bears. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "190-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://edforlife.org/journey-to-the-heart-of-nature/",
"date": "2023-06-07T18:44:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00663.warc.gz",
"language": "en",
"language_score": 0.9050207734,
"token_count": 244,
"score": 3.09375,
"int_score": 3
} |
<urn:uuid:d51693e4-6c65-465b-8bb7-dde2229eeea7> | 16-Apr-2021 | Market Research Store
Currently, the smartphones and many electronic devices are using face recognition for unlocking the devices from the security protocol point of view. The advanced technologies are believed to confuse and make it difficult for the hackers to gain access to the data in the devices due to such security features such as the facial recognition. However, the thieves or hackers try unlocking the phone using the face when you asleep or using the photo from social media. Just like the other existing human biometric identification system, there are flaws in these advanced identity verification technology as well.
The team from Brigham Young University has found a more secure and effective means of using face for making accessibility limited. The latest security method named Concurrent Two-Factor Identity Verification (C2FIV) requires facial identity and particular facial motion to gain access to the device. For setting up the security code, the user uses a camera to record a video of about 1 or 2 Seconds of facial movements or lip motion after reading a secret phrase. The integration of the video into the device helps use facial features and facial motion and also stores them for ID verification in the future as well.
The researchers basically want the identity verification process to be intentional to help overcome the hacking issues. There are risks that even if the person falls unconscious, the individual’s device can be opened using the finger or retina to gain access to the device. However, in the C2FIV as it uses integrated neural network structure to continuously analyze the facial motions and features. The framework comprises of dynamic, sequential data that are recorded for further use. The facial features and motions are stored in the server or devices such that it can be used to unlock the device. The device verifies the user’s ID to the stored embedding so that they match. The researchers believe that C2FIV could be used in restricted areas or high security demanding places such as a workplace, ATM use, online banking, safe deposit box access, hotel room entry, or keyless entry/access to vehicle. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses market research and security technology without any inappropriate, harmful, or offensive content. It is suitable for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "191-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.marketresearchstore.com/news/new-facial-motion-tracking-algorithm-makes-id-verification",
"date": "2023-06-07T20:26:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00663.warc.gz",
"language": "en",
"language_score": 0.9301547408,
"token_count": 415,
"score": 2.84375,
"int_score": 3
} |
<urn:uuid:773d816a-6f42-4265-bb46-2b228d0fda6a> | Today, 356 years ago, in the year 1664, R’ Zacharia Möhr passed away in Vienna.
R’ Zacharia and his wife Feigle lived in Vienna, where they built a Klaus/Beis Hamedrash. They paid for several talmidei chachamim to sit in the Klaus and learn all day.
R’ Zecharia also had the chazaka, to buy the wine that was used for Kiddush and Havdalah after Maariv, in shul every week.
What’s interesting, is that these details were all inscribed on his, and his wife’s gravestones.
Their son R’ Yosef, who was expelled from Vienna during the famous expulsion in 1670, went in his parents’ footsteps and built a Klaus in Kremsier [Kroměříž. Czech], the town where he settled.
After the expulsion from Vienna, R’ Zacharia’s Klaus was demolished, and a church has been erected in its place.
Source: Edus Beyosef, Bikurei Haitim 1865.
You must log in to post a comment. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and religious content with no unsafe elements\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides historical and religious information about a rabbi and his family. It does not contain any unsafe, inappropriate, or offensive content. The information is suitable for educational and public use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "192-0",
"llm_safety_score": 0,
"reason": "historical and religious content with no unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://kankanjournal.com/kdh22045780/",
"date": "2023-06-09T03:47:50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00663.warc.gz",
"language": "en",
"language_score": 0.9826309085,
"token_count": 254,
"score": 3.09375,
"int_score": 3
} |
<urn:uuid:5ba64052-1a7c-49ed-9dc3-7f535aafc7fe> | Andalusian researchers, led by the University of Granada, have discovered a curious characteristic of the members of the human lineage, classed as the genus Homo: they are the only primates where, throughout their 2.5-million year history, the size of their teeth has decreased alongside the increase in their brain size.
The key to this phenomenon, which scientists call “evolutionary paradox”, could be in how Homo’s diet has evolved. Digestion starts first in the mouth and, so, teeth are essential in breaking food down into smaller pieces. Therefore, the normal scenario would be that, if the brain grows in size, and, hence, the body’s metabolic needs, so should teeth.
However, in the case of Homo, this has not been the case, according to scientists in an article recently published in the journal BioMed Research International. The main author of the study, researcher Juan Manuel Jimenez Arenas, from the University of Granada’s Department of Pre-History and Archaeology, points out that “This means that significant changes must have occurred in order to maintain this trend”.
A change in diet, incorporating a higher amount of animal food, must have been one of the keys to this phenomenon. The quality leap in Homo’s diet, through a greater intake in animal proteins, fats and certain olio-elements, is essential for a correct working and maintenance of the brain. On a similar note, a larger brain allows greater social and cultural development, which, at that time, led to the achievement of important technological innovations.
In order to validate this theory, the researchers evaluated the relationship between the size of post-canine teeth and the volume of the endocranium in a wide set of primates, among which were found the main representatives of Homo fossils. “Before we started the study, it was well known that, throughout the evolution of humans, tooth-size diminished and brain-size increased. We have established that they are two opposing evolutionary trends that have been linked for 2.5 million years, when our first ancestors within the Homo genus first appeared on the evolutionary stage”.
The study’s authors also relate these changes to the inactivation of gene MYH16, linked to temporalis musculature, which fell in size approximately 2.4 million years ago. This would do away with an important barrier for encephalization (a hypertrophied temporalis musculature prevents the development of the cranial dome). Likewise, they analyzed their relationship with the inactivation of gene SRGAP2, which helps towards the evolution of the neo-cortex, playing a principal role in human brain development.
This study has been carried out thanks to the collaboration of Juan Manuel Jiménez Arenas, along with three renowned lecturers and researchers from the University of Malaga: Paul Palmqvist and Juan Antonio Pérez Claros, from the Dept. of Ecology and Geology, and Juan Carlos Aledo, from the Dept. of Biochemistry and Molecular Biology.
Header Image : Left: Upper and lower views of cranium OH5 (Paranthropus boisei). Right: Same views of Homo Sapiens cranium.
Contributing Source : University of Granada | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text is a scientific article discussing the evolution of human teeth and brain size over 2.5 million years. It contains no unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and scientific, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "193-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.heritagedaily.com/2014/04/homo-is-the-only-primate-whose-tooth-size-decreases-as-its-brain-size-increases/102677",
"date": "2023-06-09T04:53:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00663.warc.gz",
"language": "en",
"language_score": 0.9344370365,
"token_count": 676,
"score": 3.59375,
"int_score": 4
} |
<urn:uuid:eb953659-6062-46e4-ad8f-36233ff1932f> | NUTRIENT STATUS OF APPLE ORCHARDS’ SOIL OF DISTRICT ZIARAT BALOCHISTAN
Poor apple yields and widespread nutrient shortages in Baluchistan’s apple-growing region are attributable to a combination of factors. Salinity, alkalinity, calcareousness, low organic matter, and macro- and micronutrients are the main determinants among these. A study was planned in the Balochistan region of Ziarat to investigate the soil macro and micronutrient quality of fifty apple orchards. Soil samples were taken from two tehsils i.e. Ziarat and Sanjavi. Textural class, organic matter percentage, pH, EC, soil macronutrients like nitrogen (N), phosphorus (P), and potassium (K), as well as micronutrients like copper (Cu), iron (Fe), manganese (Mn), and zinc(Zn) were determined for the samples. The findings revealed that apple orchard soil could be classified into three types based on texture: loam, silt and sandy loam with silt loam accounting for 82 % of the samples. The coefficient of variation showed narrow spread of electrical conductivity data and all 100% orchard soils were non-saline. The pH values illustrated that 92% soils were classified as moderately alkaline (7.9-8.4), 6% as slightly alkaline (7.4-7.8) and 2% as strongly alkaline. Total organic matter content was typical of our soils and was as low as 0.31% and as high as 2.91% with average values of fifty orchards as 1.39%. The results revealed that majority of 54% apple orchards had appropriate quantities of organic matter. Total N, AB-DTPA extractable nutrients i.e. P, K, Cu, Fe, Mn and Zn were in the range of 0.02-0.13%, 0.26-9.41, 21.0-203.60, 0.21-1.35,0.25-6.29, 0.41-65.97 and 1.80-27.01 mg kg-1 respectively. On percent basis, 38, 72, 50, 74 and 10 apple orchard soils were correspondingly low in N, P, K, Fe and Mn. While, 46%, 24%, 44%, 26%, 20% orchard soils were marginal in N, P, K, Cu and Fe. Only 16%, 4%, and each 6% were adequate in N, P, K and Fe. In case of Cu (74%) and Mn (90%), majority of the soils were adequate. While 100% was adequate in Zn. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a scientific study about the nutrient status of apple orchards' soil in the Ziarat district of Balochistan. It discusses soil properties and nutrient levels without any unsafe, inappropriate, or harmful content. The language is respectful and the themes are entirely related to agricultural and scientific research, making it fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "194-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://fuuastjb.org/index.php/fuuastjb/article/view/676",
"date": "2023-06-10T14:16:11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00663.warc.gz",
"language": "en",
"language_score": 0.9632134438,
"token_count": 575,
"score": 2.53125,
"int_score": 3
} |
<urn:uuid:b0b958ae-b532-42b0-a4ff-a454952314c7> | Our original group gained inspiration by the close interaction between both basic scientists and medical doctors trained by the interdisciplinary IMPRS-TP and a translational course IMPRS-TP offers on the clinical manifestation of psychiatric disorders. During this course and from discussions between the basic scientists and medical doctors of the group it became clear to us that there is high prevalence of psychosis in adolescents who have consumed cannabis. This was enough for us to research on the subject and choose this as the first worthwhile topic to communicate to the general public, especially to adolescents who are at a critical period for the onset of cannabis-related psychotic symptoms. So, we came up with the idea of writing an article for Frontiers for Young Minds, a peer-reviewed journal in which the reviewers and the target audience are children and adolescents. Our main focus of the article was to connect epidemiological data that correlate cannabis use and psychotic symptoms with the basic biological mechanisms that are dysregulated in the adolescent brain after cannabis consumption. In that way, we hoped to achieve two things: first, provide in a language accessible to children a reference for the risk of using cannabis in relation to psychiatric problems and second, show that psychiatric phenotypes and disorders are connected with dysregulated underlying biological mechanisms in the brain. Especially with the latter, we additionally aim to battle, early in the life of the children, the still existing beliefs that psychiatric disorders are different from other physical diseases. So, our efforts added up in an article published in Frontiers for Young Minds in May 2020 entitled: “Be careful what you feed your brain: cannabis and mental health”. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses scientific research and educational content related to the effects of cannabis on adolescent mental health. It is written in a manner suitable for a peer-reviewed journal aimed at children and adolescents. There is no inappropriate language, harmful themes, or unsafe content that would warrant a higher safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "195-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.imprs-tp.mpg.de/140776/media",
"date": "2023-06-10T15:28:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00663.warc.gz",
"language": "en",
"language_score": 0.9525163174,
"token_count": 325,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:b9333d2a-f9f1-4dbc-b7a6-7f5c6c028afb> | 23 SES 08 A, The Nordic Vision of a School for All Meets the Neo-Liberal Education Policy. Part 1. Reports from Five Countries
Symposium, Part 1
Behind the introduction of a public primary school in 1842 was the idea of education for all its children and youth. These discussions were intense among the political parties in Sweden throughout the 19th century and reached its culmination in preparation of the compulsory school reform in 1962. The vision of a school for all, where all children from the society met, has been one of the cornerstones in the social democratic building of an equal and democratic society from the 1960s to 1980. But time changes and this is no longer the case in the 21st century and the new era of globalisation and market-oriented education, or is it? What has become of the vision of a school for all? There is evidence from e.g. PISA that the school for all are under threat. At the same time it is obvious that system-building continues with school laws that strengthen the rights of children. And furthermore attitude studies show that the great majority of the students like in school and state that they learn. Could it be asserted that a school for all still holds true but is instead fulfilled through strengthening the rights of each child in school?
- Search for keywords and phrases in "Text Search"
- Restrict in which part of the abstracts to search in "Where to search"
- Search for authors and in the respective field.
- For planning your conference attendance you may want to use the conference app, which will be issued some weeks before the conference
- If you are a session chair, best look up your chairing duties in the conference system (Conftool) or the app. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is an academic discussion about the history and evolution of the public school system in Sweden. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "196-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://eera-ecer.de/ecer-programmes/conference/6/contribution/18323",
"date": "2023-09-21T07:58:29",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00063.warc.gz",
"language": "en",
"language_score": 0.9552761912,
"token_count": 357,
"score": 2.71875,
"int_score": 3
} |
<urn:uuid:b5d408da-a217-484c-b696-6bec92a6ae01> | 1. Open with discussion of narrative characteristics Greeks and Romans myths.
2. Gods and Heroes comparison interactivity conducted throughout videoconference.
3. View and discuss depictions of Hercules and other gods and heroes in ceramics and sculpture.
4. Using objects from the Cleveland Museum of Art collection such as a sarcophagus, tapestries, and paintings, review myths of Orestes and Perseus.
Students will be able to compare gods and heroes of Greece and Rome, including Hercules, Orestes and Perseus.
Students will understand the importance of mythology in Greek and Roman culture.
Students will learn the characteristics of myth and understand how culture is revealed through the stories it tells.
Students will be introduced to the cultural and historical context of selected works of art and learn how art can tell a story.
Students will be introduced to the characteristics of mythology and learn that ancient myths, legends, and stories are used to explain the natural world, to teach morals, and to entertain.
All programs are aligned with the National Education Standards, the Ohio Department of Education Academic Standards, and New York State Learning Standards. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a detailed lesson plan for a videoconference discussing Greek and Roman mythology. It contains no unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and suitable for all audiences, including children. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "197-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.cilc.org/ContentProvider/Program.aspx?id=514",
"date": "2023-09-21T10:14:42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00063.warc.gz",
"language": "en",
"language_score": 0.9188947678,
"token_count": 231,
"score": 4.0625,
"int_score": 4
} |
<urn:uuid:b5f76bb2-35af-4215-b295-e12f5d7786a9> | Scientists from the Oregon State University (OSU) School of Pharmacy in the United States have demonstrated the possibility of using lipid nanoparticles and messenger RNA in animals, the technology on which COVID-19 vaccines are basedto treat blindness associated with a rare genetic disease.
The researchers developed nanoparticles capable of penetrating the neural retina and administer mRNA to the photoreceptor cells whose proper functioning makes vision possible, as published in the journal ‘Science Advances’.
The study, led by OSU Associate Professor of Pharmaceutical Sciences Gaurav Sahay, Oregon State doctoral student Marco Herrera-Barrera, and Oregon Health & Science University Assistant Professor of Limitation of Ophthalmology Renee Ryals, has passed the The main reason for using lipid nanoparticles (NPLs) to transport genetic material for vision therapy purposes: getting it to the back of the eye, where the retina is located.
Lipids are fatty acids and similar organic compounds, including many naturally occurring oils and waxes. Nanoparticles are tiny fragments of material that range in size from one to one hundred billionth of a meter. Messenger RNA instructs cells to make a certain protein.
The model with the coronavirus
In the case of coronavirus vaccines, the mRNA carried by PCNLs instructs cells to make a harmless fragment of the virus’s spike protein, triggering an immune response from the body. In the treatment of vision disorders due to hereditary retinal degeneration (DHR), the mRNA would instruct photoreceptor cells, defective due to a genetic mutation, to manufacture the proteins necessary for vision.
The DHR encompasses a group of disorders of varying severity and prevalence that occur in one in thousands of people worldwide.
mice and primates
The scientists demonstrated, in research with mice and non-human primates, that peptide-equipped NPLs were able to cross the barriers of the eye and reach the neural retina, where the light is transformed into electrical signals that the brain converts into images.
«We identified a new set of peptides capable of reaching the back of the eye,» explains Sahay. «We use these peptides as zip codes to transport nanoparticles with genetic material to the desired address within the eye.»
«The peptides we have discovered can be used as targeting ligands directly conjugated to silencing RNAs, small molecules for therapeutics, or as imaging probes,» adds Herrera-Barrera.
Sahay and Ryals have received a grant of 3.2 million dollars (almost 3 million euros) from the National Eye Institute of the United States to continue studying the promise of lipid nanoparticles in the treatment of hereditary blindness. They will lead research into using lipid nanoparticles to deliver a gene-editing tool that could remove defective genes from photoreceptor cells and replace them with properly functioning genes.
The goal of the research is to develop solutions to the limitations associated with the current main means of delivery for gene editing: a type of virus known as adeno-associated virus (AAV).
«AAV has limited packaging ability compared to NPLs and can elicit an immune system response,» Sahay explains. «In addition, it doesn’t express very well the enzymes that the editing tool uses like molecular scissors to cut DNA.» what is going to be editedR. use we we have learn to now about the NPL to development an improved system of Administration of editors genetics». | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a scientific article discussing research on using lipid nanoparticles and messenger RNA to treat blindness associated with a rare genetic disease. There is no unsafe, inappropriate, or harmful content in the text. It is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "198-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://adonemagazine.com/researchers-take-key-step-toward-new-treatment-for-hereditary-blindness/",
"date": "2023-09-22T12:50:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00863.warc.gz",
"language": "en",
"language_score": 0.9081269503,
"token_count": 712,
"score": 3.53125,
"int_score": 4
} |
<urn:uuid:c7e3cc12-c1cc-4f96-8630-3a76cbe39e23> | Dec. 10, 2018
How do we know that humans are still evolving?
Humans’ life span is not as short as other species so it can be hard to see our evolution overtime but the fact of the matter is that like all other species humans are still evolving. Evolution is caused by natural selection which is labile. Today, many long-term studies, such as the Framingham study, have identified trends that have altered different communities overtime. Evidence that humans are still evolving includes human’s ability to digest milk beyond infancy, variation in skin colour and height, birth patterns and resistance to malaria.
Humans are still evolving and one of the evidences that supports this claim is human’s ability to digest milk. Before humans began to domesticate animals and rely on dairy farming as a source of obtaining energy, adult humans were unable to digest lactose, a sugar found in milk. Essentially our bodies start tolerating the food source that is most abundant in our region. Lactose which was only digested by animals and infants before, can now be digested by adult humans. Lactose is broken down into two subunits; galactose and glucose by an enzyme called lactase. Today, humans from areas that have a long history of dairy farming such as Europe are able to digest milk better than those originating from areas where dairy farming wasn’t as popular such as Asia. As a result, some people of European descent and many people of Asian descent are lactose intolerant. Human adults began to digest milk because short patches of DNA outside the lactase gene started regulating its activity. About 7000 years ago, people started domesticating cattle, sheep, goats and camels for the purpose of dairy farming in Europe. Before that the ancient Europeans relied on energy from food obtained by hunting, fishing and gathering. Lactose tolerance is increasing substantially in the British population. By being able to obtain energy from lactose which makes up 30% of the calories found in milk, women who are lactase-persistent are able to use this energy in order to have a healthier children at a young age. Since women who are lactase-persistent have children at a young age, they are able to give birth to overall more children in their lifetime than those who are lactase-resistant. Slowly, mutations affecting the lactase gene became dominant and in every generation the population of those with lactose tolerance grew by 10%. Along with lactose tolerance, variation in skin colour and height are also pieces of evidence that prove that humans are still evolving.
Skin colour is a very obvious physical difference between different communities. More than 24 genes are involved in the production of melanin and its regulation in different tissues. When these genes are altered the production of eumenalin, the dark pigment, is affected and the skin contains mostly the reddish skin pigment, pheomelanin. As a result many skin tones and patterns... | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the evolution of humans and the ability to digest milk beyond infancy, which is a scientific topic and does not contain any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "199-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://ostatic.com/essays/how-do-we-know-that-humans-are-still-evolving-biology-assignment",
"date": "2023-09-22T10:51:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00863.warc.gz",
"language": "en",
"language_score": 0.9681452513,
"token_count": 599,
"score": 3.625,
"int_score": 4
} |
<urn:uuid:8a2d1122-3b23-4a89-9482-3abcc99fbed7> | Budgies, either adult or fledgling, cannot go without food and water for long due to their high metabolism.
Adult budgies can manage up to 12 hours, but past this point, their condition worsens rapidly.
For baby budgies, the timeline is even shorter, showing signs of weakness and lethargy within just 6 hours of no feeding.
As someone who has raised budgies, I have been frequently asked, “How long can budgies go without food and water?” This question is usually asked by people who will be away from home for a few days.
The answer varies depending on whether we’re talking about adult budgies or their tiny, fluffy fledgling counterparts.
Here’s a comprehensive, hour-by-hour and day-by-day breakdown of what happens when these lively birds are deprived of their basic necessities.
How Long Can Adult Budgies Go Without Food And Water?
When it comes to adult budgies, these lively birds have a high metabolism and eat frequently throughout the day.
So what happens when they can’t access food or water? Here’s a detailed, stage-by-stage explanation, from the first hour up to three days.
For the first 12 hours without food or water, an adult budgie can still maintain its energy levels.
You might find it surprising, but these birds have an impressive capability to tap into their energy reserves.
You will probably see your budgie being its usual chirpy self, moving around, and possibly displaying normal behavior.
This resilience, however, won’t last long as the clock continues to tick.
After the initial 12 hours, signs of distress start creeping in.
Your budgie may become less active, spending more time resting.
A common response to this stress is fluffing up their feathers, a way to conserve heat as their body starts to feel the impact of no food or water.
Without any intervention at this point, the budgie’s condition can quickly deteriorate.
Fast forward to the first 24 hours, and into the second day, your budgie will be severely weakened.
The previously active bird now becomes visibly lethargic, may seem disoriented, and will likely stop vocalizing.
It’s a desperate call for help.
Its body starts shutting down as it can no longer function without nutrition.
Organ failure is imminent unless there’s immediate intervention.
Between the second and third day, the budgie teeters on the brink of death.
The effects of dehydration and starvation have caused significant damage, leading to serious organ failure.
Immediate veterinary attention is now a must.
Unfortunately, even with professional care, the chances of survival are grim.
It’s a somber testament to how crucial regular access to food and water is for these small, vibrant creatures.
How Long Can Baby Budgies Go Without Food And Water?
The story is markedly different when we consider baby budgies, also known as fledglings.
These tiny creatures are still developing, and their need for regular feeding is even more acute.
Let’s examine what happens when a baby budgie goes without food or water for various periods.
Baby budgies typically rely on their parents for feeding every 1-2 hours.
So, when deprived of food or water, the first 6 hours can already cause noticeable effects.
Their small bodies begin to lose heat rapidly, their response levels drop, and they grow noticeably weaker.
The chicks’ vulnerability is alarming, as a mere few hours without feeding can lead to drastic changes.
During the next phase, from 6 to 12 hours, the situation gets progressively worse.
