id
stringlengths
47
47
text
stringlengths
176
666k
safety_metadata
dict
metadata
dict
<urn:uuid:cfb45692-a168-4506-b9d3-1669b067beb6>
Posted By Claire on November 30, 2022 On this day in Tudor history, 30th November 1529, the Feast of St Andrew, Henry VIII received a dressing down from two women: his wife, Catherine of Aragon, and the woman he wanted to make his wife, Anne Boleyn. Henry VIII’s treatment of his first wife was angering her, and Catherine told him so. And the king’s sweetheart was annoyed with the king for letting Catherine get the upper hand and she didn’t hold back either. Both Catherine and Anne told the king exactly what they thought. Find out exactly what happened between Henry VIII, Catherine of Aragon and Anne Boleyn on 30th November 1529, during the Great Matter, Henry VIII’s quest for an annulment of his first marriage… Catherine of Aragon and Anne Boleyn are angry with Henry VIII On this day in Tudor history, 30th November 1529, the Feast of St Andrew, Henry VIII was reproached by the two women in his life: his wife, Catherine of Aragon, and the woman he wanted to marry, Anne Boleyn. An angry Catherine of Aragon confronted her husband regarding his treatment of her, which she considered “the pains of Purgatory on earth”, and then when the King sought comfort from Anne Boleyn, she reproached him for giving Catherine the “upper hand”. Oh dear! Let me tell you a bit more about the king’s experiences that day… According to Eustace Chapuys, the imperial ambassador, in a letter to Emperor Charles V, Catherine of Aragon complained to her husband the king “that she had long been suffering the pains of Purgatory on earth, and that she was very badly treated by his refusing to dine with and visit her in her apartments.” In answer, the king said that Catherine had no right to complain, “for she was mistress in her own household, where she could do what she pleased” and explained that he had not dined with her because he had been busy with “affairs of government”. Regarding Catherine’s complaint about not visiting her apartments, Henry VIII said that: “she ought to know that he was not her legitimate husband, as innumerable doctors and canonists, all men of honour and probity, and even his own almoner, Doctor Lee, who had once known her in Spain, were ready to maintain” and that “should not the Pope, in conformity with the above opinions so expressed, declare their marriage null and void, then in that case he (the King) would denounce the Pope as a heretic, and marry whom he pleased.” Then, according to Chapuys, Catherine replied, “that he himself, without the help of doctors, knew perfectly well that the principal cause alleged for the divorce did not really exist” and said that she cared not a straw for his almoner’s opinion on the matter, saying “he is not my judge in the present case; it is for the Pope, not for him, to decide.” As for the opinions of the doctors of Paris and other universities, she reminded the king that he knew very well that the principal and best lawyers in England had written in her favour, going on to say “Indeed, if you give me permission to procure counsel’s opinion in this matter I do not hesitate to say that for each doctor or lawyer who might decide in your favour and against me, I shall find 1,000 to declare that the marriage is good and indissoluble.” After further words on the matter, the king then “left the room suddenly” and Chapuys describes him as “very disconcerted and downcast”. If he thought that he could find comfort in the arms of his sweetheart, Anne Boleyn, he was wrong. Chapuys reported that Anne gave him a telling off too. Here are the words Anne reprimanded him with: “Did I not tell you that whenever you disputed with the Queen she was sure to have the upper hand? I see that some fine morning you will succumb to her reasoning, and that you will cast me off. I have been waiting long, and might in the meanwhile have contracted some advantageous marriage, out of which I might have had issue, which is the greatest consolation in this world; but alas! farewell to my time and youth spent to no purpose at all.” Henry VIII was having a bad day, wasn’t he? It almost makes you feel sorry for him! Henry VIII’s marriage to Catherine of Aragon was finally annulled by Archbishop Cranmer in May 1533, shortly before his second wife, Anne Boleyn, was crowned queen.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses historical events and figures from the Tudor period. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful and the themes are historical and educational in nature, making it fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85281-0", "llm_safety_score": 0, "reason": "historical context" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.theanneboleynfiles.com/november-30-henry-viii-gets-a-dressing-down-from-his-wife-and-sweetheart/", "date": "2023-02-08T08:20:43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500719.31/warc/CC-MAIN-20230208060523-20230208090523-00258.warc.gz", "language": "en", "language_score": 0.9863580465, "token_count": 1020, "score": 3, "int_score": 3 }
<urn:uuid:d224c31d-d58e-4a92-a198-637b6100e806>
Updated: Feb 27, 2021 As this month of February closes and as the new year becomes less of a new year, I cannot help but reflect on how fast time is truly flying. Taking a moment to slow down, to contemplate, to learn, and to reflect seems awfully simple yet awfully hard, given the busyness of our lives and the stress of real-world concerns. However, it’s important to not let the lessons of February - Black History Month - get overtaken in the day-to-day details of life. We at CANA wanted to offer some ideas to continue to recognize and learn Black History throughout the year with the following ideas and suggestions. Visit a museum History comes alive in our Nation's museums, and many of these institutions had events, conferences and celebrations surrounding Black History Month. Most have excellent exhibits that will extend throughout the year. Get out there and see first-hand our Nation's collective historical treasures. An obvious choice in our Nation’s backyard is the Smithsonian’s National Museum of African American History (https://nmaahc.si.edu/). Also, many institutions, including the Association for the Study of African American Life and History (ASAALH) as well as the Smithsonian’s National Museum of African American History and Culture, offer digital programming for those who are not able to leave home. Read and reflect Libraries, bookstores, used bookstores (my favorite!) — not to mention online repositories and booksellers — are overflowing with interesting and engaging works of literature, history, and biography. Take a break, find a book about a part of Black History that you were previously unaware of and get educated. Take some time to then share and reflect with your friends, family, and colleagues. One single topic can turn into a tapestry of honest discussion. Seek and you shall find...on the internet There are expansive digital resources available online, which continue to provide easy access to Black History Month collages, anthologies, and profiles on Black leaders, historical figures, authors, poets, artists, teachers and more. A really engaging compilation published by Google can be found here under its Google Arts & Culture page -https://artsandculture.google.com/project/black-history-and-culture. It takes a mere three seconds (depending upon how fast you type!) to type the words “Black History” into your search engine, and your world will explode with accessible content! Stay civically engaged One of the best ways to stay engaged and to help contribute to a better society is by contacting members of Congress, whether local, state or federal. Ask them what they did to celebrate Black History Month and what specific legislative actions they plan or are planning to take to ensure your community remains committed to providing opportunities for each and every person. It may not necessarily be part of your routine nor always comfortable to reach out to elected officials, but it is important to share your voice and be informed on what our government leaders are doing and planning. Be part of the process! Lastly, an idea - write a blog! It makes you stop, ponder and realize, oh yes, thinking and learning about and understanding Black History should not be limited to the month of February - it can happen every day. Like Ferris Bueller famously once said, “[l]ife moves pretty fast. If you don’t stop and look around once in a while you could miss it.” Let’s find those moments to stop and look around. Black history is interwoven throughout the past, present, and future of our Nation. Let’s see where we’ve come from, and where we need to go! Liz Cranston is the Chief Executive Officer & Chief Financial Officer of CANA Advisors. You can contact her via email at email@example.com.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational and reflective content\", \"score\": 0}\n```\n\nThe text is entirely focused on promoting educational and reflective activities related to Black History Month. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85282-0", "llm_safety_score": 0, "reason": "educational and reflective content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.canallc.com/post/black-history-month-is-every-month-ways-to-celebrate-black-history-month", "date": "2023-01-30T17:14:10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00698.warc.gz", "language": "en", "language_score": 0.9403917193, "token_count": 803, "score": 3.1875, "int_score": 3 }
<urn:uuid:d90f0d73-a59d-4a65-86e0-2a016d5d52b0>
L'étude, qui a été dirigée par le National Renewable Energy Laboratory (NREL) du Département américain de l'énergie et comprend un membre du corps professoral du Collège d'ingénierie de l'Oregon State University (OSU), publiée aujourd'hui dans la revue Les sciences. Scientists have taken a key step to significantly expand the range of plastics that can be recycled. This breakthrough is important because plastic waste is a huge problem both globally and in the United States. In fact, only about 5% of used plastic is recycled in the United States, according to NREL. Packaging materials, containers and other discarded items are filling up landfills and polluting the environment at an incredibly fast rate. According to NREL, scientists estimate that by 2050 the ocean will contain more plastic by weight than fish. A collaboration led by NREL’s Gregg Beckham and including Lucas Ellis, an OSU researcher who was an NREL postdoctoral fellow during the project, combined chemical and biological processes in a proof-of-concept to “upgrade” mixed plastic waste. To enhance means to increase the value of something. The research relies on the use of chemical oxidation to break down a variety of plastic types, a method pioneered a decade ago by chemical industry giant DuPont. “We have developed a technology that uses oxygen and catalysts to break down plastics into smaller, biologically friendly chemical building blocks,” said Ellis, assistant professor of chemical engineering. “From there, we used a biologically modified soil microbe that could consume and ‘channel’ these building blocks into a biopolymer or component for advanced nylon production. Beckham, principal investigator at NREL and lead of the Bio-Optimized Technologies to keep Thermoplastics out of Landfills and the Environment Consortium – known as BOTTLE – said the work provides a “potential entry point into plastics processing that cannot be recycled at all today.” Current recycling technologies can only work effectively if the plastic inputs are clean and separated by type, says Beckham. Plastics can be made from different polymers, each with their own unique chemical building blocks. When polymer chemicals are mixed in a collection bin or formulated together into certain products like multi-layer packaging, recycling becomes expensive and nearly impossible as the polymers often have to be separated before they can be recycled. “Our work has resulted in a process that can convert mixed plastics into a single chemical,” Ellis said. “In other words, this is a technology that recyclers could use without having to sort plastics by type.” The scientists applied the process to a mixture of three common plastics: polystyrene, used in disposable coffee cups; polyethylene terephthalate, the base of carpets, polyester clothing and single-use beverage bottles; and high-density polyethylene, used in milk jugs and many other consumer plastics. The oxidation process broke down the plastics into a mixture of compounds including benzoic acid, terephthalic acid and dicarboxylic acids which, in the absence of the modified soil microbe, would require advanced and expensive separations to yield pure products. The researchers engineered the microbe, Pseudomonas putidato biologically channel the mixture into one of two products – polyhydroxyalkanoates, an emerging form of biodegradable bioplastics, and beta-ketoadipate, which can be used in the manufacture of performance-enhanced nylon. Trying the process with other types of plastics, including polypropylene and polyvinyl chloride, will be the focus of future work, the researchers said. “The chemical catalysis process we used is just a way to speed up a process that occurs naturally, so instead of degrading over hundreds of years, you can break down these plastics in hours or minutes. “said co-author Kevin Sullivan, a postdoctoral researcher. researcher at NREL. Reference: “Recovery of mixed plastic waste by chemical oxidation in tandem and biological funnel” October 13, 2022, Sciences. Funding was provided by the U.S. Department of Energy’s Office of Advanced Manufacturing and Office of Bioenergy Technologies, and the work was carried out as part of the BOTTLE Consortium. Scientists from the Massachusetts Institute of Technology (MIT), University of Wisconsin-Madison and Oak Ridge National Laboratory also participated in the study. NREL is the US Department of Energy’s primary national laboratory for renewable energy and energy efficiency research and development. It is operated for the department by the Alliance for Sustainable Energy, LLC.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses scientific research on recycling plastics and does not contain any unsafe, inappropriate, or harmful content. It is fully appropriate for all audiences and does not include any language that could be considered offensive or harmful." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85284-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://letsradiate.com/new-technology-is-a-key-step-towards-big-gains-in-plastics-recycling/", "date": "2023-02-04T18:37:54", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500151.93/warc/CC-MAIN-20230204173912-20230204203912-00138.warc.gz", "language": "en", "language_score": 0.9144749641, "token_count": 991, "score": 3.765625, "int_score": 4 }
<urn:uuid:67a87034-bdfd-4d17-b73c-0e4bf8fe352d>
General equilibrium theory The theory of general equilibrium is a model of the branch of microeconomics that studies the interaction and equilibrium point between the different markets of an economy. It is also known as the Walrasian general equilibrium theory, after its developer. General equilibrium is an economic model that seeks to explain the behavior, interaction and equilibrium between the different markets of the economy. Its study includes consumption, production, price formation, the determination of wages and the way in which an equilibrium is reached that determines the final distribution of resources. Thus, for example, when observing the bread market, the general equilibrium model also studies how this market interacts with other related ones (for example, butter as complementary good, wages of bread producers, cookies as substitute goods, etc.) General equilibrium differs from partial equilibrium in that the latter only focuses on analyzing a particular market (for example, the bread market) considering that the prices of other goods and services remain constant. In general equilibrium all prices are variable and all markets are required to adjust. Nor should we confuse general equilibrium with macroeconomics, the latter studies economic aggregates at the national or regional level, analyzing global indicators such as the level of employment, inflation, investment, etc. This is different from analyzing the interaction between different markets that make up an economy at the macro level.Market equilibrium Macroeconomic equilibrium Origin of general equilibrium One of the first general equilibrium models was developed at the end of the 19th century by the French mathematician and economist León Walras. In his work "Elements of Pure Economics", Walras proposes a model with n markets where prices are adjusted so that the sum of excess demand becomes zero. Among the most important assumptions of your model are: - There is perfect competition. Agents are price takers, there is no intervention in the price system and no hoarding of goods. - The figure of the "Walras auctioneer" is created who announces prices and is an intermediary or auctioneer between buyers and sellers. No transactions are made when the prices offered by buyers and sellers are unbalanced. The auctioneer will sing the prices again until they adjust to equilibrium. Later, other economists and mathematicians such as Vilfredo Pareto, Kenneth Arrow, Gerard Debreu and Lionel W. McKenzie included improvements to the Walras model. And they also developed alternative general equilibrium models. Why study general equilibrium General equilibrium analysis is an indispensable tool to be able to answer certain basic questions of economics that partial analysis could not answer. Thus, for example, when we want to determine if the economy works efficiently, it is not enough to observe a single market, we must observe the economy as a whole and how the adjustments in one market affect other related markets directly or indirectly. Likewise, when we want to study the factors that determine economic development we must apply a general equilibrium since there are interrelationships between different markets that determine the final effect of the adjustment of a certain variable (thus, for example, if the wages of a sector of the economy increase , this increase generates a positive effect on other sectors by increasing their sales). Money market equilibrium
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is purely academic and discusses economic theories without any unsafe or inappropriate content. It does not contain any harmful language, themes, or references to illegal activities." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85287-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://goka-finance.com/definiciones-teoria-del-equilibrio-R4E", "date": "2023-01-28T09:24:03", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00658.warc.gz", "language": "en", "language_score": 0.9327802658, "token_count": 638, "score": 4.25, "int_score": 4 }
<urn:uuid:6770c6c2-4e14-48a9-8225-ce3387852ced>
A chemical engineer is a person who applies his chemical knowledge in an industrial setting to create new substances and products and to improve the quality and production processes of existing substances and products. Talking about chemistry these days is no longer just about manipulating test tubes amid toxic overtones. The notions of quality and safety are today at the center of the process and of the professions in the sector. For all these reasons, chemical engineers are highly sought after, whether in heavy chemistry, fine chemistry, para chemistry, or pharmacy. The chemical engineer develops molecules, active principles, or even chemical products intended, for example, for the marketing of pharmaceutical or cosmetic products. The chemical engineer is involved in all stages of an impressive range of everyday products. Responsible for the design of clean fertilizers, fuels, or solvents, on water purification and waste treatment Responsible for the creation of preventive anti-pollution technologies. Design and production of chemical compounds Responsible for designing equipment and installations for the manufacture of products (creams, perfumes, and also foods). Find new, more efficient products, make improvements, and control existing ones. Ensures the good quality of the raw materials and the products designed, by carrying out tests on samples. Verifies that the final product complies with the specifications established upstream. They can help prevent and resolve technical issues that arise during product development. They can help the advertising department understand the benefits of adding a substance to a product. Education and Training To become a chemical engineer, one typically needs to have at least a bachelor’s degree in engineering or a similar field. This can also lead to a master’s degree in a specific area such as plastics engineering or food science. In the United States, a license for a Professional Engineer (PE) is allowed but not required. This requires a combination of an accredited degree, work experience, and passing multiple exams. He can work in a research laboratory, industrial production, or a design office. Qualities of a Chemical Engineer In any case, the chemical engineer must know how to work in a team be versatile. At the end of additional training in marketing and management, he can hold a sales position and see his career prospects broaden. He is persevering and does not give up after having suffered a few failures: finding a new formula can take time. Moreover, he has developed a good spirit of deduction and is particularly pragmatic. Attentive and rigorous, he handles the chemicals he knows inside out with great care: some reactions can turn out to be very dangerous. The chemical engineer is a meticulous and curious professional. Like an investigator, he tests several hypotheses before finding the ideal solution. He is therefore patient, persevering, and knows how to manage his frustration. In the event of a problem, the chemical engineer is reactive, creative even to multiply the avenues of research. Halfway between development and marketing, the chemical engineer enjoys good interpersonal skills. He knows how to adapt to his interlocutor and likes teamwork. The salary of the chemical engineer is attractive and as soon as you leave your studies: around $68,430 for a beginner profile, it increases with experience to an average of $108,540 per annum during your career. For the most specialized profiles, this remuneration can even exceed $168,960 yearly. The professional development of the chemical engineer generally passes through the acquisition of managerial responsibilities. With experience, team management nibbles on their technical missions and can end up representing the major part of their work. Depending on his sector of activity, the chemical engineer can also retrain by integrating the sales department of his company. The specific duties of a chemical engineer also depend mainly on how much experience they have. Junior-level workers tend to perform basic tasks. While those with more experience tend to take on roles with more responsibility and independence. Some manage teams of engineers themselves, while others propose and execute research projects. Experienced chemical engineers can also work in consulting or have a lot of latitudes if needed. Some chemical engineers may study chemistry at the undergraduate level. A chemical engineer can work in laboratories, public or private, design offices, civil engineering agencies, the chemical industry, and also local authorities.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the role, responsibilities, and career prospects of chemical engineers. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85288-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://akandle.com/article/what-is-the-job-of-a-chemical-engineer/", "date": "2023-01-30T20:44:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499829.29/warc/CC-MAIN-20230130201044-20230130231044-00818.warc.gz", "language": "en", "language_score": 0.9580339789, "token_count": 867, "score": 3.109375, "int_score": 3 }
<urn:uuid:1395b4a2-e948-4f4d-9fcc-c57049797c79>
In today’s digital age, it’s more important than ever to ensure that your applications are secure. With the rise of cyber-attacks and data breaches, securing your applications is crucial to protect your customers’ data and your own reputation. This blog post will explore various security best practices that can be used to secure your applications and keep them safe from cyber threats. Table of Contents Encryption is the process of converting plaintext into ciphertext to protect data from unauthorized access. By encrypting data, it is possible to ensure that it remains confidential and cannot be read or understood by anyone who does not have the decryption key. Encryption is an important tool for securing data in transit and at rest. When data is in transit, it can be encrypted using secure protocols such as HTTPS, which encrypts the data being transmitted over the internet. Additionally, it is also important to encrypt data at rest, such as data stored in a database, to ensure that it is protected even if the database is compromised. Authentication and Authorization Authentication is the process of verifying a user’s identity, while authorization is the process of granting access to specific resources based on that identity. By implementing proper authentication and authorization controls, it is possible to ensure that only authorized users can access specific resources, such as sensitive data or critical functionality. One of the most important aspects of authentication and authorization is the use of strong and unique credentials. By requiring strong, unique passwords or multi-factor authentication, it’s possible to ensure that only authorized users have access to resources. Additionally, by implementing role-based access control, where users are assigned specific roles with associated permissions, it is possible to ensure that users only have access to the resources they need to perform their job functions and nothing more. Patching and Updating Patching and updating is the process of applying software updates and fixes to address vulnerabilities and improve security. By keeping software updated, it is possible to ensure that the latest security patches and fixes are in place, which can help to reduce the risk of cyber attacks. Additionally, it is important to have a process in place to test and deploy patches in a timely manner to ensure that vulnerabilities are addressed before they can be exploited. Penetration testing, also known as pen testing, is the process of simulating a cyber attack on a system, network, or web application to identify vulnerabilities. By conducting regular penetration testing, it’s possible to identify vulnerabilities that may not be immediately apparent and address them before they can be exploited by an attacker. Securing your applications is crucial to protect your customers’ data and your own reputation. By implementing security best practices such as encryption, authentication and authorization, patching and updating, and penetration testing, it’s possible to keep your applications safe from cyber threats. By regularly evaluating and updating your security practices and staying up to date with new threats and vulnerabilities, you can make sure that your application remains secure and protected.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content on security best practices\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on educational content related to securing applications and does not contain any unsafe or inappropriate elements. It discusses best practices such as encryption, authentication and authorization, patching and updating, and penetration testing, which are all appropriate for public use and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85289-0", "llm_safety_score": 0, "reason": "educational content on security best practices" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.gudstory.com/a-guide-to-security-best-practices/", "date": "2023-02-01T05:48:48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00018.warc.gz", "language": "en", "language_score": 0.9357996583, "token_count": 614, "score": 3.203125, "int_score": 3 }
<urn:uuid:fe3a3977-ba07-408a-84d5-398436ee97c8>
|AIATSIS Thesaurus language code and map grid reference: (N21) (NT SD52-04) For more information, refer to the AIATSIS Thesauri (see reference below). The Larrakia Nation Aboriginal Corporation (c2005) states that 'Larrakia is the language group name for the Aboriginal people of Darwin, of the greater Darwin region of the Northern Territory. Traditionally, Larrakia lands include[d] the Cox Peninsula, most of Gunn Point and much of rural Darwin. Darwin Harbour is also recognised as being within Larrakia country. Larrakia people are often referred to as "saltwater people", although [their] boundaries extend up to approximately 50km inland.'|
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is educational and informative, detailing information about the Larrakia Nation and their traditional lands. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85290-0", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://database.atns.net.au/agreement_print.asp?EntityID=1431", "date": "2023-02-04T22:26:40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500154.33/warc/CC-MAIN-20230204205328-20230204235328-00258.warc.gz", "language": "en", "language_score": 0.932431519, "token_count": 152, "score": 2.859375, "int_score": 3 }
<urn:uuid:887b9912-37aa-46db-9c17-38a6e0411571>