The baby budgie’s growth starts to decline, its responsiveness reduces, and signs of dehydration begin to appear.
The once active and noisy chick now seems much weaker, displaying clear signs of lethargy.
At the 12 to 24-hour mark, the baby budgie’s life hangs in the balance.
Its little body is now severely dehydrated, and essential systems begin to shut down.
The chick’s responses to stimuli will likely be minimal if at all present.
It’s a heartbreaking sight and a critical moment that requires urgent action.
The scenario at day 1-2 is bleak.
The chick is now in critical condition, and survival without immediate veterinary intervention is highly unlikely.
At this crucial stage of development, a lack of nourishment can lead to irreversible damage or even death.
It’s a stark reminder that baby budgies need constant care and regular feeding to ensure their healthy growth and survival.
Diving into the world of budgies brings up a multitude of questions.
Let’s address some of the most frequently asked queries about these fascinating little birds.
Is There A Food Or Drink That Will Keep Budgies Full For A Long Time?
In their natural habitat, budgies thrive on a varied diet of seeds, fruits, vegetables, and even insects.
In captivity, most owners rely on a seed mix along with fresh fruits and vegetables to keep their budgies well-fed.
Unfortunately, no specific food or drink can keep them full for an extended period due to their fast metabolism.
Regular feeding is essential for their health and wellbeing.
How Long Do Budgies Naturally Starve In Their Natural Habitat?
In the wild, budgies usually don’t experience long periods of starvation.
Their natural environment in Australia is abundant with food sources.
However, during extreme weather conditions or environmental changes, food might become scarce.
But, budgies are known for their adaptability and can often find food even in harsh conditions.
What Are The Reasons Why Budgies Cannot Stay Hungry And Thirsty For A Long Time?
Budgies have a high metabolic rate, which means they burn through their food supply quite quickly.
They need to eat often to keep up their energy levels.
If they go without food or water for too long, their bodies begin to shut down, leading to severe health complications or even death.
How Often Do Budgies Eat At Intervals?
Budgies usually eat multiple times throughout the day.
You might observe them nibbling on their food every few hours.
This frequent feeding pattern aligns with their high metabolic rate, requiring them to consume food regularly to maintain energy.
How Often Do Budgies Drink Water At Intervals?
Budgies drink water at least once or twice a day, depending on the temperature and their diet.
If their diet includes fresh fruits and vegetables, they might drink less as they get some hydration from these foods.
However, clean and fresh water should always be available.
How Often Do Baby Budgies Eat At Intervals?
Baby budgies, or fledglings, are typically fed by their parents every 1-2 hours.
At this early stage of their lives, frequent feeding is critical for their growth and development.
How Often Do Baby Budgies Drink Water At Intervals?
Young budgies acquire most of their hydration needs from the food their parents feed them.
As they grow and start to eat independently, they will learn to drink water as well.
Why Do Budgies Need To Eat So Often?
Due to their high metabolic rate, budgies need to consume food frequently to supply the energy their bodies require.
Regular eating helps them maintain their bodily functions, keep their energy levels up, and stay healthy.
What Is The Amount Of Food And Water That Budgies Should Eat Daily?
The daily food requirement for budgies can vary based on their age, size, and activity level.
However, a general guideline is to provide 1.5 to 2 teaspoons of seed mix per budgie daily.
In addition, fresh vegetables and fruits should be part of their diet.
For water, ensure there is always fresh, clean water available for your budgie, replacing it at least once a day.
How Do Budgies Survive Without Food And Water In The Wild?
In their natural habitat, budgies often face periods without access to food and water.
However, they have developed adaptive behaviors to survive these situations.
For instance, budgies may travel vast distances in search of food and water, relying on their stored energy reserves to keep them going.
Despite this, their high metabolic rate means they can’t endure long periods of scarcity, unlike some other bird species.
Can Budgies Drink Any Other Liquid Besides Water For Hydration?
Budgies, like most birds, primarily drink water for hydration.
However, they can also obtain moisture from the fresh fruits and vegetables in their diet.
Despite this, it’s important to remember that these cannot substitute for water entirely.
A constant supply of fresh, clean water is still essential for their health and wellbeing.
How Can You Tell If Your Budgie Is Hungry Or Thirsty?
Budgies show certain signs when they’re hungry or thirsty.
They may become more vocal, exhibit restlessness, or peck at their empty food and water dishes. Physical signs can include a hunched posture, ruffled feathers, and a lack of activity.
What Are The Long-Term Effects Of Malnutrition On Budgies?
Long-term malnutrition in budgies can lead to numerous health problems.
This includes weakened immunity, making them more susceptible to diseases; decreased energy levels, which can affect their activity and behavior; and stunted growth in fledglings.
In severe cases, prolonged malnutrition could lead to organ failure and death.
How Can I Prevent My Budgie From Going Without Food And Water?
Preventing your budgie from going without food and water involves regular feeding, maintaining a balanced diet, and ensuring a constant supply of fresh water.
In addition, monitoring your budgie’s eating and drinking habits can help you spot any changes that might suggest a health problem. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides educational information about the needs of budgies regarding food and water, which is appropriate for an educational environment. The content is factual and does not contain any unsafe or inappropriate elements.",
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is entirely educational and informative, providing details about budgie feeding and hydration habits. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "200-0",
"llm_safety_score": 0,
"reason": "educational content"
},
{
"custom_id": "200-1",
"llm_safety_score": 0,
"reason": "educational and informative content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.petiska.com/how-long-can-budgies-go-without-food-and-water-adult-baby-hour-by-hour-day-by-day-what-will-happen/",
"date": "2023-09-22T11:48:19",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00863.warc.gz",
"language": "en",
"language_score": 0.9417845607,
"token_count": 2108,
"score": 2.9375,
"int_score": 3
} |
<urn:uuid:78095608-8054-4312-b2d6-3169b0b8e689> | Not all cognitive collaborations are equally effective. We tested whether friendship and communication influenced collaborative efficiency by randomly assigning participants to complete a cognitive task with a friend or non-friend, while visible to their partner or separated by a partition. Collaborative efficiency was indexed by comparing each pair’s performance to an optimal individual performance model of the same two people. The outcome was a strong interaction between friendship and partner visibility. Friends collaborated more efficiently than non-friends when visible to one another, but a partition that prevented pair members from seeing one another reduced the collaborative efficiency of friends and non-friends to a similar lower level. Secondary measures suggested that verbal communication differences, but not psychophysiological arousal, contributed to these effects. Analysis of covariance indicated that females contributed more than males to overall levels of collaboration, but that the interaction of friendship and visibility was independent of that effect. These findings highlight the critical role of partner visibility in the collaborative success of friends.
Citation: Brennan AA, Enns JT (2015) What’s in a Friendship? Partner Visibility Supports Cognitive Collaboration between Friends. PLoS ONE 10(11): e0143469. https://doi.org/10.1371/journal.pone.0143469
Editor: Marina A. Pavlova, University of Tuebingen Medical School, GERMANY
Received: June 26, 2015; Accepted: November 5, 2015; Published: November 30, 2015
Copyright: © 2015 Brennan, Enns. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited
Data Availability: All relevant data are within the paper and its Supporting Information files.
Funding: This research was supported by a Doctoral Scholarship from the Natural Sciences and Engineering Research Council of Canada to A.A. Brennan and a Discovery Grant from the Natural Sciences and Engineering Research Council of Canada to J.T. Enns. No individuals employed or contracted by the funders (other than the named authors) played any role in study design, data collection and analysis, decision to publish, or preparation of this manuscript.
Competing interests: The authors have declared that no competing interests exist.
Research in cognitive psychology has recently begun to acknowledge what others have noted since ancient times: humans are social animals by nature (Aristotle, 4th century BCE). Social influences on human cognitive processes are now being studied aggressively in research domains that previously focused primarily on the individual, including attention , perception , memory , and language . The focus of the questions is also shifting, with greater emphasis now being placed on the dynamic social interactions that occur between people and less on the factors that influence social cognition in an individual (see [5–6] for reviews).
These lines of inquiry have demonstrated that not all social interactions are equally rewarding. As Gilbert noted, “it’s not marriage that makes you happy, it’s happy marriage that makes you happy.” Such diversity in outcome is also true of cognitive collaboration in field studies; teams with an intermediate density of social connections amongst collaborators made more successful Broadway musicals than those with weaker or stronger connections , teams produced higher impact research when collaborators were geographically closer to one another and when more researchers contributed to the project . In the lab, the success of teams on collaborative tests of intelligence has been associated with the average social sensitivity of team members and their equity in conversational turn-taking, rather than with individual intelligence, group cohesion, motivation, or satisfaction . In a recent study we showed that the efficiency with which two people collaborated on a task of visual cognition was correlated with the strength of their pre-existing friendship and their equity in communication .
While these studies establish important associations between aspects of social interaction and collaborative success, it is important to note that they do not test the direction of the relationship. That is, the foregoing studies did not test whether the quality of the social interaction influenced the success of collaboration, or whether collaborative success influenced the quality of the social interaction, or even whether a third factor influenced both social interaction and collaborative success.
Here we use an experimental design to test whether the quality of social interaction between friends (versus non-friends) and partner visibility influence collaborative success. Study participants were assigned randomly to collaborate with either a friend or a non-friend (i.e., the friend of another participant). One half of these teams were further assigned randomly to work together while separated by a partition that prevented pair members from seeing one another. Not being see one another meant that these pairs could not communicate using body language, such as eye contact, gesture, and posture. The remaining one half of the teams collaborated while partners were fully visible to one another.
We focused on the possible effects of friendship and partner visibility, using a randomized between-subject design, because previous research provides inconsistent evidence about the directional relations among these factors and collaborative success. With regard to friendship, research suggests that friendship influences group productivity, but some studies report greater group productivity among groups with stronger preexisting friendships [13–14], while others report that stronger friendships are linked to reduced productivity [15–16]. However a meta-analysis suggests the opposite structure, reporting that successful group performance influences cohesiveness more than group cohesiveness influences performance . Complicating the interpretation of these relations even further, it is possible that a third factor such as social intelligence may mediate both good rapport and successful group performance.
The direction of the relation between communication and collaborative success is equally unclear. Previous research reports a trading relation between the channel of communication and collaborative success. Collaborative visual search was faster than individual search when pairs communicated verbally, and also when they communicated nonverbally using a gaze cursor that displayed each person’s eye movements to their partner. However search efficiency was impaired, relative to these conditions, when pairs were given the opportunity to communicate both verbally and nonverbally [18–20].
Previous research has also reported mixed results on the role of partner visibility in collaborative success. Participant pairs who were visible to one another while collaborating on a navigation task outperformed those who were not . However when pair members were able to see each other via video-mediated communication during collaborative problem solving, it did not improve performance to the same extent as face-to-face interaction . On the other hand, a comparison of online texting versus face-to-face interactions on a variety of group tasks of intelligence showed no advantage for the face-to-face condition .
Aside from the trading relations between the channels of communication described above, research has shown that verbal communication is consistently associated with collaborative success. In some past research, the opportunity to communicate verbally during collaboration was reported to be more important than accuracy feedback . When teams performing a perceptual detection task were allowed to freely discuss their decisions, they were more efficient than when they used a numerical scale to communicate their confidence . Moreover, team members that used a similar task-relevant vocabulary were more efficient than teams who communicated using different descriptors and figures of speech .
In addition to experimentally testing the direction of the relation between friendship, the role of partner visibility, and collaborative success, we thought it was also important to monitor the possible role of social facilitation in collaborative efficiency. Social facilitation is the tendency for performance to improve when a task is completed in the presence of others; it has been shown in hundreds of studies (for reviews see [27–28]). Drive theorists (e.g., ) have argued that physiological arousal underlies this effect, such that the mere presence of another person heightens an individual's arousal, leading to improved performance. In the present study we therefore monitored the psychophysiological arousal of participants in all conditions. Skin conductance response (SCR) and heart rate (HR) were our indices; SCR measured sympathetic affective arousal and HR measured more generalized arousal and bodily state . We noted that HR is also influenced by factors other than arousal such as verbal speech, which was used by participants during team performance, but not individual performance . These measurements were intended to reveal the role of HR and SCR, if any, in the conclusions drawn on the roles of friendship and partner visibility in the efficiency of cognitive collaboration.
It is important to note that we measured HR and SCR, not because we thought they would mediate the effects, but because we wished to rule them out as intervening variables. For this reason, it was also important to show that these measures moved, as they should, when participant arousal was artificially elevated with a startle manipulation. This manipulation check provided necessary context for the null results we expected would occur for HR and SCR in our four experimental groups. Our guiding hypothesis was that the collaborative advantage results from an efficient division of the cognitive load of the task between team members, not from social facilitation mediated by arousal. We used analysis of covariance to consider the role of arousal in the potential influences of friendship and partner visibility on cognitive collaboration. We also used the same approach to consider the gender composition of teams (coded as 0, 1, or 2 females) and their potential contributions to these interactions.
Research has shown that visual search is effectively limited to one item at a time . Therefore performance should improve when two people divide the search task between them such that each person looks for a different target. Of course team members must also coordinate how they will share the task and integrate their individual efforts prior to their joint response, which are processes that require effort and time. We hypothesize that collaborations will be most successful when partners are able to communicate their unique information quickly and efficiently to one another, while at the same time focusing their attention on the visual search task at hand. Friendship should facilitate collaboration through pre-existing efficient channels of communication; partner visibility should aid further by allowing some of that communication to be nonverbal.
Thirty-seven University of British Columbia students registered for the study using an online research participation system. During registration participants provided the name and email contact of a friend who was also registered in a psychology course and seeking to earn extra course credit. This created a pool of seventy-four total study participants. To test the influence of friendship on team performance, 40 participants were randomly assigned to participate with the friend they indicated during registration (30 female, 10 male; age mean = 20.50), and 34 participants were randomly assigned to participate with the friend that another participant had indicated during registration (16 female, 18 male; age mean = 20.85). This created 20 pairs of friends and 17 pairs of non-friends using the same recruitment method. Four pairs were male-male, 20 pairs were female-male, and 13 pairs were female-female. We selected this sample size with reference to Brennan and Enns , who reported a significant association between friendship strength and collaborative efficiency in 22 pairs of friends. Eleven of the pairs tested had partial data loss (missing behavioral data: N = 1 female-female pair of friends; incomplete video data: N = 4; psychophysiological recording errors: N = 6). Table 1 shows the gender composition of the four conditions in the experiment, after randomly assigning participants to these conditions and omitting teams with missing behavioral data. All participants provided written informed consent and were debriefed in accordance with APA guidelines. The University of British Columbia Behavioural Research Ethics Board (H09-01732) approved this research.
To test whether the critical communication channel in team performance was verbal or nonverbal, one half of pairs of friends and non-friends were randomly assigned to complete the team task with a partition between them that prevented partners from seeing each other. The remaining one half of pairs of friends and non-friends completed the task with full sight of their partners. The partition was a standard office divider (108 cm X 149 cm X 4 cm). Pairs in both partner visibility conditions had equal ability and opportunity to communicate verbally because the partition did not interfere with sound transmission nor alter the procedure of the task. The data showed that team members interacted even when they were not visible to each another because they communicated verbally (see Verbal communication below).
Search displays, apparatus, and procedure
As shown in Fig 1, experimental displays depicted wire shelving containing 82 distractor objects commonly found in a home or office and 0, 1, or 2 of 4 possible targets. The same target never appeared twice in a display and each appeared equally often in each quadrant. Distractor objects appeared in four different configurations. This generated 356 displays: 4 without a target, 64 with one target, and 288 with two targets. Sessions were 60 trials in length: 20 trials each with 0, 1, and 2 targets. Search displays for each session were selected using weighted random sampling of the 356 total search displays. Displays subtended 40° x 32° visual angle on a 24-inch iMac computer (screen resolution 1920 X 1200 pixels). The experiment was controlled by Matlab 2010a software and Psychtoolbox3.
Participants searched displays and indicated whether 0-, 1-, or 2-targets were present. This display contains 2 targets: coffee can and penguin.
Participants completed 60 trials alone and 60 trials as a team with another participant who was either a friend or non-friend (see Participants above for additional detail). A partition that prevented nonverbal communication separated one half of the teams of friends and non-friends. Shown in Fig 2, this created four experimental conditions: friends/partition, friends/visible, non-friends/partition, and non-friends/visible. A randomly selected one half of pairs in each of these conditions first completed a session alone before completing a session together as a team, while the other one half first completed a session together as a team before completing a session alone.
The arrangement of collaborative participants relative to search displays (gray horizontal bars) and partitions occluding visibility of the partners (black vertical bars).
During individual and team sessions participants indicated as rapidly and accurately as possible the number of targets present in a display by pressing keys labeled 0, 1, and 2. The four possible targets remained visible throughout the sessions in pictures placed underneath the computer screen. Participants received feedback on their percentage of correct responses every 15 trials. Before beginning the experiment, they were told that sessions were video recorded for the purpose of knowing where they looked while searching. At debriefing we requested that the video recordings be used to analyze their verbal communication; all participants agreed to this request.
The procedure of individual and team sessions differed in only two ways. Teams were instructed to use whatever strategy they thought was best to work together, while individuals were instructed to use whatever strategy they thought was best. Because there was only one keyboard for responses during the team task, team members each took a turn by exchanging the keyboard after 30 trials. During individual sessions, participants each had their own keyboard and computer.
To explore whether verbal communication contributed to the effect of friendship or partner visibility on team performance, a research assistant who was naïve to the experimental hypotheses transcribed participants’ verbal communication. Transcription was completed from a video recording (Logitech HD Pro Webcam C920, 1080p) of participants, filmed while they completed the team task. Not all of the verbal communication was linguistic, and utterances such as “Ummm,” “Uh huh,” and “Umph” were included in the transcript and the following measures.
The verbal communication value was computed by counting the number of distinct utterances (i.e., words and non-linguistic utterances such as “uh huh”) made by each team member. For example, the following exchange received a verbal communication value of 12:
Person A: “Do you see anything?”
Person B: “Yep. Penguin.”
Person A: “And apple.”
Person B: “Great. So two targets.”
Verbal communication values measured the total number of distinct utterances made by team members from the start of trial 1 to the end of trial 60 during the team task. Teams spoke an average of 664.91 (SE = 46.13) utterances. Higher verbal communication values indicate that team members spoke more to one another.
To explore whether psychophysiological arousal contributed to the influence of friendship or partner visibility on team performance, heart rate (HR) and skin conductance response (SCR) were recorded during both the individual and team tasks. A BVP-Flex/Pro sensor (Model SA 9308M L5890) recorded HR from blood volume pressure (BVP) and two SC-Flex/Pro sensors (Model SA 9309M) recorded SCR. All three sensors (manufactured by Thought Technology Ltd.) recorded from participants’ left hand: HR from the palmar surface of the distal phalanx of the middle finger and SCR from the palmar surface of the distal phalanx of the index and ring fingers. Participants were instructed to minimize hand movements to avoid movement artifacts in the recordings. The sampling rate of the digitized signals of the HR and SCR sensors was 2048 Hz and 256 Hz, respectively.
As described in the introduction, we hypothesized there would not be a difference in HR or SCR between friendship and partner visibility conditions. Therefore we used an auditory startle as a manipulation check, to assess the sensitivity of our psychophysiological measures to an event that should reliably increase arousal [33–34]. An auditory startle (110–115 dB; 1000 Hz; 40 msec) followed trial 39 in both the individual and team tasks. Because both individuals did not complete trial 39 at the same time, the startle sounded after one randomly selected individual completed trial 39. Before beginning the experiment participants were informed that a loud noise would be played at two random times during the experiment.
Data are available as a Supporting Information file (see S1 Dataset).
We report the results of this study in three parts. First, collaborative efficiency was determined by comparing each pair’s team performance with a model of the optimal performance of the same two individuals working independently, following the analysis procedure used by Brennan and Enns [12, 35]. Second, we investigated whether friendship and partner visibility influenced collaborative efficiency, and whether verbal communication was associated with collaborative efficiency. Third, we tested whether psychophysiological arousal contributed to the effect of friendship and partner visibility on collaborative efficiency.
Two-person team performance exceeded an optimal performance model of the same two independent individuals
Following Brennan and Enns [12, 35], individual and team performance was compared using Miller’s Race Model Inequality (RMI) [36–37]. This model tested whether the efficiency advantage of teams over individuals was due to a statistical advantage or to collaboration between team members by comparing the distributions of correct response times (RTs) during individual and team performance. The steps of this analysis are described below.
Correct RT and accuracy.
Before assessing collaborative efficiency using Miller’s RMI, correct RT and accuracy were tested in a mixed-design analysis of variance (ANOVA) with social condition (slower individual, faster individual, team), friendship (friends, non-friends), partner visibility (visible, partition), and task order (first, second) as between-groups factors, and target number (0, 1, 2) as a repeated measures factor. All reported p-values have been corrected for violations of sphericity where appropriate, using the Greenhouse-Geisser correction. All interaction effects were tested post-hoc using Tukey’s HSD procedure.
Two people working together were faster and more accurate in the visual enumeration task than either individual working alone. Correct responses were made in an average of 11.99 sec (SE = 0.347). This analysis revealed that team enumeration was faster than enumeration by either the slower or faster individual [F(2, 84) = 41.95, p < .001, ηp2 = .50]. It also showed that enumerating 2 targets was faster than enumerating 1 or 0 targets [F(2, 168) = 177.11, p < .001, partial ηp2 = .68]. The task done second was also significantly faster than the same task done first, [F(1, 84) = 86.36, p < .001, ηp2 = .51].
There was a significant interaction such that the difference between team and individual RT was greater with 0 and 1 targets than with 2 targets [F(4, 168) = 8.19, p < .001, partial ηp2 = .16]. No other effects were significant at p < .05, including the effect of friendship or partner visibility. Most important was the absence of significant interaction involving task order, indicating that the task done second was completed approximately 4 s faster than when it was done first, but that the size of this benefit did not vary with social condition.
Response accuracy was high at 86.12% (SE = 1.07). An ANOVA with the same factors used to examine correct RT revealed that accuracy declined as target number increased [F(2, 168) = 29.45 p < .001, partial ηp2 = .26] and that the task done second was approximately 7% more accurate than the task done first [F(1, 84) = 23.86 p < .001, ηp2 = .22]. Task order did not interact significantly with social condition [F(1, 84) = 1.38, p = .258, ηp2 = .03], indicating that the benefits of teamwork were not dependent on testing order. No other effects were significant at p < .05, including the effect of friendship or partner visibility.
A comparison of the correct RT and accuracy data pointed to a speed accuracy tradeoff involving target number. Participants generally made more rapid responses to 2 targets than to 0- and 1-targets (a mean reduction of 5 seconds in RT) at the expense of accuracy (a reduction in accuracy of 7.5%). Because of this, we submitted the high accuracy RTs in the 0- and 1-target conditions to an RMI analysis of correct RT. This included forty trials of data for each friendship X partner visibility condition, minus the small number of trials in which an error occurred. The results that follow do not differ in any important way when we included the more error-prone data in the 2-target condition.
The algorithm and MATLAB routines provided in were adapted to compare team performance to the optimal performance of the same two individuals alone. This method of calculating collaborative efficiency is ideal because it parses the statistical advantage of teamwork from the collaborative advantage of teamwork [12, 35]. Collaborative efficiency was calculated in 3 steps. First, cumulative density functions (CDFs) of each team’s correct RTs were generated. Each CDF contained a total of forty correct RTs, less the small number of errors that were committed. Second, CDFs of the optimal performance of two individuals alone were generated by combining individual team member’s correct RTs into one distribution, and truncating this distribution at the number of RTs in the collaborative team CDFs. Third, a collaborative efficiency value was generated for each team by subtracting the two-person team performance CDF was from the CDF of the optimal performance by two individuals alone. The difference between these distributions indicates the extent of the performance improvement that resulted from collaboration between team members. Positive values indicate that two-people performed better as a team compared to the model of their optimal performance as two individuals, whereas negative values indicate that the optimal performance model of two individuals surpassed the performance of two-person teams.
Multiple Bonferroni-corrected paired sample t-tests at 10 percentiles along the CDFs indicated that two-person team performance exceeded a model of the optimal performance of the same two individuals at the first seventh percentiles, i.e., .05 through .65 [t(35) = 3.83, 4.32, 4.08, 3.70, 3.48, 2.81, and 2.40, respectively, all ps < .02]. The following analysis of collaborative efficiency uses the values (in msec) of each team at the first percentile tested (i.e., fast RTs at the .05 CDF), since the distinction between team performance and the optimal individual performance model was greatest here. The same pattern of results reported below was also obtained when further percentiles were included; the strength of the effects simply declined.
Partner visibility supports cognitive collaboration among friends
The effects of friendship (friends, non-friends) and partner visibility (visible, partition) were tested with a 2 X 2 between groups ANOVA. As shown in Fig 3, teams were more efficient when visible to one another than when a partition prevented team members from seeing each other [F(1, 68) = 10.45, p = .002, ηp2 = .13]. Importantly, partner visibility and friendship interacted such that friends collaborated more efficiently than non-friends, but only when they were not separated by a partition [F(1, 68) = 5.50, p = .022, ηp2 = .08]. When partner visibility was prevented with a partition, the efficiency of collaboration between friends and non-friends did not differ.
Collaborative efficiency values index the difference between team performance and the optimal individual performance model (in msec). Friends collaborated more efficiently than non-friends, but only when they were visible to each other. Error bars represent 95% confidence intervals around each mean. The asterisk denotes a significant interaction between friendship and partner visibility.
To test whether the interaction we observed between partner visibility and friendship was influenced by the gender composition of the teams, we repeated the analysis of collaborative efficiency, but this time entering gender as a covariate. We coded each team as containing 0, 1, or 2 females. The covariate of gender was significant on its own, F(1, 67) = 4.37, p = .040, ηp2 = .06, indicating that females contributed more than males to the overall collaborative benefit. But this gender effect was not itself responsible for the interaction we observed between friendship and partner visibility, which remained significant after the covariate had been taken into account [F(1, 67) = 6.67, p = .012, ηp2 = .09].
Verbal communication, on the other hand, was negatively associated with collaborative efficiency [r = -.32, p = .01], suggesting that pairs who communicated more while working together during the team task were less efficient. We further investigated this negative association between collaborative efficiency and verbal communication with a 2 X 2 between groups ANOVA on verbal communication with the factors of friendship (friends, non-friends) and partner visibility (visible, partition). Shown in Fig 4, this analysis revealed that teams of friends who were unable to see one another used the most verbal communication. This was demonstrated in main effects of friendship [F(1, 62) = 4.16, p = .046, ηp2 = .06] and partner visibility [F(1, 62) = 11.34, p = .001, ηp2 = .15], and an interaction between these two factors [F(1, 62) = 7.12, p = .010, ηp2 = .10]. To test whether this interaction was influenced by the gender composition of teams, we repeated the analysis of verbal communication, with gender as a covariate (coded as 0, 1, or 2 females). The friendship by partner visibility interaction remained significant [F(1, 59) = 6.44, p = .014, ηp2 = .10]. Here the gender covariate did not influence verbal communication on its own, [F(1, 61) = 1.08, p = .302, ηp2 = .02.
Verbal communication values indicate the total number of distinct utterances (i.e., words and non-linguistic utterances such as “uh huh”) made by team members during the team task. Teams of friends separated by a partition communicated at the highest rate. Error bars represent 95% confidence intervals around each mean. The asterisk denotes a significant interaction between friendship and partner visibility.
Together these results show that partner visibility supports cognitive collaboration among friends. When friends were visible to each other and able to communicate via body language they were more efficient than non-friends. However, when a partition prevented friends from seeing each other, they communicated verbally instead. Because verbal communication was negatively associated with collaborative efficiency, this switch from nonverbal to verbal communication reduced the efficiency of cognitive collaboration among friends to the same lower level as non-friends.
The collaborative efficiency advantage does not result from psychophysiological arousal. Arousal does not mediate the effects of friendship and partner visibility on collaborative efficiency
The HR and SCR data were re-sampled offline to 32 Hz. No data filtering was used during the following analyses. Multiple Bonferroni corrected paired sample t-tests evaluated whether psychophysiological arousal levels differed when pairs completed the task as a team versus when each individual completed the task alone. Changes in HR and SCR following an auditory startle were tested to confirm the sensitivity of psychophysiological measures. The results of these analyses are reported below.
Baseline measures of HR and SCR were computed by averaging these values during the 10 sec before the auditory startle was played during both the team and individual tasks. Following the auditory startle to a maximum of 60 sec, the highest HR and SCR were observed on average 2 sec and 15 sec after the auditory startle, respectively. The values at these time points were used to compute the increase in HR and SCR from the auditory startle in each social condition.
HR was higher when two people collaborated [M = 79.19 bpm] than when they worked alone [M = 78.17 bpm; t(61) = -3.44, p < .001, r = .40]. The auditory startle produced an increase in HR when people worked alone [t(61) = -3.42, p < .001, r = .40] and when they worked as a team [t(61) = -3.13, p = .003, r = .37]. There was no difference in SCR when pairs completed the task as a team [M = 6.03 μS] versus completed the task alone [M = 5.30 μS; t(61) = -0.92, p = .361, r = .12]. The auditory startle produced an increase in SCR when people worked alone [t(61) = -10.95 p < .001, r = .81] and when they worked as a team [t(61) = -8.47, p < .001, r = .74].
Concerning the relations between psychophysiological arousal and the factors of friendship and partner visibility, HR did not differ as a result of these factors [all ps > .13], while SCR was lower in friends than non-friends during the team task [F(1, 58) = 6.46, p = .014, partial η2 = .10]. No other SCR effects were significant [ps > .20].
To test whether the interaction we observed between partner visibility and friendship was confounded by variation in HR or SCR, we repeated the analysis of collaborative efficiency, but this time entering HR and SCR as covariates. The original interaction [F(1, 68) = 5.50, p = .022, ηp2 = .08] was still significant when HR was included as a covariate [F(1, 55) = 4.04, p = .049, ηp2 = .07], when SCR was included as a covariate [F(1, 55) = 4.31, p = .043, ηp2 = .07], and when both were included simultaneously, [F(1, 54) = 4.18, p = .046, ηp2 = .07]. Moreover, these covariates did not account for a significant proportion of variance in any of the analyses, all p-values > .40.
Not all cognitive collaboration results in a joint effort that exceeds the independent contributions of the individual people involved. This study demonstrated that friendship and partner visibility influenced the success of collaboration during a visual enumeration task. By randomly assigning participants to collaborate either with friends or non-friends (i.e., friends of other participants), this study design randomized individual ability while experimentally testing the role of friendship. The same logic applied to collaboration with full visibility of the partner versus collaboration despite a partition that occluded visibility. The results revealed a decisive interaction between these two factors: collaboration by friends was more efficient than collaboration by non-friends, but only when pair members were visible to each other. When partner visibility was prevented with a partition, the efficiency of collaboration between friends and non-friends was reduced to a similar low level.
While this study tested the role of friendship and partner visibility in collaborative success with an experimental design (i.e., participants were assigned randomly to both experimental conditions), uncertainty remains about which features of friendship and partner visibility improve collaborative performance. Additional research is needed to understand the mechanisms underlying this effect. We posit that friends who can see one another collaborate efficiently because partner visibility reduces the cognitive load during the visual enumeration task. Communication using body language, which is possible only when pair members can see each other, may be critical to cognitive load reduction. In support of this idea are previous reports that familiarity with an activity reduces the cognitive resources required to complete the activity , and familiarity with a face decreases the attentional resources required to process emotional expressions . Familiarity with a collaborator and their style of nonverbal communication therefore has the potential to reduce the cognitive resources required to communicate task relevant information, freeing these resources for the task of enumerating the target objects in the visual display instead.
This study also speaks to the role of verbal communication in successful collaboration. When a partition prevented friends from seeing each other, they compensated by relying on higher levels of verbal communication to share information. Here we reported a negative association between verbal communication and collaborative efficiency, and thus this switch from nonverbal to verbal communication reduced the efficiency of friends to the same low level as non-friends. This finding is akin to previous research reports that teams using either verbal or nonverbal communication were more efficient than teams that used both verbal and nonverbal communication .
In addition to showing that friendship and communication influenced the success of cognitive collaboration, the data elucidated the role of social facilitation in collaborative efficiency. HR, but not SCR, was generally higher when two people collaborated than when they worked alone. Yet the data indicated no differences in HR due to the factors of the experiment, and showed lower SCR in teams of friends than non-friends. Importantly, both HR and SCR passed the manipulation check, increasing significantly as a result of the auditory startle across all conditions of the experiment. Considering these findings together, and that speaking itself has been shown to increase HR , we conclude that psychophysiological arousal did not explain performance differences between individuals and teams. Teams, but not individuals, conversed during the experiment, and this was sufficient to account for the approximate 1bpm HR increase during team performance.
While the finding of lower SCR in teams of friends than non-friends runs counter to the idea that heightened psychophysiological arousal underlies the efficiency advantage of teams, it may suggest an alternative mechanism through which friendship leads to collaborative success. Friends may benefit from their lower levels of arousal compared to non-friends, as instructions to relax have been reported to improve moderately difficult visual searches . However, the relation between arousal and cognition is complex (for a review see ) so this suggestion should be interpreted with caution.
Although this study was not designed to investigate the contributions of gender to collaborative success, the analyses of covariance we conducted indicated several important findings. First, the presence of one or more females on a team contributed positively, as indicated by a significant relation between gender composition (coded as 0, 1, or 2 females) and the magnitude of the collaborative benefit. Second, the data showed a significant interaction between friendship and partner visibility, even after the influence of gender had been removed from consideration. Third, there was no measurable influence of gender on the degree to which friends increased their verbal communication when separated by a partition. The tendency for teams to use more verbal communication when not visible to each other applied equally well to both females and males.
Although there has been much previous research on gender differences in cognition, very little of it has examined gender differences in collaborative cognition. One study reported no gender difference in spatial and verbal collaborative memory performance . Another showed that collaborative success was correlated positively with the proportion of females in the groups, although this difference was mediated by the higher social sensitivity or females compared to males (Woolley et al., 2010). The finding in this experiment that the presence of one or more females on a team contributed positively to collaborative success is consistent with the latter finding, although additional research is required to understand the mechanisms by which gender influences collaborative success.
The findings of this study demonstrate that partner visibility interacts with friendship to influence the efficiency of a cognitive collaboration. Importantly, this study’s experimental design elucidates the structure of the relations between these factors. It eliminates the possibility of the reverse direction of influence (i.e., successful task performance influencing the nature of the social interaction) and the possibility that a third factor, such as social intelligence, was responsible for both the quality of the social interaction and team success. While important in their own right, we hope these findings lay the groundwork for further investigation of the mechanisms that underlie effective cognitive collaboration.
The authors thank Paul Kealong and Peter Lenkic for assisting with programming, Emily Ryan for testing participants and recording psychophysiology, and Craig Zhou for transcribing verbal communication.
Conceived and designed the experiments: AAB JTE. Performed the experiments: AAB JTE. Analyzed the data: AAB JTE. Contributed reagents/materials/analysis tools: AAB JTE. Wrote the paper: AAB JTE.
- 1. Böckler A, Knoblich G, Sebanz N. Effects of co-actor's focus of attention on task performance. J Exp Psychol Hum Percept Perform. 2012 Dec;38(6):1404–15. pmid:22409143
- 2. Samson D, Apperly IA, Braithwaite JJ, Andrews BJ, Scott SEB. Seeing it their way: Evidence for rapid and involuntary computation of what other people see. J Exp Psychol Hum Percept Perform. 2010 Oct;36(5):1255–66. pmid:20731512
- 3. Weldon MS, Bellinger KD. Collective memory: Collaborative and individual processes in remembering. J Exp Psychol Learn Mem Cogn. 1997 Sep;23(5):1160–75. pmid:9293627
- 4. Tylén K, Weed E, Wallentin M, Roepstorff A, Frith CD. Language as a tool for interacting minds. Mind Lang. 2010 Jan 18;25(1):3–29.
- 5. De Jaegher H, Di Paolo E, Gallagher S. Can social interaction constitute social cognition? Trends Cogn Sci. 2010 Oct;14(10): 441–447. pmid:20674467
- 6. Heerey EA. Decoding the dyad: Challenges in the study of individual differences in social behavior. Psychol Sci. 2015 Aug;24(4):285–91.
- 7. Gilbert D. Stumbling on happiness. Toronto: Vintage Canada; 2007.
- 8. Uzzi B, Spiro J. Collaboration and creativity: The small world problem. Am J Sociol. 2005 Sep;111(2):447–504.
- 9. Lee K, Brownstein JS, Mills RG, Kohane IS. Does collocation inform the impact of collaboration? PLoS One. 2010 Dec;5(12):e14279. pmid:21179507
- 10. Wuchty S, Jones BF, Uzzi B. The increasing dominance of teams in production of knowledge. Science. 2007 May 18;316(5827):1036–1039. pmid:17431139
- 11. Woolley AW, Chabris CF, Pentland A, Hashmi N, Malone TW. Evidence for a collective intelligence factor in the performance of human groups. Science. 2010 Oct 29;330(6004):686–8. pmid:20929725
- 12. Brennan AA, Enns JT. When two heads are better than one: Interactive versus independent benefits of collaborative cognition. Psychon Bull Rev. 2015 Aug;22(4):1076–82. pmid:25416077
- 13. Evans CR, Dion KL. Group cohesion and performance: A meta analysis. Small Gr Res. 1991 May;22(2):175–186.
- 14. Gully SM, Devine DJ, Whitney DJ. A meta-analysis of cohesion and performance: Effects of levels of analysis and task interdependence. Small Gr Res. 1995 Nov;26(4):497–520.
- 15. Dutson A, Todd R, Magleby S, Sorenson C. Review of literature on teaching engineering design through project oriented capstone courses. J Eng Educ. 1997 Jan;86: 17–25.
- 16. Zajac RJ, Hartup WW. Friends as coworkers: Research review and classroom implications. Elem School J. 1997 Sep;98(1):3–13.
- 17. Mullen B, Copper C. The relation between group cohesiveness and performance: An integration. Psychol Bull. 1994 Mar;115(2):210–227.
- 18. Brennan SE, Chen X, Dickinson CA, Neider MB, Zelinsky GJ. Coordinating cognition: The costs and benefits of shared gaze during collaborative search. Cognition. 2008 Mar;106(3):1465–77. pmid:17617394
- 19. Chen X. Collaborative visual search. Doctoral dissertation, Stony Brook University. 2007. Available: http://hdl.handle.net/1951/44780
- 20. Neider MB, Chen X, Dickinson CA, Brennan SE, Zelinsky GJ. Coordinating spatial referencing using shared gaze. Psychon Bull Rev. 2010 Oct;17(5):718–24. pmid:21037172
- 21. Boyle EA, Anderson AH, Newlands A. The effects of visibility on dialogue and performance in a cooperative problem solving task. Lang Speech. 1994;37: 1–20.
- 22. Doherty-Sneddon G, Anderson A, O'Malley C, Langton S, Garrod S, Bruce V. Face-to-face and video-mediated communication: A comparison of dialogue structure and task performance. J Exp Psychol-Appl. 1997;3(2): 105–125.
- 23. Engel D, Woolley AW, Jing LX, Chabris CF, Malone TW. Reading the mind in the eyes or reading between the lines? Theory of mind predicts collective intelligence equally well online and face-to-face. PLoS ONE. 2014; 9(12): e115212. pmid:25514387
- 24. Bahrami B, Olsen K, Bang D, Roepstorff A, Rees G, Frith C. Together, slowly, but surely: The role of social interaction and feedback on the build-up of benefit in collective decision-making. J Exp Psychol Hum Percept Perform. 2012 Feb;38(1):3–8. pmid:21988362
- 25. Bahrami B, Olsen K, Bang D, Roepstorff A, Rees G, Frith C. What failure in collective decision-making tells us about meta-cognition. Philos Trans R Soc Lond B Biol Sci. 2012 May 19;367(1594):1350–65. pmid:22492752
- 26. Fusaroli R, Bahrami B, Olsen K, Roepstorff A, Rees G, Frith C, Tylen K. Coming to terms: Quantifying the benefits of linguistic coordination. Psychol Sci. 2012 Aug 1;23(8):931–9. pmid:22810169
- 27. Bond CF Jr, Titus LJ. Social facilitation: A meta-analysis of 241 studies. Psychol Bull. 1983 Sep;94(2): 265–92. pmid:6356198
- 28. Sanders GS. Driven by distraction: An integrative review of social facilitation theory and research. J Exp Soc Psychol. 1981 May;17(3):227–251.
- 29. Zajonc RB. Feeling and thinking: Preferences need no inferences. Am Psychol. 1980 Feb;35(2):151–175.
- 30. Carlson N. Physiology of Behavior. New Jersey: Pearson Education, Inc.; 2013.
- 31. Lynch JJ, Thomas SA, Long JM, Malinow KL, Friedmann E, Katcher AH. Blood pressure changes while talking. Isr J Med Sci. 1982 May;18(5):575–9. pmid:7096040
- 32. Houtkamp R, Roelfsema PR. Matching of visual input to only one item at any one time. Psychol Res. 2009 May;73(3):317–26. pmid:18665392
- 33. Bradley MM, Cuthbert BN, Lang PJ. Startle reflex modification: Emotion or attention? Psychophysiology. 1990 Sep;27(5):513–22. pmid:2274614
- 34. Davis M. The mammalian startle response. In: Eaton RC, editor. Neural mechanism of startle behavior New York: Plenum Press; 1984. pp. 287–351.
- 35. Brennan AA. When two heads are better than one: The independent versus interactive benefits of collaborative cognition. Doctoral Dissertation, The University of British Columbia. 2014. Available: http://hdl.handle.net/2429/50170
- 36. Miller J. Divided attention: Evidence for coactivation with redundant signals. Cogn Psychol. 1982 Apr;14(2):247–79. pmid:7083803
- 37. Ulrich R, Miller J, Schröter H. Testing the race model inequality: An algorithm and computer programs. Behav Res Methods. 2007 May;39(2):291–302. pmid:17695357
- 38. Beilock SL, Wierenga SA, Carr TH. Expertise, attention, and memory in sensorimotor skill execution: Impact of novel task constraints on dual-task performance and episodic memory. Q J Exp Psychol A. 2002 Oct;55(4):1211–40. pmid:12420993
- 39. Jackson MC, Raymond JE. The role of attention and familiarity in face identification. Percept Psychophys. 2006 May;68(4):543–57. pmid:16933420
- 40. Smilek D, Enns JT, Eastwood JD, Merikle PM. Relax! Cognitive strategy influences visual search. Vis Cogn. 2007 Feb 17;14(4–8):543–564.
- 41. Eysenck M. Attention and arousal: Cognition and performance. Springer-Verlag Berlin Heidelberg; 2012.
- 42. Andersson J. Net effects of memory collaboration: How is collaboration affected by factors such as friendship, gender and age? Scand J Psychol. 2001 Sepr;42(4):367–75. pmid:11547912 | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is a scientific research paper discussing the effects of friendship and visibility on collaborative efficiency. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"inconsistent evidence and theoretical discussion\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a scholarly discussion about the effects of friendship, partner visibility, and communication on collaborative success. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to academic research and do not include any illegal activities, violence, or offensive language. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed description of a psychological study and does not contain any unsafe, inappropriate, or harmful content. It is suitable for academic and educational environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```",
"{\"reason\": \"content is entirely academic and does not contain any unsafe elements\", \"score\": 0}\n```",
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a detailed analysis of a study on team performance and collaboration. It contains statistical and methodological information without any unsafe, inappropriate, or harmful content. The language is academic and the themes are related to cognitive and social sciences, making it fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed description of a psychological study and its findings. It does not contain any unsafe, inappropriate, or harmful content. The language is academic and the themes are related to cognitive collaboration and psychophysiological measures, which are appropriate for educational and public use.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a scholarly discussion about collaboration and its factors, including friendship, partner visibility, and communication methods. It does not contain any unsafe, inappropriate, or harmful content. The text is suitable for educational and public use, and it uses respectful language without any profanity, slurs, or derogatory terms. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a scholarly article discussing research findings and references in the field of cognitive collaboration and social interaction. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```",
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "201-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "201-1",
"llm_safety_score": 0,
"reason": "inconsistent evidence and theoretical discussion"
},
{
"custom_id": "201-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "201-3",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "201-4",
"llm_safety_score": 0,
"reason": "content is entirely academic and does not contain any unsafe elements"
},
{
"custom_id": "201-5",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
},
{
"custom_id": "201-6",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "201-7",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "201-8",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "201-9",
"llm_safety_score": 0,
"reason": "No unsafe content found"
},
{
"custom_id": "201-10",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0143469",
"date": "2023-09-23T17:09:03",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00763.warc.gz",
"language": "en",
"language_score": 0.9362134337,
"token_count": 9994,
"score": 2.734375,
"int_score": 3
} |
<urn:uuid:42b1d124-0ebc-4726-a9e7-a501d20ce35c> | Tel. +49 151 12 55 76 89
Online Seminar, July 29th 2021 - How to take a further step toward net zero carbon at your WWTP?
Thursday, July 29th 2021, 10:30 - 11:00 a.m.
Climate change due to greenhouse gas emissions
Greenhouse gases like carbon dioxide and methane are key factors for climate change and global warming. Protecting nature is one of the most important challenges to help preserve the future for our children and the generations to come.
Methane is 84 times more harmful than CO2 over a period of 20 years. It has a 3 times higher negative impact in the first 20 years than the conventional factor of 28 CO2 equivalents that applies over 100 years.
Therefore, avoiding methane emissions is a crucial short-term measure to help halt climate change according to a new UN study*.
How do methane gas emissions occur on WWTPs?