Financial accounting is an important discipline that is crucial to reporting a company’s financial information. Its principles are centered around the concept of double-entry bookkeeping, first introduced by the Italian monk Luca Pacioili in 1494. The idea behind double-entry bookkeeping is that every single transaction will affect at least two accounts. Financial accounting involves calculating and presenting financial information to meet the needs of users and help them make rational decisions. It is also used by businesses to disclose their financial health to third parties, which helps them meet statutory requirements. This information helps them determine whether they can meet their obligations and can afford to pay their creditors. The financial statements of companies are an important tool for financial decision-making, and are used to provide information to creditors and shareholders. Financial accounting is also used for internal communications within the company. It can be used to communicate the company’s financial status to employees, as well as to the company’s finance team. Knowing that the company’s finances are in order can help employees feel secure and can even prevent layoffs. This information is vital to making important financial decisions for any company. Another important document in financial accounting is a company’s income statement. It reflects how much money flows in and out of the business and shows the total revenue and expenses for the business. Other documents that include financial information include a statement of cash flows. When used properly, this document can help investors, business partners, and creditors assess whether the company can meet its financial obligations. As mentioned, a financial accounting degree can be a lucrative career option. The median annual salary for a financial analyst is over $85,000, while financial managers earn more than $102,000 per year. However, an unaccredited degree will have less credibility. For this reason, prospective learners should consider the reputation of the school in question. For example, some schools are known to be among the best business schools in the world. They should also consider the credentials of their faculty members. One of the main differences between cost accounting and financial accounting is the way the numbers are reported. Cost accounting is an internal accounting system that organizes costs according to the products or processes of the business. It also tracks internal planning, and information needs. Professional accountants who specialize in financial accounting can earn the designations of Chartered Accountant or Certified Public Accountant. Financial accounting is an important tool in business because it enables companies to analyze their financial performance and make projections for the future. Knowing where money is going will help avoid mistakes and find opportunities for growth. It will also show the areas in which the company can make improvements. It can even help a company decide whether to invest in new products and services. If you are pursuing an MBA program, a financial accounting concentration may give you a leg up on the competition. A degree in financial accounting will help you position yourself for upward mobility, as companies always need skilled managers with the right financial background.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is entirely focused on explaining financial accounting and its importance in business and decision-making. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and relevant to business and finance. Therefore, it is fully appropriate for all audiences, including children and sensitive environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85291-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://benefitsinbusiness.com/the-importance-of-financial-accounting/", "date": "2023-02-07T09:22:00", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500392.45/warc/CC-MAIN-20230207071302-20230207101302-00418.warc.gz", "language": "en", "language_score": 0.9550958276, "token_count": 604, "score": 3.78125, "int_score": 4 }
<urn:uuid:450e9e81-a805-4b14-a8b1-79d429c94a2a>
How many conjunctions are there in English? How many conjunctions are there in English? seven coordinating conjunctions What are the 5 types of conjunctions? Types of Conjunction - Coordinating Conjunction. - Subordinating Conjunction. - Correlative Conjunction. What are the 3 types of conjunction? Following are brief overviews of the three types of conjunctions: coordinating, subordinate (subordinating), and correlative. What is conjunction give 5 examples? He had climbed many mountains when he was a boy. You are very late so that we can not start the lesson. I don’t know whether she’ll be admitted to the university. He had climbed many mountains when he was a boy. You don’t need to go unless you want to. What is conjunction word? Conjunctions are words that link other words, phrases, or clauses together. What is a conjunction for kids? Conjunctions are words that connect or link phrases, sentences, clauses, or words together. You can think of this words as words that join phrases or different parts of a sentence together. Common conjunctions include the following: -and. -but. What’s another word for conjunction? What is another word for conjunction? How can I learn conjunctions in English? - 1 Coordinating conjunctions – these connect words, phrases or clauses that are independent or equal; and, but, so, for, yet, not. - 2 Correlative conjunctions – these are always used in pairs; both/and, either/or, neither/nor, not only/but also. - And – in addition to. - But – connects to opposite things. How do you introduce conjunctions to students? Have students write down all the words they can think of that are conjunctions. Remove duplicates, give them some example sentences using a different conjunction, and ask for more. You can also add a new conjunction into the sentence and let the kids pick it out. Then create a wall with all the suggestions. What age do you learn conjunctions? Conjunctions. Between 25 and 27 months, toddlers begin to use the conjunction and to list two things. For example, at snack time, twenty-six-month-old Avery said, “Juice and cookie.” Younger toddlers list things by saying the names of the two things one after the other as “Coat. How do conjunctions help students? Conjunctions are an important part of speech that connect two ideas together. When students know how to combine sentences, their writing variety and quality increases. Check out these tips for teaching sentence combining in the classroom, or assign some sentence combining worksheets for extra practice. Why we use conjunctions for kids? A conjunction is a word that joins together words, phrases, or parts of sentences. The three most-used conjunctions are and, or, and but. Conjunctions can join words together, like in this sentence: I’d like five peanut butter and jelly sandwiches, please. How do you teach conjunctions of time? Before, after and until With before and after, either the main clause or the subordinate clause can come first: [event 1]She’ll pick you up before [event 2]she comes here. After [event 1]she comes here, [event 2]she’ll pick you up. Until as a time conjunction means up to a time in the past or future. How do you teach so conjunctions? Have your students sit in a circle and write all the words they can think of that are conjunctions on the blackboard. After removing some duplicates, encourage them to think outside the box. Provide some example sentences using different conjunctions, and have students identify the conjunctions. What is a conjunction Year 1? When we write a sentence we always use a capital letter at the start and punctuation at the end (usually a full stop). We also often use joining words when writing sentences. Joining words are also known as conjunctions. Watch this short video to find out more about joining words. How do you use a conjunction but? The conjunction but is used to suggest a contrast. - It was a sunny day, but the wind was cold. (Here the second clause suggests a contrast that is unexpected in the light of the first clause.) - The stick was thin but it was strong. - He was ill but he went to work. - She is poor but honest. Is both a conjunction word? As a conjunction, ‘both’ should only be used with ‘and’; its use with other conjunctive phrases (e.g., “as well as” and “along with”) is not preferred. In the examples below, “both…and” is used as a conjunction relating two nouns, two adjectives, and two verbs, respectively. What are joining words called? A CONJUNCTION is a word that connects or joins together words, phrases, clauses, or sentences. There are two kinds of conjunctions, a primary class of COORDINATING conjunctions and a secondary class called SUBORDINATING or SUBORDINATE conjunctions. What are joining words in English? They join together words, group of words or sentences. Such joining words are called Conjunctions. The word that joins words or two sentences is called conjunction. Conjunction is an important part of grammar that helps us form complex sentences with ease.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content, appropriate for all audiences\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, focusing on explaining conjunctions in English. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences, including children and educational environments.", "{\"reason\": \"appropriate educational content\", \"score\": 0}\n```\n\nThe text is purely educational and informative, providing definitions and explanations about conjunctions in English grammar. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85292-0", "llm_safety_score": 0, "reason": "educational content, appropriate for all audiences" }, { "custom_id": "85292-1", "llm_safety_score": 0, "reason": "appropriate educational content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://easierwithpractice.com/how-many-conjunctions-are-there-in-english/", "date": "2023-01-27T09:03:26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494974.98/warc/CC-MAIN-20230127065356-20230127095356-00698.warc.gz", "language": "en", "language_score": 0.9386707544, "token_count": 1171, "score": 3.859375, "int_score": 4 }
<urn:uuid:68ac5816-6122-4923-9b4b-6080004bffc8>
diffrence between stomata and hydathodes. Hydathodes are special pore-like structures at the margins and tip of leaves of some grasses and angiosperms which secrete excess water in the form of liquid drops apart from transpiration. The water also contains salts, sugars, and organic compounds dissolved in it and sometimes seen to crystallize on evaporation. Stomata are tiny pores present on the epidermis of the leaves. They are surrounded by guard cells that regulate the opening and closing of the stomata. Stomata basically have two major functions: 1. Helps in photosynthesis by facilitating gaseous exchange. The absorb carbon dioxide and release oxygen. 2. Stomata also helps in transpiration. Hydathode (Water Stomata): Hydathode is a secretory tissue commonly found in the leaves of Angiosperms. They are pore-like structures present on the leaf margin through which water is secreted out as droplets. This type of secretion is called?Guttation.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text provided is purely educational and scientific, explaining the differences between stomata and hydathodes. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and sensitive environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85293-0", "llm_safety_score": 0, "reason": "educational content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.meritnation.com/ask-answer/question/diffrence-between-stomata-and-hydathodes/transpiration/13510965", "date": "2023-01-28T14:06:57", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499634.11/warc/CC-MAIN-20230128121809-20230128151809-00778.warc.gz", "language": "en", "language_score": 0.9573255777, "token_count": 222, "score": 3.9375, "int_score": 4 }
<urn:uuid:eadfb812-8a84-4993-85d3-eaad59f57238>
Watch this video and more on Grace Media Dr. McClain discusses why we disagree with the secular culture about dinosaurs. Since dinosaurs lived thousands of years ago, how do we know about them? Dr. Matt McClain discusses the physical and historical evidence that helps us understand more about dinosaurs. How do we identify dinosaurs? Dr. Matt McClain guides us through how paleontologists determine what is and isn’t a dinosaur. The glory of God is exhibited through dinosaurs. Dr. McClain discusses the main category of dinosaurs and then guides us through the many kinds of dinosaurs God created.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses scientific and historical evidence related to dinosaurs and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85294-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.gracemedia.app/thinking-biblically-about-dinosaurs/season:1/videos/why-do-we-disagree-about-dinosaurs", "date": "2023-01-31T04:21:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499842.81/warc/CC-MAIN-20230131023947-20230131053947-00058.warc.gz", "language": "en", "language_score": 0.8536606431, "token_count": 122, "score": 2.65625, "int_score": 3 }
<urn:uuid:cf0e57bd-1cd5-4700-bd21-8567aaa8f2d7>
Most youth mental health service staff are ‘dedicated people with a strong sense of social justice. They want to meet the needs of young Aboriginal people,’ says Professor Michael Wright, Curtin School of Allied Health. ‘But they also know they don’t know how to do this. ‘For historical reasons, Aboriginal youth distrust mainstream organisations. For this reason, they often don’t seek help early for mental health issues. ‘Our Journey Our Story aims to build the capacity of mental health service staff. We want them to be flexible, confident, and competent in responding to the cultural needs of Aboriginal young people.’ Debakarn Koorliny Wangkiny (Steady Walking and Talking) A Nyoongar man, Michael worked with Aboriginal Elders to develop the Debakarn Koorliny Wangkiny (Steady Walking and Talking) co-design framework (DKW). DKW disrupts by questioning service providers’ ‘typical ways of working,’ Michael says. Participants are asked to commit to being motivated, present and teachable, respecting status, staying connected, and continually weaving. DKW starts with going on Country The DKW change process has 3 phases. It begins when mental health services staff go on Country with Aboriginal Elders and young people. They share experiences such as dance, art, preparing traditional foods, and walking through the bush. This activity deepens staff understanding of culture, kinship and spirit. The second phase involves Storying. Participants build connections by sharing parts of their life stories. ‘This provides the foundation for meaningful relationships that can progress to trust and deeper connection,’ Michael says. Aboriginal Elders and youth and mental health staff ‘usually have a deep self-realisation that change is possible!’ Michael says. ‘Our experience is that the changes they experience are profound.’ Co-design of youth mental health services Relational work on Country creates an equitable framework where Aboriginal Elders and youth can co-design mental health services with mainstream providers. This is the third phase of DKW. Prioritising cultural and community engagement ensures that mental health services are more appropriate for Aboriginal youth. It also enables culturally appropriate services to be sustained over time. Proven Nyoongar research method Our Journey Our Story is one of several projects that have used the DKW change framework. In each project, Aboriginal Elders work ‘burdiya to burdiya’ (boss to boss) with partner mental health service providers to create positive organisational change. This impacts service partners’ governance and staff development and support. Aboriginal staff increase across most service partners. Services build capacity to embed innovative ways of working through their organisation. Evaluation surveys show that Aboriginal clients benefit when - ‘the worker understands that being Aboriginal means I sometimes have a different way of looking at the world’ - ‘the worker took responsibility to make me feel safe in the service.’ DKW for other Aboriginal groups In Our Journey Our Story, for the first time Michael is trialling the DKW framework with another Aboriginal group, the Yawuru people in Broome. ‘We believe the principles that guide and underpin the DKW framework are universal principles. They are based on relational ways of working that fit with the Aboriginal world view,’ Michael explains. But because DKW is a Nyoongar framework, Michael first asks Aboriginal people from other language groups if they are comfortable using the framework. ‘To date they have been fine with working with us,’ he says. The measure of success Michael evaluates the impact of each DKW co-design program. He surveys client experiences and service provider attitudes. ‘A critical measure for us is when a community asks us about a service, we can say with absolute confidence that it is safe for them to go there. In essence we are vouching for the service.’ Our Journey Our Story is funded by $2.5 million from the MRFF.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the development and implementation of a co-design framework for improving mental health services for Aboriginal youth. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are focused on improving community health and well-being." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85295-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.health.gov.au/news/our-journey-our-story", "date": "2023-02-05T00:32:28", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00378.warc.gz", "language": "en", "language_score": 0.9339586496, "token_count": 856, "score": 2.578125, "int_score": 3 }
<urn:uuid:245f4e5c-bc75-4290-b63e-61b00e74bae8>
Floods are a recurrent natural calamity in Pakistan, followed by earthquakes, cyclones and drought. However, drought is more damaging than floods in terms of food insecurity. Evidence of chronic water shortages have been painfully evident in some parts of Pakistan in recent years, due to low rainfall and extreme variations in temperature. The Tharparkar District is the largest (by land area) of twenty-nine districts of the Sindh province in Pakistan. An extension of the Thar Desert in Rajasthan, India, the Tharparkar district is situated to the west of India. 15% of the Thar Desert is located in Pakistan over Punjab and Sindh, starting from the Tharparkar District up towards the Cholistan Desert: this part of the desert is referred to as Tharparkar Desert. Divided into 7 tehsils, an administrative division used in various South Asian countries, the Tharparkar District is headquartered at Mithi. Thar has the only fertile desert in the world, and the livelihood of Thari people depends on rainfall agriculture and livestock rearing, which is critical to household food security. If a family requires cash for essential commodities or services, they trade-in or sell their animals to fulfil their requirements. The veterinary epidemic that wiped out most of the region’s livestock and negatively affected people’s ability to sustain their livelihoods was caused by chronic drought. The mounting challenges posed by drought are focus areas for Pakistan Water Partnership’s (PWP/GWP-Pakistan) work, particularly in desert areas, which have received minimal attention in the past. PWP’s Desert Development model puts emphasis on livelihood creation, water security, hygiene, and environmental sustainability as a means of improving the quality of life of desert dwellers and their livestock. Drought is an overwhelming concern and Pakistan faces this stress in all three of its deserts, namely Tharparkar, Cholistan and Thal. As part of WACREP funded PWP intervention, a wide range of activities were carried out under Desert Development, targeting two major desert regions of Pakistan: the Greater and Lesser Cholistan Desert and the Tharparkar Desert from September 2014 to November 2015 (14 months). Both of these areas are geographically an extension of the Great Indian Thar Desert in Pakistan. Given the severity of the crisis, three priority sectors were identified by PWP/GWP-Pakistan for immediate and long-term improvements in the lives of Thari people, which are Water, Sanitation and Hygiene (WASH), Health and Hygiene and Nutrition. The Desert Development approach consisted of a wide range of activities, carried out in 45 villages of the Tharparkar District housing more than 128,000 people. By improving access to potable water, distributing food and medicines for people and livestock, building capacity in traditional soap-making techniques, and the operation of bio sand filters, entire communities were benefited in various ways. Local village leaders were trained in soap-making and provided bio sand filters. Their increased capacity in these realms allowed them to educate the rest of the community members. PWP demonstrated the use of BSFs in isolated areas of the Tharparkar district, covering 29 villages across the districts of Mithi, Chahro, and Diplo over 14 months. These target areas were chosen on the basis of advice provided by the local government; they highlighted the areas that were most affected by drought, suffered from the most notable water issues, and represented the most economically backward sections of Tharparkar. The PWP introduced the Integrated Water Resources Management concept in the Tharparkar district of Sindh, Pakistan, in the hopes of mobilising community action to tackle the negative effects of chronic drought. Major contributions of this project were: - WASH: bio sand filters were demonstrated and distributed in 29 villages; ponds were created in 17 villages. - Health and Hygiene: soap making techniques were demonstrated in 25 villages; medicines were distributed to villages; seeds and mineral mix were distributed to 23 villages. - Nutrition: food packets were distributed in 7 villages; medicines were handed out in 21 villages; village nurseries were set up in 21 villages. In order to ensure water security in drought-affected areas, widespread support by governmental/local agencies should be provided to communities. Large scale and widespread capacity building in livestock, forestry, fodder, women rights, and health is needed on a fast-track basis for self-reliance and sustainable development. Focusing on home garden and village plant nurseries can augment food security and health of community. Training sessions will help reduce exploitation and ensure that dwellers receive fair prices for their products in the market. Introducing small-scale, portable solar units to convert brackish water to sweet water can provide an alternative source of potable water preventing diseases. Local donkeys could be revived as they are a source of power and can thrive very well on scant vegetation. Hence a small equine research centre could be created to further research on improvement of this species. The government should commission water interventions like RWH systems, emergency ponds, and small dams to provide safe drinking water. It could further facilitate a focused response from NGOs working in THAR and conduct M&E, so activities can be scaled up.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses natural calamities, drought, and development initiatives in Pakistan's Tharparkar District. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use and educational environments.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThis text discusses the creation of a research center and government interventions for water management and NGO support. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85296-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85296-1", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://gwptoolbox.org/case-study/pakistan-iwrm-practices-alleviate-poverty-model-desert-development-tharparkar", "date": "2023-02-07T11:56:52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500456.61/warc/CC-MAIN-20230207102930-20230207132930-00538.warc.gz", "language": "en", "language_score": 0.9648450017, "token_count": 1087, "score": 3.453125, "int_score": 3 }
<urn:uuid:7f3a8bc0-93da-44c8-afca-631854a3e890>
Global NGO WRAP has challenged the way retailers sell fresh uncut fruit and vegetables, following an 18-month project conducted with input from industry. The research, which examined the link between food waste in the home and the use of plastic packaging, challenges accepted thinking that packaging helps to preserve fresh produce. In fact, it shows that selling loose has huge potential to reduce food waste in our homes. The research also examined the influence of date labels and storage temperatures on food going to waste. Packaging advice to retailers WRAP is now calling on the UK’s major retailers to rethink how they sell uncut fresh produce. It recommends that retailers sell loose, where possible, unless it is shown that plastic packaging reduces overall food waste. The NGO is also calling for date labels to be removed unless it can be shown that a Best Before reduces overall food waste. Retailers are also being advised to help customers understand the benefits of storing appropriate fresh produce in the fridge, below 5°C, at home. ‘This important research could be a game-changer in the fight against food waste and plastic pollution. We have demystified the relationship between wasted food, plastic packaging, date labels and food storage. While packaging is important and often carries out a critical role to protect food, we have proven that plastic packaging doesn’t necessarily prolong the life of uncut fresh produce. It can in fact increase food waste in this case. We have shown the massive potential to save good food from being thrown away by removing date labels. ‘We are all living with the reality of the climate emergency and the rising cost of living. This new clarity could not be more timely. We need retailers to step up and follow our recommendations so we can achieve real progress in tackling food waste and plastic pollution. This helps save the planet and us money at the same time – a real win-win.’ Saving food waste WRAP tested five commonly wasted items (apples, bananas, broccoli, cucumber and potatoes) stored in the original packaging and loose and at different temperatures. The charity found that selling the five loose and removing Best Before dates could result in a combined saving of around 100,000 tonnes of household food waste, more than 10,300 tonnes of plastic and 130,000 tonnes of CO2e. This saving comes from both enabling people to buy the right amount for their needs (potatoes, bananas and apples) and to use their judgement to decide when items are still good to eat. While most supermarkets already sell some items loose, the new research presents compelling evidence for significantly increasing the practice across a wide range of fresh fruit and vegetables.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the findings of a research project conducted by an NGO (Global NGO WRAP) on the impact of plastic packaging on food waste and provides recommendations for retailers. The content is entirely focused on environmental and economic benefits and does not contain any unsafe, inappropriate, or harmful elements." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85297-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.mygreenpod.com/articles/no-plastic-packaging/", "date": "2023-02-08T17:54:08", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500837.65/warc/CC-MAIN-20230208155417-20230208185417-00618.warc.gz", "language": "en", "language_score": 0.9384002686, "token_count": 551, "score": 2.90625, "int_score": 3 }
<urn:uuid:0075ea58-89e0-4643-a822-32269401d811>
These days, a cool blanket of snow has come to rest over all of campus, and when the temperatures drop below zero, it’s hard to imagine leaving the complex, much less living out there. How do different Minnesotan fauna survive, and which animals might still be active when you walk (or ski or snowshoe) the Arb? Hibernation, of course, is a key method. And many critters do choose to sleep the winter away, including the common garter snakes and the tiny woodland jumping mouse. But it’s not the only way that fauna deal with the cold. Deer and short-tailed weasels both exchange their coats: deer sport thicker and darker fur, while the short-tailed weasel turns from brown to a snowy white. Beavers spend all fall in preparation, cutting trees and branches to both build their den and stockpile food. In the winter, beavers stay under the ice and consume the mounds of sticks they procured earlier (see more at https://northernwoodlands.org/outside_story/article /beavers-winter). Minks adopt a different form of this strategy, as they continue to hunt, but will stay buried in their dens for winter’s coldest weeks. The Arb’s turtle species choose another means of survival. Both snapping and painted turtles live in ponds beneath the snow and ice where temperatures fluctuate far less. While their metabolism slows significantly, these creatures still move around in their aquatic environment (learn more at northcountypublicradio.org, turtles and natural selection). Of course, it’s worth noting that not all animals devote energy to surviving in the snow and ice. Most of Carleton’s flock of geese head down south (although some intrepid birds do stay on the Lyman Lakes, and the number of fowl here year-round is increasing each year). Keep an eye out for those last geese this winter as they hunker down on the ice and await the return of spring.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text discusses the survival strategies of various animals in Minnesota during winter, including hibernation, coat changes, and other adaptive behaviors. There is no inappropriate language, harmful content, or references to illegal activities. The text is suitable for educational and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85298-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://thecarletonian.com/2023/01/13/arb-notes-58/", "date": "2023-01-28T20:33:53", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00018.warc.gz", "language": "en", "language_score": 0.9310520887, "token_count": 424, "score": 3.171875, "int_score": 3 }
<urn:uuid:20eebd02-ee6a-451d-a957-4a3b9a1a3209>
Scleroderma with internal-organ involvement (diffuse cutaneous systemic sclerosis) is a devastating autoimmune disorder. Despite advances in management, mortality driven by pulmonary involvement has not changed in 40 years. Although disease-modifying antirheumatic drugs (DMARDs) and biologics have been studied, none have shown lasting benefit, and only cyclophosphamide given for 12 months has shown short-term benefit as compared with placebo. For many patients, scleroderma is a fatal disease. Pilot studies of autologous hematopoietic stem-cell transplantation in scleroderma showed improvement in skin sclerosis and stabilization of pulmonary function. Two randomized trials of nonmyeloablative transplantation also showed benefit; however, neither trial changed clinical practice in the United States, in part owing to concerns about durability of response and the safety of transplantation. A study has now found new cause for optimism for Scleroderma using an aggressive stem cell transplant regimen The researchers, publishing in the Jan. 4 issue of the New England Journal of Medicine, found significantly improved survival among patients with a severe form of scleroderma who underwent chemotherapy, whole body radiation and a stem cell transplant. Patients also had less need for immunosuppressive drugs after transplant. In the current study, Sullivan and colleagues developed a transplant conditioning regimen that included high-dose chemotherapy plus whole-body radiation to fully wipe out the patient’s defective immune-forming system, with the aim of improving survival and diminishing the effects of the disease. They limited radiation by shielding patients’ kidneys and lungs while repopulating the blood and immune system. Thirty-six scleroderma patients were randomly assigned to receive transplants. The regimen was designed to destroy the patients’ defective autoreactive immune system and replace it with their own blood stem cells that had been removed and treated to eliminate self-reacting lymphocytes. For comparison, 39 additional patients were randomized to receive 12 monthly intravenous injections of cyclophosphamide, a conventional immunosuppressive treatment for severe scleroderma. The study was conducted over a 10-year period at 26 universities in the United States and Canada. The primary study endpoint at 54 months was a global rank composite score based on a hierarchy of scleroderma features including survival, organ function, quality of life and skin hardening. Results showed significant benefit with transplant: 67 percent of 1,404 pairwise comparisons favored transplant vs. 33 percent favoring cyclophosphamide. By study endpoint, fewer transplant recipients resumed use of anti-scleroderma drugs (9 percent vs. 44 percent of controls). Overall survival at 72 months was 86 percent after transplant vs. 51 percent after cyclophosphamide, a highly significant benefit. Treatment-related mortality at the study endpoint of 54 months was 3 percent among transplant recipients while cyclophosphamide recipients had no treatment-related deaths. In the short term, transplant recipients also had more serious side effects, such as low blood counts and infections. These advances show the value of medical research and clinical trials in finding better therapies to advance health. Keith M. Sullivan, Ellen A. Goldmuntz, Lynette Keyes-Elstein, Peter A. McSweeney, Ashley Pinckney, Beverly Welch, Maureen D. Mayes, Richard A. Nash, Leslie J. Crofford, Barry Eggleston, Sharon Castina, Linda M. Griffith, Julia S. Goldstein,. Myeloablative Autologous Stem-Cell Transplantation for Severe Scleroderma. New England Journal of Medicine, January 4, 2018; 378 (1): 35 DOI: 10.1056/NEJMoa1703327