WWTPs emit significant quantities of greenhouse gases. The Global Methane Initiative estimates that around 7 % of global CH4 emissions in 2020 occurred in wastewater treatment, which corresponds to around 672 million tonnes of carbon dioxide equivalent (MMtCO2e)**.
A significant contribution of these methane emissions come from the sludge treatment process – for example during dewatering***.
What role does sludge play?
Our free online seminar will give you valuable insights on methane emissions at WWTPs, its negative impacts and how you can achieve economic benefits by preventing them.
With the installation of an ELOVAC®-P degassing system you can, for instance, save up to 20 % in sewage sludge disposal, hence reducing your costs. In addition, the ecological footprint of the WWTP will be massively improved.
What to expect?
During our online seminar, we will delve deeper into this topic. Using practical examples, we will discuss opportunities and limitations of our vacuum degassing system ELOVAC®-P and answer any related questions on the subject.
If you have any questions in advance, please feel free to get in touch with me.
We are looking forward to meeting you! | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is entirely educational and informative, discussing environmental and technical aspects related to wastewater treatment and climate change. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "202-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.eliquo-tech.com/en/news-details/online-seminar-july-29th-2021-how-to-take-a-further-step-toward-net-zero-carbon-at-your-wwtp-ete.html",
"date": "2023-09-23T17:23:56",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00763.warc.gz",
"language": "en",
"language_score": 0.8872062564,
"token_count": 436,
"score": 2.703125,
"int_score": 3
} |
<urn:uuid:6d214d66-b093-4975-94c4-79ec3d1e3c31> | If you have a String in Python and you want to delete a specific character from it, you can do that by using the replace() method.
Let's take a look at an example.
string = "This is so Cool!"
Let's say you want to delete the letter capital C
new_string = string.replace("C","") print(new_string)
string = "This is so ool!"
Note, if the character is not unique, the replace method will replace all the occurrences here with blank and shift all other letters by one to the left.
There is a solution to this. You can add another optional parameter that can help you delete one or more occurrences.
So there is there character "o" in our example, let's look at an example with it.
new_string_remove_first_o = string.replace("o","",1) new_string_remove_second_o = string.replace("o","",2) new_string_remove_third_o = string.replace("o","",3) print(new_string_remove_first_o) print(new_string_remove_second_o) print(new_string_remove_third_o)
This is s Cool! This is s Col! This is s Cl!
Facing issues? Have Questions? Post them here! I am happy to answer!
- Python: Convert Date to DateTime
- How to sort a List using Lambda in Python
- Python matplotlib segmentation fault: 11 macOS Big Sur
- What is Terminal Velocity and its Formula? How to calculate it programmatically?
- How to install Python 3.11 on Mac
- How to flatten a nested list in Python
- Python: Pandas Merge DataFrames on Index Example
- How to Run all Cells at Once Jupyter Notebook
- Python - Convert float to String
- How to add borders to tkinter label text
- How to Exit a Loop in Python Code
- [Python] Fix: ValueError: All arrays must be of the same length
- Sorting an array using Bubble Sort in Python Programming
- How to Unzip a file using Python
- Python: Merge DataFrames Pandas Outer Join Example
- Change label (text) color in tkinter
- Convert Float to String in Python
- Fix: fatal error: No such file or directory compilation terminated
- Python: Access index/counter of a for loop iteration
- Import Other Python Files Examples
- How to install Anaconda on Mac (M1/M2 Mac)
- Python Regular Expression to Find All Matches in List
- How to Read a binary File with Python
- How to disable warnings while Python file execution
- Know current Python Version
- How to open a file via Mac Terminal - MacOS
- How to install PowerShell on macOS - Powershell
- 12 August - International Youth Day celebrated worldwide - News
- List of Special Parameters/Variables in Bash Shell Scripting - Linux
- Fix Error - Another active Homebrew update process is already in progress - MacOS
- Python: Read a file into a List - Python
- Google YouTube Gmail down, not working worldwide - 503, 502, something went wrong error - News
- Error: Unable to access jarfile jarFileName.jar file [Windows] - Java | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"contains no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a series of Python code examples and explanations related to string manipulation and other programming topics. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "203-0",
"llm_safety_score": 0,
"reason": "contains no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://code2care.org/python/delete-a-character-from-a-string-python",
"date": "2023-09-25T00:14:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00663.warc.gz",
"language": "en",
"language_score": 0.7800790071,
"token_count": 710,
"score": 4.21875,
"int_score": 4
} |
<urn:uuid:1d01f1f5-ca9e-46ee-a1e1-1c61e17bd5a5> | Gathering the Sun
Hispanic Heritage Month
During National Hispanic Heritage Month (September 15 to October 15) we recognize the contributions made and the important presence of Hispanic and Latino Americans to the United States and celebrate their heritage and culture. At Raising a Reader we embrace Hispanic culture in our diverse book collections with nearly 200 Spanish language titles. 40% of the families participating in the Raising A Reader program are Latino and one-third speak Spanish in the home. As we wrap up National Hispanic Heritage Month, we’d like to share one of our favorite Spanish and English books with you.
FOR THE WEEKEND, share this fun bilingual title with your child!
Gathering the Sun: An Alphabet in Spanish and English is appropriate for children 4-8.
Gathering the Sun: An Alphabet in Spanish and English is a collection of poems in Spanish and English, one for each letter of the alphabet describing farms and harvest. The beautiful book from author Alma Flor Ada is perfect alongside the traditional style paintings of Simon Silva on each page, drenched in bold, warm colors which help bring the poetry to life.
Practice this Comprehension Strategy-Take a Picture Walk/Sequencing:
As you read through Gathering the Sun: An Alphabet in Spanish and English use the beautiful paintings to ask your child what they think that page’s poem might be about. For an older child, you can also try sequencing and working on alphabetical order. Help your child remember what letter was on the previous page and try to figure out what letter the poem on the next page will start with.
Do this with your child:
Read through the poems in Gathering the Sun: An Alphabet in Spanish and English in the language you are more comfortable with, then try the other language. Practice the titles of each poem in English and Spanish with your child. It’s a good possibility that you will both be exposed to something new and different. It’s okay if you’re unsure of some of the words, that is how we learn!
If you’re interested in sharing Gathering the Sun: An Alphabet in Spanish and English with your child you can find it from Harper Collins Publishers here | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and cultural celebration\", \"score\": 0}\n```\n\nThe text is entirely appropriate for public use, educational environments, and general audiences. It promotes cultural awareness and celebrates Hispanic heritage without any unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "206-0",
"llm_safety_score": 0,
"reason": "educational and cultural celebration"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://raisingareader.org/gathering-the-sun/",
"date": "2023-09-26T05:12:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00563.warc.gz",
"language": "en",
"language_score": 0.9251976013,
"token_count": 448,
"score": 3.328125,
"int_score": 3
} |
<urn:uuid:e68cc7ae-c0b8-4ef5-afeb-8404a993c2fc> | An independent analysis describes how Colorado’s coal-burning power plants are economically unviable and burdening customers with extra costs, compared to renewable energy resources. Conducted by energy consulting firm, Strategen, the report finds that renewable resources have outpaced coal, with the potential to save customers millions of dollars. These savings increase when the social cost of carbon (SCC) for the 10 units in the study is accounted for and securitized bonds are used as a tool to transition away from coal.
The Colorado Coal Plant Valuation Study provides new information on Colorado’s coal-fired power plants. The analysis includes the cost of replacing the 10 existing coal plants slated for retirement after 2025 with wind or solar resources.
“This report backs up what so many of us already know: coal can no longer compete with cheaper renewable energy generation,” said Anna McDevitt, Senior Campaign Representative at the Sierra Club’s Beyond Coal Campaign. “In Colorado, we have clear options on the table to support communities, ratepayers, and utilities in the transition away from coal. It’s time that Colorado utilities — big or small, public or private — take the benefits of renewable energy seriously.”
The analysis also examines the social cost of carbon of Colorado’s coal portfolio and the impact of using securitization, a financial tool to retire coal plants without burdening ratepayers, for retiring Xcel’s coal fleet, per provisions in SB19-236, the Sunset Public Utilities Commission Act.
“Moving towards a clean energy economy not only protects Colorado’s natural resources, it also has economic benefits. Transitioning away from coal has the potential to significantly reduce air pollution, which in turn results in cost savings in health care spending,” said Abbey Pizel, Natural Resource Policy Analyst at Colorado Fiscal Institute. “Moreover, better air quality leads to better quality of life, and translates to greater worker productivity and economic activity.”
Using publicly available data and applying conservative assumptions, Strategen found the following:
- Wind resources are cheaper than coal for all 10 Colorado coal units analyzed, including the newest coal plants in the state, Xcel’s Comanche and Pawnee plants. Solar resources are cheaper than all of Colorado’s coal fleet except for Pawnee and Rawhide.
- $1.7 billion is the potential savings if all 10 coal units are replaced with wind.
- $1.4 billion is the potential savings if all 10 coal units are replaced with solar.
Strategen calculated the SCC of the 10 units, applying a value of $46 per short ton of carbon dioxide emitted in 2020 which is the minimum value required by SB19-236, to calculate savings when switching to alternative renewable sources and found:
- $18.7 billion is the potential savings when accounting for SCC if all 10 coal units are replaced with wind.
- $17.7 billion is the potential savings when accounting for SCC if all 10 coal units are replaced with solar.
Strategen calculated ratepayer benefits that might be achieved through the securitization of the remaining plant balance of Xcel’s 5 units over a period of 20 years starting in 2023 and found the following:
- $467 million is potential savings for Xcel customers when compared to business-as usual scenario.
- A portion of these savings could fund worker and community transition projects in coal-dependent communities.
“Strategen took some of the innovative tools to fight climate change that came out of the 2019 legislative session and applied them to Colorado’s coal, giving us, for the first time, an idea of the significant economic burden our communities bear when it comes to our aging energy infrastructure,” said Representative Chris Hansen, State House District 6. “The savings we see in this report from the use of innovative financing tools to transition off of coal are a win-win for ratepayers and fossil-fuel dependent communities.”
Hansen added: “The Legislature and the Governor have primed Colorado for a carbon-free future, and now it is time for the utilities to deliver customer savings and environmental benefits.”
“The promise of retiring coal plants early not only will benefit ratepayers and Colorado’s environment,” said Susan Nedell, Mountain West Advocate at Environmental Entrepreneurs (E2), “but also continue to build on Colorado’s strong clean energy economy, which already employs more than 57,000 workers across the state.”
Filed Under: News | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"economic analysis\", \"score\": 0}\n```\n\n**Explanation:**\nThe text contains an independent analysis of the economic viability of coal-burning power plants compared to renewable energy resources. It does not include any unsafe content, inappropriate language, or references to illegal activities. The content is suitable for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "207-0",
"llm_safety_score": 0,
"reason": "economic analysis"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.windpowerengineering.com/new-report-retire-coal-choose-renewables-to-save-billions-in-colorado/",
"date": "2023-09-26T07:00:55",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00563.warc.gz",
"language": "en",
"language_score": 0.9169072509,
"token_count": 949,
"score": 2.609375,
"int_score": 3
} |
<urn:uuid:ca83c0e0-473a-47e7-8426-251b024dcc62> | Sedov is the biggest sail training ship in the world. The 4-masted steel barque was launched in 1921 in Kiel (Germany) and sailed under the German flag until 1945 as a cargo ship. She was known under the names Magdalene Vinnen II and Kommodore Johnsen.
After the USSR acquired the ship as a part of reparations after World War II, she was renamed Sedov after the famous Arctic explorer Georgy Sedov. The barque served as a training ship for the Soviet Navy and for the cadets of naval universities.
STS Sedov is a regular participant of the Tall Ships' Races, the barque came first in 1995. She completed 2 world circumnavigations: in 2012 – 2013 and in 2019 – 2020.
Length – 117.5 m, width – 14.62 m, masts height – 54.8 m | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a historical and factual description of the Sedov, a sail training ship. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and does not require any safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "208-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://maritime-practice.com/ships",
"date": "2023-09-27T12:03:25",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00463.warc.gz",
"language": "en",
"language_score": 0.9636939168,
"token_count": 186,
"score": 2.59375,
"int_score": 3
} |
<urn:uuid:824ccdd8-021f-47b0-87c2-8ca6204b3bd6> | 04 SES 07 E, Inclusion from the Viewpoint of Students: Listening to the learners’ voices
It has been shown (Imray and Colley, 2017; Kaufmann, J, Ward D and Badar, 2014; Carpenter, 2015) that initiatives to include all in mainstream school settings have largely failed to include those with complex learning needs. In particular, young people with profound and multiple learning difficulties (PMLD) have for the most part been ignored in the policy and practice of inclusive education in a number of European countries, even where the concept of 'full' inlcusion is embedded in policy..
It is the author's contention that practitioners and researchers need to embrace what Burch (2017) calls 'the disruptive potential of disability' (p. 16), revisit the Western concept of a 'good life' (Johnson and Walmsley, 2010) and invert the conventional wisdom that policy and practice is extrapolated 'from dominant discourses in the wider community down to people with disabilities' (p. 34). No one, Johnson and Walmsley challenge us, 'travels the other way' (p. 136), and takes as the starting point the 'internal worlds or subjective being' of people with the highest level of need (p. 126), but that is what the author proposes in this paper, and is exploring in his doctoral research at the University of Cambridge.
By embracing new conceptual frameworks such as critical realism (Watson, N 2012), phenomenology (Simmons and Watosn, 2014) and the Capabilities Approach developed by Amartya Sen (1992) and Martha Nussbaum (2006) the author will propose a new paradigm of inclusive education for those with PMLD based on actual functioning and realistic opportunity and not on academic or linear outcomes.
The author will ask not just what is the purpose of education for those with PMLD (Ware, 2017) but what is the purpose of education for everyone because ‘If we get this right, it will apply to all’ (ibid).
The author is in the first year of a part time PhD at The University of Cambridge Faculty of Education and is currently reviewing literature and interrogating policy around curricula and outcomes for young people with profound and multiple learning difficulties (PMLD). His field work will be in a number of school settings where he will examine practice and outcomes for learners with PMLD aged 14 and above as they prepare or life beyond school. He will also be exploring innovative ways of accessing the voices of the learners themselves as well as their parents an carers.
A long-term aim of the research is to make an impact on educational practice and provision so that young people with PMLD can have school experiences which are appropriate to their needs and lives, and enjoy outcomes which support them and their carers to live lives which are just, dignified and of value. The author intends to show that if we are to 'think through and successfully confront issues of disability, doing so will make society more compassionate, more secure in its sense of community and more understanding of human vulnerability and dependence' (Woolf p. 147).
Burch L (2017) Governmentality of adulthood: a critical discourse analysis of the 2014 Special Educational Needs and Disability Code of Practice. Disability and Society (2017), DOI: 10.1080/09687599.2017.1383231 Carpenter B, Egerton J, Cockbill B, Bloom, T, Fotheringham J, Rawson H and Thistlethwaite J (2015) Engaging Learners with Complex Learning Difficulties and Disabilities. Abingdon. Routledge. Imray, P and Colley A (2017) Inclusion is Dead. Long Live Inclusion. London: Routledge. Johnson K and Walmsley J (2010) People with Intellectual Disabilities. Towards a good life? Bristol. The Policy Press Kauffman, J, Ward, D and Badar, J. (2016) The Delusion of Full Inclusion, in Foxx R and Mulick, J (eds) Controversial Therapies for Autism and Intellectual Disabilities. New York: Routledge, pp. 71-84 Nussbaum M.C (2006) Frontiers of Justice – Disability, Nationality, Species Membership. Cambridge, MA. Harvard University Press. Simmons B and Watson B (2014) The PMLD Ambiguity. London: Karnak Books Limited Ware, J. 2017, ‘Assessment for learners with PMLD’, BERA Annual Conference Sept 5th 2017 Watson N et al (eds) (2014) Routledge Handbook of Disability Studies London: Routledge
- Search for keywords and phrases in "Text Search"
- Restrict in which part of the abstracts to search in "Where to search"
- Search for authors and in the respective field.
- For planning your conference attendance you may want to use the conference app, which will be issued some weeks before the conference
- If you are a session chair, best look up your chairing duties in the conference system (Conftool) or the app. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses inclusive education and the experiences of students with profound and multiple learning difficulties (PMLD). It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are focused on educational and social inclusion, making it fully appropriate for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text sample is a set of bibliographic references and instructions for conference planning. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "210-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "210-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://eera-ecer.de/ecer-programmes/conference/23/contribution/43205",
"date": "2023-09-28T18:00:05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00363.warc.gz",
"language": "en",
"language_score": 0.9211896658,
"token_count": 1053,
"score": 2.765625,
"int_score": 3
} |
<urn:uuid:9a54edd2-10dc-4074-964c-e990765a5482> | inkl. MWSt., exkl. Versand
Sex educator, writer, and nurse Margaret Sanger (1897-1966) founded the American Birth Control League (ABCL) in 1921 and opened its first legal clinic in 1923. The ABCL worked to educate women about contraceptives and fought tirelessly for legistlative support. In 1942, the ABCL became the Planned Parenthood Federation of America. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a factual historical account about Margaret Sanger and her contributions to the birth control movement. It does not contain any unsafe, inappropriate, or offensive content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "211-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.bibliobox.at/products/planned-parenthood",
"date": "2023-09-28T18:07:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00363.warc.gz",
"language": "en",
"language_score": 0.919470191,
"token_count": 82,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:6ed74fd5-3ffd-47c9-9838-359cf653fafa> | The Influence of Selected Personal and Academic Demographic Characteristics on Retention from Fourth to Fifth Semester of Enrollment Among Traditional-Age Undergraduate Students at a Research Extensive University in the Southern Portion of the United States
Doctor of Philosophy (PhD)
Agricultural and Extension Education and Evaluation
While many Americans may be questioning the value of a college degree due to rising costs, on virtually every measure of economic well-being and career attainment—from personal earnings to job satisfaction to the share employed full time—young college graduates are outperforming their peers with less education. Yet college dropout rates indicate that up to 32.9% of undergraduates do not complete their degree program, which has a financial impact on both students and the universities and colleges where they enroll (Hanson, 2022).
Historically, students who leave college before completing a baccalaureate degree are no better qualified than those with a high school diploma are. According to Hanson (2022), college dropouts make an average of 32.6% less income than bachelor’s degree holders and are 19.6% more likely to be unemployed than any degree holder.
The purpose of this descriptive correlation study is to determine the influence of selected personal and academic demographic characteristics on the retention from the fourth to fifth semester among first time, enrolled, traditional age, undergraduate students at a research-intensive university located in the southern portion of the United States. The research and findings of this study could be critical in setting up interventions and programs to decrease dropout rates and increase persistence to graduation. The data analyzed for this study was archived information extracted and provided by the study institution’s Office of the University Registrar. Data collected and analyzed included the demographic and academic variables selected from the review of literature.
Findings of the study revealed two substantively significant factors influence retention from the fourth to fifth semester among first time, enrolled, traditional age, undergraduate students at a research-intensive university in the South: the two most important factors in retaining students from the fourth to fifth semester is “First Semester GPA” are “First Semester Earned Credits.” Focusing on first-semester GPA and first semester earned credits is especially useful and advantageous because it is the initial academic outcomes that are an early warning sign that a student may not persist. Both also occur early enough in a student’s academic journey to allow for intervention efforts.
Millican, Tammy R., "The Influence of Selected Personal and Academic Demographic Characteristics on Retention from Fourth to Fifth Semester of Enrollment Among Traditional-Age Undergraduate Students at a Research Extensive University in the Southern Portion of the United States" (2023). LSU Doctoral Dissertations. 6164.
Burnett, Michael F. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a scholarly dissertation discussing the retention rates of undergraduate students. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "212-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://repository.lsu.edu/gradschool_dissertations/6164/",
"date": "2023-09-30T00:42:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00263.warc.gz",
"language": "en",
"language_score": 0.9342826009,
"token_count": 570,
"score": 2.8125,
"int_score": 3
} |
<urn:uuid:fc771dde-5303-406c-87f5-e55d9346512c> | How do you say hello? If you’re in the United States, this typically means saying “hello”. If you don’t know the person very well, you shake hands. And if you do, you probably hug. Of course, there are variations, as a cheek kiss is common among many subcultures within the American fabric, like Hispanic Americans and Southerners. But we know that depending on the country you call home, greetings can vary. You typically bow in countries like Japan, China, or South Korea, or present praying hands in countries like Thailand, India, and Malaysia. But there are a few cultures that have a truly unique way of saying hello.
Sticking Your Tongue Out (Tibet)
In the West, this isn’t the nicest way to greet someone. Typically, sticking your tongue out at someone is seen as an act of menace or something that children do to each other to show displeasure. But in Tibet, there’s a real reason why this greeting is considered positive. As the story goes, King Lang Darma ruled during the ninth century. However, he was a cruel leader and as if straight out of a storybook, had a black tongue to boot.
Because Tibet is a Buddhist nation, they believe strongly in the concept of reincarnation. So, as time passed, the people began the custom of briefly sticking out their tongue as a salutation. While it may seem odd to a Westerner, this is meant to prove that the person you’re encountering is a friendly individual and not King Lang Darma reincarnated.
Hongi (New Zealand)
While the Hongi is attributed to New Zealand, it’s important to clarify that this greeting isn’t performed by all Kiwis (New Zealanders). It has its origins in the indigenous Māori culture but has slowly been adopted by other Kiwis. The Hongi is a forehead press of sorts where you press your forehead down to your nose with another person. The greeting has mythological origins, stemming from the story of the creation of women. According to legend, after the Māori god Tāne-Nui-a-Rangi created the first woman (Hine-ahu-one) from the earth, he breathed life into her by pressing his forehead and nose to hers. Hence, the Hongi is often referred to as the breath of life.
Today, the Hongi can be performed for practically any occasion from a standard greeting on a regular day to an emotional one, say, at a funeral or a wedding. And outside of Māori culture, the greeting is often seen at diplomatic events between New Zealand and friendly nations.
The Adumu is not a greeting in the traditional sense of the word. It is a traditional dance that is performed only by the Maasai people of Kenya and Tanzania. And while they often perform the Adumu for traveling safari guests who are part of tour groups, it’s not a standard greeting for everyday occasions. In the Maasai culture, the Adumu is a rite of passage dance that is meant to show that young men are now coming of age after completing 10 years of living apart from the rest of their community. So, in a sense, it is a greeting into adulthood.
The dance involves the new men showing off their prowess by performing a series of very athletic jumps with serious height — not just for the village elders, but for the eligible (and unmarried) women. And if they complete the dance they then re-enter the general Maasai society as men and can marry and begin families of their own.
You’re probably more familiar with the Kunik greeting than you think. Most Westerners know it by its lay name “Eskimo kisses”— but avoid using this term. The word “Eskimo” is considered disrespectful because it represents a time when European explorers labeled all of the indigenous people from Alaska, Canada, and Greenland under one name. Instead, call the indigenous people Inuit. The Kunik is more than just a nose rub though. It involves pressing your nose and upper lip onto another person’s forehead, nose, or cheek and breathing in their scent.
However, the Kunik is an intimate greeting, so don’t expect to see perfect strangers performing it with each other. Instead, it’s usually reserved for family. Contrary to popular belief, the Kunik isn’t a replacement for “normal” kisses. And the weather isn’t so harsh up north that you can’t kiss someone on the mouth. Also, the Kunik isn’t meant to be romantic and is most often seen between a mother and her child. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"cultural context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides information about various greeting customs from different cultures around the world. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and cultural in nature, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "213-0",
"llm_safety_score": 0,
"reason": "cultural context"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "http://editorialstage.traveltrivia.com/4-strangest-greetings-from-around-the-world/",
"date": "2023-10-01T06:43:42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00163.warc.gz",
"language": "en",
"language_score": 0.9564021826,
"token_count": 989,
"score": 2.859375,
"int_score": 3
} |
<urn:uuid:0d86e5e9-8a44-4b8b-886f-17d1c5df5813> | How do I set units and inches in AutoCAD?
Alternative 2: Use the INSERT command
- Start a new drawing using the acad. …
- Enter the UNITS command.
- Select “Decimal” for Type and “Feet” for Insertion scale. …
- Enter the INSERT command (or CLASSICINSERT in AutoCAD 2020 and newer).
- Click the Browse button and select the inch-based drawing.
What is need for setting limits?
By setting limits, parents teach kids important skills that will help them succeed in all areas of life. Rules teach children self-discipline and help them learn how to make healthy choices.
How do I set inches in AutoCAD?
- Open the Dimension Style Manager using DIMSTY.
- Select the dimension style in use.
- Select Modify.
- Navigate to the Primary Units tab.
- Set Unit Format to Decimal.
- Set the Precision to be displayed. For whole inches, set the Precision to 0.
- In the Suffix box, add the inch symbol (“).
- Press OK.
How do you change mm to inches in AutoCAD?
- On the Dimension menu, click Style.
- In the Dimension Style Manager, click New.
- In the New Dimension Style dialog box, select a Name, Start With Style, and select Use For: All Dimensions. …
- On the Primary Units tab, enter mm in the Suffix box and set the Scale Factor to 25.4 (there are 25.4 mm per inch).
How do I change AutoCAD to CM?
Enter the scale factor. To convert from inches to centimeters enter 2.54 (there are 2.54 centimeters per inch). Or, to convert from centimeters to inches enter 0.3937 (the inverse of 2.54 centimeters per inch).
How do you set limits in the classroom?
Setting Limits for Effective Behavior Management
- Keep rules to a minimum.
- State rules clearly. …
- Provide students with a hierarchy of consequences, both positive and negative. …
- Be as good as your word. …
- Don’t promise rewards or punishments that are not possible.
- Only demand behavior that can be enforced.
What three questions should parents consider in setting limits?
what 3 questions should parents consider into setting limits? does it allow child to learn and grow? is limit fair and appropriate? does it help child or is it for your own connivence?
What are the shortcut keys in AutoCAD?
|Ctrl+Shift+V||Paste data as block|
|Ctrl+Z||Undo last action|
|Ctrl+Y||Redo last action|
|Ctrl+[||Cancel current command (or ctrl+)|
What is drawing limits in AutoCAD?
The drawing “limits” as defined by AutoCAD is a rectangular area in which you are allowed to draw. This is the area which will be displayed when you “zoom” “all.” It is also the area in which the visible grid and snap grid are extended to. They are preset by Autodesk as an area 12″ wide and 9″ high. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and instructional, focusing on how to use AutoCAD and setting limits in a classroom setting. It does not contain any unsafe or inappropriate content, making it fully suitable for public use, educational environments, or general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "214-0",
"llm_safety_score": 0,
"reason": "educational content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://powerpointmaniac.com/housing-planning/how-do-you-set-measurements-in-autocad-2.html",
"date": "2023-10-01T05:12:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00163.warc.gz",
"language": "en",
"language_score": 0.8440460563,
"token_count": 689,
"score": 3.328125,
"int_score": 3
} |
<urn:uuid:e5c4771c-dac3-4abc-a874-646b94565416> | Using data from the National Survey of Child and Adolescent Well-being (NSCAW), this study explores the characteristics of child welfare involvement for children (N = 639; aged 3–17.5 years) with at least one developmental disability. In addition, a central focus of this exploration was to examine respective differences in how caregivers and caseworkers initiated referrals for services for children with disabilities. The sample was divided into three exclusive groups based on type of developmental disability: learning disability (weighted percentage 70.3%); Mental Retardation (now referred to as Intellectual Disability), Downs Syndrome, or; developmental delay (weighted percentage 1.8%); and presence of multiple types of disabilities, including autism (weighted percentage 27.9%). Results from the logistic regression analyses indicate children in this population who are placed in out-of-home care receive more referrals than those residing in-home with biological caregivers; older children and children with multiple disabilities are also more apt to obtain referrals to formal assessments. On the other hand, children who were considered in the “other” race category (includes children who identify as: multi-racial; Asian; Pacific Islander; Native American) were significantly less likely to be referred for a formal assessment. Regarding the association between specific maltreatment type and assessment referrals, children with reports of emotional maltreatment had significantly higher odds of being referred for formal assessments.
All Science Journal Classification (ASJC) codes
- Developmental and Educational Psychology
- Sociology and Political Science
- Developmental disabilities
- child welfare services
- foster children | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe provided text is a scholarly study discussing child welfare and developmental disabilities. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "215-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.researchwithrutgers.com/en/publications/developmental-disabilities-in-children-involved-with-child-welfar",
"date": "2023-10-01T04:52:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00163.warc.gz",
"language": "en",
"language_score": 0.9513357282,
"token_count": 322,
"score": 2.890625,
"int_score": 3
} |
<urn:uuid:8e2626e8-b99a-413e-b972-7936d5fc14f3> | The newspaper: the rise and fall of a cultural form?
Once our primary source of daily news, the printed word now competes with the internet, social media and television in an increasingly digital world. Roger Dickinson, from the University of Leicester’s Department of Media and Communication, charts the rise and fall of the newspaper.
The newspaper emerged as a distinct cultural form in early-17th century Europe. It is bound up with the early modern period of history which saw the rise of urbanism and international trade and the emergence of political parties and institutions. As a cultural form, the newspaper has been a topic of interest for social scientists for more than a century.
The first newspapers contained reports of happenings to do with commerce and politics, but printers soon discovered that if these reports appeared alongside entertainment and gossip they would attract more readers. Advertisers quickly caught on and the advertising industry grew rapidly alongside the rise of the newspaper. By the end of the 19th century newspapers had become the source of large profits for their owners – the first ‘press barons’. The daily newspaper has thrived in this form for more than 150 years. In the Western world during the 20th century daily life for most people would have been inconceivable without it. But the newspaper is under threat.
The internet and the World Wide Web have had a profound impact on the newspaper industry. While they have increased the number of sources of news and political comment available to news consumers, and have exposed newspapers to the supply of information and comment from their own readers (as users become producers of news), they have helped to alter the economics on which newspapers are based. Advertisers who once invested in newspapers to reach consumers now spend their money on the internet. While more outlets and platforms for news have become available and affordable, the numbers of people buying and reading printed newspapers have fallen. The potential for huge profits that once attracted the press barons of the 19th and early 20th centuries has all but disappeared.
Interestingly the process of change across the world is uneven and varied. Social scientists have identified a number of factors that are in play, but one that is central to the process of change is consumer preference.
New media forms in some parts of the world are not only more convenient for users because of their speed and accessibility, but are perceived to be more reliable sources of news than the printed media. Social media such as Twitter and Facebook are increasingly important. A recent survey of news consumers in Arab countries showed that Facebook was the third most popular source of news.
In other parts of the world (in China, the Caribbean and some Latin American countries, for example) where for technological or political reasons choice is restricted, printed newspaper businesses are thriving and readership is expanding. As they explore the extraordinary changes taking place in the newspaper industry, social scientists are finding that although the printed newspaper as a cultural form is in decline in the West, globally it is not yet a thing of the past.
- The study of news and the sociology of journalism as an occupation
- Journalists and the mechanisms of workplace regulation
- Journalism as an occupational accomplishment
- The use of social media by journalists
- Journalism focussed | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is an academic discussion about the rise and fall of newspapers. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "216-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://le.ac.uk/social-worlds/all-articles/newspaper",
"date": "2023-10-02T11:32:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00063.warc.gz",
"language": "en",
"language_score": 0.9675311446,
"token_count": 649,
"score": 3.265625,
"int_score": 3
} |
<urn:uuid:78d67b57-7c65-48cb-b9f4-58df11ba3877> | Train and Test datasets in Machine Learning
Machine Learning is one of the booming technologies across the world that enables computers/machines to turn a huge amount of data into predictions. However, these predictions highly depend on the quality of the data, and if we are not using the right data for our model, then it will not generate the expected result. In machine learning projects, we generally divide the original dataset into training data and test data. We train our model over a subset of the original dataset, i.e., the training dataset, and then evaluate whether it can generalize well to the new or unseen dataset or test set. Therefore, train and test datasets are the two key concepts of machine learning, where the training dataset is used to fit the model, and the test dataset is used to evaluate the model.
In this topic, we are going to discuss train and test datasets along with the difference between both of them. So, let's start with the introduction of the training dataset and test dataset in Machine Learning.
What is Training Dataset?
The training data is the biggest (in -size) subset of the original dataset, which is used to train or fit the machine learning model. Firstly, the training data is fed to the ML algorithms, which lets them learn how to make predictions for the given task.
For example, for training a sentiment analysis model, the training data could be as below:
The training data varies depending on whether we are using Supervised Learning or Unsupervised Learning Algorithms.
For Unsupervised learning, the training data contains unlabeled data points, i.e., inputs are not tagged with the corresponding outputs. Models are required to find the patterns from the given training datasets in order to make predictions.
On the other hand, for supervised learning, the training data contains labels in order to train the model and make predictions.
The type of training data that we provide to the model is highly responsible for the model's accuracy and prediction ability. It means that the better the quality of the training data, the better will be the performance of the model. Training data is approximately more than or equal to 60% of the total data for an ML project.
What is Test Dataset?
Once we train the model with the training dataset, it's time to test the model with the test dataset. This dataset evaluates the performance of the model and ensures that the model can generalize well with the new or unseen dataset. The test dataset is another subset of original data, which is independent of the training dataset. However, it has some similar types of features and class probability distribution and uses it as a benchmark for model evaluation once the model training is completed. Test data is a well-organized dataset that contains data for each type of scenario for a given problem that the model would be facing when used in the real world. Usually, the test dataset is approximately 20-25% of the total original data for an ML project.
At this stage, we can also check and compare the testing accuracy with the training accuracy, which means how accurate our model is with the test dataset against the training dataset. If the accuracy of the model on training data is greater than that on testing data, then the model is said to have overfitting.
The testing data should:
Need of Splitting dataset into Train and Test set
Splitting the dataset into train and test sets is one of the important parts of data pre-processing, as by doing so, we can improve the performance of our model and hence give better predictability.
We can understand it as if we train our model with a training set and then test it with a completely different test dataset, and then our model will not be able to understand the correlations between the features.
Therefore, if we train and test the model with two different datasets, then it will decrease the performance of the model. Hence it is important to split a dataset into two parts, i.e., train and test set.
In this way, we can easily evaluate the performance of our model. Such as, if it performs well with the training data, but does not perform well with the test dataset, then it is estimated that the model may be overfitted.
For splitting the dataset, we can use the train_test_split function of scikit-learn.
The bellow line of code can be used to split dataset:
In the first line of the above code, we have imported the train_test_split function from the sklearn library.
In the second line, we have used four variables, which are
Overfitting and Underfitting issues
Overfitting and underfitting are the most common problems that occur in the Machine Learning model.
A model can be said as overfitted when it performs quite well with the training dataset but does not generalize well with the new or unseen dataset. The issue of overfitting occurs when the model tries to cover all the data points and hence starts caching noises present in the data. Due to this, it can't generalize well to the new dataset. Because of these issues, the accuracy and efficiency of the model degrade. Generally, the complex model has a high chance of overfitting. There are various ways by which we can avoid overfitting in the model, such as Using the Cross-Validation method, early stopping the training, or by regularization, etc.
On the other hand, the model is said to be under-fitted when it is not able to capture the underlying trend of the data. It means the model shows poor performance even with the training dataset. In most cases, underfitting issues occur when the model is not perfectly suitable for the problem that we are trying to solve. To avoid the overfitting issue, we can either increase the training time of the model or increase the number of features in the dataset.
Training data vs. Testing Data
How do training and testing data work in Machine Learning?
Machine Learning algorithms enable the machines to make predictions and solve problems on the basis of past observations or experiences. These experiences or observations an algorithm can take from the training data, which is fed to it. Further, one of the great things about ML algorithms is that they can learn and improve over time on their own, as they are trained with the relevant training data.
Once the model is trained enough with the relevant training data, it is tested with the test data. We can understand the whole process of training and testing in three steps, which are as follows:
The above process is explained using a flowchart given below:
Traits of Quality training data
As the ability to the prediction of an ML model highly depends on how it has been trained, therefore it is important to train the model with quality data. Further, ML works on the concept of "Garbage In, Garbage Out." It means that whatever type of data we will input into our model, it will make the predictions accordingly. For a quality training data, the below points should be considered:
The very first quality of training data should be relevant to the problem that you are going to solve. It means that whatever data you are using should be relevant to the current problem. For example, if you are building a model to analyze social media data, then data should be taken from different social sites such as Twitter, Facebook, Instagram, etc.
There should always be uniformity among the features of a dataset. It means all data for a particular problem should be taken from the same source with the same attributes.
3. Consistency: In the dataset, the similar attributes must always correspond to the similar label in order to ensure uniformity in the dataset.
4. Comprehensive: The training data must be large enough to represent sufficient features that you need to train the model in a better way. With a comprehensive dataset, the model will be able to learn all the edge cases.
Good training data is the backbone of machine learning. It is crucial to understand the importance of good training data in Machine Learning, as it ensures that you have data with the right quality and quantity to train your model.
The main difference between training data and testing data is that training data is the subset of original data that is used to train the machine learning model, whereas testing data is used to check the accuracy of the model. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"content is appropriate and educational\", \"score\": 0}\n```\n\nThe provided text is entirely focused on explaining the concepts of training and test datasets in machine learning. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for educational environments and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses machine learning concepts and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "217-0",
"llm_safety_score": 0,
"reason": "content is appropriate and educational"
},
{
"custom_id": "217-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.javatpoint.com/train-and-test-datasets-in-machine-learning",
"date": "2023-10-02T10:52:41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00063.warc.gz",
"language": "en",
"language_score": 0.9352958202,
"token_count": 1702,
"score": 3.40625,
"int_score": 3
} |
<urn:uuid:46162e6d-6b23-4b7d-b4ab-c5cae6e0e7b0> | ROCKVILLE, MD – Feb. 21, 2023 – A new impact study at Prince George’s County Public Schools (PGCPS) found that students in grades 6 to 8 who used Speak Agent Math+Language℠ outperformed their peers who did not use the program. Students who completed ten Speak Agent learning activities experienced a ten percent higher mean score than their peers on the PGCPS Math Benchmark assessments.
In addition, multilingual learners experienced a 17-point (five percent) higher mean score on the WIDA ACCESS for ELLs test, in addition to a higher math score. This is the first large-scale study to find a positive, independent effect at a 99.9% confidence level for both Math and English language proficiency scores, as measured by third-party assessments, caused by a single education technology program.
“We chose Speak Agent’s Math+Language program to develop middle-grade math literacy, communication, and reasoning skills,” said Dr. Michelle Dyson, PGCPS Mathematics Instructional Supervisor for Grades 6-8. “We could see students making progress, so we collaborated with our ESOL department to commission this study to quantify the impact. This research shows that our implementation – which closely integrates with our curriculum – helped students make strong gains on math and ELD assessments.”
Speak Agent Math+Language improves math performance for all students by empowering them to learn math through language. Students use the program to master key math concepts, develop reasoning and modeling skills, and to express mathematical thinking and ideas. Speak Agent courses map to fit the school district’s curriculum so that teachers can seamlessly integrate the program into their teaching practice. It includes learning supports and scaffolds for all learners, including multilingual and historically marginalized learners.
“Our cross-departmental goal was to improve outcomes for not only our multilingual learners but for all learners,” said Dr. Melissa Kanney, PGCPS ESOL Supervisor. “All of our students who used the Math+Language program were able to improve both their math outcomes and English language proficiency. What’s so exciting about this study is that it provides evidence that our implementation of Speak Agent is helping us meet our goals.”
Download the full research report >
APA Citation: Huebert, E. (2022). Effect of Speak Agent on Math and English Language Proficiency Scores at Middle Grades in Prince George’s County Public Schools. Leanlab Education. https://www.speakagent.com/evidence
About Prince George’s County Public Schools
Prince George’s County Public Schools (PGCPS), the nation’s 20th largest school district, has 208 schools and centers, more than 136,500 students and nearly 20,000 employees. The school system serves a diverse student population from urban, suburban and rural communities located in the Washington, DC suburbs. PGCPS is nationally recognized for college and career-readiness programs that provide students with unique learning opportunities, including dual enrollment and language immersion.
About Speak Agent, Inc.
Speak Agent is a research-based English language development (ELD) platform that significantly impacts math and ELD outcomes for all K-12 students. Speak Agent’s Math+Language program improves math performance by empowering students to learn math through language. They use the program to master key math concepts, develop reasoning and modeling skills, and to express mathematical thinking and ideas. Speak Agent engages students with ready-to-use digital lessons that seamlessly integrate with your existing curriculum and provide actionable data to inform both individual and group instruction.
Media Inquiries Only: 770-310-5244
This is a sponsored message and does not necessarily represent the views of the Education Writers Association, its board of directors, or its members. Want to see your release on the EWA site? Promote it with EWA. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample provided is a press release about an educational impact study. It contains no unsafe or inappropriate content, uses respectful language, and discusses educational outcomes without any harmful themes or references."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "218-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://ewa.org/members-news/press-releases/prince-george-county-public-schools-math-english-proficiency",
"date": "2023-10-03T15:15:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00863.warc.gz",
"language": "en",
"language_score": 0.9239476323,
"token_count": 808,
"score": 3.140625,
"int_score": 3
} |
<urn:uuid:0fad1b15-7713-44f5-9dba-a042c2f53f86> | Browser compatibility or cross-browser testing is a process of evaluating whether the functionality of a web application remains consistent when the end-user visits your web-application from a different browser. It is also used to validate browser compatibility for desktop and web applications.
In cross-browser testing, you will validate the style, font, and other UI elements of your website. All these things should look similar in each browser.
The Importance of Testing in Different Browser Versions
Well, first, not all people are using the same browser.
You can check the latest stats on Wikipedia for usage share of all browsers, desktop browsers, mobile browsers, and tablet browsers.
Now let’s look at the other scenarios…
You hear about some sales on a product that your parents wanted. You call them and recommend checking the online store so that they find some stuff they were looking for a long time. In some time, they call you back and say that it’s hard to navigate. After several questions, you understand that they are using a different browser and it begins a whole new question of how to download another browser — the one that you are using.
In this case, the business is just risking losing clients because of one browser version looking awful. In the 21st century, when you open some web app and it looks bad, you just go back to Google and open another one until you find a good-looking web app.
What Features Are Analyzed in a Browser Test?
When the testing phase is coming, the product team (most of the time it is QA related work) creates a test specification document in which they specify a list of features to be tested, and in what browsers/versions/platforms in order to meet test scenarios. We can divide this into the sections given below.
1. Basic functionality: To ensure that simple stuff is working on most browser-OS combinations
- All input fields and their validation
- Dialog boxes and menus are working as expected
- Input touch on mobile devices
2. Design: To make sure fonts, styles, images, and layouts are matching requirements that were sent by designers
3. Responsiveness: Verify that design is solid and not broken in some layers after you change the resolution/orientation of a browser
How To Choose Browsers?
There are two easy ways to choose from all the variety of browsers
1. Based on popularity: Choose browsers that can overcome the 5% barrier in global statistics. So, for example, in 2020 you would choose Google Chrome, Safari, Mozilla Firefox, Microsoft Edge, and IE. Regarding IE, it is a bit tricky because there are a lot of versions of this browser. Our recommendation is to support only IE 10, the reason being that IE 8 and 9 are too old and hard to support.
2. Based on the analysis: If you have some analytics tools (Google Analytics, etc.) that are tracking all traffic stats, you will have a full understanding of what your customers are using, and it will be an easy decision to make. If not, you may try to know your customer better by creating some polls, etc. Would it be worth to support all the versions of different browsers? It depends on if you agree that development and testing time will be higher every time. Either way, in the long run, you will have to sacrifice supporting old versions.
The decision on which browsers and platforms to choose depends on the business team and the marketing team.
How To Plan & Run Tests?
Before planning when and what tests will be executed, you should make sure that these conditions are met:
- Your test cases are up to date.
- Design and mockups are according to requirements.
- You have all the tools and devices that you need for testing.
- You should run regression testing at least one time in each browser. This will give you knowledge about the product and its bottlenecks.
When you are planning, don’t forget to mention who will be responsible for what browser/platform combination and assign test cases to be executed to the person responsible.
Tools To Use For Browser Compatibility Testing
- If you don’t have an opportunity to have physical devices on your project, you can use some kind of emulator/simulator/virtual machine. For mobile devices consider these options:
- You can simulate devices using developer tools that are default in Google Chrome or Mozilla Firefox.
- Fiddler/Android studio/Xcode if you need to debug or reproduce an issue with your mobile device.
- As an example of a VM, you can use a virtual box or anything related that you prefer.
- For different browsers, you can use some paid cloud services that will provide you with a whole variety of browser/platform combinations.
However, don’t forget that simulation/emulation is great when you have a limited budget, but nothing will compare to testing on a real physical device.
Manual vs Automated Cross-Browser Testing
Let’s talk about manual vs automated execution.
Manual testing needs human testers to execute scenarios, and it means that there is room for human error. From the beginning of the project, the amount of work for manual testers will only increase, which will, in turn, increase recourses and time.
When there is a scope of tests that are being executed every time, it’s better to just automate it. Setting up a full process of automation that would cover most of the tests takes a long time. So, it’s good for a long-term project.
In the modern world, most projects have both manual and automation testers in one project. Manual testers are doing exploratory testing to find the pain points in the UX (that is if we are talking only about the FE testing part) and automation guys automate scenarios that are running every time.
Common Issues While Performing Cross-Browser Testing
1. Internet Explorer: Yes, you read it right! As a separate category, I’ve put IE. This is the most painful browser to test. Every QA tester knows that when he opens Internet Explorer, he will find a couple of bugs. Everything related to the front end can be broken here. You need to keep this in mind and don’t forget to check your application in IE.
2. Layout: This is the most visible issue that you can find. Basically, it’s all related to CSS, Canvas, or DOM. Various bugs ranges from wrong text or image position to a small issue like a wrong-looking font. Do not forget about negative testing here as well, like closing a pop-out form by clicking somewhere outside the form.