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a medical article discussing the treatment of scleroderma, a serious autoimmune disorder. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to medical research and patient care, making it fully appropriate for public use, educational environments, and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85299-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://shop.drramon.com/stem-cell-transplant-for-scleroderma/", "date": "2023-01-31T06:22:14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00178.warc.gz", "language": "en", "language_score": 0.92062217, "token_count": 772, "score": 2.546875, "int_score": 3 }
<urn:uuid:965ed5de-0f79-410c-93a0-f53082d040a5>
Each fall, monarch butterflies across Canada and the United States turn their orange, black and white-mottled wings toward the Rio Grande and migrate over 2,000 miles to the relative warmth of central Mexico. This journey, repeated instinctively by generations of monarchs, continues even as monarch numbers have plummeted due to loss of their sole larval food source, milkweed. But amid this sad news, a research team believes they have cracked the secret of the internal, genetically encoded compass that the monarchs use to determine the direction — southwest — they should fly each fall. “Their compass integrates two pieces of information, the time of day and the sun’s position on the horizon — to find the southerly direction,” said Eli Shlizerman, a University of Washington assistant professor. While the nature of the monarch butterfly’s ability to integrate the time of day and the sun’s location in the sky are known from previous research, scientists have never understood how the monarch’s brain receives and processes this information. Shlizerman, who has joint appointments in the Department of Applied Mathematics and the Department of Electrical Engineering, partnered with colleagues at the University of Michigan and the University of Massachusetts to model how the monarch’s compass is organized within its brain. “We wanted to understand how the monarch is processing these different types of information to yield this constant behavior — flying southwest each fall,” said Shlizerman, who is lead author on the team’s recent paper in the journal Cell Reports. Monarchs use their large, complex eyes to monitor the sun’s position in the sky. But the sun’s position is not sufficient to determine direction. Each butterfly must also combine that information with the time of day to know where to go. Fortunately, like most animals including humans, monarchs possess an internal clock based on the rhythmic expression of key genes. This clock maintains a daily pattern of physiology and behavior. In the monarch butterfly, the clock is centered in the antennae, and its information travels via neurons to the brain. Biologists have previously studied the rhythmic patterns in monarch antennae that control the internal clock, as well as how their compound eyes decipher the sun’s position in the sky. Shlizerman’s collaborators, including Steven Reppert at the University of Massachusetts, recorded signals from antennae nerves in monarchs as they transmitted clock information to the brain as well as light information from the eyes. “We created a model that incorporated this information, how the antennae and eyes send this information to the brain,” said Shlizerman. “Our goal was to model what type of control mechanism would be at work within the brain, and then asked whether our model could guarantee sustained navigation in the southwest direction.” In their model, two neural mechanisms — one inhibitory and one excitatory, controlled signals from clock genes in the antennae. Their model had a similar system in place to discern the sun’s position based on signals from the eyes. The balance between these control mechanisms would help the monarch brain decipher which direction was southwest. Based on their model, it also appears that during course corrections monarchs do not simply make the shortest turn to get back on route. Their model includes a unique feature, a separation point that would control whether the monarch turned right or left to head in the southwest direction. “The location of this point in the monarch butterfly’s visual field changes throughout the day,” said Shlizerman. “And our model predicts that the monarch will not cross this point when it makes a course correction to head back southwest.” Based on their simulations, if a monarch gets off course due to a gust of wind or object in its path, it will turn whichever direction won’t require it to cross the separation point. Additional studies would need to confirm whether the researchers’ model is consistent with monarch butterfly brain anatomy, physiology and behavior. So far, aspects of their model, such as the separation point, seem consistent with observed behaviors. “In experiments with monarchs at different times of the day, you do see occasions where their turns in course corrections are unusually long, slow or meandering,” said Shlizerman. “These could be cases where they can’t do a shorter turn because it would require crossing the separation point.” Their model suggests a simple explanation why monarch butterflies are able to reverse course in the spring and head northeast back to the United States and Canada. The four neural mechanisms that transmit information about the clock and the sun’s position would simply need to reverse direction. “And when that happens, their compass points northeast instead of southwest,” said Shlizerman. “It’s a simple, robust system to explain how these butterflies — generation after generation — make this remarkable migration.” In addition to Reppert, other co-authors on the paper were James Phillips-Portillo at the University of Massachusetts and Daniel Forger at the University of Michigan. Funding: Shlizerman’s work was funded by the National Science Foundation and the Washington Research Fund. Grant number: DMS-1361145. Source: James Urton – University of Washington Image Source: The image in credited to Eli Shlizerman. Original Research: Full open access research for “Neural Integration Underlying a Time-Compensated Sun Compass in the Migratory Monarch Butterfly” by Eli Shlizerman, James Phillips-Portillo, Daniel B. Forger, and Steven M. Reppert in Cell Reports. Published online April 14 2016 doi:10.1016/j.celrep.2016.03.057 Neural Integration Underlying a Time-Compensated Sun Compass in the Migratory Monarch Butterfly Highlights •A model for time-compensated sun compass used by monarch butterflies is developed •Neural oscillations encoding solar azimuth and time of day are proposed •Special integration of neural oscillations enables correction to southwest flight •The model explains flight simulator tracks and supports northeast remigration Summary Migrating eastern North American monarch butterflies use a time-compensated sun compass to adjust their flight to the southwest direction. Although the antennal genetic circadian clock and the azimuth of the sun are instrumental for proper function of the compass, it is unclear how these signals are represented on a neuronal level and how they are integrated to produce flight control. To address these questions, we constructed a receptive field model of the compound eye that encodes the solar azimuth. We then derived a neural circuit model that integrates azimuthal and circadian signals to correct flight direction. The model demonstrates an integration mechanism, which produces robust trajectories reaching the southwest regardless of the time of day and includes a configuration for remigration. Comparison of model simulations with flight trajectories of butterflies in a flight simulator shows analogous behaviors and affirms the prediction that midday is the optimal time for migratory flight. “Neural Integration Underlying a Time-Compensated Sun Compass in the Migratory Monarch Butterfly” by Eli Shlizerman, James Phillips-Portillo, Daniel B. Forger, and Steven M. Reppert in Cell Reports. Published online April 14 2016 doi:10.1016/j.celrep.2016.03.057
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text discusses scientific research on monarch butterflies and their migration patterns. It contains no unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and scientific.", "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a scientific summary of a research paper. It contains no unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to scientific research and biology, making it fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85300-0", "llm_safety_score": 0, "reason": "No unsafe content found" }, { "custom_id": "85300-1", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://neurosciencenews.com/monarch-butterfly-internal-compass-4050/", "date": "2023-02-02T18:26:36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00338.warc.gz", "language": "en", "language_score": 0.9270654321, "token_count": 1543, "score": 4.15625, "int_score": 4 }
<urn:uuid:b1856df9-dc20-44bb-b90c-30cbaa48977c>
The Borobudur Temple is Indonesia’s spectacular site which allows you to travel back in time to enjoy an unrivaled combination of history, culture, spiritually and natural beauty. Visitors will enjoy the astonishing experience afforded by the world’s biggest Buddhist monument which survived 1,200 years of natural and man-made disasters. Set in an unspoiled green valley surrounded by majestic mountains, a visit to Borobudur is an unforgettable experience. Floating above the landscape of Central Java like a series of concentric circles that forms a giant mandala, Borobudur Temple is the largest Buddhist monument in the world. Even though there is no written record of who built the temple first, it is believed that Borobudur Temple was built between AD 780 and 840 when the Syailendra Dynasty ruled the region. The building was abandoned for centuries and buried beneath layers of volcanic ash from Mount Merapi with only local people knew of its existence. In 1814, the British ruler of Java, Sir Thomas Stanford Raffles, appointed a team led by Cornelius to investigate a hill, which, according to many local inhabitants, was the site of an ancient monument. The discovery got the Borobudur Temple worldwide attention, but it was not until 1835 that the entire area of the temple has been cleared. Photo credit: © Fabrice Finotti
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is entirely focused on describing the Borobudur Temple in Indonesia. It contains no unsafe, inappropriate, or harmful content. The language is respectful, and the themes are historical and cultural, making it fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85301-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://great.sv.ugm.ac.id/2019/03/11/borobudur-temple/", "date": "2023-02-05T05:01:12", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00498.warc.gz", "language": "en", "language_score": 0.9579157829, "token_count": 280, "score": 3.234375, "int_score": 3 }
<urn:uuid:faa871f7-b7b2-4ca5-a0ba-4ec1f83ac221>
A pilot project to encourage scientific debate in schools. Comics written and peer reviewed by young learners Comprehension of the nature and practice of science and its social context are important aspects of communicating and learning science. However there is still very little understanding among the non-scientific community of the need for debate in driving scientific knowledge forward and the role of critical scrutiny in quality control. Peer review is an essential part of this process. We initiated and developed a pilot project to provide an opportunity for students to explore the idea that science is a dynamic process rather than a static body of facts. Students from two different schools experienced the process of peer-review by producing and reviewing comics related to the science done at Rothamsted Research. As authors, students showed a large degree of creativity and understanding of the science while as referees they showed good critical skills. Students had at first hand an insight into how science works. Request to Edit a Resource If you would like to edit a resource, please use this form to submit your request.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on a pilot project aimed at encouraging scientific debate in schools through the use of comics. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and suitable for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85302-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://resources.informalscience.org/pilot-project-encourage-scientific-debate-schools-comics-written-and-peer-reviewed-young-learners", "date": "2023-02-07T14:27:41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00658.warc.gz", "language": "en", "language_score": 0.9611161947, "token_count": 205, "score": 3.03125, "int_score": 3 }
<urn:uuid:e706865b-267f-49ce-9010-241e4d40f7b7>
Abstract: The availability and use of geographic information technologies and data for describing the patterns and processes operating on or near the Earth’s surface have grown substantially during the past fifty years. The number of geographic information systems software packages and algorithms has also grown quickly during this period, fueled by rapid advances in computing and the explosive growth in the availability of digital data describing specific phenomena. Geographic information scientists therefore increasingly find themselves choosing between multiple software suites and algorithms to execute specific analysis, modeling, and visualization tasks in environmental applications today. This is a major challenge because it is often difficult to assess the efficacy of the candidate software platforms and algorithms when used in specific applications and study areas, which often generate different results. The subtleties and issues that characterize the field of geomorphometry are used here to document the need for (1) theoretically based software and algorithms; (2) new methods for the collection of provenance information about the data and code along with application context knowledge; and (3) new protocols for distributing this information and knowledge along with the data and code. This article discusses the progress and enduring challenges connected with these outcomes. New Protocols for Distributing the Data and Code of Geospatial Research Here, we propose a five-star practical guide for sharing data and code in geospatial research, modeled after the five-star system offered by Berners-Lee (2009) for publishing linked open data on the Web. Instead of asking researchers to share all pieces of data and code, this five-star guide encourages a simple start of data and code sharing, and researchers can move to a higher level when time and other resources allow. There has not been a time in the history of GIScience when movement analytics and mobility insights have played such an important role in policymaking as in today’s global responses to the COVID-19 crisis. This special section further builds on previous efforts by the editorial team and others from the GIScience community and beyond to advance the body of knowledge in Computational Movement Analysis (CMA). CMA generally refers to series methods and analytical approaches to process, structure, visualize and analyze tracking data and movement patterns to facilitate knowledge discovery and modeling of movement. Specifically, this special section was proposed as part of a pre-conference workshop on Analysis of Movement Data (AMD 2018) at the GIScience 2018 meeting, 28 August 2018, Melbourne, Australia. The focus of this special section is on three aspects of CMA: (1) representation and modeling of movement; (2) urban mobility analytics; and (3) movement analytics using social media data. With the papers presented in the special section, we highlight recent advancements in CMA with the development of methods and techniques for big movement data analytics and utilization of trajectories constructed using user-generated crowdsourced contents such as geo-tagged social media posts. Traditional CMA methods were often developed and evaluated using a smaller set of movement data involving smaller numbers of individuals and contextual variables. As the momentum to generate more geo-enriched movement data at large volumes, high frequencies and for longer durations continues, this is a timely and significant achievement towards movement data science. As the papers of this special section illustrate, movement data science leverages the advancements in big data analytics, cyberinfrastructure, parallel computing and data fusion to enhance the analysis of large, multi-faceted and multi-sourced movement data. Below are the editorial and the six original papers presented in this special section on the International Journal of Geographical Information Science (IJGIS). Moving forward, we see a clear need for more reproducible research in CMA, following a growing mega-trend in data-driven sciences. Data quality and privacy challenges as well as uncertainty in data, analytics, and modeling have been largely overlooked in the CMA literature so far. For a more responsible movement data science, careful considerations should be given to the quality, uncertainty and representativeness of ‘large’ mobility data that are being used for generating important mobility insights for policymaking. Lastly, with the recent exciting developments in data access, as a community, we should think about leveraging this advantage to make movement data science more relevant to real-world problems for the mitigation of societal and environmental challenges such as disease outbreaks, population mobility, natural hazards and human-wildlife conflicts. As efforts to mitigate and suppress COVID-19 continue, many decision makers are asking if digital contact tracing—a method for determining contact between an infected individual and others using tracking systems commonly based on mobile devices—can help us safely transition from population-wide social distancing to targeted case-based interventions such as individualized self-quarantine. In response, the Spatial Analysis Research Center (SPARC) at Arizona State University organized a panel of national experts to discuss the use of geospatial technologies in digital contact tracing and identify the practical challenges researchers can address to make digital contact tracing as effective as possible. The major themes of the discussion included (i) the capabilities and limitations of geospatial technology, (ii) privacy, and (iii) future research directions. Key takeaways from each of these areas include: Capabilities and limitations of geospatial technology: There are many geospatial technologies (e.g., GPS, Bluetooth, Cellular, WiFi) embedded in mobile devices that can be leveraged for digital contact tracing. However, GPS technology in smartphones lacks accuracy to map interactions in the detailed way one might expect. For instance, the horizontal accuracy of GPS is 15m, and the vertical accuracy is insufficient to pick up which floor of a building a person is on. Indoor accuracy is particularly poor, which is problematic given people spend 87% of their time indoors. However, information about the absolute location of an individual may not be as important to digitally tracing epidemiologically meaningful contacts as identifying the types of interactions most likely to result in the spread of the virus. The importance of tracing interactions creates an opportunity to use Bluetooth-based exchange of encrypted keys to record person-to-person contacts that can then be analyzed within the space-time prism framework. This approach will not require storing of all individuals’ movement data, which will reduce computation complexity. Geotargeted and geotagged social media are useful for tracking transmission between cities or within cities, detecting large gatherings, and helping individuals recall location and contact history during contact tracing interviews. Social media can also provide useful context, such as check-in locations and textual content, to reduce false positives in interactions identified through other forms of digital contact tracing. Privacy: Digital contact tracing raises numerous privacy concerns. By creating some record of the location history or contacts of an individual, digital contact tracing creates an opportunity to identify an individual without their consent. At present, the privacy implications of digital contact tracing are unclear because these systems have yet to be fully developed or deployed in the US. An evaluation of pros and cons in the existing digital contact tracing plans operating in other countries can inform policy makers on privacy mediation during and after contact tracing. While companies and officials working on this issue have made statements that preserving privacy is an important goal, the details of how privacy will be preserved and the safeguards that will be put in place are not yet available. If any privacy protections are lifted to enable contact tracing, a plan should be put in place to restore protections once the pandemic subsides. Future Research: To support digital contact tracing and surveillance, several research areas must be advanced. Key technical areas include increasing the accuracy of indoor positioning, developing approaches for reducing false positive of potential exposure (not to be confused with false negatives which are more common in COVID-19 diagnostic test) ensuring a focus on high accuracy in relative positioning, addressing computational complexities, developing group or bubble based approaches to surveillance, and developing a system for the creation and distribution of high resolution risk data and to enable self-determination of the need of quarantine and testing based on possible exposure. Research into how digital contact tracing systems link with existing contact tracing infrastructure and with other digital contact tracing systems also needs to be conducted. The implications of digital contact tracing for society and privacy will emerge along with these systems. Researchers need to study these issues as they emerge to ensure that we have the ability to hold an informed public debate about the effectiveness and costs of digital contact tracing. The travels and close contact-tracing from/to infected communities is useful for identifying potential hotspots and assessing the potential risk across different places. A recent research published in Science showed that “substantial undocumented infection facilitates the rapid dissemination of novel coronavirus (SARS-CoV2) “. Understanding the human physical movement patterns and social contacts is a key for saving more lives as one may be surrounded by latent exposed people who don’t show SARS-CoV2 symptoms. Therefore, human mobility patterns and changes could be one indicator for understanding the status of physical social distancing. Here are the neighborhood mobility pattern and the Spring 2019 and March 2020 travel patterns for US cities and counties using the anonymized and aggregated mobile phone location big data in collaboration with SafeGraph, which covers over 3.6 million points of interest (POI) and business venues with visit patterns. Meanwhile, we are working on the whole US 2020 census block data and monitoring new infected areas from the CDC and from a list of Coronavirus dashboards in response to COVID-19. You can find out where people from those POIs / neighborhoods / a county connecting with other neighborhoods and counties across the US. By comparing the POI visits between last March and March 2020, we can summarize the changes and visualize the patterns on the maps to understand whether people in each County/State has reacted to (Physical) Social Distancing. In addition, the maps below show the origin-destination (OD) flows larger than a travel frequency threshold at different spatial scales. The one at the urban scale can help understand the potential spread and hotspots in a city/metropolitan area. Spring Travel Risk By using the county-level Spring travel data in March, we can see thousands of trips generated from the U.S. counties in the Spring season and widely across the U.S., which may help explain the rapid growth of infection cases across the whole U.S. Our travel-augmented SEIR epidemic modeling results showed that only about 20% of infected cases reported (with testing) at the state level in the US. The following table shows the top 20 counties which the people reside in the King County traveled to in March 2019. And using the Country-to-US Counties flow data from last March, we can assess how the global travels from other countries outside of US will influence the potential coronavirus outbreak and spread in the US. Acknowledgment: We would like to thank all individuals and organizations for collecting and updating the COVID-19 observation data and reports. Dr. Song Gao acknowledges the funding support provided by the National Science Foundation (Award No. 2027375). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. Abstract: With the booming economy in China, many researches have pointed out that the improvement of regional transportation infrastructure among other factors had an important effect on economic growth. Utilizing a large-scale dataset which includes 3.5 billion entry and exit records of vehicles along highways generated from toll collection systems, we attempt to establish the relevance of mid-distance land transport patterns to regional economic status through transportation network analyses. We apply standard measurements of complex networks to analyze the highway transportation networks. A set of traffic flow features are computed and correlated to the regional economic development indicator. The multi-linear regression models explain about 89% to 96% of the variation of cities’ GDP across three provinces in China. We then fit gravity models using annual traffic volumes of cars, buses, and freight trucks between pairs of cities for each province separately as well as for the whole dataset. We find the temporal changes of distance-decay effects on spatial interactions between cities in transportation networks, which link to the economic development patterns of each province. We conclude that transportation big data reveal the status of regional economic development and contain valuable information of human mobility, production linkages, and logistics for regional management and planning. Our research offers insights into the investigation of regional economic development status using highway transportation big data. Reference: Song Gao, Jinmeng Rao, Xinyi Liu, Yuhao Kang, Qunying Huang, Joseph App. (2019) Exploring the effectiveness of geomasking techniques for protecting the geoprivacy of Twitter users.Journal of Spatial Information Science. 