3. Touches and Clicks: It’s not easy to juggle the various types of input, especially now that tablets and phones generate touches that may or may not act as a mouse click.
4. Hovering: If you have a menu that opens by hovering a mouse over it, don’t forget to check it as well. Sometimes the hovering never ends, sometimes the hover event links to the wrong item, sometimes it doesn’t open at all.
- Identify what browsers and platforms you will be testing on.
- Make sure that your test cases and designs are up to date.
- Set up devices/browsers you’ll test on.
- Assign test cases to the responsible person. Try not to assign the same person to test the same platform/browser combination a few times in a row.
- Share the document with the test results to people that will be fixing the bugs. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses browser compatibility and cross-browser testing in a professional and educational manner. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses project management, testing strategies, and common issues in cross-browser testing. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to professional and technical aspects of software testing, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "219-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "219-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.geeksforgeeks.org/cross-browser-testing-how-to-run-cases-tools-common-issues/?ref=rp",
"date": "2023-10-03T14:06:17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00863.warc.gz",
"language": "en",
"language_score": 0.9172187448,
"token_count": 1575,
"score": 3.140625,
"int_score": 3
} |
<urn:uuid:faa20717-13cb-44db-b59b-c80dd42dba24> | - Energy Efficiency Solutions
- EV Charging Solutions
- Microgrid Solutions
- ABOUT US
For many organizations, energy efficiency has become a top priority. These companies understand that by reducing their energy consumption and implementing energy optimizing strategies, they can reap the multiple benefits of energy efficient solutions. These benefits include:
It is important to understand the difference between energy efficiency and energy conservation. While many use these interchangeably, these words are quite different in the energy world.
Energy Efficiency means using less energy to perform the same task, such as lighting a room or heating a building. Technology is usually involved in this type of energy solution. For example, lighting a room uses less energy if LED lights are installed.
Energy Conservation is to prevent energy waste or not using energy at all. It typically involves changing a person’s behavior, for example, turning off the lights when leaving a room or turning down the thermostat on a cold day so the heater doesn’t run as often.
Energy efficiency upgrades may take more time and resources, but they will also save more money in the long run.
Now that we’ve got that cleared up. Let’s discuss the many benefits of energy efficiency:
Energy efficiency is a very effective way to reduce costs for your organization. The EPA estimates that by taking a staged approach to energy efficiency, most buildings can reduce their energy use by 30%. If major capital upgrades are implemented, even larger savings can be generated. Reducing energy consumption in an existing building by 20% to 30% can deliver savings ranging from 6% to 9% to total annual costs.
Money saved from energy efficiency directly impacts your organization’s bottom line and can improve profitability. Often, energy is viewed as a fixed operating expense. Fortunately, this is not the case. A variety of energy management strategies can be put in place, improving energy efficiency while also decreasing an organization’s operating costs, which can increase their bottom line.
An organization can use savings gained from implemented energy optimization initiatives to fund additional energy efficiency projects or pay for other core business needs. We call this Making Energy an Asset®.
Energy efficiency is a way to reduce not only your energy consumption but also a way to improve sustainability. A sound energy optimization strategy can help bridge the gap between your existing carbon footprint and your company’s decarbonization goals. Commercial, industrial, and even transportation use an astounding amount of energy. In 2020, transportation was 27% of U.S. greenhouse gas emissions, and the industrial sector was 24%.
Organizations with a high level of energy use are confronted with both a challenge and an opportunity for decarbonization. The simple act of updating your organization’s lighting system with LED lights can quickly and significantly reduce the amount of electricity consumed and help achieve carbon reduction goals.
Sustainability can help beyond lowering an organization’s carbon footprint. Business leaders are coming to understand that sustainability is worth the effort – both in environmental and economic terms. A recent study by McKinsey found that “sustainability programs are not only strongly correlated with good financial performance but also play a role in creating it.”
Most people realize that energy efficient initiatives will save energy and money. Many don’t recognize that energy saving projects often produce benefits beyond energy and cost savings. It is important that facility, energy, or operations managers understand how an energy solution can also support overall corporate goals. Energy efficiency and productivity go hand in hand.
Consider a manufacturing plant where an electrical disruption can be costly and greatly affect productivity. A power disturbance can cause expensive equipment failures, prolonged machine downtime, and inconsistent or poor product quality. Energy management strategies that are put into place can improve the resiliency of the facility, which ultimately affects productivity as well as asset performance.
Let’s not forget another type of productivity – people. If employees are comfortable, they will be more productive. Energy efficiency projects that tackle things like improved lighting, better air quality and circulation, and proper temperature can make a big difference in productivity.
More organizations are realizing that energy efficiency can be a key part of a business strategy. But how does energy efficiency provide a competitive advantage? Using energy more efficiently can reduce costs, optimize operations, advance decarbonization, and increase profitability.
Furthermore, organizations can leverage a competitive advantage by doing something mentioned earlier – Making Energy an Asset®. It can be a key differentiator that helps your organization achieve its business goals faster. An example of Making Energy an Asset® is when an organization uses savings attained from energy efficiency initiatives to fund growth activities within the business.
The fact is – energy efficiency isn’t just about financial benefits. A reduced carbon footprint is often a result of energy efficiency. As sustainability, decarbonization, and energy efficiency topics rise on corporate agendas, consumers are paying more attention to how an organization’s operations impact the environment.
Organizations that are improving energy efficiency and sustainability have the opportunity to boost their brand reputation as well. According to a Global Sustainability Study 2021, “Companies that don’t have sustainability as part of their core value proposition need to act now to protect against future reputational impacts and loss of market share.”
With the rise in social awareness concerning the environment, this might be the right moment for your organization to begin the transition to become more energy efficient.
Energy efficiency has become a critical piece of the puzzle for many organizations. Energy optimization reduces energy waste, drives down costs, and reduces carbon emissions. It can also improve profitability and productivity, be a competitive differentiator, and enhance a brand. Major brands, large corporations, and local businesses are realizing the tremendous return on investment they are able to achieve through energy efficient solutions.
Chateau Energy assists organizations in creating and implementing an energy solution that cuts energy consumption and costs and provides immediate value and long-lasting results.
Our Energy Consultants can create and implement energy efficient solutions to meet your organization’s complex needs and goals. Our approach is collaborative, with teams working together to develop customized solutions that address the opportunities and challenges unique to your business.
Ready to get started on the path to energy efficiency and sustainability? | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on energy efficiency and sustainability solutions, discussing various benefits and strategies without any unsafe or inappropriate content.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is entirely focused on promoting sustainability and energy efficiency. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to corporate responsibility and environmental awareness, which are suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "220-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "220-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://chateaues.com/the-benefits-of-energy-efficiency/",
"date": "2023-10-04T20:52:02",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00763.warc.gz",
"language": "en",
"language_score": 0.9430392385,
"token_count": 1268,
"score": 2.78125,
"int_score": 3
} |
<urn:uuid:2adf244d-fb16-446a-8bcd-ae8f16924bdb> | Research that tracks participants in early childhood programs has shown that high quality improves a raft of outcomes, both in children’s formal education and beyond. Good quality early childhood education improves children’s average test scores and high school graduation rates. It lowers their need for special education and reduces the risk of experiencing child abuse. And when they become adults, the average results include more steady and better-paying employment. Wow!
Lee, S., Drake E., Pennucci, A., Bjornstad, G. & Edovald, T. (2012). Economic evaluation of early childhood education. Journal of Children's Services, 7(1), 53-63.
Early Childhood Investment = Money Well Spent | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the benefits of high-quality early childhood education and cites academic research. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "221-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "http://wishviewkids.com/tuition.html",
"date": "2023-09-21T11:16:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00163.warc.gz",
"language": "en",
"language_score": 0.904306531,
"token_count": 144,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:1bb36484-4456-40fa-8973-27ebbaff610e> | What is block storage?
I know you blocked your calendars to check back here and read our weekly blog on storage formats, right? Well, just in case you didn’t, be sure to check out last week’s introductory piece that covers all the bases of file storage. This week’s blog is about block storage, a slightly more nuanced format than file and object but no less attractive.
Part 2. What is Block Storage?
Block storage is a storage format that treats each volume as a separate hard drive. Its configuration is the responsibility of the storage admin. That is why it is called “block”: it organizes and structures the data as blocks with a fixed size. Each block is assigned with metadata serving as its unique address. What is interesting about block storage is that it isn’t limited to one environment: you can store several blocks in one environment and the rest in another.
Block storage is operated and managed via unique software, separated from storage media. This program controls the way blocks are allocated and organized on disk space. The retrieving option is also a part of its functionality, as this software uses unique identifiers to locate the required blocks and sort them into files however the user needs. The most traditional way to operate and control such management programs is by using a server operating system to format block devices with a file system. Users can access block storage volumes through protocols such as NVMe-oF, NVMe over TCP, Fiber Channel over Ethernet (FCoE), or iSCSI. Moreover, directly attached storage, drives, and server RAID are also block storage devices.
Pros & Cons of Block Storage
Today block storage is quite a popular solution for many environments. This is not surprising, considering some of its advantages. Naturally, it has setbacks as well.
- High performance: Access to block storage using high-performance protocols is a perfect fit for high-performance mission-critical apps. Practically, it guarantees high I/O performance with low latency as the cherry on the cake. Its most popular applied use is a high-performance alternative to file storage, used predominantly in SAN environments.
- Reliability: Block storage generally has a low failure rate since blocks of data are stored in self-contained units. An organization can restore data from backup media quickly in case of failure.
- Incremental Modifications: One of the most valuable things about block storage in practical terms is that it is easy to modify. Within a block storage environment, files can be altered without the necessity to remove existing data, as would have happened in the case of a files storage system. Accordingly, blocks can be subjected to any operations, including replacing, deleting, or inserting them. In other words, if you want to change a block, there’s no need to make a new one. Just create another version.
- Server-Bound: The block storage system is usually bound to the server, making it impossible to access it from other servers simultaneously. You can put some software that solves it on top, of course. Unfortunately, it does not remove inconveniences as it is additional pressure on the system overall, affecting performance.
- Limited Metadata: Unlike file or object storage, block storage volumes have almost no metadata. It isn’t hard to imagine how poorly this may reflect on operations where the use of metadata is critical, such as search and retrieval. In a block storage environment, an application has to go through many blocks to succeed in the search. However, specific file systems such as ZFS or Btrfs can provide metadata capabilities to increase data integrity.
- Hard to Afford: Block storage is indeed performative and reliable, but it needs SANs, which are expensive. Such a storage array requires some more considerable financial expenses, let alone professional and regular maintenance. Even a large enterprise may find that supporting and maintaining block storage isn’t that easy to afford.
Block Storage Use Cases
Fast and performative block storage finds much appreciation. Here are some possible use cases:
- Database Storage: Speed, performance, and reliability. These are the reasons that make block storage superb in use for databases and as good support for enterprise apps. Blocks of data are also simple to modify, which makes this such a good match for frequently updated files.
- Server Storage: Block storage systems distribute data across multiple volumes. A block-based storage volume is simple to create and format. It is perfect for running as backend storage for a virtualized system. You can create multiple VMs by attaching a bare-metal server to that block. For example, many enterprises often use block storage for deploying VMFS volumes across the whole enterprise.
- Email Servers: Organizations often choose highly performative and reliable block storage technology as a standard option to store emails.
And with that, the foundational understanding of file and block storage formats has been laid. We hope you have found revisiting these storage types as refreshing as we have. With one final blog in the series, we will discuss the newest of the three (and our personal favorite 😏) object storage next week. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is an educational and informative piece about block storage. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "222-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://objectfirst.com/blog/block-storage-pros-cons-use-cases/",
"date": "2023-09-21T11:36:56",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00163.warc.gz",
"language": "en",
"language_score": 0.9483252168,
"token_count": 1044,
"score": 3.21875,
"int_score": 3
} |
<urn:uuid:08c67d6e-e128-47e0-9276-0c2ff8ddf876> | Air Quality Detector Can Protect Babies and Elderly from Allergies
Babies, kids and the elderly are especially at risk for breathing diseases for many reasons. They are very susceptible to breathing diseases, all the more we should invest in protecting them from what may cause it.
Protect Babies and Elderly from Breathing Diseases
The elderly usually suffer from asthma but are often explained as old age. It could also be caused by smoking or bad air quality (pollution). Ones who suffer from dementia or Alzheimer’s also cannot communicate what they feel, and this makes the diagnosis even harder.
Asthma is one of the most undiagnosed breathing diseases, causing breathing restrictions by inflaming the airways and lungs.
Recent studies confirm that a lot of people who suffer from asthma are older and that the disease lasted longer, needing emergency treatments and often went together with sinusitis and pneumonia. And it gets even harder to diagnose if the person has chronic bronchitis, heart failure or any other pulmonary disease.
Babies and children also have a hard time showing signs of asthma. 1 of 10 kids can develop it, and it can cause severe respiratory distress, with the chances of being fatal for the little ones.11
Other Asthma signs to watch out for:
Besides the usual symptoms of coughing, you can check:
- Breathing problems
- Frequent viral infections
- Chest tightness
- Trouble sleeping
Changing the habits can make a difference!
- Avoid triggers
Smoke and pollen (particulate matter, PM.25) are one of the most common asthma triggers. Avoid smoking near or around children and the elderly. Assess the place you are going to for pollen count this way you can help avoid triggering an asthma attack.
Read More: Ultimate Guide for First Time Parents
- Know your air
Having an Indoor Air Quality Monitor will help you to find out what’s going on where your loved ones live. uHoo can provide you with the data you need to make the changes that matter. When you receive an alert about the air quality, the uHoo app will also automatically provide recommendations on what you can do at that moment for better air quality.
- Getting proper treatment
Going to your doctor and learning more about asthma can avoid visits to the ER, or even having to take shots, corticosteroids, or oxygen therapy. Use the right medications and allergy shots to get immunisations. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"safe\", \"score\": 0}\n```\n\nThe text is focused on providing information about air quality and its impact on the health of babies and the elderly, particularly in relation to asthma and allergies. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "223-0",
"llm_safety_score": 0,
"reason": "safe"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.medical-xprt.com/news/air-quality-detector-can-protect-babies-and-elderly-from-allergies-822699",
"date": "2023-09-21T11:47:02",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00163.warc.gz",
"language": "en",
"language_score": 0.9366458058,
"token_count": 507,
"score": 3.203125,
"int_score": 3
} |
<urn:uuid:b4dd3e55-b5bf-461f-a837-25672b5f13ce> | Exit Tickets (digital download)
This booklet includes 28 different exit tickets that are suitable for a range of age groups. Each ticket also has an interactive version that can be used as part of a remote learning strategy.
According to leading educational researcher Robert J. Marzano, exit slips can be used to fulfill one of four purposes:
- To provide formative assessment data
- To stimulate student self-analysis
- To reflect on instructional strategies
- To encourage open communication with the teacher.
At the end of your lesson, or before the end of class, ask students to complete an exit slip. Students then hand these in as they exit the classroom or transition to the next lesson, providing you with helpful feedback and information that can guide your interactions with students and inform your next lesson for that subject.
We hope that this resource will be of support for you and your school community. If you have any feedback, or you’d like to suggest ideas for new resources, please contact our team at: [email protected].
Please note: As this is a digital product, we have provided two different options for purchase.
The ‘Individual’ licence enables you to use this product with your students but does not enable you to share this resource with another teacher for use with their class.
The ‘Whole School’ licence enables every teacher at your school to use this product but does not enable you to share this resource with teachers from another school. The PDF will be stamped with details pertaining to the licence option you have selected. Please enter your school’s name in the company field during checkout.
For any enquiries regarding which licence is most appropriate for your context, please contact: [email protected]. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"suitable for all audiences\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is entirely appropriate for public use, educational environments, and general audiences. It discusses the use of exit tickets in education, which is a common and beneficial practice. The language is respectful, and there are no references to unsafe content, illegal activities, or inappropriate themes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "224-0",
"llm_safety_score": 0,
"reason": "suitable for all audiences"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://instituteofpositiveeducation.com/collections/positive-education-resources/products/exit-tickets-digital-download",
"date": "2023-09-22T18:14:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00063.warc.gz",
"language": "en",
"language_score": 0.9274269342,
"token_count": 361,
"score": 2.78125,
"int_score": 3
} |
<urn:uuid:8ab5ecea-bea9-408a-93da-3595f0bcbbbc> | 2011 AMC 10A Problems/Problem 24
Two distinct regular tetrahedra have all their vertices among the vertices of the same unit cube. What is the volume of the region formed by the intersection of the tetrahedra?
A regular unit tetrahedron can be split into eight tetrahedra that have lengths of . The volume of a regular tetrahedron can be found using base area and height:
For a tetrahedron of side length 1, its base area is , and its height can be found using Pythagoras' Theorem. Its height is . Its volume is .
The tetrahedron actually has side length , so the actual volume is .
On the eight small tetrahedra, the four tetrahedra on the corners of the large tetrahedra are not inside the other large tetrahedra. Thus, of the large tetrahedra will not be inside the other large tetrahedra.
The intersection of the two tetrahedra is thus .
The intersection of the two tetrahedra is an octahedron that has points touching the center of each face of the original cube. We can split the octahedron into two square pyramids, and from there we can find the volume of each pyramid. The sides of the square face of the pyramid will have lengths of , so the volume of both pyramids (the whole octahedra) will be .
Notice that the intersection of the tetrahedra is one of the larger tetrahedra with the four smaller tetrahedra on its points cut off. Using the tetrahedron volume formula (, where is the length of a side), and using and as the side lengths, you get the volume of the intersection as .
|2011 AMC 10A (Problems • Answer Key • Resources)|
|1 • 2 • 3 • 4 • 5 • 6 • 7 • 8 • 9 • 10 • 11 • 12 • 13 • 14 • 15 • 16 • 17 • 18 • 19 • 20 • 21 • 22 • 23 • 24 • 25|
|All AMC 10 Problems and Solutions| | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe given text is a mathematical problem and solution from the AMC 10A contest. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "226-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://artofproblemsolving.com/wiki/index.php?title=2011_AMC_10A_Problems/Problem_24&oldid=183920",
"date": "2023-09-23T20:35:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00863.warc.gz",
"language": "en",
"language_score": 0.8941574693,
"token_count": 449,
"score": 3.703125,
"int_score": 4
} |
<urn:uuid:f9d92d9d-1214-430b-b5c2-1c289f11f0d8> | In diagnostics and quick testing, lateral flow assays have become pivotal. These compact devices offer rapid and reliable results, from pregnancy tests to detecting infectious diseases. But what exactly does a lateral flow assay detect, and how does it work? This article will delve into lateral flow assays, exploring their mechanisms, applications, and significance in modern healthcare.
Understanding the Basics
The Fundamentals of Lateral Flow Assays
Lateral Flow Manufacturing assays, commonly known as LFAs or lateral flow tests, are simple yet powerful devices for detecting a specific analyte’s presence or absence in a sample. These analytes can range from antibodies, antigens, and pathogens to various biomolecules.
How Does It Work?
Capillary Action and Sample Flow
The core principle behind lateral flow assays is capillary action. When a sample is applied to the sample pad, it gets drawn through the test strip via capillary action. This movement is crucial in facilitating the interaction between the sample and the components of the assay.
Within the test strip, various zones containing immobilized reagents are present. These reagents can include antibodies, antigens, or other molecules specific to the target analyte. As the sample flows through these zones, any target analyte present will bind to these reagents, initiating an immunochemical reaction.
Once the analyte has bound to the immobilized reagents, a visible signal is generated. This signal is what allows for the detection of the analyte. Commonly, this signal is in the form of colored lines or spots on the test strip, making it easily interpretable.
Applications of Lateral Flow Assays
Where are Lateral Flow Assays Used?
Lateral flow assays find applications across various fields:
In the medical field, lateral flow assays are extensively used for diagnosing diseases and monitoring health conditions. Pregnancy tests, HIV tests, and COVID-19 rapid tests are some prominent examples.
Food Safety Testing
To ensure food safety, these assays are employed to quickly detect contaminants, allergens, or pathogens in food products.
Lateral flow assays are valuable tools for assessing environmental conditions by detecting pollutants or specific biomarkers.
Believe it or not, lateral flow assays have even made their way into space. They are used for detecting biomarkers and pathogens in spacecraft environments.
Advantages and Limitations
The Pros and Cons of Lateral Flow Assays
- Rapid Results: Lateral flow assays provide quick results, often within minutes.
- Portability: They are compact and easy to transport.
- Cost-Effective: These assays are cost-effective, making them accessible in various settings.
- User-Friendly: They require minimal training to operate.
- Sensitivity: LFAs may not be as sensitive as laboratory-based tests.
- Specificity: Cross-reactivity with similar analytes can occur.
- Quantitative Data: LFAs usually provide qualitative results, not precise quantitative data.
The Future of Lateral Flow Assays
As technology advances, lateral flow assays are likely to become even more sophisticated. Researchers are continually working to improve their sensitivity and specificity, opening doors to new applications in healthcare and beyond.
Lateral Flow Manufacturing assays have revolutionized the world of diagnostics and quick testing. Using a simple yet effective mechanism, they detect a wide range of analytes, from antibodies to pathogens. While they have limitations, their advantages make them indispensable tools in modern healthcare, food safety, and space exploration. As technology continues to evolve, lateral flow assays are set to play an even more significant role in various fields.
Frequently Asked Questions
- Q1: How accurate are lateral flow assays? Lateral flow assays are generally accurate, but their accuracy can vary depending on the specific test and the components’ quality.
- Q2: Can lateral flow assays be used for quantitative measurements? Lateral flow assays are primarily qualitative tests, providing a yes/no answer. They are not designed for precise quantitative measurements.
- Q3: What is the typical shelf life of lateral flow assay kits? The shelf life of lateral flow assay kits varies, but it is usually several months to a few years. It depends on factors like the type of assay and storage conditions.
- Q4: How are lateral flow assays different from ELISA tests? Both lateral flow assays and ELISA tests are immunoassays, but they differ in their complexity, time required, and the type of results they provide.
- Q5: Are lateral flow assays suitable for home use? Yes, many lateral flow assays are designed for home use, such as pregnancy tests and some infectious disease tests. They are user-friendly and provide quick results. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text sample is entirely educational and informative, discussing the principles, applications, and significance of lateral flow assays in various fields. It does not contain any unsafe or inappropriate content, making it fully suitable for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "227-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://ridzeal.com/what-does-a-lateral-flow-assay-detect/",
"date": "2023-09-23T21:12:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00863.warc.gz",
"language": "en",
"language_score": 0.9111377597,
"token_count": 988,
"score": 4.03125,
"int_score": 4
} |
<urn:uuid:ba2b02fc-e750-4930-b544-86d4e7133745> | Re-inventing math education for neurodiverse students was the inspiration behind bringing internationally recognized math expert, Christopher Woodin to the Dallas Academy campus this summer. His two-day visit included a coaching workshop during which Dallas Academy teachers practiced Woodin math with Dallas Academy students while Mr. Woodin provided real-time coaching and discussion. The second day, Mr. Woodin presented teaching methods that are designed whole to part and require minimal language demands, multimodal strategies to help students express, relate, store, and retrieve information efficiently.