19, 105-129. DOI: 10.5311/JOSIS.2019.19.510[PDF] Abstract: With the ubiquitous use of location-based services, large-scale individual-level location data has been widely collected through location-awareness devices. Geoprivacy concerns arise on the issues of user identity de-anonymization and location exposure. In this work, we investigate the effectiveness of geomasking techniques for protecting the geoprivacy of active Twitter users who frequently share geotagged tweets in their home and work locations. By analyzing over 38,000 geotagged tweets of 93 active Twitter users in three U.S. cities (Los Angeles, Madison, and Washington D.C.), the two-dimensional Gaussian masking technique with proper standard deviation settings is found to be more effective to protect user’s location privacy while sacrificing geospatial analytical resolution than the random perturbation masking method and the aggregation on traffic analysis zones. Furthermore, a three-dimensional theoretical framework considering privacy, spatialanalytics, and uncertainty factors simultaneously is proposed to assess geomasking techniques. Our research offers insights into geoprivacy concerns of social media users’ georeferenced data sharing for future development of location-based applications and services. Broader Impacts: In fact, Twitter removes support for precise geotagging since June, 2019. However, the metadata of historical tweets prior to the policy change may still reveal precise GPS coordinates. In addition, when a user deletes a geotagged tweet , Twitter does not guarantee the information will be completely removed from all copies of the data on third-party applications or in external search results. Even if the precise GPS location is not available anymore, Twitter users are still able to add place tags (e.g., a city, office building, apartment, landmark, and many other types of places) to their geotagged tweets, which can be converted to the GPS coordinates (often using the centroid as a representation location). This is similar to the aforementioned aggregation-based masking approach, thus we may still be able to get users’ sensitive locations based on fine-scale place tags. People should be aware that sharing or publishing such kind of location data involve geoprivacy issues and the geomasking technique provides a way to help mitigate the problem not only for Twitter users but also for other telematics and social media platforms such as Facebook, Flickr, Weibo, and Instagram where geotagging or place-tagging is accessible, as well as for mobile applications that track individual locations. Geospatial artificial intelligence (GeoAI) is an interdisciplinary field that has received tremendous attention from both academia and industry in recent years. We recently published an article that reviews the series of GeoAI workshops held at the Association for Computing Machinery (ACM) International Conference on Advances in Geographic Information Systems (SIGSPATIAL) since 2017. These workshops have provided researchers a forum to present GeoAI advances covering a wide range of topics, such as geospatial image processing, transportation modeling, public health, and digital humanities. We provide a summary of these topics and the research articles presented at the 2017, 2018, and 2019 GeoAI workshops. We conclude with a list of open research directions for this rapidly advancing field. Abstract: The significance of urban metro stations extends beyond their roles as transport nodes in a city. Their surroundings are usually well developed and attract a lot of human activities, which make the metro station areas important cognitive places characterized by vague boundaries and rich semantics. Current studies mainly define metro station areas based on an estimation of walking distance to the stations (e.g., 700 m) and investigate these areas from the perspectives of transportation and land use instead of as cognitive places perceived by the crowd. To fill this gap, this study proposes a novel framework for extracting and understanding the cognitive regions of urban metro stations based on points of interest (POIs). First, we extract the cognitive regions of metro stations based on co-occurrence patterns of the stations and their surrounding POIs on web pages by proposing a cohesive approach combined of spatial clustering, web page extraction, knee-point detection, and polygon generation techniques. Second, we identify the semantics of metro stations based on POI types inside the regions using the term frequency-inverse document frequency (TF-IDF) method. In total 166 metro stations along with more than one million POIs in Shenzhen, China are utilized as data sources of the case study. The results indicate that our proposed framework can well detect the place characteristics of urban metro stations, which enriches the place-based GIS research and provides a human-centric perspective for urban planning and location-based-service (LBS) applications. Implications for urban planning As Kevin Lynch stated in The Image of the City (Lynch, 1960), the skeleton of individuals’ mental images is formed by five types of elements in the city: paths, edges, nodes, districts and landmarks, which mediates in the interaction between humans and their environment. The first thing we want to emphasize in this study is that urban metro stations are also one type of such cognitive elements (i.e., landmarks) in cities; their properties as cognitive places should be considered in urban planning and design so as to match people’s cognition. In addition, our extracted cognitive regions of urban metro stations show diverse and irregular shapes, which indicates that unified physical distances frequently used in existing studies and planning practices cannot precisely define TOD precincts perceived by humans. To this end, what we suggest in this study is that urban planning practices should attach importance to “cognitive place” and “cognitive distance”, which load human experiences and perceptions toward the environments (Briggs, 1973; Montello, 1991). This is also coincident with the ultimate goal of urban planning, urban design, and smart-city construction, i.e., making better human societies and improving human lives (Shaw & Sui, 2019). Abstract: What is the current state-of-the-art in integrating results from artificial intelligence research into geographic information science and the earth sciences more broadly? Does GeoAI research contribute to the broader field of AI, or does it merely apply existing results? What are the historical roots of GeoAI? Are there core topics and maybe even moonshots that jointly drive this emerging community forward? In this editorial, we answer these questions by providing an overview of past and present work, explain how a change in data culture is fueling the rapid growth of GeoAI work, and point to future research directions that may serve as common measures of success. Moonshot (Editorial): Can we develop an artificial GIS analyst that passes a domain-specific Turing Test by 2030? Keywords: Spatial Data Science, GeoAI, Machine Learning, Knowledge Graphs, Geo-Semantics, Data Infrastructure Acknowledgement: we sincerely thank all the reviewers who contribute their time to the peer-review process and ensure the quality of the accepted papers. The problem of discovering regions that support particular functionalities in an urban setting has been approached in literature using two general methodologies: top-down, encoding expert knowledge on urban planning and design and discovering regions that conform to that knowledge; and bottom-up, using data to train machine learning models, which can discover similar regions. Both methodologies face limitations, with knowledge-based approaches being criticized for scalability and transferability issues and data-driven approaches for lacking interpretability and depending heavily on data quality. To mitigate these disadvantages, we propose a novel framework that fuses a knowledge-based approach using design patterns and a data-driven approach using latent Dirichlet allocation (LDA) topic modeling in three different ways: Functional regions discovered using either approach are evaluated against each other to identify cases of significant agreement or disagreement; knowledge from patterns is used to adjust topic probabilities in the learning model; and topic probabilities are used to adjust pattern-based results. The proposed methodologies are demonstrated through the use case of identifying shopping-related regions in the Los Angeles metropolitan area. Results show that the combination of pattern-based discovery and topic modeling extraction helps uncover discrepancies between the two approaches and smooth inaccuracies caused by the limitations of each approach. Liu, Y., Yuan, Y., & Gao, S. (2019). Modeling the Vagueness of Areal Geographic Objects: A Categorization System. ISPRS International Journal of Geo-Information, 8(7), 306. DOI: https://doi.org/10.3390/ijgi8070306 Abstract: Modeling vague objects with indeterminate boundaries has drawn much attention in geographic information science (GIScience). Because fields and objects are two perspectives in modeling geographic phenomena, this paper investigates the characteristics of vague regions from the perspective of the field/object dichotomy. Based on the assumption that a vague object can be viewed as the conceptualization of a field, we defined five categories of vague objects: (1) direct field-cutting objects, (2) focal operation-based field-cutting objects, (3) element-clustering objects, (4) object-referenced objects, and (5) dynamic boundary objects. We then established a categorization system to formalize the semantic differences between vague objects using the fuzzy set theory. The proposed framework provides valuable input for the conceptualization, interpretation, and modeling of vague geographical objects. Recently, Dr. Laurel Legenza (PI) from the UW School of Pharmacy, Dr. Thomas R. Fritsche (Co-PI) from the Marshfield Medical Center and Professor Song Gao participating as a geospatial analysis scientist along with the State Cartographer’s Office (SCO) and other multidisciplinary collaborators, have been awarded a pilot grant from theUW Institute for Clinical and Translational Research (ICTR) and the Marshfield Clinic Research Institute for a research proposal titled “Geo-mapping antimicrobial resistance in E. coli from humans & animals” in Wisconsin. When a patient arrives at a hospital with an infection, his/her doctor must decide which antibiotic might have the best chance of curing him/her — no easy feat when disease-causing pathogens are increasingly resistant to multiple antibiotics. To make this data more accessible, a team of researchers at the University of Wisconsin–Madison School of Pharmacyand the State Cartographer’s Office have developed a prototype system that maps out trends in antibiotic resistance across the State of Wisconsin, which provides guidance at a glance of the likelihood a pathogen will respond to a particular drug. Some students asked me the question about the difference between Esri standard and the open standard in my course: Geospatial Big Data Analytics. The current ArcGIS conversion tool (in ArcMap not ArcGIS Pro) “JSON To Features” only supports its own format (aka Esri GeoJSON) and the structure is below: In the Mobile Age, with the widespread use of location-awareness devices, it is possible to collect large-scale location-awareness datasets, such as mobile phone data, GPS-enabled taxi trajectories, and location-based social media data, to sense complex human movements and human-environment interactions in urban space. Here are some examples of research that we have been working on. (1) Discovering Spatial Interaction Communities from Mobile Phone Data This research attempts to explore and interpret patterns embedded in the network of phone‐call interaction and the network of phone‐users’ movements, by considering the geographical context of mobile phone cells. We adopt an agglomerative clustering algorithm based on a Newman‐Girvan modularity metric and propose an alternative modularity function incorporating a gravity model to discover the clustering structures of spatial‐interaction communities using a mobile phone dataset from one week in a city in China. The results verify the distance decay effect and spatial continuity that control the process of partitioning phone‐call interaction, which indicates that people tend to communicate within a spatial‐proximity community. Furthermore, we discover that a high correlation exists between phone‐users’ movements in physical space and phone‐call interaction in cyberspace. Our approach presents a combined qualitative‐quantitative framework to identify clusters and interaction patterns, and explains how geographical context influences communities of callers and receivers. The findings of this empirical study are valuable for urban structure studies as well as for the detection of communities in spatial networks. (2) Spatio-Temporal Analytics for Exploring Human Mobility Patterns and Urban Dynamics In this research, we present a spatio-temporal analytical framework including spatiotemporal visualization (STV), space-time kernel density estimation (STKDE), and spatio-temporal-autocorrelation-analysis (STAA), to explore human mobility patterns and intra-urban communication dynamics. Experiments were conducted using large-scale detailed records of mobile phone calls in a city. The space-time path, time series graphs, vertical Bezier curves, STKDE, STAA, and related techniques in 3D GIS as well as statistical tests have been suggested for different spatio-temporal analysis tasks. We also investigated several statistical measures that extend the classic spatial association indices for spatio-temporal autocorrelation analysis. The spatial order of weighted matrix was found to have more significant effects than the temporal neighbors on influencing the autocorrelation strength of hourly phone calls. (3) Spatio-Temporal-Network Visualization for Exploring Human Movements and Interactions in Physical and Virtual Spaces Spatiotemporal visualization techniques are effective in detecting human activity patterns over space and time, while social network analysis is good for exploring graph structures and interactions among individual nodes and groups. Integrating these two types of methods can facilitate the exploration of complex social networks in space and time, and can help discover hidden spatiotemporal and social connections. In this research, we propose a novel conceptual framework for spatiotemporal and social network visualization in a three-dimensional context. Based on this framework, new spatio-temporal-network (STN) quantitative metrics (including STN-impact-extent, STN-impact-center, STN-distance, STN-efficiency, and STN-centrality) are introduced to measure the underlying dynamic interactions among entities. The proposed framework aims to help better understand spatiotemporal patterns of human dynamics and social interactions over both physical and virtual spaces simultaneously, as well as explore how emerging events trigger spatial-temporal-social interactions and information diffusion from a process perspective. As a proof of concept, we demonstrate the proposed framework with a case study using geotagged tweets and associated visualization in the ArcScene software. We hope that this research can stimulate new insights on integrating multidisciplinary knowledge to explore human dynamics in a broader way. (4) Uncovering the digital divide and the physical divide using mobile phone data In this research, we first aim at developing data analytics that can derive insights about how people from different regions communicate and connect via mobile phone calls and physical movements. We uncover the digital divide (geographical segregation of phone communication patterns) and the physical divide (geographical limits of human mobility) in a developing country. The research also demonstrates that the chosen spatial unit and temporal resolution can affect the community detection results of spatial interaction graphs when analyzing human mobility patterns and exploring urban dynamics in the mobile age. We find that the daily detection has generated a more stable partition structure than an hourly one, while monthly changes also exist over time. The presented framework can help identify patterns of spatial interaction in both cyberspace and physical space with phone call detailed records in some regions where census data acquisition is difficult, especially in some developing countries. (5) Identifying Local Spatiotemporal Autocorrelation Patterns of Large-scale Taxi Pick-ups and Drop-offs Analyzing spatiotemporal autocorrelation would be helpful to understand the underlying dynamic patterns in space and time simultaneously. In this work, we aim to extend the conventional spatial autocorrelation statistics to a more general framework considering both spatial and temporal dimensions. Specifically, we focus on the spatiotemporal version of Getis-Ord’s G*. The new indicator STG* can quantify the local association of adjacent features in space and time. As a proof of concept, the proposed method is applied in a large-scale GPS-enabled taxi dataset to identify local spatiotemporal autocorrelation patterns of taxi pick-ups and drop-offs in New York City. (6) Extracting urban functional regions from points of interest and human activities on location‐based social networks Data about points of interest (POI) have been widely used in studying urban land use types and for sensing human behavior. However, it is difficult to quantify the correct mix or the spatial relations among different POI types indicative of specific urban functions. In this research, we develop a statistical framework to help discover semantically meaningful topics and functional regions based on the co‐occurrence patterns of POI types. The framework applies the latent Dirichlet allocation (LDA) topic modeling technique and incorporates user check‐in activities on location‐based social networks. Using a large corpus of about 100,000 Foursquare venues and user check‐in behavior in the 10 most populated urban areas of the US, we demonstrate the effectiveness of our proposed methodology by identifying distinctive types of latent topics and, further, by extracting urban functional regions using K‐means clustering and Delaunay triangulation spatial constraints clustering. We show that a region can support multiple functions but with different probabilities, while the same type of functional region can span multiple geographically non‐adjacent locations. Since each region can be modeled as a vector consisting of multinomial topic distributions, similar regions with regard to their thematic topic signatures can be identified. Compared with remote sensing images which mainly uncover the physical landscape of urban environments, our popularity‐based POI topic modeling approach can be seen as a complementary social sensing view on urban space based on human activities. (7) Detecting Origin-Destination Mobility Flows From Geotagged Tweets Human origin-to-destination (OD) trip information is of major importance in urban transportation modelling and infrastructure planning in order to optimize the use of street networks. The increasing use of social media like Twitter offers unprecedented opportunities to study individual activities and movements, to know where users are at which time, and what they are talking about. In this work we study the reliability of detecting regional OD trips from individual geotagged tweets in comparison with survey data in a quantitative manner, and explore the spatiotemporal flow patterns extracted from social media. We investigate the research question of whether OD trips mined from social media yield comparable results to expensive and labour intensive large-scale studies. To do so, we derive large-scale OD trips from geotagged tweets, aggregate them, and compare the results by correlating them to the American Community Survey data. (8) Exploring the uncertainty of activity zone detection from Geotagged Tweets with multi-scaled DBSCAN (M-DBSCAN) While exploring human mobility patterns based on digital footprints captured from social media, the density-based spatial clustering of applications with noise (DBSCAN) method is often used to identify activity zones which an individual regularly visits. However, DBSCAN is sensitive to the two parameters, including the search radius of a cluster (eps), and the minimum number of points (minpts). This research first discusses the uncertainty while detecting an individual’s activity zones through digital footprints. An improved density-based clustering algorithm for mobility analysis known asMulti-Scaled DBSCAN (M-DBSCAN), is then presented to mitigate the detection uncertainty of clusters produced by DBSCAN at different scales of density and cluster size. Next, we demonstrate that M-DBSCAN iteratively calibrates suitable local eps and minpts values instead of using one global parameter setting as DBSCAN for detecting clusters of varying densities, and proves to be very effective for detecting potential activity zones (clusters) with the historic geo-tagged tweets of selected users. Besides, M-DBSCAN can significantly reduce the noise ratio (the proportion of trajectory points not included in any cluster) by identifying all points capturing the activities performed in each zone. Using the historic geo-tagged tweets of a large number of users in Madison, Wisconsin and Washington, D.C., the results of M-DBSCAN and DBSCAN with a minpts value of 4 and varying eps values reveal that: 1) M-DBSCAN can capture dispersed clusters with low density of points, and therefore detecting more activity zones for each user and resulting in a lower noise ratio; 2) A value of 40m or higher should be used for eps in order to reduce the possibility of collapsing distinctive activity zones, and ensure a relatively low noise ratio during the clustering process; and 3) A value between 200m to 300m is recommended for eps while using DBSCAN for detecting activity zones from geotagged tweets. (9) Reconstruction of human movement trajectories from large-scale low-frequency mobile phone data Understanding human mobility is significant in many fields, such as urban planning, transportation, and sociology. Due to the wide spatiotemporal coverage and low operational cost, mobile phone data have been recognized as a major resource for human mobility research. However, due to conflicts between the data sparsity problem of mobile phone data and the requirement of fine-scale solutions, trajectory reconstruction is of considerable importance. Although there have been initial studies on this problem, existing methods rarely consider the effect of similarities among individuals and the temporal patterns of missing data. To address this issue, we propose a novel multi-criteria data partitioning trajectory reconstruction (MDP-TR) method for large-scale mobile phone data. In this research, a multi-criteria data partitioning (MDP) technique is used to measure the similarity among individuals in near real-time and investigate the spatiotemporal patterns of missing data. With this technique, the trajectory reconstruction from mobile phone data is then conducted with classic machine learning models. We verified the method using a real mobile phone dataset in a large city. Results indicate that the MDP-TR method outperforms competing methods in both accuracy and robustness. We argue that the MDP-TR method can be effectively utilized for grasping highly dynamic human movement status and improving the spatiotemporal resolution of human mobility research. (10) Understanding neighborhood isolation through spatial interaction network analysis using location big data Hidden biases of racial and socioeconomic preferences shape residential neighborhoods throughout the USA. Thereby, these preferences shape neighborhoods composed predominantly of a particular race or income class. However, the assessment of spatial extent and the degree of isolation outside the residential neighborhoods at large scale is challenging, which requires further investigation to understand and identify the magnitude and underlying geospatial processes. With the ubiquitous availability of location-based services, large-scale individual-level location data have been widely collected using numerous mobile phone applications and enable the study of neighborhood isolation at large scale. In this research, we analyze large-scale anonymized smartphone users’ mobility data in Milwaukee, Wisconsin, to understand neighborhood-to-neighborhood spatial interaction patterns of different racial classes. Several isolated neighborhoods are successfully identified through the mobility-based spatial interaction network analysis. A street network is a system of interconnecting polylines and points (called edges and nodes in network science) that represent street segments/roads and intersections for a given area. It plays a very important role in transportation operation and management and many other fields. Below are some examples of research that we have been working on in this field. (1) Street Centrality and Traffic Flow The structural and morphological properties of a street network, represented in topological or geographic metric measurements, are considered to be the key factors that shape dynamic urban traffic flow. Urban traffic flow can be seen as individual trips aggregately distributed in street networks. Each trip is generated from an origin and destination (OD) pair or multiple destinations with a network path connecting them. Generally, urban planners and transportation engineers rely on household questionnaires or transportation surveys on job–housing places for traffic-demand forecasting. With the rapid development of information and communication technology (ICT), the availability of large amounts of GPS (Global Positioning System) data and mobile phone data over time and space has increased the capability for monitoring, visualizing, analyzing, and modeling urban dynamics. In this research we investigate the spatial distribution of urban traffic flow based on taxi trajectories in a city in China and compute the correlation between urban traffic fl ow and street betweenness centrality. The results confirm that purely betweenness centrality is not an ideal measure for predicting urban traffic flow. We analyze the characteristics of betweenness and point out the ‘gap’ between betweenness centrality and actual flow. The gap is filled by a framework taking into account the distance decay and the spatial heterogeneity of human activities. (2) Ride-sharing and Street Networks Given different types of constraints on human life, people must make decisions that satisfy social activity needs. Minimizing costs (i.e. distance, time, or money) associated with travel plays an important role in perceived and realized social quality of life. Identifying optimal interaction locations (e.g., for ride-sharing) along road networks when there are multiple moving objects (MMO) with space–time constraints remains a challenge. In this research, we formalize the problem of finding dynamic ideal interaction locations for MMO as a spatial optimization model and introduce a context-based geoprocessing heuristic framework to address this problem. (3) Spatial Interactions along Street Networks Researchers have proposed many methods to investigate the spatial interactions derived from human movements, such as the gravity model and the radiation model. However, most studies have mainly focused on the interactions among areal units at an aggregated level, neglecting that in most cases, human movements are carried by vehicles and constrained by the underlying road networks. To fill this gap, we propose a novel approach to identify spatial interaction patterns of vehicle movements along urban road networks. Good characterization of traffic interactions among urban roads can facilitate traffic-related applications, such as traffic control and short-term forecasting. Most studies measure the traffic interaction between two roads by their topological distance or the correlation between their traffic variables. However, the distance-based methods neglect the spatial heterogeneity of roads’ traffic interactions, while the correlation-based methods cannot capture the non-linear dependency between two roads’ traffic variables. In this paper, we propose a novel approach called Road2Vec to quantify the implicit traffic interactions among roads based on large-scale taxi operating route data using a Word2Vec model from the natural language processing (NLP) domain. A case study on short-term traffic forecasting is conducted with artificial neural network (ANN) and support vector machine (SVM) algorithms to validate the advantages of the presented method. The results show that the forecasting achieves a higher accuracy with the support of the Road2Vec method than with the topological distance and traffic correlation based methods. (4) Public Transportation Optimization Public transportation systems, in particular, bus systems, play an essential role in the process of urbanization. Typically more bus stops enable more people to access the bus whereas lower the efficiency of bus system. We utilize spatial optimization techniques to address this issue. In one of our studies, we use the Spatial Interaction Coverage (SIC) model to identify and remove redundant bus stops while maintain the overall success of the whole bus system. The SIC model aims to model the relationship between demand points and bus stops. It takes factors such as the distance and the attractiveness of each bus stop into consideration. By applying the SIC model to the iXpress 202 route in Kitchener-Waterloo region in Canada, we can effectively identify the number of stops to maintain and remove redundant stops. The bus operation efficiency can be increased by 7.28% after optimization. The relationships between bus ridership and the socioeconomic variables (population, income, and age) in the study area are also analyzed. We are expanding our research to multiple cities with the consideration of multi-route buses and multi-mode transportation. (5) Regional Economy and Transportation Network Analytics With the booming economy in China, many researches have pointed out that the improvement of regional transportation infrastructure among other factors had an important effect on economic growth. Utilizing a large-scale dataset which includes 3.5 billion entry and exit records of vehicles along highways generated from toll collection systems, we attempt to establish the relevance of mid-distance land transport patterns to regional economic status through transportation network analyses. We apply standard measurements of complex networks to analyze the highway transportation networks. A set of traffic flow features are computed and correlated to the regional economic development indicator. The multi-linear regression models explain about 89% to 96% of the variation of cities’ GDP across three provinces in China. We then fit gravity models using annual traffic volumes of cars, buses, and freight trucks between pairs of cities for each province separately as well as for the whole dataset. We find the temporal changes of distance-decay effects on spatial interactions between cities in transportation networks, which link to the economic development patterns of each province. We conclude that transportation big data reveal the status of regional economic development and contain valuable information of human mobility, production linkages, and logistics for regional management and planning. Our research offers insights into the investigation of regional economic development status using highway transportation big data. Funded by UW-Madison Office of the Vice Chancellor for Research and Graduate Education (VCRGE) and the Wisconsin Alumni Research Foundation (WARF). Place names and the semantics of places described in natural languages rather than coordinates (i.e., longitude and latitude) are pervasive in human discourse, documents, and social media while location needs to be specified for mapping or interlinking other information. However, there is still a gap between the informal or vague cognition expressions of place (e.g., downtown, neighborhood, up north Wisconsin) and the formal computational representations of place in computerized information systems. Cognitive regions and places are notoriously difficult to represent in geographic information science and systems. They arise from the complex interactions of individuals, society, and the environment. The emergence of big data brings new opportunities to better understand our geographic and socioeconomic environments. In this research, we will synthesize multi-source datasets from census, location-based social networks, news media, Wikipedia, travel blogs, and other open data websites, and utilizing the theory of place, natural language processing, machine learning, and visualization techniques for extracting and representing vague cognitive places. The research will also help better understand individuals’ observations, experiences, and exposures to different types of places and ambient social environments. A specialissue on “Place-Based Research in GIScience and Geoinformatics” recently published on the ISPRS International Journal of Geo-Information (ISSN 2220-9964). It consists of 12 peer-reviewed articles relevant to the topic, co-edited by Professor Thomas Blaschke and Professor Song Gao. Congratulations to Yuhao Kang and Yunlei Liang for their paper acceptance! Check “Publication” for more details. “Utilizing Reverse Viewshed Analysis in Image Geo-Localization”by Yuhao Kang, Song Gao, and Yunlei Liang, has been accepted at the 2nd ACM SIGSPATIAL International Workshop on Recommendations for Location-based Services and Social Networks (LocalRec 2018). “Optimizing Bus Stop Spacing Using the Simulated Annealing Algorithm with Spatial Interaction Coverage Model“, by Yunlei Liang, Song Gao, Tianyu Wu, Sujing Wang and Yuhao Wu, has been accepted for presentation at the 11th ACM SIGSPATIAL International Workshop on Computational Transportation Science (IWCTS 2018).