Mr. Woodin is a specialist in the fields of mathematics and learning differences and the Ammerman Chair of Mathematics at Landmark School in Massachusetts. In addition to authoring two books and multiple journal articles, Mr. Woodin has presented at numerous international Learning Disabilities Association (LDA) and International Dyslexia Association (IDA) conferences and led math workshops to audiences across the world.
Woodin’s approach is quite different from how most of us were taught math, and it is different from most modern curriculum approaches as well. Students with dyslexia and other language-based learning disabilities who are confused by typical math instruction can excel when instructed in a way that always shows the big picture first, uses visual-spatial images, and directly examines how the parts are connected to the whole. Number sense is developed by establishing a robust understanding of quantities so that their values may be compared. The methodology presented enables such comparison by limiting demands on language processing, working memory, and executive function skills.
Dallas Academy is actively using multiple methods presented by Mr. Woodin in their math classes. “It’s about how our teachers can use these tools to support neurodiverse students and adjust what is needed for our students to succeed,” Dr. Mandi Skerbetz says. “We are privileged to have a world leader guiding our teachers in research-based methods teaching math from whole to part and with minimal language demands.” | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the introduction of a math expert, Christopher Woodin, to a school to improve math education for neurodiverse students. The content is entirely focused on educational and professional development, with no inappropriate language, harmful themes, or unsafe references. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "229-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://lakehighlands.bubblelife.com/community/dallas_academy/library/356418490/key/355071613/How_Dallas_Academy_Learned_to_Re-Invent_Math_Education?image=357425551",
"date": "2023-09-25T02:59:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00763.warc.gz",
"language": "en",
"language_score": 0.9411172271,
"token_count": 407,
"score": 2.75,
"int_score": 3
} |
<urn:uuid:83f79325-1d35-4bc2-874d-65acc77e22f3> | Young people have ideas. Good ideas. But how can the tech industry support young innovators to turn those ideas into projects, products, and businesses?
In 2020, a group of researchers set about to conduct a systematic review of studies into adolescent creativity. Across 64 articles on the factors that enhance or inhibit creativity in young people, they found that the vast majority of studies (94%) to date have not taken social contextual factors into account.
In other words, we know quite a bit about how individual mindset, parental influence, and educational experience influence how likely (or not) a young person is to embrace and express their creativity – but research hasn’t really explored the impact of social context.
This is particularly interesting when we know that social groups and social influence are incredibly important to young people, and research shows that teenagers thrive when they’re able to contribute to their communities and societies.
There’s a gap to be filled here: how can we support young people in developing a social context that enables them to tap into their creativity and have a meaningful impact on the world around them? And we think the answer (or at least, one of various possible answers) lies in tech.
Gitanjali Rao: a role model
Gitanjali Rao is a scientist, engineer and author. She’s 16 years old, and when she was only 12 she invented a portable device to detect lead in water. In 2020 she was named as TIME’s Kid of the Year because of her work as a scientist and leader, giving other young people the tools and motivation to develop their own innovations.
In a recent interview with Entrepreneur Magazine, Rao suggested that rather than worrying about whether or not they’re a genius or prodigy, young people can have a big impact by finding solutions to the problems they see in the society around them. This isn’t easy though – and Rao herself said she’s been dismissed by researchers and organisations based on her age or “perceived immaturity.”
The notion that young people’s ideas aren’t worth listening to doesn’t do much to create a good social context in which young people can have ideas, and feel confident enough to share them. But role models like Rao, who’s specifically working to create models that enable and empower her peers, can create the space for adolescent innovation.
And we need that. Because these aren’t just kids – they’re the people who will soon inherit the responsibility for their societies, and who can see impending global problems with clear minds.
Can the social context for innovation override education gaps?
Access to education and resources is a huge influencing factor in whether or not a young person will develop their ideas and become a successful entrepreneur. And ensuring that access is the responsibility of older generations and government leaders.
But even in regions and demographics with lower than average access to high quality education, when role models like Rao create a social environment in which young people feel like their ideas matter, there is hope.
Part of Rao’s book, Young Innovator’s Guide to STEM, has been adopted as a formal STEM curriculum in Kakuma Refugee Camp in Kenya. By reaching into places where education and inspiration is limited, existing young innovators can drive the creation of a youth culture in which you don’t have to be from a wealthy family, or attend a top school, in order to feel like your ideas matter.
Rao wants to see a movement of young innovators who are empowered to solve problems. We’re behind her. And we hope major tech leaders will support this movement, and start opening more doors for young entrepreneurs. Through technology, young people can solve the problems they see in the world around them. And the youth innovators who are welcomed into the industry now will soon be the ones driving tech into a more meaningful future. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"promotes role models and empowerment of young innovators\", \"score\": 0}\n```\n\nThe text discusses the importance of supporting young innovators and highlights the role of role models like Gitanjali Rao in empowering young people to develop their ideas and contribute to society. It does not contain any unsafe or inappropriate content and is suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "230-0",
"llm_safety_score": 0,
"reason": "promotes role models and empowerment of young innovators"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.insights.onegiantleap.com/blogs/how-create-youth-innovation-movement/",
"date": "2023-09-25T04:18:54",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00763.warc.gz",
"language": "en",
"language_score": 0.952562809,
"token_count": 805,
"score": 2.953125,
"int_score": 3
} |
<urn:uuid:9c828f81-cd17-43e1-8309-2bc91455a2c6> | A small adder averaging around 25 cm with a maximum length of 34 cm. The Albany Adder is endemic to the Eastern Cape in the Algoa Bay region where it occupies Albany-thicket and Bontveld grasslands.
The Anchieta’s Cobra is very similar to the Snouted Cobra in both appearance and behaviour. It occurs in western Zimbabwe, northern Botswana and northern Namibia (and elsewhere further north). Individuals are orange-brown to purple-brown and banded varieties are also found.
A beautifully-marked nocturnal snake that averages 40-60 cm with a maximum length of 68 cm. It inhabits the rocky arid regions of Namaqualand and the Karoo extending into southern Namibia. This snake is quite common in some areas and often killed at night on roads by passing vehicles.
There are at least four isolated populations of the Berg Adder, largely occurring at high altitudes except for the Western Cape and Eastern Cape where they may occur at sea level. This snake averages 30 – 40 cm, reaching 60 cm in length. It is fond of basking, especially on mountain paths and rocky ledges.
This harmless burrowing snake spends most of its life underground where it feeds on ants, termites and their larvae. It is often flushed to the surface after heavy rains. As the common name indicates it is largely blind as scales cover the eyes – an adaptation for an underground existence. Bibron’s Blind Snake averages 30 – 38 cm with a maximum length of 48.4 cm.
After the Mozambique Spitting Cobra and Puff Adder, the Bibron’s Stiletto Snake accounts for most serious snakebites in South Africa. It spends most of its life underground but often emerges on hot humid nights and may be stepped on. With large hinged fangs it cannot be handled safely and also cannot be held behind the head – it merely twists its head sideways and will get a fang to penetrate a fingertip. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is purely educational and informative, detailing the characteristics and habitats of various snake species. There are no unsafe, inappropriate, or harmful elements present."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "231-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.africansnakebiteinstitute.com/category/snakes/southern-african-snakes/?utm_source=website&utm_medium=referral&utm_campaign=willemvzyl",
"date": "2023-09-26T08:46:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00663.warc.gz",
"language": "en",
"language_score": 0.9415519834,
"token_count": 411,
"score": 3.015625,
"int_score": 3
} |
<urn:uuid:b346937f-6323-4127-a238-587ef4d86c4d> | How the Moon Illuminates Our Sky and Controls Oceanic Tides
When you look at the moon do you ever wonder about the relationship between its visibility and oceanic tides? The earth, moon, and auxiliary planets participate in an elliptical orbit around the sun, a course that is non-circular and similar to the shape of an oval (1). The sun is the center of this orbit as it has a significant gravitational force compared to all of the other masses (2). All celestial bodies with substantial masses, such as planets, the moon, and the sun, rotate on an axis, an invisible line that penetrates through the center of these objects (3). The earth rotates around its axis every twenty-four hours and revolves around the sun once each year (4). However, the moon’s rotation on its axis and revolution around the earth both take twenty-nine days, allowing the same side of the moon to continually face the earth (4,5). The relationship between the earth, moon, and sun dictates the visibility of the moon, along with the pattern of oceanic tides around the world (6).
The moon has eight phases, each of which are differentiated by its position, orbit, and reflection of the sun’s light (7). Depending on the moon’s position in relation to the sun, its image from the earth drastically changes throughout the month. The first phase is the new moon phase, or the “invisible stage,” and is when the bright side of the moon faces the sun (5). The next phases of the waxing crescent and the first quarter demonstrate the progression of the satellite’s orbit around the earth. At first, a sliver of the moon is illuminated, followed by what appears to be half (8). While the first quarter moon takes shape as a glowing half, the name of this stage is derived from its revolution around the earth, as one-quarter of the orbit is completed by this stage (8).
In the fourth phase, the moon is a waxing gibbous. While most of the moon is opposite the sun, its silhouette is not entirely lit up (8). Once the moon’s orbit is at the point where it is completely opposite the sun, its shape becomes illuminated. As the earth’s satellite, the moon, makes its journey toward the sun, it completes the phases of waning gibbous, last quarter, and waning crescent (8). By the waning gibbous stage, the amount of the moon’s light that beams proportionately decreases, and by the last quarter phase, it returns to being half lit up (5). Lastly, the moon reaches the last stage of waning crescent when a thin oblong shape is lit up; after this phase, the moon returns to the first stage (8).
The eight phases of Earth’s moon (8).
In addition to how the moon is visible on Earth, the moon’s gravitational pull and eight phases dictate high and low tides all across the world. As the moon orbits around the earth, its gravitational pull results in tidal force. Tidal force is a force that drives the earth’s water and causes the land to “bulge” out (9). While Earth’s land does not project out with the effect of tidal force, its water swells and creates high tides as the moon moves in orbit (10). At a specific point in time, two points on Earth will simultaneously experience the emergence of a high tide; these two places will be points on Earth that are directly facing the moon (direct tide) and a point furthest from the moon (opposite tide) (10). The point of the earth that is closest to the moon experiences the strongest gravitational pull, whereas the weakest gravitational pull is at the most distant point on Earth (10). The center of the earth experiences an “average amount” of gravitational pull from the moon.
Tidal force on Earth can be calculated from the average gravitational pull of the moon subtracted from its pull at one location. This calculation and transpiration of events in reality ultimately leads to a “stretching and squeezing” of the earth, creating two high tides at one time (9).
The moon’s gravitational pull on the earth is not the only factor determining notable high and low tides. When the moon is in the new or full phase, high tides reach their ultimate heights and low tides plummet. These types of tides are classified as spring tides. At this point, the earth, moon, and sun are all parallel to one another, and the additional gravity of the sun creates an increased swelling of Earth’s water (10). On the other hand, neap tides occur at the quarter phases when the sun pulls against the moon’s gravitational force, producing less of a margin between high and low tides (10). When the moon is a waxing gibbous or waning crescent, about to approach the full and new phases, high tides increase in size, and low tides decrease (10). Similarly, when the moon is a waning gibbous or waxing crescent and nearing the quarter phases, high tides reduce in size and low tides are at their extreme height (10).
While we may look up at the night sky and see varying projections of the moon every day, its visibility and illumination are vital in informing our world about the pattern and magnitude of high and low tides, especially as more coastal communities face the threat of climate change.
A depiction of the high and low tides on Earth’s water based on the position of the sun and moon (9).
- Why one side of the Moon faces Earth explained | Britannica. (2022). In Encyclopædia Britannica. Retrieved from https://www.britannica.com/video/162011/Explanation-side-Earth-Moon#:~:text=The%2 0period%20of%20the%20Moon’s,from%20when%20it%20was%20full
- Bozeman Science. (2013). ESS1B – Earth and the Solar System [YouTube Video]. In YouTube. Retrieved from https://www.youtube.com/watch?v=mxI7vRv8HT0
- Axis. (2015). NASA. Retrieved from https://www.nasa.gov/audience/forstudents/k-4/dictionary/Axis.html
- Earth’s rotation and revolution explained | Britannica. (2022). In Encyclopædia Britannica. Retrieved from https://www.britannica.com/video/151528/Earth-rotation-axis-revolution-Sun
- Top Moon Questions | Inside & Out – Moon: NASA Science. (2021). Moon: NASA Science. Retrieved from https://Moon.nasa.gov/inside-and-out/top-Moon-questions/
- Moon – Distinctive features | Britannica. (2022). In Encyclopædia Britannica. Retrieved from https://www.britannica.com/place/Moon/Distinctive-features
- Phases and orbits of the Moon. (2022, July 21). Phases and Orbits of the Moon | Institute of Physics. Retrieved from https://www.iop.org/explore-physics/Moon/phases-and-orbits-Moon#gref
- Moon Phases | Moon in Motion – Moon: NASA Science. (2022). Moon: NASA Science. Retrieved from https://Moon.nasa.gov/Moon-in-motion/Moon-phases/
- What Causes Tides? | NOAA SciJinks – All About Weather. (2022). Scijinks.gov. Retrieved from https://scijinks.gov/tides/
- The Effects of the Moon Phases on Ocean Tides. (2018). Sciencing. Retrieved from https://sciencing.com/effects-Moon-phases-ocean-tides-8435550.html | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is purely educational and informative, discussing the relationship between the moon, its phases, and oceanic tides. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text sample is purely educational and informative, discussing the phases of the moon and their effects on tides. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "232-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
},
{
"custom_id": "232-1",
"llm_safety_score": 0,
"reason": "educational content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://bbnchasm.com/2023/01/24/shedding-light-on-the-moon/",
"date": "2023-09-27T15:03:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510300.41/warc/CC-MAIN-20230927135227-20230927165227-00563.warc.gz",
"language": "en",
"language_score": 0.8745881915,
"token_count": 1688,
"score": 4.0625,
"int_score": 4
} |
<urn:uuid:2d2e4c9f-018a-478b-88e1-23d7f3615303> | - 46.1k views
Overview of Macronutrients & Micronutrients
The majority of the diet is made up of macronutrients, which also provide energy and many necessary nutrients. The macronutrients are water, microminerals, proteins (including necessary amino acids), fats (including essential fatty acids), and carbohydrates. Proteins, carbs, and fats can all be used as energy sources; lipids have a caloric value of 9 kcal/g (37.8 kJ/g), while proteins and carbohydrates have a caloric value of 4 kcal/g (16.8 kJ/g). Micronutrients include trace minerals and vitamins, which are needed in very small levels.
About the Speaker
Nt Asritha Vissapragada
Nutrition Counselor at TRULY NUTRITION
Role of Nutrition in Health and Well-Being
Nutrition plays a pivotal role in promoting overall health and well-being by supplying the body with essential nutrients that support its growth, maintenance, and functioning. A balanced and varied diet provides the necessary vitamins, minerals, proteins, carbohydrates, and fats that contribute to optimal bodily functions, energy levels, and immune system strength. Adequate nutrition is closely linked to preventing chronic diseases such as heart disease, diabetes, and obesity, as well as supporting healthy aging and cognitive function. Nutrient-rich foods like fruits, vegetables, whole grains, lean proteins, and healthy fats offer a spectrum of benefits, from boosting metabolism to aiding in digestion. Proper nutrition during different life stages, such as childhood, pregnancy, and old age, is vital for growth, development, and maintaining vitality. Hydration, an essential aspect of nutrition, ensures proper bodily functions, including regulating body temperature and transporting nutrients.
Case Discussion on Role of Micronutrients in Thyroid
Micronutrients play a crucial role in thyroid function, supporting its hormonal regulation and overall health. Iodine, an essential micronutrient, is a key component of thyroid hormones, thyroxine (T4) and triiodothyronine (T3). Deficiency can lead to thyroid dysfunction and goiter. Selenium aids in the conversion of T4 to active T3 and protects the thyroid gland from oxidative stress. Zinc is necessary for thyroid hormone production and proper immune function. Iron is vital for thyroid peroxidase, an enzyme required for thyroid hormone synthesis. Adequate intake of these micronutrients through a balanced diet is essential for maintaining optimal thyroid function and preventing related disorders.
Pediatric and Maternal Nutrition
Maternal nutrition during pregnancy significantly impacts fetal growth and development. Adequate maternal intake of essential nutrients like folate, iron, and calcium is crucial for the baby's health. Proper nutrition during pregnancy helps reduce the risk of birth complications and promotes healthy birth weight. Breastfeeding is recommended as the best source of nutrition for infants up to six months, providing essential antibodies and nutrients. Exclusive breastfeeding supports optimal growth and development during the first six months of life. Introducing complementary foods after six months, along with continued breastfeeding, ensures a balanced diet for infants. Pediatric nutrition plays a pivotal role in supporting growth, cognitive development, and immune function in children. Early exposure to a variety of foods can help prevent picky eating and foster healthy eating habits later in life. Age-appropriate portions and balanced meals with a mix of fruits, vegetables, proteins, and grains are essential for children's nutrition.
Nutrition interventions for obesity and metabolic disorders.
Obesity and metabolic disorders have become significant public health concerns worldwide. Nutrition interventions play a crucial role in managing and preventing these conditions. Obesity is a complex condition characterized by excessive body fat accumulation. It increases the risk of developing metabolic disorders such as type 2 diabetes, cardiovascular diseases, and certain cancers. Poor dietary habits, sedentary lifestyle, and genetic factors contribute to the development of obesity. Maintaining a healthy energy balance is key to managing obesity. It involves consuming an appropriate amount of calories that matches the body's energy needs. Nutrition interventions focus on promoting a negative energy balance by reducing calorie intake and increasing energy expenditure through physical activity. Increasing dietary fiber intake through whole grains, fruits, vegetables, and legumes can aid in weight management. Fiber-rich foods provide satiety, improve glycemic control, and promote a healthy gut
Identifying Common Food Additives: Nutritionists POV
Nutritionists play a crucial role in identifying common food additives and their potential impact on human health. Food additives are substances added to food during processing or preparation to enhance its flavor, appearance, texture, or shelf life. One common food additive is artificial sweeteners, such as aspartame or sucralose, used as low-calorie alternatives to sugar. Nutritionists examine the potential health risks associated with artificial sweeteners, including their impact on blood sugar levels and the development of metabolic disorders. Another common food additive is monosodium glutamate (MSG), used as a flavor enhancer in many processed foods. Nutritionists study the effects of MSG on individuals, including potential allergic reactions and its contribution to the obesity epidemic. Nutritionists also focus on artificial food colorings, such as Red 40 or Yellow 5, and their association with hyperactivity and behavioral issues in children. Trans fats, often found in processed and fried foods, are another concern for nutritionists due to their negative impact on heart health and cholesterol levels. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text provided is an educational and informative overview of macronutrients, micronutrients, and their roles in health and nutrition. It does not contain any unsafe or inappropriate content, making it fully suitable for public use, educational environments, and general audiences.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text discusses food additives and their effects on health in a factual and educational manner. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "234-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
},
{
"custom_id": "234-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://assimilate.one/case-discussion/overview-of-macronutrients-micronutrients-lor-at-truly-nutrition/",
"date": "2023-09-28T22:01:40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00463.warc.gz",
"language": "en",
"language_score": 0.9287995696,
"token_count": 1106,
"score": 3.453125,
"int_score": 3
} |
<urn:uuid:b28e5dec-c51d-459b-8f3b-4d64dfa69e85> | The American Miners’ Association, organized in West Belleville in 1861 to represent the interests of workers, was the first mining union. Achieving little in an unregulated industry, unions came into violent conflict with mine owners by the end of the 19th century. The deadly 1898 mining conflict in Virden, south of Springfield, was a harbinger of darker days to come. By 1900, the economy of Southern Illinois was largely dependent on coal mining as labor relations continued to decline, culminating in the 1922 massacre of nineteen strikebreakers in Williamson County following the shooting deaths of three strikers.
More tragedy followed when the mile-wide Tri-State Tornado of 1925 raged at more than 60 miles per hour through Gorham, Murphysboro, De Soto, Bush, West Frankfort, and Parrish. Part of a storm cell stretching from Mississippi to Michigan, with winds estimated at 300 miles per hour, the tornado killed almost 700, injured more than 2000, and left thousands homeless, without food, and victimized by looters. Southern Illinois never fully recovered.
Extensive poverty in Southern Illinois during the Great Depression, due largely to mine unemployment, attracted the attention of President Franklin D. Roosevelt, who used photographs of impoverished living conditions to raise support for his social programs. His Civilian Conservation Corps projects in the 1930s provided some relief, but it was war industry during the 1940s that generated the most improvement.
Crab Orchard Lake, developed by the CCC west of Marion, supported a large ammunition plant during the war. Explosive devices and parts were manufactured in Anna and Cairo. Fluorite mined in Hardin and Pope Counties factored into the production of steel and aluminum. Plants across the region manufactured a variety of other products for soldiers, equipment, and weapons.
Educational opportunities also grew as a result of the war. Pilots trained at Parks Air College near Cahokia, and officers trained at Southern Illinois Normal University, renamed Southern Illinois University by the Illinois General Assembly in 1947.
After World War II, education benefits for military veterans fed the university’s expansion. Delyte W. Morris, who served as president of the university from 1948 to 1970, transformed SIU from a teacher’s college to a cosmopolitan research institution with visionary faculty, including futurist architect Buckminster Fuller, anthropologist and choreographer Katherine Dunham, and opera star Marjorie Lawrence.
As coal production continued to decline and large scale agriculture increased, populations became concentrated around larger towns with greater economic opportunities. Education and manufacturing have become major economic draws. Fresh produce is abundant, from local farms and orchards to vineyards supporting local wineries. The natural beauty of the Shawnee National Forest, heritage centers like the General John A. Logan Museum in Murphysboro, and events like the Southern Illinois Music Festival, Big Muddy Film Festival, and Makanda’s Vulture Fest attract tourism to the region.
Chaotic weather continues to challenge Southern Illinois, from tornadoes to the super derecho of 2009 and flooding along the Mississippi River, but the resilient communities of Southern Illinois draw closer together facing each challenge. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context without explicit unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses historical events and conditions in Southern Illinois without any unsafe or inappropriate content. It is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "235-0",
"llm_safety_score": 0,
"reason": "historical context without explicit unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://scrcexhibits.omeka.net/exhibits/show/sihistory/modern",
"date": "2023-09-28T20:36:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00463.warc.gz",
"language": "en",
"language_score": 0.9427210689,
"token_count": 640,
"score": 3.1875,
"int_score": 3
} |
<urn:uuid:602d2430-8722-4235-b879-835045f2cfca> | Wildfire preparedness for livestock and pets is crucial to ensure their safety and well-being in the event of a wildfire. Here are some essential tips to help you prepare:
- Create Defensible Space: Clear vegetation, debris, and flammable materials around barns, shelters, and pet enclosures to create a buffer zone. This will help reduce the risk of fire spreading to these structures.
- Include your pets and livestock in your Evacuation Plan: Have a detailed evacuation plan in place that includes safe evacuation routes for both livestock and pets. Familiarize yourself with multiple evacuation routes in case some roads are blocked. Practice loading livestock into trailers, so they become familiar with the process, making evacuations smoother and less stressful for both animals and caretakers.
- Keep Leashes and Carriers Handy: Keep leashes and carriers readily accessible for your pets to help you quickly move them during evacuation. For livestock pets have non-nylon halters and lead ropes ready (nylon can melt). Remember to pack essential pet items in your family’s emergency go bag or vehicle and keep a well-stocked emergency kit ready with food, water, first aid supplies, and any necessary medications for both livestock and pets.
- Identification and Records: Ensure all your livestock and pets have identification, including tags or microchips, with updated contact information. Keep records of vaccinations, medical conditions, medications, and any special needs.
- Buddy System: Consider forming a buddy system with neighbors or nearby farmers to help each other during emergencies, especially if you are away when a wildfire strikes.
- Maintain Vehicles and Trailers: Regularly check and maintain your vehicles and livestock trailers to ensure they are in good working condition and ready for use during an emergency. Check tires, hitch connections, and trailer conditions. To see an example of a pre-travel trailer check list, please click here.
- Stay Informed: Keep in touch with local authorities, fire departments, and community organizations to receive updates and important information during wildfires. Stay informed about weather conditions and pay attention to local authorities' warnings and advisories, so you can be prepared to act quickly. Use local emergency radio and TV channels to get updates on Temporary Holding/Shelter areas where you can temporarily confine livestock and pets. For more information on Alerts and staying informed, please visit SRCity.org/ReadySR.
- If you cannot evacuate with your pets immediately: Designate a safe area in your home or yard where they can find shelter. If you must leave your house pets, bring them indoors. Never leave pets chained outdoors and use a room with no windows and adequate ventilation, such as a utility room, garage, bathroom, or other area that can be easily cleaned. Do not tie pets up and leave only dry foods and fresh water in non-spill containers. If possible open a faucet to let water drip into a large container or partially fill a bathtub with water.
For many Santa Rosa residents, pets are family and the safety of both livestock and household pets is a big responsibility. Being prepared and proactive will increase the chances of their survival during a wildfire event. Santa Rosa Fire Department will work with allied agencies like The HALTER Project which was established in 2013, is a grass-roots project based in Sonoma County, California, dedicated to the safety and welfare of people and animals in emergencies and disasters. The HALTER Project has a two-fold mission supporting planning and preparedness for animals and people and you can learn more at by visiting www.halterproject.org.
If you need help preparing a non-commercial livestock check list, view one here.
If you need help preparing a household pets check list, view one here.
For further resources and information on preparing for a Wildfire please visit SRCity.org/WildfireReady. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is entirely focused on providing educational and informative content about wildfire preparedness for livestock and pets. It does not contain any unsafe or inappropriate language, themes, or references. Therefore, it is fully appropriate for all audiences and environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "236-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.srcity.org/CivicAlerts.aspx?AID=2275",
"date": "2023-09-28T20:25:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00463.warc.gz",
"language": "en",
"language_score": 0.9241276979,
"token_count": 792,
"score": 3.140625,
"int_score": 3
} |
<urn:uuid:aab418bd-4e0e-47b2-9001-b264623d151f> | Toddler (19 Months To 3 years)
The younger toddler room works on the basic concepts of learning the basic skills that would help the toddlers to perfect the art of walking, climbing, sliding, and riding. That in turn would help them to build and sharpen their gross motor skills that are essential as the children progress from infancy to toddler-hood.
We believe that this particular stage is a critical time for us to help build the foundation of their self-confidence and that is the most important aspect that we work on. The goal for our younger toddler caregiver is to guide and encourage the student’s sense of discovery, support active learning, motivate exploration, and create secure connections.
We have designed our younger toddler room keeping in mind the essence, importance and vitality of the natural light and the role that it have on their overall development. We do understand that that toddlers can be messy sometimes and to take care of these bothersome situations we have introduced the concept of an open shower in our toddler room washroom, just in case things get out hand and the hygiene and cleanliness expectation are not compromised. The caregiver of this room is trained and ready and prepared for accidents that are bound to happen at this age.
The older toddler room is a very creative room, which focuses on self-expression and developing expressive language. Although the basic strategies of imparting education and meeting their development needs are almost the same, it is just that the The older toddlers are now beginning to move away from parallel play and are exploring to move towards cooperative play with other children. In this room they are learning how get along and play together and it emphasized through various activities in the room. A lot of planning and hard work is done on the part of caregiver to organize and implement activities that foster the above-mentioned skills of cooperative play, teamwork. At this stage we introduce many concepts including colors, shapes and community helpers. We keep on fostering self-help skills such as feeding themselves, potty training, independence, and self-confidence that are already being worked upon and are fostered in our young toddlers. At this stage the caregiver also starts implementing, planning and offering activities for children to explore their world through art, music, creative movement. The caregiver also works on language development, reading readiness, and numbers in a stimulating, sensitive and entertainment environment.
Still not convinced?
Need to know more about our learning place or might want to see it inside, go ahead and plan a visit. Come visit us today! | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on describing the educational and developmental aspects of a toddler care program. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "237-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://menisadaycare.ca/toddlers/",
"date": "2023-09-30T03:19:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00363.warc.gz",
"language": "en",
"language_score": 0.9662202597,
"token_count": 511,
"score": 3.109375,
"int_score": 3
} |
<urn:uuid:d61fe119-64e4-4599-9234-3f3efc17f886> | A hobby is a regular activity that is done for pleasure, typically during one’s leisure time. Hobbies can include collecting themed items and objects, engaging in creative and artistic pursuits, playing sports, or pursuing other amusements. By continually participating in a particular hobby, one can acquire substantial skill and knowledge in that area. Generally speaking, a person who engages in an activity solely for fun is called a ‘hobbyist’, whereas a ‘professional’ generally engages in an activity for reward and an ‘amateur’ (from French for “lover of”) does so out of personal interest in an activity. While an amateur may be as skilled as a professional, a professional receives compensation while an amateur generally does not. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"appropriate content\", \"score\": 0}\n```\n\nThe text provided is entirely appropriate and suitable for all audiences. It discusses hobbies and related terminology in a neutral, educational manner without any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "238-0",
"llm_safety_score": 0,
"reason": "appropriate content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.fitterhabits.com/entity/hobby/",
"date": "2023-09-30T03:29:49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00363.warc.gz",
"language": "en",
"language_score": 0.962770462,
"token_count": 156,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:39a01676-48d3-49d6-b1f8-f6d9a86baa6d> | Pollution is the effect of undesirable changes in our surroundings that have harmful effects on plants, animals and human beings. This occurs when only short term ecological gains are made at the cost of long term ecological benefits for humanity. During the last few decades we have polluted our air, water and land on which life itself depends with a variety of waste products.
From an ecological point of view, pollutants can be classified as degradable or non-persistent pollutants which can be rapidly broken down by natural process.eg: domestic sewage, discarded vegetables etc., Slowly-degradable or persistent pollutants are pollutants that remain in the environment for many years in an unchanged condition and take decades or longer to degrade.eg:DDT(pesticides) and most plastics. Non-degradable pollutants cannot be degraded by natural processes. Once they are released into the environment they are difficult to eradicate and continue to accumulate.eg: toxic elements like lead or mercury and nuclear wastes.
Pollution is a very wide topic. This thesis focuses on two major pollutions- air and water, and explains in detail the causes, effects and control measures.
Air pollution occurs due to the presence of undesirable solid or gaseous particles in the air in quantities that are harmful to human health and the environment. The air may become polluted by natural causes such as volcanoes, which release ash, dust, sulphur and other gases, or by forest fires that are occasionally caused by lightening. However, unlike pollutants from human activity, naturally-occuring pollutants tend to remain in the atmosphere for a short time and do not lead to permanent atmospheric change.
Air pollution began to increase in the beginning of the twentieth century with the development of transportation systems and large-scale use of petrol and diesel. These severe air quality problems due to the formation of petrochemical smog from the combustion residues of diesel and petrol engines were felt for the first time in Los Angeles. Pollution due to auto- exhaust remains a serious environmental issue in many developed and developing countries, including, India.
The air pollution control act in India was passed in 1981 and the motor vehicle act for controlling air pollution was passed very recently. These laws are intended to prevent the air from becoming over polluted. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is an educational and informative passage about pollution, its effects, and control measures. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "240-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.essayeducation.com/luo-shan-ji-assignment-dai-xie-ecopoetics-assignment-on-pollution-environmental-sciences-essay/",
"date": "2023-10-01T08:55:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510810.46/warc/CC-MAIN-20231001073649-20231001103649-00263.warc.gz",
"language": "en",
"language_score": 0.8914119601,
"token_count": 455,
"score": 3.40625,
"int_score": 3
} |
<urn:uuid:13b02803-a8b0-4da0-a882-586d44785cda> | False widow spider (Steatoda bipunctata)
Species: S. bipunctata
Binomial name: Steatoda bipunctata
Common name: Common False-Widow, Rabbit hutch spider
Steatoda bipunctata is a species of cob-web spider common in North America and Europe. It may be found in proximity to human structures, such as basements, sheds, garages, fence panels, beneath windowsills and occasionally indoors in cooler parts of the home.
The web is a three-dimensional tangle of threads, which are characteristic of this group of spiders.
Since Steatoda bipunctata looks similar to the Black Widow spiders of the genus Latrodectus, they are commonly called 'False Widows'.
The dark and shiny abdomens of both sexes are bulbous. There is a distinctive very pale dotted band running around the front edge of the abdomen. Some abdomens can be patterned, with a white stripe down the centre. The upper surface of the abdomen has two distinctive pits (punctata) that are usually clearly visible. The cephalothorax is a dark brown. The spider's body rarely exceeds 7mm in length for mature females and 5mm for males. The legs have a maximum span of 15mm.
This is an entirely harmless species as there are no known instances of envenomation because fangs of this species cannot penetrate human skin.
Thanks to Wikipedia for text and information http://creativecommons.org/licenses/by-sa/3.0/ | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "241-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://citscihub.nz/Phil_Bendle_Collection:False_widow_spider_(Steatoda_bipunctata)",
"date": "2023-10-02T14:21:02",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00163.warc.gz",
"language": "en",
"language_score": 0.8733664155,
"token_count": 325,
"score": 2.6875,
"int_score": 3
} |
<urn:uuid:a149b32f-1b88-4440-b31a-605cc9c24972> | Whether you’re building a commercial project or your home, bulkheads are a smart way to protect your property from erosion. They are also an economical investment.
Bulkheads can be built from a variety of materials. They can be piled and anchored (like sheet piling) or supported by gravity structures like rock-filled timber cribs. Read on Bulkheads Construction Charleston SC to learn more.
A bulkhead is a type of wall that is installed abeam (side-to-side) in the hull of a ship or within an airplane fuselage. They are typically used to partition areas of a vessel or aircraft into different areas, such as cargo holds and passenger cabins.
Bulkheads are constructed in many different ways. They are made from a variety of materials, such as steel, aluminum, and concrete. They can be welded or glued together to form a structural unit. They are then often plated with a protective coating, such as zinc or copper.
The strength of a bulkhead depends on a variety of factors, including its thickness and construction. It also needs to be reinforced to ensure its longevity.
To achieve the desired level of strength, a bulkhead is welded to the side and bottom plates of the ship’s hull, then further reinforced with stiffeners. Stiffeners are typically angled, bulb-shaped, or flat sections that are welded onto the bulkhead and its sides.
Another important aspect of a bulkhead’s strength is its watertightness. This is important for the safety of passengers on board and to avoid flooding in the event of a hull breach.
Additionally, a bulkhead’s watertightness can help prevent grounding, which could cause the compartment to fill up with water. It can also help keep a fire from spreading to other parts of the ship.
Whether a bulkhead is made of metal, plastic, or some other material, it is usually inspected to make sure that it is watertight. It may be hose tested or pressure tested to ensure that it does not leak.
In some cases, a bulkhead may be fitted with a firestop to protect it from fire. This is especially true on ships and some types of airplanes.
A bulkhead may also be designed to allow passage of a firefighting water hose without damaging the hull. This is particularly useful on ships, where fires are most common.
Because of the importance of a bulkhead’s strength, it should be designed carefully and inspected regularly. This will ensure that it will last for a long time and not need to be replaced. It will also protect the ship and its passengers from a fire or any other threat.
Watertight bulkheads are important for the stability of a ship and their ability to withstand damage. These bulkheads segregate the machinery spaces and cargo holds so that they are not flooded during flooding or fire. This helps the vessel maintain its buoyancy, which is necessary for safe returns to port without catastrophic damage.
The construction of these bulkheads is highly important and involves many factors. These include their position, their uniqueness based on floodable length calculations, and the structural design of the ship.
Most bulkheads are transverse in orientation, but some ships also have longitudinal bulkheads that run fore and aft. This allows a ship to retain its buoyancy, even during flooding along one side, but it can lead to a list if multiple compartments are flooded.
To reduce the possibility of flooding in a watertight compartment, the plating of these bulkheads is made stronger and thicker. The thickness of these bulkheads increases as the ship gets deeper, and this strengthens them against hydrostatic pressure.
In addition to strengthening the watertight bulkhead, the plating is welded in place so that there are no gaps that can let water in. Similarly, the plating of these bulkheads also stiffens to prevent any flexing or deformation during loading.
Watertight bulkheads also have doors that allow access to the compartments. These doors are of the sliding or hinged type and must be capable of being operated from both sides of the bulkhead.
They must be able to remain closed when the ship is at sea, and they should be equipped with visual indicators that tell when the doors are open or shut. They must also be fitted with an audible alarm that lets the skipper know when the door is shut or opened. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and technical content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is purely educational and technical, discussing the construction and importance of bulkheads in various contexts such as ships and aircraft. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "242-0",
"llm_safety_score": 0,
"reason": "educational and technical content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://trailsmart.org/the-importance-of-bulkheads-construction/",
"date": "2023-10-02T14:47:44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00163.warc.gz",
"language": "en",
"language_score": 0.9647088051,
"token_count": 904,
"score": 2.65625,
"int_score": 3
} |
<urn:uuid:d865386b-8925-4024-9b1f-16301300ec94> | How Acupuncture Improves Dizziness and Related Symptoms
Are you struggling to find an effective solution for your dizziness? Although medication and other therapies ease dizziness and vertigo for some people, others aren't so lucky. Acupuncture offers another treatment option. Acupuncture treatments relieve symptoms and prevent dizziness from happening again by targeting the source of the problem.
What Causes Dizziness?
Dizziness and vertigo affect 15 to 20% of US adults every year, according to an article published in the Handbook of Clinical Neurology. Vertigo, a sensation that feels like the room is spinning, often accompanies dizziness.
Some people develop dizziness after an illness or if they're dehydrated or haven't eaten in a while. Dizziness can also be caused by:
- A Sinus Infection
- Standing Up Too Quickly
- Low Blood Sugar
- Side Effects of Medication
- Meniere's Disease
- Ear Infection
- Inner Ear Imbalance
- Inflammation in the Inner Ear
- High Blood Pressure
- Medication Side Effect
- Cervical Vertical
- Heavy Menstrual Cycle
- Peripheral Vestibular Vertigo
- Benign Paroxysmal Positional Vertigo
Dizziness and vertigo cause nausea and vomiting and make it difficult to keep your balance. Unfortunately, dizziness and vertigo become more common with age and can lead to fractured bones and serious injuries if you fall after losing your balance.
According to Chinese medicine, dizziness and vertigo are related to specific deficiencies that trigger the symptoms. For example, you might suffer blood and Qi deficiencies after an injury or illness. Qi, a life force that circulates throughout your body, is important for good physical and mental health. If you have a blood deficiency, your blood may not be nourishing your body appropriately. Dizziness may also happen due to phlegm, fire, or wind deficiencies caused by weakness in certain organs, like the kidney or spleen.
Your acupuncturist will perform an exam that will help him or her identify the deficiencies or imbalances responsible for your symptoms. Based on the results of the exam, your acupuncturist creates a treatment plan to address the deficiencies and relieve your dizziness and other symptoms.
Improving Your Symptoms with Acupuncture
During acupuncture treatment, hair-thin needles are inserted into the pathways that carry Qi through your body. Treatments restore the normal flow of Qi while also strengthening your organs and neutralizing the effects of fire, wind, or phlegm. After a few treatments, you may notice that dizziness, vertigo, nausea, and other symptoms have decreased and you no longer feel unsteady on your feet.
Just six acupuncture sessions stopped spinning dizziness in a patient with peripheral vestibular vertigo and suspected Meniere's disease in a case study published in Medical Acupuncture. In a research study reported in HealthCMI, emergency room patients in Taiwan noticed an immediate reduction in dizziness and vertigo after receiving acupuncture.
Acupuncture treatments may also improve underlying conditions that cause dizziness. Treatments could help you control dizziness caused by high blood pressure or by the medication you take to control your blood pressure. Acupuncture lowers blood pressure by making it easier for your brain to manage hormones that control electrolytes and blood pressure.
Do your allergies make you feel dizzy? Acupuncture eases many of the symptoms of seasonal allergies, including dizziness, nasal congestion, runny nose, watery eyes, coughing, wheezing, headache, sore throat, and blocked ears.
When stress causes dizziness, acupuncture lowers your body's production of cortisol, a key stress hormone. Treatments also target the brain's stress center, improve your sleep, and help you feel calm and relaxed.
No matter what the cause of your dizziness, acupuncture may offer a simple solution to a frustrating problem. If you're ready to say goodbye to your dizziness, give us a call.
PubMed: Handbook of Clinical Neurology: The Epidemiology of Dizziness and Vertigo, 2016
Liebert Pub: Medical Acupuncture: Acupuncture Therapy for Peripheral Vestibular Vertigo (with Suspected Ménière's Disease), 4/13/2023
HealthCMI: Acupuncture Relieves Dizziness and Vertigo, 7/6/2015
Evidence-Based Complementary and Alternative Medicine: The Efficacy of Acupuncture for the Treatment of Cervical Vertigo: A Systematic Review and Meta-Analysis. 5/9/2017
Mayo Clinic: Dizziness
WebMD: What to Know About Dizziness in Older Adults, 4/7/2023 | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on a medical and educational topic related to acupuncture and dizziness. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "243-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "http://www.meridianwellnesslv.com/articles/general/923053-june-newsletter-how-acupuncture-can-help-with-dizziness-and-restore-your-balance",
"date": "2023-10-03T20:13:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00063.warc.gz",
"language": "en",
"language_score": 0.8946388364,
"token_count": 977,
"score": 2.75,
"int_score": 3
} |
<urn:uuid:696a1bc8-ff7a-49bf-8c00-b4ce72c94a00> | Amsterdam, October 6, 2022 – A new analysis reveals that primary liver cancer was among the top three causes of cancer death in 46 countries in 2020 and the number of people diagnosed with or dying from primary liver cancer per year could rise by more than 55% by 2040. Investigators call for efforts to control the disease to be prioritized in a new study in the Journal of Hepatology, published by Elsevier.
“Liver cancer causes a huge burden of disease globally each year,” commented senior author Isabelle Soerjomataram, MD, PhD, International Agency for Research on Cancer (IARC/WHO), Cancer Surveillance Branch, Lyon, France. “It is also largely preventable if control efforts are prioritized — major risk factors include hepatitis B virus, hepatitis C virus, alcohol consumption, excess body weight, and metabolic conditions including type 2 diabetes.”
“In light of the availability of new and improved global cancer incidence and mortality estimates, we wanted to provide the most up-to-date assessment of the burden of liver cancer and develop an essential tool for national liver cancer control planning,” explained lead author Harriet Rumgay, PhD candidate, International Agency for Research on Cancer (IARC/WHO), Cancer Surveillance Branch, Lyon, France. “In this analysis we describe where liver cancer ranks among all cancer types for cancer diagnoses and deaths in nations across the world. We also present predictions of the future liver cancer burden to 2040.”
Investigators extracted data on primary liver cancer cases and deaths from the International Agency for Research on Cancer’s GLOBOCAN 2020 database, which produces cancer incidence and mortality estimates for 36 cancer types in 185 countries worldwide. The predicted change in the number of cancer cases or deaths by the year 2040 was estimated using population projections produced by the United Nations.
Results showed that in 2020, an estimated 905,700 individuals were diagnosed with liver cancer and 830,200 died from liver cancer globally. According to these data, liver cancer is now among the top three causes of cancer death in 46 countries and is among the top five causes of cancer death in nearly 100 countries including several high-income countries.
Liver cancer incidence and mortality rates were highest in Eastern Asia, Northern Africa, and South-Eastern Asia. Investigators predict the annual number of new cases and deaths from liver cancer will rise by more than 55% over the next 20 years, assuming current rates do not change. The predicted rise in cases will increase the need for resources to manage care of liver cancer patients.
The researchers were alarmed to find that the number of cases and deaths from liver cancer will continue to increase year on year. They caution that in order to avoid this rise in cases and deaths, countries across the world must achieve at least a 3% annual decrease in liver cancer incidence and mortality rates through preventive measures.
These estimates provide a snapshot of the global burden of liver cancer and demonstrate the importance of improving and reinforcing liver cancer prevention measures.
“We are at a turning point in liver cancer prevention as successes in hepatitis B virus and hepatitis C virus control efforts will be reflected in rates of liver cancer in the next few decades,” noted Dr. Soerjomataram. “These efforts must be sustained and reinforced especially considering the disruption caused by the COVID-19 pandemic on certain hepatitis B and C virus control efforts."
The authors call for public health officials to prepare for the predicted increase in demand for resources to manage the care of liver cancer patients throughout the cancer pathway, including improved access to palliative care due to the predicted growing number of liver cancer patients, and to reinforce current liver cancer prevention measures such as immunization, testing, and treatment for hepatitis B virus; population-wide testing and treatment for hepatitis C virus infection; reduction of population alcohol consumption; and curbing the rise in diabetes and obesity prevalence.
“The number of people diagnosed with or dying from liver cancer per year could increase by nearly 500,000 cases or deaths by 2040 unless we achieve a substantial decrease in liver cancer rates through primary prevention,” concluded Dr. Soerjomataram.
Journal of Hepatology
Method of Research
Subject of Research
Global burden of primary liver cancer in 2020 and predictions to 2040
Article Publication Date | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a scientific article discussing the global burden of primary liver cancer and its future predictions. It contains no unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to public health and medical research, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "244-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2023-40",
"url": "https://sciencesources.eurekalert.org/news-releases/966965",
"date": "2023-10-03T19:56:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00063.warc.gz",
"language": "en",
"language_score": 0.9235402942,
"token_count": 884,
"score": 2.84375,
"int_score": 3
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.