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is an academic abstract discussing the advancements and challenges in geographic information systems (GIS) and computational movement analysis. It does not contain any unsafe, inappropriate, or harmful content. The text is entirely focused on research and does not include any language, themes, or references that would be considered unsafe or inappropriate for public use, educational environments, or general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the capabilities and limitations of geospatial technology, privacy concerns, and future research directions related to digital contact tracing. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a scholarly article discussing travel data, economic growth, and geoprivacy concerns. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses geoprivacy issues, geomasking techniques, and urban planning, focusing on academic and technical aspects. There is no unsafe, inappropriate, or harmful content present.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a scholarly article discussing methodologies in geographic information science and urban planning. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on academic and research topics related to spatio-temporal analytics, urban dynamics, and social network analysis. There is no unsafe, inappropriate, or harmful content present in the text.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses various aspects of urban traffic flow, street networks, and transportation optimization. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses various research topics related to transportation systems, economic development, and geographic information science. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful, and the themes are relevant to academic and professional discussions. Therefore, it is fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85303-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-1", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-2", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-3", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-4", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-5", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-6", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-7", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85303-8", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://geography.wisc.edu/geods/archives/author/sgao", "date": "2023-01-27T17:31:22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495001.99/warc/CC-MAIN-20230127164242-20230127194242-00058.warc.gz", "language": "en", "language_score": 0.9114983082, "token_count": 9198, "score": 2.53125, "int_score": 3 }
<urn:uuid:ec053ab4-0b78-4bed-b8e3-f0da77485d9c>
Urgent call from scientists to create new protected zone in Pacific The coalition of scientists and environmental groups have been working for more than a decade to prove the importance of the swim-way between Galapagos Islands of Ecuador and Cocos Island, off the coast of Cost Rica, deep in the Pacific Ocean. By placing satellite and ultrasonic tags on nearly 400 animals and fish, they managed to prove that whale sharks, hammerhead sharks, silky sharks, tiger sharks, leatherback turtles and green turtles are migrating between these two marine reserves. During their migration they are following the chain of seamounts which roughly stretches 700 kilometers. There is a protection zone around Cocos Island with 22-kilometers radius and Galapagos Islands with 74 kilometers radius. Sharks and other marine animals are protected in those areas, but there is no protection in between. Scientists researched and proved that populations of migratory species, many of which are already endangered, are rapidly declining. “All of these species are suffering from population decline and are listed as vulnerable, endangered or critically endangered, except the tiger shark which is considered near threatened. As tiger sharks are one of the top predators in the Pacific, it is vital to protect their migratory pathway" says Todd Steiner, executive director of Turtle Island Restoration Network. Protecting biodiversity hotspots around the islands is not enough, says Alex Hearn, biology professor and founding member of MigraMar. He and his team of scientists are leading and campaigning for the entire swim-way to be protected which is an area overing 240,000 square kilometers of ocean, about the size of the United Kingdom. The governments of Ecuador and Costa Rica are currently examining plans to protect the swim-way and their final decisions will be based on scientific data and research findings. Both nations have signed up to the Global Ocean Alliance, a UK-led initiative that calls for 30% of the ocean to be protected by 2030. This shows political will, says Steiner, but with only 13% of Ecuador's and 3% of Costa Rica's waters safeguarded so far, the countries need to convert this will into action. “Momentum is building, and the science is clear. We are hopeful that action will be taken in the near future.”says Steiner. But he warns that with some species under threat of extinction, governments need to act urgently. “We have taken baby steps, but these endangered species do not have time for that.” he explains.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses scientific research and environmental conservation efforts without any inappropriate, harmful, or unsafe content. It is fully appropriate for public use and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85304-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.sharkguardian.org/post/call-to-create-protected-zone-in-pacific", "date": "2023-01-29T00:11:33", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499695.59/warc/CC-MAIN-20230128220716-20230129010716-00138.warc.gz", "language": "en", "language_score": 0.9544183612, "token_count": 512, "score": 3.5625, "int_score": 4 }
<urn:uuid:99aa59fb-31d4-465b-ae51-d5189ea69997>
Download Full Text (2.0 MB) The overall objective of this project was to construct a process-structure-property-performance (PSPP) map for a chosen metallic material. The material chosen by the group is tungsten (W). Tungsten is a rare, naturally occurring element and is usually found in the form of ores. It is known predominantly for its ability to withstand extreme temperatures, as well as its high tensile strength. The PSPP map displays many specifications of tungsten in each of the four categories and further details regarding each specific linkage, or subcategory, within the map are written throughout the research paper. Along with the four specific categories outlined by the PSPP, specific tungsten applications are also explained in detail. Each of the four group members compiled his or her own detailed description of said application in order to bring a real-world situation into the project. Mechanical Metallurgy, Tungsten, PSPP Map Engineering | Materials Science and Engineering | Mechanical Engineering | Metallurgy James Worth Bagley College of Engineering Department of Mechanical Engineering Holland, Haley E.; Khadka, Razan; Marble, Lee; and Tutor, Kaleb, "Tungsten: The Strongest Natural Metal on Earth" (2021). ME 4133/6133 Mechanical Metallurgy. 14.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed academic research paper about tungsten, focusing on its properties and applications. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85305-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://scholarsjunction.msstate.edu/metallurgy/14/", "date": "2023-01-31T10:31:45", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00298.warc.gz", "language": "en", "language_score": 0.8969510794, "token_count": 281, "score": 2.796875, "int_score": 3 }
<urn:uuid:8290798d-46ed-4a06-a1bc-15370cdcbdbb>
Table of Contents - 1 How is the cold war different from other wars? - 2 What affect did the Cold War have? - 3 What if the Soviets won the Cold War? - 4 What contributed to the end of the Cold War? - 5 What was the Cold War for Dummies? - 6 How does the cold war still affect us today? - 7 How does the Cold War still affect us today? - 8 How did the Cold War affect America socially? How is the cold war different from other wars? The Cold War got its name because both sides were afraid of fighting each other directly. In a “hot war,” nuclear weapons might destroy everything. So, instead, both sides fought each other indirectly. They supported opposing sides in conflicts in different parts of the world. What affect did the Cold War have? The Cold War shaped American foreign policy and political ideology, impacted the domestic economy and the presidency, and affected the personal lives of Americans creating a climate of expected conformity and normalcy. By the end of the 1950’s, dissent slowly increased reaching a climax by the late 1960’s. How did the Cold War affect the rest of the world? For example, the USSR established the “iron curtain” to control most of Central and Eastern Europe. Additionally, American fear of the spread of communism led to a number of proxy wars. The Cold War also spread the worldwide fear of nuclear war, which heavily influenced international diplomacy and affairs. What if the Soviets won the Cold War? The USSR would also come up with a more powerful political organization called the “Paris Pact” which includes some Communist nations in Asia (including China and Korea). With all this in place, the USSR would be *the* world’s superpower with the USA now being isolated. But, American isolation wouldn’t last for long. What contributed to the end of the Cold War? During 1989 and 1990, the Berlin Wall came down, borders opened, and free elections ousted Communist regimes everywhere in eastern Europe. In late 1991 the Soviet Union itself dissolved into its component republics. With stunning speed, the Iron Curtain was lifted and the Cold War came to an end. What made the Cold War unique? Cold War, the open yet restricted rivalry that developed after World War II between the United States and the Soviet Union and their respective allies. The Cold War was waged on political, economic, and propaganda fronts and had only limited recourse to weapons. What was the Cold War for Dummies? The Cold War was a long period of tension between the democracies of the Western World and the communist countries of Eastern Europe. The west was led by the United States and Eastern Europe was led by the Soviet Union. These two countries became known as superpowers. How does the cold war still affect us today? The Cold war has also affected us today by helping the West evade Communist rule; without intervention from The U.S. forces China and The Soviet Union might have conquered Europe and The U.S.. Finally, The Cold War helped form modern day friendships, alliances and hostilities between countries. What were the reasons for the Cold War? Historians have identified several causes that led to the outbreak of the Cold War, including: tensions between the two nations at the end of World War II, the ideological conflict between both the United States and the Soviet Union, the emergence of nuclear weapons, and the fear of communism in the United States. How does the Cold War still affect us today? In conclusion, the Cold War had a large effect on American society. Americans went through a phase of paranoia related to McCarthyism and his blacklist. Television shows and comics sought to assuage these fears. Meanwhile, the Civil Rights Movement was greatly influenced by the Korean War and Executive Order 9981.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical context without unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the Cold War in a historical and educational context without any unsafe or inappropriate content. It is suitable for educational environments and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85306-0", "llm_safety_score": 0, "reason": "historical context without unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://short-facts.com/how-is-the-cold-war-different-from-other-wars/", "date": "2023-02-02T21:21:53", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.18/warc/CC-MAIN-20230202200542-20230202230542-00458.warc.gz", "language": "en", "language_score": 0.9614707828, "token_count": 796, "score": 3.609375, "int_score": 4 }
<urn:uuid:20c7a953-5767-4d42-bc10-0fb5485aa27e>
Detecting neutrinos and photons is crucial to identifying the sources of ultrahigh-energy cosmic rays (UHECRs), especially for transient sources. We focus on ultrahigh-energy γ-ray emission from transient sources such as γ-ray bursts, since >EeV γ rays can be more direct evidence of UHECRs than ∼PeV neutrinos and GeV-TeV γ rays. We demonstrate that coincident detections of ∼1-100 events can be expected by current and future UHECR detectors such as Auger and JEM-EUSO, and the detection probability can be higher than that of neutrinos for nearby transient sources at 50-100Mpc. They may be useful for constraining the uncertain cosmic radio background as well as knowing the source properties and maximum energy of UHECRs. They can also give us more than 104 times stronger limits on the Lorentz-invariance violation than current constraints. All Science Journal Classification (ASJC) codes - Physics and Astronomy(all)
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses scientific research related to detecting neutrinos and photons for identifying sources of ultrahigh-energy cosmic rays. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are entirely scientific and educational. Therefore, it is fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85307-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://pennstate.pure.elsevier.com/en/publications/ultrahigh-energy-photons-as-a-probe-of-nearby-transient-ultrahigh", "date": "2023-02-05T08:11:27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00618.warc.gz", "language": "en", "language_score": 0.9182032943, "token_count": 222, "score": 2.5625, "int_score": 3 }
<urn:uuid:d663cf5a-5f00-49df-a077-8ef8d15f97d0>
Snow Cover and SWE Research MODIS and AMSR-E Snow Products Validation and Applications Snow cover pattern has a significant impact on climate processes, surface hydrological cycles and ecological processes (Simpson et al., 1998; Simic et al., 2004). Frequent and long term snow observation and accurate snow cover (SC) mappings and snow water equivalent (SWE) estimates are critical for snowmelt-runoff prediction, operational flood control, water supply planning, and water resource management in snow cover-dominated basins (Gutzler & Rosen, 1992; Brown, 2000; Dressler et al., 2006; Pulliainen,2006). Conventional ground snow monitoring is normally based on point measurements. However, sparse point observation networks can not provide accurate data on regional and global scales, due to their low density even no existence especially at inaccessible mountainous or high latitude regions (Derksen et al., 2005). Satellite images are readily available and provide spatio-temporal characteristics needed for snow monitoring and snow cover mapping. Satellite data from visible and infrared spectrum as well as from passive microwaves provide important sources of information on snow cover. Since the middle of the 1960s, a number of satellite-derived snow products have been available, with a few available in near-real time through Internet (Bitner et al, 2002). Space-board passive microwave radiometer, such as SMMR (Scanning Multichannel Microwave Radiometer), SSM/I (Special Sensor Microwave/Imager), and AMSR-E (Advanced Microwave Scanning Radiometer-Earth Observing System), can penetrate clouds to detect microwave energy emitted by snow and ice and provide information on SWE or snow depth and thus estimating runoff (Pulliainen & Hallikainen,2001; Wulder et al., 2000). Since the 1970s, SWE retrieval from space-borne passive microwave has been investigated (Pulliainen, 2006; Derksen et al., 2005). Space-borne passive microwave data are well suited to snow cover monitoring because of characteristics such as all weather imaging, a wide swath width with frequent overpass times, and a long available time series (Derksen et al., 2004). But the coarse spatial resolution (25 km of AMSR-E is the best available now) hinders their application in operational hydrological modeling and snow-caused disasters monitoring (kelly et al., 2003; Dressler, et al. 2006; Pulliainen, 2006). Optical sensors such as AVHRR (Advanced Very High Resolution Radiometer), MODIS (Moderate Resolution Imaging Spectraradiometer), SPOT and Landsat have been well developed to produce snow cover maps with high spatial resolution (Salonmonson & Appel, 2004; Brown et al., 2007; Dozier & Painter, 2004). But due to the inherent limitation, optical sensors cannot see the earth surface when cloud is present. High cloud blockage becomes the biggest problem in applying snow products from optical sensor (Klein & Barnett, 2003; Zhou et al., 2005; Tekeli et al., 2005; Ault et al., 2006; Liang et al. 2008 a, b; Wang et al., 2008a, b; Wang and Xie, 2008). The goals of the LRSG group for the MODIS and AMSR-E snow products study, supported by the DoEd, USGS, and Chinese NSF, are to: - Validate the MODIS and AMSR-E snow products - Develop algorithms to general advanced daily and/or multi-day MODIS/Terra and Aqua and AMSR-E/Aqua snow cover and SWE products, with a purpose of reducing cloud contamination and increase spatial resolution of SWE product - Use the new products to generate image-based snow cover onset date, snow melt onset date, snow cover duration date, and snow cover index to better study the snow cover spatial and temporal variations, and their climate connection - Perform snow-runoff modeling and predict the water availability for regions depending on snow pack
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```" ], "llm_harm_scores_by_chunk": [ { "custom_id": "85308-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.utsa.edu/LRSG/Snow/", "date": "2023-02-06T12:50:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00698.warc.gz", "language": "en", "language_score": 0.848551333, "token_count": 850, "score": 2.765625, "int_score": 3 }
<urn:uuid:6d441cd0-d65d-46a9-a4b9-e8df3040db1a>
Commonly used devices on the circuit board include: resistance, capacitance, diode, triode, thyristor, touch switch, liquid crystal, light-emitting diode, buzzer, various sensors, chips, relays and so on. And electronic components have different packaging types, different types of components have the same appearance, but the internal structure and use is very different, for example, TO220 packaging components may be triode, SCR, FET, or double diode. To-3 package components include triode, integrated circuit and so on. Diodes also come in several packages, glass, plastic and bolt packages, so how to identify them? Xiaobian and everyone together to see it. Contour recognition method Electronic component shape recognition is the physical object and the name should correspond, its purpose is to get an electronic component can know what it is, know its circuit graphic symbol. Circuit graphic symbol recognition Understanding the recognition information in circuit symbols is helpful to the memory of circuit symbols and the analysis of circuit working principle. The following points are mainly explained about the circuit graphic symbols of electronic components. (1) The circuit graphic symbols of electronic components contain a lot of map recognition information for circuit analysis. The most basic thing is to know how many pins the component has through the circuit graphic symbols. If the pins have positive and negative polarity, there will be various expressions in the circuit graphic symbols. (2) Component circuit graphic symbols have the characteristics of visualization, and each stroke or symbol of the circuit graphic symbol expresses specific map recognition information. (3) The letter in the circuit symbol is the first letter of the word in English of the component. For example, T is used to represent Transformer, which is the first letter of Transformer in English. If you know professional English, it is also helpful to recognize the circuit symbol in the circuit diagram, which is very beneficial to some circuit diagram recognition. Pin identification and pin polarity identification The pins of many electronic components have polarity, and each pin can not be used instead of each other. At this time, it is necessary to identify the pins and the polarity of the pins through the circuit graphic symbol or the physical components. Pin identification and pin polarity identification methods have two cases: one is the recognition of the circuit symbol, the other is the physical identification of electronic components. The printing of the component itself Generally speaking, the printed words express some parameters or models, of course, there are also the manufacturer's batch number, version number and other attributes, as well as some symbols of international certification. This method also depends on the usual understanding of component models and parameters. For example, for a triode-like device, labeled C1815 is a low-power low-frequency NPN triode; Label TL431 is integrated regulator IC; If labeled 13001, it is a low power switch tube, which can be used in small low power chargers. Examples of electronic component identification (1) CAPACITOR: C is the first letter of CAPACITOR. Capacitors can be divided into non-polar and polar according to polarity. (2) Resistance: "R", the first letter of the English RESISTOR. (3) Inductor: Inductor is made of insulated wire wound on the skeleton; Inductance is denoted by the letter "L". The value of the inductor is called the inductance quantity, and the unit is "Henry (H)". Due to the large size of the hyung units, the hao-hyung (mH) and wei-hyung (uH) are often used. (4) transformer: transformer is a kind of inductor, voltage boost, step-down and isolation coupling, etc.; TRANSFORMER is represented by the letter "T" (the first letter of TRANSFORMER); Transformer has primary joint, secondary joint points, so in action must pay attention to. (5) diode: diode with the letter "D", there are positive and negative points, not to plug back. (6) Crystal oscillator: crystal oscillator, also known as crystal oscillator, is a quartz wafer that is processed by quartz crystal to generate resonance at a certain frequency, and is represented by "X" in English. Because the function of crystal oscillator is to stabilize the oscillation frequency, the important parameter of crystal oscillator is resonance frequency.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a detailed explanation of electronic components and their identification methods. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85309-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.aycsnetwork.com/post/77", "date": "2023-01-29T02:33:37", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00258.warc.gz", "language": "en", "language_score": 0.9123433232, "token_count": 931, "score": 3.40625, "int_score": 3 }
<urn:uuid:9e1078c8-63f4-4b6f-a183-712995dd733b>
Culture and natural environment are within the human mind and external to it as well. Even climate change deniers exist due to the natural environment, breathing air, drinking water, eating food, and so forth. Culture, since pre-history, revolves around the natural world. All art, all music, all representation of anything, is an attempt to capture ideas and increase awareness of them, find influence from them, comprehend the human role with them, and more. All science and religion as Einstein observed, is based on our curiosity about an awesome creation that is called the Cosmos. The Cosmos means harmony and balance, and Chaos, its opposite, means upset of the balance. All upheaval such as uprisings in Middle East, Wisconsin, or even in a classroom, are attempts to restore balance. Scientists and moms, gangstas rappers, dancers, and painters are all seeking to either express dissatisfaction through their arts, or to improve what we call injustice, division, or alienation. All beings then, are agents of Cosmos. Even a cave painting, or a tool made from a stick or rock is both cultural, and natural. Music is a cultural representation of natural sounds heard, the drum beat of rain, the whistle of wind through reeds led to all air instruments, and the tinkling of metals and glass percussion gave us many other instruments, including the voice. Birds sing, as do many other animals, and humans sought to find ways to communicate with song too. Other cultural trends we experience can be found with a foundation in the natural world, no matter how far the technology takes us. Going to the moon depends upon a vast understanding of natural laws, for example, and the very drive to go is rooted in human need to explore, innovate, and even compete. All of these are survival mechanisms that nature created. However, it is misleading to say nature and culture influence and affect one another. This is because one could not say the cells in a human body and the atoms of those cells affect one another. They ARE one another. In essence, the atoms, like all matter, are the cells, (and everything else) and there is no clear delineation between any one thing, say a tree, and all the things that tree is part of: creating oxygen, lumber for your house, the paper you put in recycling today, the food that grows on trees, the water that trees protect, and the medicines that come from a forest. In nature, everything is inter-dependent upon all other things. There is no waste, and no inefficiency, this is the only incidence of the inter action of nature and culture wherein there is a division. That division is core to all our human cultural problems. Conflict, wars, starvation, corrupt politics, and racial hatred all stem from nature, but also from our separation, and/or domination of nature. All of nature seeks affinities, and balance, no matter how unbalanced situations become moment to moment. War, garbage, greed, and pollutants are unhealthy manifestations of culture and nature being in a dysfunctional, unhealthy relationship. Even this, is of course, a relationship, but one we are constantly needing to correct for the environment to be kept healthy enough to sustain life. People who sense alienation as we moved indoors, or when we “conquer” places and peoples, express throughout all cultures this realization, and exhibit behaviors suggesting a wish for reunion. Competition is well known in nature, but total domination, when it occurs usually leads to major die offs, and what one could call a nature correction.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses cultural and natural environments, the relationship between them, and the impact of human actions on the environment. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and informative, making it fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85310-0", "llm_safety_score": 0, "reason": "No unsafe content identified" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.sciences360.com/index.php/culture-class-wars-nature-healing-nature-and-culture-art-and-nature-science-nature-ecopsyh-6208/", "date": "2023-01-31T13:39:00", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00418.warc.gz", "language": "en", "language_score": 0.9500867128, "token_count": 732, "score": 2.890625, "int_score": 3 }
<urn:uuid:f1c32a20-75cc-4cf4-a481-4b07b4d58ecb>
Proclamation 10162—National Equal Pay Day, 2021 By the President of the United States of America Equal Pay Day is a reminder of the work that still remains to advance equity and ensure that all Americans have the opportunity to reach their full potential. This day is a symbolic representation of how far into this year women must work to catch up to what men made in the previous year. Women working full-time, year-round are typically paid just 82 cents for every dollar paid to men. It is a day that calls us to action—to renew our commitment to the principles of equity and equal opportunity that define who we are as Americans. Women lose thousands of dollars each year, and hundreds of thousands over a lifetime, because of the gender and racial wage gap. In 2019, the typical woman who worked full time took home just 82 percent of the typical man's pay. The disparities are even greater for Black, Native American, and Hispanic women, who earned 63 percent, 60 percent, and 55 percent of white men's wages, respectively. While Asian American women make 87 percent of what white men make, the gap for Asian women varies significantly depending on subpopulation, with some Asian women—for example, Cambodian and Vietnamese women—earning among the lowest wages. Those gaps mean we will not be marking Latinas' Equal Pay Day until October—because it takes that long for the average Latina to earn what the average white man made in the previous year. Since the COVID-19 pandemic began, we have seen women, particularly women of color, disproportionately working on the frontlines, caring for our loved ones, and working to combat the virus—but they continue to earn less than their male counterparts. The Biden-Harris Administration believes that ensuring equal pay is essential to advancing America's values of fairness and equity as well as our economic strength here at home and our competitiveness abroad. The burdens and job losses women sustained this year have erased more than 30 years of progress they have made in the labor force. Due in large part to the impact of the pandemic, there are 4.2 million fewer women working now than there were in February 2020—and millions more women have had to reduce their hours, often in response to caregiving demands that we know fall disproportionately on women. America's economic recovery depends on us addressing the barriers that have hampered women from fully participating in the labor force, resulting in gender income and wealth gaps that have been magnified and exacerbated by COVID-19. We must begin by passing the Paycheck Fairness Act, which will take important steps towards the goal of ending pay discrimination. For instance, it will ban employers from seeking salary history—removing a common false justification for under-paying women and people of color—and it will hold employers accountable who engage in systemic discrimination. The bill will also work to ensure transparency and reporting of disparities in wages, because the problem will never be fixed if workers are kept in the dark about the fact that they are not being paid fairly. Relying on individuals to uncover unfair pay practices on their own will not get the job done; when pay data is available, workers can better advocate for fair pay and employers can fix inequities. We must also provide paid family and medical leave, make schedules more predictable and childcare more affordable, and build pipelines for training that enable women to access higher-paying jobs. This commitment also means increasing pay for childcare workers, preschool teachers, home health aides, and others in the care economy—and taking additional steps to increase wages for American workers, such as raising the minimum wage and empowering workers to organize and collectively bargain, both of which are important to reducing the wage gap for women. Vice President Harris and I are committed to building back better: for low-wage workers, for working families, and for all women. There is still significant work to be done to make sure our daughters receive the same rights and opportunities as our sons, and that work is critical to ensuring that every American is given a fair shot to get ahead in this country. Today, on Equal Pay Day, we recognize the role that equal pay plays in building back better for everyone. Now, Therefore, I, Joseph R. Biden Jr., President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim March 24, 2021, as National Equal Pay Day. I call upon all Americans to recognize the full value of women's skills and their significant contributions to the labor force, acknowledge the injustice of wage inequality, and join efforts to achieve equal pay. In Witness Whereof, I have hereunto set my hand this twenty-fourth day of March, in the year of our Lord two thousand twenty-one, and of the Independence of the United States of America the two hundred and forty-fifth. JOSEPH R. BIDEN, JR. NOTE: This proclamation was published in the Federal Register on March 29. Joseph R. Biden, Proclamation 10162—National Equal Pay Day, 2021 Online by Gerhard Peters and John T. Woolley, The American Presidency Project https://www.presidency.ucsb.edu/node/348934
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational and historical content\", \"score\": 0}\n```\n\nThe text is an official proclamation from the President of the United States, focusing on the issue of equal pay and the disparities faced by women in the workforce. It does not contain any unsafe or inappropriate content and is fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a citation from a presidential proclamation and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would warrant a higher safety score." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85311-0", "llm_safety_score": 0, "reason": "educational and historical content" }, { "custom_id": "85311-1", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.presidency.ucsb.edu/documents/proclamation-10162-national-equal-pay-day-2021", "date": "2023-02-03T00:30:09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.2/warc/CC-MAIN-20230202232251-20230203022251-00578.warc.gz", "language": "en", "language_score": 0.9603531957, "token_count": 1068, "score": 3.0625, "int_score": 3 }
<urn:uuid:8dd7eaf9-65a0-48de-ad2f-a7452c3f1c1a>
The Lancet Planetary Health, Volume 5, November 2021 , Agricultural Water Management, Volume 243, 1 January 2021 Produced water (PW) is the main waste stream generated from oil and gas extraction. Nowadays, half of the global PW volume is managed through environmentally controversial and expensive disposal practices, such as re-injection through deep wells. In dry areas such as in the Arabian Peninsula, PW could be reused to irrigate crops, creating environmental, economic and social value. However, the quality of most PWs remains challenging as their high salinity, sodicity and alkalinity can degrade soil fertility and crop yield. , TrAC - Trends in Analytical Chemistry, Volume 112, March 2019 Plastics are a frequently observed component of marine debris and there is growing concern about microplastic (MP) ecotoxicity, and the impacts of additives, sorbed hazardous organic contaminants, heavy metals, and biofilm on MP surfaces. The relative importance of MP from different terrestrial and freshwater sources is poorly understood and limits our ability to develop best management practices. This review focuses on evidence and methods for source apportionment of MP in freshwater environments including the use of MP characteristics, mass balance techniques, and surface characteristics. , Building and Environment, Volume 117, 15 May 2017 It is no secret to anyone living in Beirut or a similar modern city in a semi-arid tropical country in the summer that their home has become a concrete forest and an urban heat island. Old wood or stone houses and their gardens have been replaced by concrete towers and parking lots, in the name of development. The result is searing summer nights, a drastic loss of insect and avian biodiversity, and a large increase in energy usage for interior climate control. These problems are experienced in rapidly developing urban centers worldwide. , Materials Today, Volume 20, March 2017 The existing methods for recycling electronic wastes such as the printed circuit boards (PCB), which contains a large number of components and elements, face significant challenges when considering environmentally benign and easily separable disposal targets. We report here a low-temperature ball milling method that breaks down PCBs all the way into nanoscale particles which further enables enhanced separation of its different base constituent materials that are the polymer, oxide, and metal. , The Lancet, Volume 389, 4 February 2017 In the first paper in this Series we assessed theoretical and empirical evidence and concluded that the health of people living in slums is a function not only of poverty but of intimately shared physical and social environments. In this paper we extend the theory of so-called neighbourhood effects. Slums offer high returns on investment because beneficial effects are shared across many people in densely populated neighbourhoods. Neighbourhood effects also help explain how and why the benefits of interventions vary between slum and non-slum spaces and between slums. , Procedia CIRP, Volume 61, 2017 The European Union (EU) has had laws on the disposal of waste for over 30 years and laws concerning the environmental performance of products for over 20. However, these laws have not formed a cohesive whole - and that is about to change. December 2015 saw the European Commission (the body responsible for proposing new EU legislation) published its Circular Economy Package, with the stated objective of "closing the loop" of product lifecycles. This paper provides an overview of this package and demonstrates why the development of standards underpins future legislation. , Computers and Geotechnics, Volume 75, May 01, 2016 Energy geotechnics involves the use of geotechnical principles to understand and engineer the coupled thermo-hydro-chemo-mechanical processes encountered in collecting, exchanging, storing, and protecting energy resources in the subsurface. In addition to research on these fundamental coupled processes and characterization of relevant material properties, applied research is being performed to develop analytical tools for the design and analysis of different geo-energy applications.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a series of academic references and discussions on various scientific and environmental topics. There is no unsafe, inappropriate, or harmful content in the text." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85313-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://sdgresources.relx.com/waste-disposal", "date": "2023-02-08T01:13:27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500664.85/warc/CC-MAIN-20230207233330-20230208023330-00018.warc.gz", "language": "en", "language_score": 0.9461036921, "token_count": 807, "score": 2.546875, "int_score": 3 }
<urn:uuid:cf3fe26e-af0c-44ff-b8cf-dd2f1f80d55d>
30-hour Grammar and Language Awareness modules: 1. Course Introduction In this unit, you will be shown how to navigate around the online course platform, an overview of the entire course and told how you should approach learning English grammar. The more you learn about English grammar and language, the better you are explaining the whats, ifs and whys to English learners. There is more to a noun than you think. This unit will cover the several types of nouns you can find in the English language from proper, to concrete, to abstract. 3. An introduction to verbs There are many different types of verbs, all with different functions and uses in everyday language. This unit will teach you about main and auxiliary verbs, verb inflection (or changing the form of the verb), different forms of verbs such as past and present participles, modal verbs, and a few other types too. 4. Verbs that are not verbs Sounds strange but there are times when a word might look like a verb but it isn’t, so don’t be fooled! This unit covers gerunds, participles and infinitives and how they are used. 5. Adjectives and adverbs Adjectives and adverbs are describing words but what exactly are they describing, where do they go in a sentence, and if you have more than one, does it matter which order they go in? 6. Other parts of speech This unit covers the other parts of speech that tie everything together in a sentence including articles and determiners, phrasal verbs, prepositions, conjunctions, reported speech and passive voice in this unit. 7. Present, past and future tenses Learn how to construct sentences with different tenses, how and when to use them and how to make sure you can teach your students about them through fun activities for each. The final unit of this course will take you through the conditionals – four to be exact, plus mixed conditionals and what pitfalls to avoid when teaching them to learners. Included on the course Downloadable PDF learning resources so you can start studying straight away. A personal online tutor is available to assist you with the topics covered on the course as well as mark and provide feedback on all assignment submissions One months to complete the course – as an online course, you set the pace. You can spread your learning out over the month given, or you can complete it within a shorter timeframe if you have more time to dedicate to it – it’s completely up to you and your learning goals. Plus, as a TEFL Org student you receive lifetime access to our online TEFL Jobs Center where you can search and apply for English teaching opportunities all over the globe.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"Content is appropriate and educational\", \"score\": 0}\n```\n\nThe text provided is an educational description of a grammar and language awareness course. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to learning and teaching English grammar, which is suitable for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85314-0", "llm_safety_score": 0, "reason": "Content is appropriate and educational" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://teflcouncil.com/coursesinfo.php?id=1912", "date": "2023-01-28T00:51:09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00298.warc.gz", "language": "en", "language_score": 0.938767612, "token_count": 571, "score": 4.1875, "int_score": 4 }
<urn:uuid:76e1e947-f0fb-4870-947d-f05ff12e4ee7>
Riding to Arms A History of Horsemanship and Mounted Warfare Horses and horsemen played central roles in modern European warfare from the Renaissance to the Great War of 1914-1918, not only determining victory in battle, but also affecting the rise and fall of kingdoms and nations. When Shakespeare's Richard III cried, "A horse, a horse, my kingdom for a horse!" he attested to the importance of the warhorse in history and embedded the image of the warhorse in the cultural memory of the West. In Riding to Arms: A History of Horsemanship and Mounted Warfare, Charles Caramello examines the evolution of horsemanship—the training of horses and riders—and its relationship to the evolution of mounted warfare over four centuries. He explains how theories of horsemanship, navigating between art and utility, eventually settled on formal manège equitation merged with outdoor hunting equitation as the ideal combination for modern cavalry. He also addresses how the evolution of firepower and the advent of mechanized warfare eventually led to the end of horse cavalry. Riding to Arms tracks the history of horsemanship and cavalry through scores of primary texts ranging from Federico Grisone's Rules of Riding (1550) to Lt.-Colonel E.G. French's Good-Bye to Boot and Saddle (1951). It offers not only a history of horsemen, horse soldiers, and horses, but also a survey of the seminal texts that shaped that history.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a historical analysis of horsemanship and mounted warfare, which does not contain any unsafe or inappropriate content. It discusses the role of horses and horsemen in European warfare from the Renaissance to the Great War, referencing historical texts and their impact on warfare and cultural memory. The content is suitable for educational environments and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85315-0", "llm_safety_score": 0, "reason": "historical context" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://bookpeople.mymustreads.com/id007646040/Riding-to-Arms", "date": "2023-02-01T21:30:18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00618.warc.gz", "language": "en", "language_score": 0.921931386, "token_count": 301, "score": 3.515625, "int_score": 4 }
<urn:uuid:b30b982e-f1e7-4b92-92fc-263ba93c9ba4>
What is FDA indirect food contact? Indirect Food Additive – In general, these are food additives that come into contact with food as part of packaging, holding, or processing, but are not intended to be added directly to, become a component, or have a technical effect in or on the food. What is the FDA Food Code recommendations? The Food Code is a model for safeguarding public health and ensuring food is unadulterated and honestly presented when offered to the consumer. It represents FDA’s best advice for a uniform system of provisions that address the safety and protection of food offered at retail and in food service. What FDA regulation clears the use of olefin polymers in contact with food? Sec. 177.1520 Olefin polymers. The olefin polymers listed in paragraph (a) of this section may be safely used as articles or components of articles intended for use in contact with food, subject to the provisions of this section. What qualifies as a food additive? Legally, the term refers to “any substance the intended use of which results or may reasonably be expected to result (directly or indirectly) in its becoming a component or otherwise affecting the characteristics of any food.” This definition includes any substance used in the production, processing, treatment. What is a food contact product? Food contact materials are all materials and articles intended to come into contact with food, such as packaging and containers, kitchen equipment, cutlery and dishes. These can be made from a variety of materials including plastics, rubber, paper and metal. What does direct food contact mean? Direct Contact substances are those that directly contact food. Substances that might come in contact with food, such as on the outside of food bag or carton, are defined as indirect contact. Finally, incidental contact substances are those that rarely contact food and the contact is not purposeful or continuous. Is FDA Food code federal law? The FDA Food Code is a “model” code (guideline) that provides over 3000 local, state, tribal and federal food control agencies scientifically sound food safety information that follows national food regulatory policies. The FDA Food Code is not federal law. Is polypropylene FDA approved? Polypropylene is a plastic. Of the commercial plastics on the market today, polypropylene is considered one of the safest. It’s FDA-approved for food contact, so you’ll find polypropylene in food containers like those that hold yogurt, cream cheese, and butter products. What are olefin polymers? a macromolecular compound of the general formula. that forms during polymerization or copolymerization of unsaturated olefin hydrocarbons (R, R′ = H, CH3, C2H5, and so on). The best-known olefin polymers are polyethylene (R = R′ = H) and polypropylene (R = H, R′ = CH3). What are the three major groups of food additives? Types of food additives Antioxidants – prevent foods from oxidising, or going rancid. Artificial sweeteners – increase the sweetness. Emulsifiers – stop fats from clotting together. What materials are suitable for food contact surfaces? What is a food contact notification? FCSs are evaluated primarily through the food contact notification (FCN) program. Federal law requires companies who wish to use a food contact substance to submit Food Contact Substance Notifications (FCNs) to FDA prior to marketing the product. The FDA has a mandated 120-day time-period to review that submission. Who is the enforcer of Food Code? The health inspector is not there to shut a restaurant down, but to both enforce local food codes and educate staff on proper food handling practices. What plastic numbers are food safe? Plastics that are safe to use as food storage containers include: - Plastic #1: PET or PETE – (Polyethylene Terephthalate) - Plastic #2: HDPE – (High Density Polyethylene) - Plastic #4: LDPE (Low Density Polyethylene) - Plastic #5: PP – (Polypropylene)
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text sample is purely educational and informative, discussing FDA regulations, food contact substances, and food safety standards. It does not contain any unsafe or inappropriate content, making it fully suitable for public use and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85316-0", "llm_safety_score": 0, "reason": "educational content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://www.davidgessner.com/essay-types-tips/what-is-fda-indirect-food-contact/", "date": "2023-02-03T05:05:33", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500042.8/warc/CC-MAIN-20230203024018-20230203054018-00698.warc.gz", "language": "en", "language_score": 0.9251486063, "token_count": 886, "score": 2.984375, "int_score": 3 }
<urn:uuid:adf4ef71-54fe-4173-9cca-4691b12d9b0d>
Table of Contents Is a human an invertebrate? A vertebrate is an animal that has a backbone and a skeleton. Vertebrate animals include humans. People, dogs, horses, lizards, dogs, cats, and many other animals are in the vertebrate category. Animals without a backbone are called invertebrates. - Peacocks, also known as peafowl, are medium sized birds most closely related to pheasants. - There are three main types of peacock, the Indian peacock, the African Congo peacock and the Green peacock. What animal eats peacocks? Peacocks have numerous natural predators, including dogs, cats, raccoons, tigers and the mongoose. Is peacock a wild animal? sheep is a domestic animal but peacock is a wild bird. What are 5 examples of invertebrates? Familiar examples of invertebrates include arthropods (insects, arachnids, crustaceans, and myriapods), mollusks (chitons, snail, bivalves, squids, and octopuses), annelid (earthworms and leeches), and cnidarians (hydras, jellyfishes, sea anemones, and corals). Is snake an invertebrate? Animals can be classed as either invertebrates (animals with no backbone) or vertebrates (animals with a backbone). Invertebrates include animals like jellyfish, squid, spiders, and insects. Snakes belong to the vertebrates, along with all other reptiles and amphibians, mammals, birds, and fish. What is a peafowl vs peacock? Males vs. The term “peacock” is commonly used to refer to birds of both sexes. Technically, only males are peacocks. Females are peahens, and together, they are called peafowl. Suitable males may gather harems of several females, each of which will lay three to five eggs. Do peacocks fly? Peacocks can (sort of) fly – they tend to run and take several small leaps before a big final hop. They can’t stay airborne for very long, but their huge wingspan allows them to flutter quite far. 9. Peacocks like to roost in high places, like roofs or trees. What is peacock female? The term “peacock” is commonly used to refer to birds of both sexes. Technically, only males are peacocks. Females are peahens, and together, they are called peafowl. What class is a peacock? Is a peacock a mammal? Is a peacock a mammal? No. Peacocks are part of the Phasianidae family, which are birds.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a straightforward educational content about vertebrates and invertebrates, including information about peacocks. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85317-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-06", "url": "https://quick-advices.com/is-a-human-an-invertebrate/", "date": "2023-02-05T13:21:59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00858.warc.gz", "language": "en", "language_score": 0.9365721345, "token_count": 604, "score": 3.015625, "int_score": 3 }
<urn:uuid:40756a8c-cef4-48ec-adf2-9346590d85c8>
People With Untreated HIV Being Hit Hardest by Monkeypox While monkeypox cases are declining in the United States, a new government report shows that patients with weakened immune systems, especially those living with HIV, have been hit particularly hard by the virus. Even after taking antiviral medication for monkeypox, those with untreated HIV were more likely to end up in the hospital, the researchers from the U.S. Centers for Disease Control and Prevention found. Since May, about 28,000 monkeypox cases have been reported in this country, and 12 people who were hospitalized with the virus have died. In the report, CDC scientists described the cases of 57 patients treated between mid-August and Oct. 10. All of the patients had severe lesions caused by the virus, including 39 people who experienced lesions in their eyes, mouth and other mucous membranes. Nearly all the patients who were hospitalized were Black, 54 were men, three were pregnant and nearly 25% were homeless. Two of the patients were undergoing chemotherapy, according to the report. Another three had received organ transplants. About one-third of these 57 patients were treated in intensive care. RELATED: U.S. Monkeypox Cases Are Declining While about 5% to 10% of monkeypox patients are admitted to the hospital, those with HIV are more likely to be hospitalized, the Washington Post reported. Of the monkeypox-associated deaths, six are still being investigated, according to the report. The virus is typically affecting men who have sex with men in the current outbreak, causing painful lesions even when not severe. Those with HIV and people of color make up a disproportionate share of patients. About 38% of monkeypox cases were in someone with HIV, according to a review of 2,000 cases this summer, the Post reported. Monkeypox in HIV patients Doctors should test for HIV in all sexually active patients who they suspect have monkeypox. They should consider
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the impact of monkeypox on individuals with HIV and provides medical information. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85318-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://blacknewsdaily.com/people-with-untreated-hiv-being-hit-hardest-by-monkeypox/", "date": "2023-03-20T09:13:25", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00338.warc.gz", "language": "en", "language_score": 0.9798156023, "token_count": 398, "score": 2.671875, "int_score": 3 }
<urn:uuid:6f6fcf8a-6bc1-439f-a705-9e9d3ae8a6ca>
Observers sometimes comment on the fact that a substantial fraction of government debt is “owed to ourselves” (that is, it is held by US citizens) and therefore less of a cause for concern than the fraction that is owned by foreigners. Does this reasoning make sense? The answer is “not very much.” To see why, consider a US citizen who owns some US government bonds. Now imagine that she sells those bonds to a German bank and uses the proceeds to buy some General Motors (GM) shares that are currently owned by a French investment bank. All that has happened here is some rebalancing of portfolios. One individual decided to shift her assets around, so she now owns GM shares instead of government bonds. Likewise, the German bank decided it wanted more US bonds in its portfolio, whereas the French investment bank decided it wanted fewer GM shares. These kinds of transactions go on all the time in our economy. Our hypothetical citizen is just as wealthy as she was before; she is simply holding her wealth in a different form. The same is true for the German and French financial institutions. Yet foreigners hold more of the national debt than previously. Domestic or foreign ownership of the debt can change with no implications for the overall indebtedness of individuals or the country. It is more meaningful to look at the amount of foreign debt that has been accumulated by a country as a result of its borrowing from abroad. Foreign debt represents obligations that will have to be repaid at some future date. Commentators sometimes express worry over the fact that foreign central banks—notably those of Japan and China—own substantial amounts of US debt. There is a legitimate concern here: if one or more of those banks suddenly decided they no longer wanted to hold that debt, then there might be a large change in US interest rates and resulting financial instability. But the real issue is not that the debt is foreign owned. Rather, it is that a large amount of debt is held by individual institutions big enough to move the market. At the same time, the Chinese are equally concerned about the value of the US government debt they hold. In their view, they traded away goods and services for pieces of paper that are claims to be paid by the US government. These claims are in nominal terms (in dollars). Hence any change in the exchange rate changes the value of this debt to the Chinese. If, for example, the dollar depreciates relative to the Chinese renmimbi (RMB), then the real value (in terms of Chinese goods and services) of this debt is reduced. The RMB/dollar exchange rate was 8.28 in January 2000. A holder of a US dollar bill could obtain 8.28 RMB in exchange. This rate was 8.07 in January 2006. However, by June 2011, the exchange rate was 6.48. This means that someone who exchanged RMB for dollars in 2000 and then sold those dollars for RMB in June 2011 lost about 20 percent in nominal terms.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is an economic analysis discussing government debt, foreign ownership, and exchange rates. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85319-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://mysuperiorpaper.com/2023/03/15/government-debt/", "date": "2023-03-21T17:43:45", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00338.warc.gz", "language": "en", "language_score": 0.9758400321, "token_count": 607, "score": 2.6875, "int_score": 3 }
<urn:uuid:9a0b3f6c-2ade-4d5f-bbca-a917b1e7ef41>
This post is also available in: עברית (Hebrew) Paraplegia, paralysis from the waist down, used to confine all affected to the wheelchair. With disabled-friendly facilities being far from the norm, the limitations of this kind of existence are stark. A team of researchers at UC Berkeley’s Robotics and Human Engineering Laboratory has is getting closer to changing this reality. Led by mechanical engineering professor Homayoon Kazerooni, the team has been fastidiously working for more than a decade to create exoskeletons that can give back mobility to those that have lost it. SuitX, a spin-off company of the laboratory led by Kazerooni, has recently unveiled The Phoenix – a light and agile exoskeleton. The Phoenix has two motors at the hips with electrically controlled tension settings. They swing freely during walking and tighten when the user stands. Using buttons in the accompanying crutches users can control the the movement of the legs to walk at speeds exceeding 1.5 km/h. The battery pack, carried in a backpack, lasts up to eight hours. “We can’t really fix their disease,” says Kazerooni. “We can’t fix their injury. But what it would do is postpone the secondary injuries due to sitting. It gives a better quality of life.” Kazarooni and his team began working on the project in 2000, developing a series of increasingly sophisticated exoskeletons over the years. The work was kickstarted with funding from the Defence Advanced Research Projects Agency (DARPA) to develop a device to assist people carry heavy loads, now called the Berkeley Lower Extremity Exoskeleton (BLEEX). Work on that project led Kazarooni to realise that it could be applied to the medical field. The Phoenix is one of the lightest exoskeletons available to date. At $40,000 it’s not cheap, but still is half the cost of other available models. This next video shows the remarkable results of this exoskeleton. Paraplegics can now stand, walk, and even play soccer.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the development of an exoskeleton to help paraplegic individuals regain mobility. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85321-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://i-hls.com/archives/68331", "date": "2023-03-25T16:53:39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00338.warc.gz", "language": "en", "language_score": 0.9451541901, "token_count": 457, "score": 3.328125, "int_score": 3 }
<urn:uuid:a8e74c2e-8e12-4864-afe6-3ac9b1fe4752>
What is the other name of glossopharyngeal nerve? Anatomical terms of neuroanatomy The glossopharyngeal nerve (/ˌɡlɒsoʊfəˈrɪn(d)ʒiəl, -ˌfærənˈdʒiːəl/), known as the ninth cranial nerve (CN IX), is a mixed nerve that carries afferent sensory and efferent motor information. What is vagus and glossopharyngeal nerves? The glossopharyngeal and vagus cranial nerves provide the brainstem with sensory inputs from different receptors in the heart, lung, and vasculature. This afferent information is critical for the short-term regulation of arterial blood pressure and the buffering of emotional and physical stressors. Is the glossopharyngeal nerve sympathetic or parasympathetic? The glossopharyngeal nerve, or CN IX, carries motor and sensory fibers to and from the rostral pharynx, palate, larynx, and tongue. The glossopharyngeal nerve also contains a parasympathetic component that innervates the parotid and zygomatic salivary glands. What happens if glossopharyngeal nerve is damaged? When the glossopharyngeal nerve becomes irritated, an attack of intense electric shock-like pain is felt in the back of the throat, tongue, tonsil or ear. You may initially experience short, mild attacks, with periods of remission. But neuralgia can progress, causing longer, frequent attacks of searing pain. Figure 1. What number is the glossopharyngeal nerve? The glossopharyngeal nerve is the 9th cranial nerve (CN IX). It is one of the four cranial nerves that has sensory, motor, and parasympathetic functions. It originates from the medulla oblongata and terminates in the pharynx. What is the major function of the glossopharyngeal nerve? The glossopharyngeal nerve carries sensory, efferent motor, and parasympathetic fibers. Its branches consist of tympanic, tonsillar, stylopharyngeal, carotid sinus nerve, branches to the tongue, lingual branches, and a communicating branch to cranial nerve X (vagus nerve). Is marsilea Crenata edible? As food. Sporocarps of some Australian species such as Marsilea drummondii are edible and have been eaten by Aborigines and early white settlers, who knew it under the name ngardu or nardoo. The leaves of Marsilea crenata are part of the East Javanese cuisine of Indonesia, especially in the city of Surabaya. Is Marsilea a Biofertilizer? – Marsilea ,a genus of approximately 65 species of aquatic fern of the family marsileaceae and it is not used as a biofertilizer. How do you fix glossopharyngeal nerve damage? The most effective drugs are antiseizure medicines such as carbamazepine. Antidepressants may help certain people. In severe cases, when pain is difficult to treat, surgery to take pressure off the glossopharyngeal nerve may be needed. This is called microvascular decompression. Is the glossopharyngeal nerve sensory or motor? The glossopharyngeal nerve as noted above is a mixed nerve consisting of both sensory and motor nerve fibers. The sensory fibers’ origin include the pharynx, middle ear, posterior one-third of the tongue (including taste buds); and the carotid body and sinus. What kind of pain does glossopharyngeal neuralgia cause? Glossopharyngeal neuralgia is a disorder that is associated with repeated episodes of severe pain in the tongue, throat, ear, and tonsils.These areas are all connected to the ninth cranial nerve, also called the glossopharyngeal nerve.Episodes of pain may last from a few seconds to a few minutes and usually occur on one side of the face. Where does the glossopharygeal nerve travel to in the middle ear? The glossopharyngeal nerve provides parasympathetic innervation to the parotid gland. These fibres originate in the inferior salivatory nucleus of CN IX. These fibres travel with the tympanic nerve to the middle ear. How is decompression done for glossopharyngeal neuralgia? The decompression addresses the root cause of glossopharyngeal neuralgia by dealing with vessel that is irritating the nerve.This minimally invasive, endoscope assisted surgery involves a keyhole retromastoid craniotomy made through a small incision behind the ear.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\n*Explanation:*\nThe text provided is purely educational and anatomical in nature, discussing the glossopharyngeal nerve and related medical information. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85322-0", "llm_safety_score": 0, "reason": "educational content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.idsemergencymanagement.com/2019/12/26/what-is-the-other-name-of-glossopharyngeal-nerve/", "date": "2023-03-27T00:17:43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00338.warc.gz", "language": "en", "language_score": 0.8657596707, "token_count": 1032, "score": 3.5625, "int_score": 4 }
<urn:uuid:26b66631-36b1-437c-b607-a79f67acac56>
Strategy Overview: Dramatic Play & Researcher Center This resource illustrates: 4H) Hands-on, inquiry-based experiences; 9A) Hands-on, inquiry-based experiences in content PreK-TK, Grades K-1 This resource describes how to implement dramatic play and researcher centers in classrooms with Multilingual Learners. Centers are tied to the thematic content of a unit and provide children with the opportunity to engage in hands-on, inquiry-based experiences that give content and language meaning and purpose.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"appropriate for all audiences\", \"score\": 0}\n```\n\nThis text is focused on educational strategies for implementing dramatic play and researcher centers in classrooms, which is entirely appropriate for educational environments and does not contain any unsafe or inappropriate content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85323-0", "llm_safety_score": 0, "reason": "appropriate for all audiences" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.multilinguallearningtoolkit.org/resource/strategy-overview-dramatic-play-researcher-center/", "date": "2023-03-28T09:06:32", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00338.warc.gz", "language": "en", "language_score": 0.8380797505, "token_count": 111, "score": 3.4375, "int_score": 3 }
<urn:uuid:1ced0523-d90c-4418-90c3-95fb889e3fc8>
From the previous two examples, it should be clear how to compute nondeterministic I-states and therefore solve the passive localization problem on a grid. Now consider constructing a plan that solves the active localization problem. Imagine using a computer to help in this task. There are two general approaches: Using either approach, it will be helpful to recall the formulation of Section 12.1.1, which considers as a new state space, , in which state feedback can be used. Even though there are no nature sensing actions, the observations are not predictable because the state is generally unknown. This means that is unknown, and future new states, , are unpredictable once and are given. A plan must therefore use feedback, which means that it needs information learned during execution to solve the problem. The state transition function on the new state space was illustrated for the localization problem in Examples 12.1 and 12.2. The initial state is the set of all original states. If there are no symmetries, the goal set is the set of all singleton subsets of ; otherwise, it is the set of all smallest possible I-states that are reachable (this does not need to be constructed in advance). If desired, cost terms can be defined to produce an optimal planning problem. For example, if a motion occurs, or otherwise. Consider the approach of precomputing a plan. The methods of Section 12.1.2 can generally be applied to compute a plan, , that solves the localization problem from any initial nondeterministic I-state. The approach may be space-intensive because an action must be stored for every state in . If there are grid tiles, then . If the initial I-state is always , then it may be possible to restrict to a much smaller portion of . From any , a search based on backprojections can be conducted. If the initial I-state is added to , then the partial plan will reliably localize the robot. Parts of for which is not specified will never be reached and can therefore be ignored. Now consider the lazy approach. An algorithm running on the robot can perform a kind of search by executing actions and seeing which I-states result. This leads to a directed graph over that is incrementally revealed through the robot's motions. The graph is directed because the information regarding the state generally improves. For example, once the robot knows its state (or symmetry class of states), it cannot return to an I-state that represents greater uncertainty. In many cases, the robot may get lucky during execution and localize itself using much less memory than would be required for a precomputed plan. The robot needs to recognize that the same positions have been reached in different ways, to ensure a systematic search. Even though the robot does not necessarily know its position on the map, it can usually deduce whether it has been to some location previously. One way to achieve this is to assign coordinates to the positions already visited. It starts with assigned to the initial position. If is applied, then suppose that position is reached, assuming the robot moves to a new grid cell. If is applied, then is reached if the robot is not blocked. The point may be reachable by or . One way to interpret this is that a local coordinate frame in is attached to the robot's initial position. Let this be referred to as the odometric coordinates. The orientation between this coordinate frame and the map is not known in the beginning, but a transformation between the two can be computed if the robot is able to localize itself exactly. A variety of search algorithms can now be defined by starting in the initial state and trying actions until a goal condition is satisfied (e.g., no smaller nondeterministic I-states are reachable). There is, however, a key difference between this search and the search conducted by the algorithms in Section 2.2.1. Previously, the search could continue from any state that has been explored previously without any additional cost. In the current setting, there are two issues: Steven M LaValle 2012-04-20
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed explanation of a technical topic related to robotics and localization problems. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85324-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "http://msl.cs.uiuc.edu/planning/node605.html", "date": "2023-03-30T23:53:31", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00338.warc.gz", "language": "en", "language_score": 0.9428185225, "token_count": 830, "score": 3.046875, "int_score": 3 }
<urn:uuid:5443f7eb-b021-46f1-97e4-b7a2fe382f95>
Pulmonary helminthiasis has been reported from antiquity, particularly from areas with significant pastoralistic population. However, the diseases have received scant attention, and research in these areas has largely been limited. Echinococcosis is one such zoonotic infestation caused predominantly by the post-larval metacestode stage of the dog tapeworm, Echinococcus granulosus; the life cycle of which requires two mammalian hosts, a definitive host and an intermediate host. Cystic echinococcosis (CE) caused by E.granulosus accounts for >95% of the estimated 2–3 million cases worldwide. The disease is endemic in many parts of the world like Mediterranean countries, southern America, Australia, Africa and also in some regions of Asia. The infestation leads to the development of hydatid cysts in various organ systems, the liver and lung being the commonest. Pulmonary CE (PCE) may be an accidental diagnosis in an asymptomatic patient or may present with nonspecific chest symptoms. Incessant bouts of cough with expectoration of salt like tasting fluid may be the presenting symptom of a ruptured cyst. The current issue of Lung India carries an article where a patient of hydatidosis is shown to present with multiple pulmonary cysts, akin to a bunch of marbles. Radiological features of PCE can be varied and can include single or multiple sharply defined, round-to-oval homogenous opacity of variable size, with several characteristic features on radiology.[3,4] CT features have been well defined and differ in intact and ruptured cysts. While intact cysts present as well-defined cystic masses with variable CT density, ruptured cysts can present various imaging features depending on the extent of the rupture and the remaining contents of the cyst. These include ‘signet ring’ sign, ‘inverse crescent sign’, water lily sign, Cumbo sign, empty cyst sign, etc. Calcification and daughter cyst formation is rare in PCE.[5,6] Detached or collapsed endocyst membranes, collapsed daughter cyst membranes and intact daughter cysts are the pathognomic computer tomographic features of ruptured hydatid cysts. Evaluation of extrapulmonary intrathoracic hydatid cysts like chest wall, mediastinal, pericardial, fissural and pleural localization may necessitate MR imaging. While cysts usually have cystic/fluid attenuation, higher attenuation, usually suggestive of solid tissue, has been reported too. Further thick cyst wall has also been reported, mostly in infected cysts. Imaging features are complemented by serological evidence of echinococcosis like immunoelectrophoresis, indirect immunofluorescence, ELISA or hemagglutination. Bronchoscopy may aid in the diagnosis at times. Molecular methods, such as polymerase chain reaction (PCR) and sequencing, can play an important role in the surveillance, diagnosis, epidemiology and management of hydatid disease by ability to detect parasite DNA in various clinical samples, including cyst fluid, blood and faeces. Surgery has remained the mainstay of management of PCE and has, in recent times, been supplemented by medical therapy and percutaneous aspiration.[9–11] Variable periods of anti-helminth chemotherapeutic agents are prescribed preoperatively to prevent disease recurrence due to spillage at the time of surgery.[12,13] An 8-week combination of praziquantel and albendazole was most effective in effecting a near-total sterilization of the cysts. Post-operative use of chemotherapeutic agents is used to prevent recurrence. Echinococcus has a history of taxonomic and nomenclatural confusion, resulting from lack of morphological characters. Increasing use of recent molecular methods has led parasitologists to suggest that Echinococcus should be split into 10 species, based on not only molecular but also morphological and ecological criteria. The life cycles and host range of all 10 species are now documented and represent an essential foundation for control efforts. Molecular epidemiological studies have also been instrumental in identifying and describing sympatric cycles of transmission involving more than one species of Echinococcus. Although morphology can be used to differentiate between adult worms of different species, this is not practical given the difficulties in recovering adult specimens and the associated public health risks. However, molecular tools allow species identification from eggs in faeces. For example, a study of wild canids on both sides of the US–Canada found wolves and coyotes infected with Echinococcus canadensis. This species comprises two genotypes, G8 and G10, and single and mixed infections are reported. In areas where multiple species of Echinococcus are endemic, it is important to note that clinical infections of humans can be caused by multiple species which is important to inform public health measures. In a recent study in China, 22 isolates of E. granulosus and E. multilocularis were recovered from one patient and Echinococcus intermedius in another. Similar observations have been found in Iran where in a study of 42 patients, 18 were infected with E. granulosus and 24 with the Echinococcus intermedius (G6 genotype) In one of the patients in the study, a mixed infection of E. granulosus in the liver and right lung, and E. intermedius in the left lung, was detected. These studies demonstrate the value of using molecular diagnostic procedures to ensure appropriate therapeutic interventions. E. granulosus, throughout most of its geographical range, exists almost invariably under conditions modified by humans and perpetuated by domestic animals with infection of humans principally a result of domestic dogs having access to infected livestock. Anthropogenic activities allowed spillover from the domestic sheep/dog cycle, to a cycle involving native wildlife, macropod marsupials and dingoes in Australia, that not only impacts on public health and livestock industries but also on wildlife health.[21,22] This artificial, man-made cycle also represents a barrier to the control or eradication of E. granulosus in sheep on the Australian mainland due to infected dingoes contaminating sheep pasture Interestingly, no evidence existed that E. granulosus was present before the arrival of European settlers, with whom E. granulosus was introduced in sheep. Similarly, Echinococcus canadensis (formerly termed as genotypes G8 and G10) is also maintained in a wild animal cycle involving wolves and large cervids (moose and caribou), originally referred to as the ‘northern form’ of E. granulosus, and principally occurring in Alaska, Canada, parts of Scandinavia, Eastern Europe and the USA.[23,24] Domestic or free-roaming dogs have long been recognized as important ‘bridging hosts’ between the wild, sylvatic cycle of E. canadensis and people. In northern Canada, interaction between the wildlife cycle and indigenous communities occurs due to subsistence hunting within indigenous communities where domestic dogs have access to offal and carcasses leading to infection with E. canadensis.[17,26] Echinococcus felidis is confined to Africa and may represent an indigenous form perpetuated in wildlife cycles involving the lion as the principal definitive host and the warthog as an intermediate host. With the domestication of livestock in Africa, E. granulosus has become widespread in domestic livestock with E. intermedius also occurring in camels. Over 18 species of wild herbivores from different parts of Africa have been found to be infected with hydatid cysts. These include the most common prey species of the lion. The existence of an independent cycle in wild mammals in Africa has been proposed, and there is a speculation that E. felidis is responsible for infections in domestic livestock and other wildlife intermediate hosts of Echinococcus in Africa. Helminth zoonoses remain a global problem to public health and the economy of many countries. PCR-based techniques and sequencing have resolved many taxonomic issues and are now essential to understanding the epidemiology of helminth zoonotic infections and the ecology of the causative agents. Thus, today, we have the molecular tools to characterize helminth zoonotic infection, and we better understand the epidemiology, ecology and transmission patterns of these parasites. While theoretically we are in the best position possible to control helminth zoonoses, practically, this is not the case. Vaccines have been introduced but their full impact on controlling helminth zoonoses is unclear at present as they would still have to be administered at a significant expense in LMIC regions where their administration would be most effective. Anthropogenic factors like culture, poverty, poor hygiene, dietary factors, climate factors and urbanization have all been linked to the perpetuation of zoonotic helminthiasis. In terms of zoonotic helminths, effective control must take a one-health approach. This would need to come from governments and aid agencies, given the likely lack of commercial interest for private organizations. We need to act now, with well utilized, successful approaches that require education and government support. Otherwise, the situation will only worsen due to anthropogenic factors that are perpetually exacerbating the problem of helminth zoonoses. 1. Craig PS, Mcmanus DP, Lightowlers MW, Chabalgoity JA, Garcia HH, Gavidia CM, et al. Prevention and control of cystic echinococcosis. Lancet Infect Dis 2007;7:385–94. 2. Manoharan A, Ayub II, Arshad AM, Chockalingam C, Thangaswamy D. Cough, with a sac of marbles in the chest. Lung India 2023;40:175–6. 3. Sarkar M, Pathania R, Jhobta A, Thakur BR, Chopra R. Cystic pulmonary hydatidosis. Lung India 2016;33:179–91. 4. Ghoshal AG, Sarkar S, Saha K, Sarkar U, Kundu S, Chatterjee S, et al. Hydatid lung disease:An analysis of five years cumulative data from Kolkata. J Assoc Physicians India 2012;60:12–6. 5. Koul PA, Wahid A, Koul AN, Mir FA. CT in pulmonary hydatid disease:Unusual appearances. Chest 2000;118:1645–7. 6. Rawat S, Kumar R, Raja J, Singh RS, Thingnam SKS. Pulmonary hydatid cyst:Review of literature. J Family Med Prim Care 2019;8:2774–8. 7. Force L, Torres JM, Carrillo A, Buscà A. Evaluation of eight serological tests in the diagnosis of human echinococcosis and follow-up. Clin Infect Dis 1992;15:473–80. 8. Koul PA, Khan UH. Bronchoscopic diagnosis of a ruptured hydatid cyst in a young male with hemoptysis. J Bronchology Interv Pulmonol 2011;18:61–4. 9. Yasawy MI, Al Karawi MA, Mohamed AR. Combination of praziquantel and albendazole in the treatment of hydatid disease. Trop Med Parasitol 1993;44:192–4. 10. Urrea-París MA, Casado N, Moreno MJ, Rodriguez-Caabeiro F. Chemoprophylactic praziquantel treatment in experimental hydatidosis. Parasitol Res 2001;87:510–2. 11. Akhan O, Ozmen MN, Dincer A, Gocmen A, Kalyoncu F. Percutaneous treatment of pulmonary hydatid cysts. Cardiovasc Intervent Radiol 2004;17:271–5. 12. Taylor DH, Morris DL. Combination chemotherapy is more effective in postspillage prophylaxis for hydatid disease than either albendazole or praziquantel alone. Br J Surg 1989;76:954. 13. Cobo F, Yarnoz C, Sesma B, Fraile P, Aizcorbe M, Trujillo R, et al. Albendazole plus praziquantel versus albendazole alone as a pre-operative treatment in intra-abdominal hydatisosis caused by Echinococcus granulosus. Trop Med Int Health 1998;3:462–6. 14. Koul PA, Singh AA, Ahanger AG, Wahid A, Sofi BA. Optimal duration of preoperative anti-helminthic therapy for pulmonary hydatid surgery. ANZ J Surg 2010;80:354–7. 15. Thompson RCA. Biology and systematics of echinococcus. Adv Parasitol 2017;95:65–109. 16. Thompson RCA. The molecular epidemiology of Echinococcus infections. Pathogens 2020;9:453. 17. Schurer JM, Bouchard E, Bryant A, Revell S, Chavis G, Lichtenwalner A, et al. Echinococcus in wild canids in Québec (Canada) and Maine (USA). PLoS Negl Trop Dis 2018;12:e0006712. 18. Cao M, Chen K, Li W, Ma J, Xiao Z, Wang H, et al. Genetic characterization of human-derived hydatid fluid based on mitochondrial gene sequencing in individuals from northern and western China. J Helminthol 2018;94:e2. 19. Lashkarizadeh MR, Hooshmand N, Nasibi S, Mohammadi MA, Shamsaddini S, Kamyabi H, et al. Genetic profile of hydatid cysts in patients with multi-organ involvement:Mixed infections by different strains. Vector Borne Zoonotic Dis 2019;19:724–30. 20. Rausch RL. Life-cycle patterns and geographic distribution of echinococcus species Thompson RCA. The Biology of Echinococcus and Hydatid Disease. London, UK, Allen and Unwin; 1986:274–84. 21. Jenkins DJ, Romig T, Thompson RCA. Emergence/re-emergence of Echinococcus spp–a global update. Int J Parasitol 2005;35:1205–19. 22. Thompson RCA, Kutz SJ, Smith A. Parasite zoonoses and wildlife:Emerging issues. Int J Environ Res Public Health 2009;6:678–93. 23. Thompson RCA, Lymbery AJ, Smith A. Parasites, emerging disease and wildlife conservation. Int J Parasitol 2010;40:1163–70. 24. Dell B, Newman SJ, Purple K, Miller B, Ramsay E, Donnell R, et al. Retrospective investigation of Echinococcus canadensis emergence in translocated elk (Cervus canadensis) in Tennessee, USA, and examination of canid definitive hosts. Parasit Vectors 2020;13:330. 25. Himsworth CG, Jenkins E, Hill JE, Nsungu M, Ndao M, Andrew Thompson RC, et al. Emergence of sylvatic Echinococcus granulosus as a parasitic zoonosis of public health concern in an indigenous community in Canada. Am J Trop Med Hyg 2010;82:643–5. 26. Lichtenwalner A, Adhikari N, Kantar L, Jenkins E, Schurer JM. Echinococcus granulosus genotype G8 in Maine moose (Alces alces). Alces 2014;50:27–33. 27. Romig T, Deplazes P, Jenkins D, Giraudoux P, Massolo A, Craig PS, et al. Ecology and life cycle patterns of Echinococcus species. Adv Parasitol 2017;95:213–314. 28. Macpherson CNL. An active intermediate host role for man in the life cycle of Echinococcus granulosus in Turkana, Kenya. Am J Trop Med Hyg 1983;32:397–404.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe provided text is a detailed medical article discussing pulmonary helminthiasis and echinococcosis. It contains no unsafe, inappropriate, or harmful content. The language is academic and the themes are related to medical research and public health, making it fully appropriate for educational and public use.", "{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is an educational and scientific discussion about the epidemiology and transmission of Echinococcus species, which is important for public health and does not contain any unsafe or inappropriate content.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a series of references to medical and scientific literature related to hydatid disease. There is no unsafe, inappropriate, or harmful content in the text. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```" ], "llm_harm_scores_by_chunk": [ { "custom_id": "85325-0", "llm_safety_score": 0, "reason": "No unsafe content identified" }, { "custom_id": "85325-1", "llm_safety_score": 0, "reason": "educational content" }, { "custom_id": "85325-2", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85325-3", "llm_safety_score": 0, "reason": "No unsafe content identified" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://journals.lww.com/lungindia/Fulltext/2023/03000/Zoonotic_helminthiasis__A_challenge_unabated.1.aspx", "date": "2023-04-01T08:31:02", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00338.warc.gz", "language": "en", "language_score": 0.8776368499, "token_count": 3470, "score": 2.515625, "int_score": 3 }
<urn:uuid:c9b131af-34df-4367-a383-13015f6df5b7>
The UK's climate change official at the Foreign Office, John Ashton, has told reporters that China is now building two power stations every week, instead of one. His statement was supported by new figures from the Netherlands Environmental Assessment Agency, which suggest that China's emissions rose by 9 per cent last year, giving China the dubious accolade of the 'world's biggest polluter' several years earlier than expected. But Ashton was clear where the blame for rising emissions lies: 'Most of the greenhouse gases in the atmosphere have been put there by deevloping countries without the contrainst of having to worry about the climate. That means we should bear the leading edge of responsiblity,' he told the BBC. He also pointed the finger at rising Western import of cheap Chinese goods, forcing up industrial energy consumption, whilst per capita energy use in the country remained a fraction of that of US or British citizens. This article first appeared in the Ecologist June 2007
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses climate change, emissions, and international relations. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to environmental and political issues, which are suitable for a general audience." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85326-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://theecologist.org/2007/jun/20/china-building-2-power-stations-week", "date": "2023-03-20T13:00:24", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00538.warc.gz", "language": "en", "language_score": 0.9633062482, "token_count": 197, "score": 2.609375, "int_score": 3 }
<urn:uuid:bbe72e16-0589-4127-a2ef-692e8c75c239>
How Unconventionality is the Solution of Environmental Degradation Updated: Dec 23, 2021 Ramesh Chaurasia-Solution of Environmental Degradation Our environment has reached a critical juncture. It has come to a situation where we need to buckle up and take action to conserve it immediately without much delay. The innumerable health hazards and the destruction and food insecurity occurring as a result of environmental degradation are having and will continue to have huge impacts on the population. The decay of the environment is disturbing the balance of the ecosystem, jeopardizing biodiversity. On top of that, environmental deterioration today through the overexploitation of resources is a threat to future generations. We need to remember that we are not the owners of this planet, rather we have borrowed it from the generations to come. Therefore, environmental degradation has put the life of both, the present as well as future generations at stake. The recent revelation that I recently came across and that shook me to the core is that as of now, 75% of the earth’s land has already degraded and if we move at the same pace without following concrete conservation practices, then by 2050, almost 95% of the earth’s surface would deteriorate. In Dalai Lama’s words, “It is our collective and individual responsibility to preserve and tend to the world in which we all live.” When it comes to developing and adopting ways to preserve our environment, there are both conventional as well as unconventional ways. But I strongly believe that we have come to a point where along with practicing conventional methods of environmental protection, we must embrace unconventional methods as well to get satisfactory outcomes. Also Read:- Latest news about Ramesh Chaurasia Unconventional ways at the collective level It is of utmost importance that all the stakeholders realize the gravity of the issue with which we are dealing and formulate a framework of policies consisting of targets and unconventional practices directing towards attaining those targets. Unconventionality lies to a great extent in technological innovations and inventions, especially when we talk about combating environmental degradation at the collective level. New and improved technologies can contribute a huge deal in reducing the emission of greenhouse gases in the following ways: Technological innovations should be focused on reducing the overall consumption of energy in different sectors of the economy. They should aim at enabling the devices to use energy more efficiently, thereby decreasing their emission of greenhouse gases. The new or improved technology should develop machines that function using cleaner fuels. Carbon Capture and Storage is an emerging technology that came to my mind while thinking about some of the innovative technologies already in place. It separates CO2 from industrial emissions and stores it in underground rock formations. Unconventional ways at the individual level There are numerous unconventional practices that an individual can implement in their daily life gradually to contribute their part in countering environmental degradation and reducing our carbon footprint. Some of these include:- Discard your clothes sustainably It has been found out that the textile industry is one of the major contributors to greenhouse gas emissions. So, reuse your clothes as much as you can, and instead of throwing old clothes, try donating them to the needy. Purchase recycled products Another way of reducing your carbon footprint is to go for recycled products whenever possible, for instance instead of purchasing new notebooks, go for recycled ones. Buy local produce This is an innovative way of doing your part for the environment that many people are not aware of. When we buy locally produced goods, we reduce our carbon footprint by not contributing to the tremendous amount of energy required for the shipping of the products. Reduce usage of aerosols Aerosol sprays emit chlorofluorocarbons which are responsible for the depletion of the ozone layer. Avoiding their usage and finding some other alternatives would be a sensible decision. We all know that there is no planet B. So, if we wish to save our environment, which is synonymous with saving life on earth, then we should start pondering and coming up with ingenious ways to do so. Because only then will we be able to succeed. For the crossroads in which we are standing, on one end there are the soaring needs and demands of human beings and on the other end, there is the decaying condition of the earth. In such a tough situation, only the conventional ways will not help us in achieving our goals. Also Read:-Negative and positive Impact of Covid-19 on our environment. _________________________________________________________________________________ Author- Ramesh Chaurasia A superior and highly experienced entrepreneur in the field of business for quite a long time now. Also, a philanthropist, author, and public speaker who believes in working towards the overall well-being and betterment of society
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses environmental degradation and proposes solutions to address it, including both conventional and unconventional methods. There is no unsafe, inappropriate, or harmful content in the text." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85327-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.rameshchaurasia.com/post/how-unconventionality-is-the-solution-of-environmental-degradation", "date": "2023-03-21T21:03:56", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00538.warc.gz", "language": "en", "language_score": 0.9422307014, "token_count": 970, "score": 3.078125, "int_score": 3 }
<urn:uuid:f3157fcb-980a-46aa-a688-5d807da27545>
As you might have experienced one time or another, music can lift your mood. But what about music for anxiety? There appear to be a considerable amount of interesting findings on the benefits of music, which I’ll discuss in this video and article. A team led by Prof. Daniel J. Levitin of McGill University’s Psychology Department has been able to show that playing and listening to music has clear benefits for both mental and physical health. Professor Levitan indicates “But even more importantly, we were able to document the neurochemical mechanisms by which music has an effect in four domains: management of mood, stress, immunity and as an aid to social bonding.” This work consisted of a review of 400 papers on the subject of the neurochemistry of music. Some key findings with regard to the benefits of music were: - improving the body’s immune system function - reducing levels of stress - found to be more effective than prescription drugs in reducing anxiety prior to surgery. Actually one modality of wellness is called Music Therapy. The Canadian Association of Music Therapy indicates that Music Therapy can be helfpul for a number of conditions, but not limited to the following: - Acquired Brain Injury - Autism and other Pervasive Development Disabilities - Critical Care - Developmental Disabilities - Emotional Traumas - Geriatric Care - Hearing Impairments - Mental Health - Neonatal Care - Pain Control - Palliative Care - Personal Growth - Physical DisabilitiesTop - Speech and Language Impairments - Substance Abuse - Teens at Risk - Victims of Abuse - Visual Impairments Quite an impressive list for certain. You can visit the website and see a complete bibliography list of all the studies that CAMT cites. I would not suggest that music for anxiety and panic attacks as a “cure-all”. However this information suggests that music could be very helpful for your mental health. Knowing that you are doing something beneficial for your health can be very calming and make you feel good. However it is key to make sure that you are tackling your anxiety and panic attacks with evidenced based practices. I would encourage you to maybe consider music as an adjunct to the evidenced based techniques. References (Music for Anxiety) Canadian Association of Music Therapy. Music Therapy. Retrieved July 15, 2013 from: http://www.musictherapy.ca/en/information/music-therapy.html McGill University. Major Health benefits of music uncovered: The neurochemistry of music. Retrieved July 15, 2013 from:
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is entirely focused on the benefits of music for mental and physical health, specifically addressing anxiety and panic attacks. It provides educational and informative content from reputable sources without any unsafe elements. Therefore, it is fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85328-0", "llm_safety_score": 0, "reason": "educational and informative content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://panicattackrecovery.com/index.php/music-for-anxiety/", "date": "2023-03-24T13:38:04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00538.warc.gz", "language": "en", "language_score": 0.9421729445, "token_count": 552, "score": 2.984375, "int_score": 3 }
<urn:uuid:f08cc194-a03a-4fd3-9f94-1bc49b8611e7>
Heritage Museum of Orange County The Kellogg House. The Maag Farmhouse. Interior of the Kellogg House. Backstory and Context The two primary historic buildings at the museum are the Hiram C. Kellogg House and the John A. Maag Farmhouse. Both were relocated from their original settings to the museum in the early 1980s. The Kellogg House’s primary function is to educate young and old alike about life in Victorian Era Orange County. It has been a popular field trip destination for school children for over 30 years. The Maag Farmhouse, which was completed in 1899, will soon be the home of the museum’s archives, offices and will also display various historic exhibits. Included with the Maag Farmhouse are its two former outbuildings which once served as its pump house and carriage barn. The museum also maintains both a hydroponics and aquaponics garden as well as an organic farm that is cared for by local high school and Santa Ana College students. It produces its own fruit and vegetables which are sold to local establishments. Volunteers also tend to Gospel Swamp and Natural Area which was once home to squatters known as “swampers.” It was so named because local evangelical ministers held tent revivals for its residents back in the 1870s. Additionally, the museum offers a lecture series, group tours and various “hands-on and minds-on” educational programs. It is also, due to its bucolic setting, a popular location for weddings, receptions, corporate events, luncheons and teas.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on describing the Heritage Museum of Orange County and its various features, including historic buildings, educational programs, and community events. There is no unsafe, inappropriate, or harmful content present." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85329-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.theclio.com/entry/21977", "date": "2023-03-27T04:02:15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00538.warc.gz", "language": "en", "language_score": 0.9761764407, "token_count": 330, "score": 2.78125, "int_score": 3 }
<urn:uuid:9bbd85ad-3cb5-4888-90fd-e5a2831cbafa>
In today’s world, learning is no longer confined to a classroom. With the advancement of technology and the rise of social media, learners can access educational materials and connect with others from anywhere in the world. Embracing lifelong learning has become essential for individuals who want to stay ahead of the curve and succeed in the 21st century. The Importance of Lifelong Learning The concept of lifelong learning is not just a buzzword anymore. It has become a reality that needs to be embraced by individuals who want to keep up with the constantly evolving world of technology and markets. Lifelong learning helps individuals stay abreast of the latest developments in their field and prepares them for future challenges. Lifelong Learning and Career Advancement With the rapid pace of technological change, it’s important for individuals to keep learning throughout their careers to remain relevant and competitive in the job market. Embracing lifelong learning can help individuals acquire new skills and knowledge that can lead to career advancement and higher salaries. The Benefits of Lifelong Learning for Personal Growth Lifelong learning isn’t just important for career advancement, it also has numerous benefits for personal growth and development. Learning new things can help individuals stay mentally sharp, improve their memory, and increase their creativity. Lifelong learning can also help individuals explore new interests and hobbies, leading to a more fulfilling life. Leveraging Social Media for Learning Social media has become one of the most powerful tools for learning. Platforms like Facebook, Twitter, and Instagram provide learners with the opportunity to connect with people who can help them access educational resources. Social media platforms also enable learners to share ideas, ask questions, and collaborate with others, making learning a social experience. Finding Educational Resources on Social Media Social media platforms are a treasure trove of educational resources. Individuals can follow experts in their field, join groups related to their interests, and participate in online communities to access valuable information and resources. Social media platforms also provide a platform for individuals to ask questions and get answers from others in their network. Collaborating with Others on Social Media Social media platforms enable learners to collaborate with others on projects and assignments, making learning a social experience. This collaboration can take the form of group discussions, peer review, and co-creation of content. Collaborating with others can help learners gain new perspectives, learn from different viewpoints, and build a network of peers and mentors. Harnessing the Power of Technology for Learning Technology has transformed the way we learn, providing access to educational materials from anywhere in the world. E-learning platforms have made it possible for learners to watch lectures and take courses from renowned institutions without leaving their homes. The power of technology for learning should not be underestimated. The Rise of E-Learning E-learning has exploded in popularity in recent years, providing learners with access to educational materials from the comfort of their own homes. E-learning platforms offer a range of courses and programs, from introductory courses to advanced degrees. These platforms are often more affordable than traditional educational institutions and offer greater flexibility in terms of scheduling and pacing. Using Apps and Tools for Learning In addition to e-learning platforms, there are a variety of apps and tools available that can help individuals learn new skills and acquire knowledge. These apps and tools range from language learning apps to coding platforms to virtual reality simulations. Using these tools can make learning more engaging and interactive, helping individuals retain information more effectively. Overcoming Geographical Limitations Geographical limitations no longer need to be an obstacle to learning. With the power of technology, learners who live in remote locations or who may not have access to traditional educational institutions can still gain access to the educational materials they need. Online learning platforms and educational resources allow learners to connect with instructors and peers from anywhere in the world. Online Learning Platforms and Resources One way to overcome geographical limitations in learning is to seek out online learning platforms that offer courses and resources in your desired field of study. These platforms can provide access to educational materials that may not be available locally. Connect with Peers and Instructors Connecting with peers and instructors through online forums or social media groups can help you form study groups and expand your learning community. This allows you to connect with individuals who share your interests and may offer unique perspectives on course material. Utilize Online Tools and Resources Utilizing online tools and resources, such as virtual libraries or online research databases, can give you access to a wealth of information and educational materials that may not be available in your local area. Learn Anytime, Anywhere One of the greatest benefits of leveraging technology for learning is the ability to learn anytime, anywhere. With the emergence of mobile devices and tablets, learners can now access educational materials on the go. This is especially beneficial for those who are travelling or cannot find the time to attend traditional classes. Flexible Learning Options Taking advantage of the ability to learn anytime, anywhere means finding online courses or resources that fit your schedule and learning pace. Many online learning platforms offer flexible learning options, allowing you to learn at your own pace and on your own schedule. Using mobile devices or tablets to access educational materials on the go is another way to take advantage of the ability to learn anytime, anywhere. This allows you to learn during a commute, on a break at work, or in any other free moment you may have throughout the day. Continued Learning Outside of Traditional Class Times Leveraging online discussion forums or virtual study groups can help you connect with peers and continue learning outside of traditional class times. This allows you to stay engaged with course material and connect with others who share your interests. Unlocking Your Educational Potential The potential of the internet and social media to revolutionize the way we learn is tremendous. Leveraging these tools can help individuals unlock their educational potential and open up a world of possibilities. With the right attitude and a little dedication, learners can make use of the vast array of educational resources available online. Online learning offers flexibility, access to a wide range of courses, and the ability to learn at your own pace. Set Educational Goals Setting specific educational goals and creating a plan for achieving them through online resources can help you unlock your educational potential. This can include setting goals for completing courses, acquiring new skills, or achieving a degree or certification. Explore a Variety of Online Courses and Resources Exploring a variety of online courses and resources can help you find the best fit for your learning style and interests. This allows you to take advantage of the wide range of educational materials available online and find the resources that are most relevant and engaging for you. Get Feedback on Your Progress Taking advantage of online tools, such as online tutors or peer review platforms, can help you get feedback on your progress and improve your learning outcomes. This allows you to continually improve your skills and knowledge in your chosen field of study. Technology has transformed the way we learn, and it is important for individuals to take advantage of all the possibilities it offers. Learning can now be done anytime and anywhere, and it is up to the individual to decide how they want to take advantage of this new reality. With the right attitude and dedication, learners can unlock their educational potential and make the most of the resources available to them.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample discusses the importance of lifelong learning and the benefits of using technology and social media for education. It does not contain any unsafe, inappropriate, or harmful content.", "{\"reason\": \"promotes continued learning and educational resources\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on promoting the benefits of using mobile devices and online resources for learning. It does not contain any unsafe or inappropriate content, and the language used is respectful and appropriate for all audiences. Therefore, it is fully safe and suitable for public use, educational environments, and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85330-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85330-1", "llm_safety_score": 0, "reason": "promotes continued learning and educational resources" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://lifesmartly.com/learn-anywhere-anytime-harness-technology-and-social-media-for-lifelong-learning/", "date": "2023-03-29T19:38:34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949025.18/warc/CC-MAIN-20230329182643-20230329212643-00538.warc.gz", "language": "en", "language_score": 0.936948061, "token_count": 1489, "score": 3.03125, "int_score": 3 }
<urn:uuid:70e40d1d-5ee9-400a-b630-e6432d9bf0fd>
So it's important to really understand the nerves that pass through the elbow understanding the location of the nerves to give you a better idea on when the might be impinged. Patients that complain about certain weaknesses, numbness and tingling of the hand or the forearm or radiating pain could potentially have nerve compression and so understanding the route of these nerves are important to better understand where they may be potentially compressed. So the median nerve lies deep to the antecubital fossa, it is medial to the biceps brachii. The radial nerve is lateral to the biceps and brachialis muscle. whereas the ulnar nerve runs more posteriorly and posterior to the medial epicondyle running through the ulnar groove. So the ulnar nerve innervates the ulnar collateral ligaments and supplies the flexor carpi ulnaris The median nerve passes between the brachialis and the bicipital aponeurosis to supply the pronator muscles and most of the wrist and hand flexors. The radial nerve has a medial and posterior branch that supplies the triceps, anconeus and the posterior and anteriolateral joint capsule. They also have a lateral branch that pierces the lateral intermuscular septum and that supplies extensor carpi radialis longus and also continues on as the posterior interosseous nerve. So somatic dysfunctions can occur at the elbow joint. These dysfunctions could be due to injury or repetitive motion. Most of the time it's associated with some sort of inflammation and muscle spasms and sometimes would be compensation for injuries outside of the elbow, at the wrist or shoulder. So when we're trying to diagnose a somatic dysfunction we're making it based on motion testing. And so, if we have a restriction in flexion or extension, that could lead us to make a diagnosis of a flexion or extension dysfunction. So remember, somatic dysfunctions are named for its freedom. So if I have a flexion dysfunction of the elbow, that means that there's a preference for flexion and that there's a limited range of motion in extension. The opposite is true in an extension dysfunction The elbow prefers extension but then has difficulty reaching the full range of motion in flexion. At the radial ulnar joint, we have pronation and supination as motions. If we have restrictions in a pronation or supination, that could lead us to diagnosing somatic dysfunctions in that motion. So if I have a pronation we're gonna have a restriction in supination because pronation is the freedom of motion. Now, there's an association between the radial head positioning and how the forearm likes to glide. So, a radial head that is stuck in a posterior position prefers pronation whereas a supination dysfunction has restriction in pronation and the radilal head is not going to prefer anterior glide. So another way to diagnose radial head somatic dysfunction specifically is to contact the radial head and then motion test. So when we motion test, what we're going to do is we're going to passively move the forearm into supination and pronation and while we're monitoring at the radial head, we're gonna see which way does the movement of the radial head feel freer Does the radial head move more posterior in pronation or does it move more anterior in supination? So that is one way to passively test freedom of motion at the radial head. An alternative way is to do an active screening. So in an active screening, we're gonna have our patients kinda put their elbows against their body and have their elbows flexed at 90 degrees. We're gonna start at neutral and then we're gonna ask the patients to pronate both sides and supinate both sides. And so what you're looking for, is there a freedom of motion to either pronation or supination as the patient does that. The diagnosis is made with the side of increased freedom. An easy way to remember the direction of motion of the radial head with pronation and supination is a mnemonic PPAS, 'cause if you'll remember it, it'll help you pass your examinations. Posterior is associated with pronation and anterior radial head is associated with supination. So let's apply the knowledge that we just covered. A 45 year old tennis player presents with right lateral elbow pain. On active range of motion testing you find that he is only able to pronate his right elbow about 5 degrees while having full range of motion with supination. What is his radial head somatic So here, we have the tennis player who is unable to fully pronate his elbow. So if you are unable to fully pronate your elbow, you have a freedom of motion in supination. Remember back that we have the radial head is more anterior, that's associated with supination while posterior is associated with pronation. So in this case, we have a right anterior radial head somatic dysfunction. This is a case where we have a 14-year old male presents with right elbow pain after tripping and falling 2 days ago. He states that he fell forward on his right wrist with his elbow extended. X-rays of the elbow were negative for fracture and on passive motion testing, there was a decreased in right elbow supination. So what is the radial head somatic dysfunction? So here, our patient fell with outreached hand forward. And so, what you notice here is that the forearm is pronated, we have a crossing of the ulna and radius. So when you fall forward and land on your wrist, a lot of times that jams the radius into the elbow and creates a dysfunction. If it's crossed over, then it's more posterior because our forearm is pronated. and so that would lead to an increased risk of a posterior radial head dysfunction. The motion and characteristics on testing also confirmed that since there was decreased right elbow supination, the freedom of motion was pronation. Thus, giving us our diagnosis of a posterior radial head The opposite would be true if we were to fall with hand behind us because our forearm is now straight and where our forearm is supinated, when we jam the elbow in a supinated position that might cause anterior radial head.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is a detailed explanation of the anatomy and physiology of the elbow and associated nerves. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for educational environments and general audiences.", "{\"reason\": \"anatomical and medical content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a medical explanation about a specific anatomical condition and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational environments and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85331-0", "llm_safety_score": 0, "reason": "educational content" }, { "custom_id": "85331-1", "llm_safety_score": 0, "reason": "anatomical and medical content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.lecturio.com/medical-courses/elbow-anatomy-nerves-radial-head-dysfunction.lecture", "date": "2023-03-31T03:07:09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00538.warc.gz", "language": "en", "language_score": 0.8892872334, "token_count": 1457, "score": 2.5625, "int_score": 3 }
<urn:uuid:dcae380d-8078-43ec-acb7-8ba28bdd7d79>
On Monday 5 October, Maastricht University started with its very first MOOC (Massive Open Online Course) during which it introduces people from all over the world to our Problem-Based Learning (PBL) system. Maastricht University has been continuously working on innovating its PBL system and is now ready to show the world the knowledge that it has gained over 40 years of applying and improving this method. Problem-Based Learning is an educational model that encourages students to work together in small groups, and focuses on critical thinking. This student-centered approach teaches students to collaborate effectively and develop problem-solving skills, which students can benefit from in any phase of their future careers. The newly developed MOOC course of the UM teaches everyone that participates what the basics are of PBL, by actually practicing PBL in a MOOC set-up. The course will last for eight weeks, and all the participants will study relevant PBL problems combined with examples from many different domains. All people involved will be divided into small online groups, in which they will discuss what they have learned and how this knowledge could be applied to their own educational setting. Professors, teachers and PBL researchers of Maastricht University will be the facilitators and will guide you during your first PBL experience. Every participant will start with a basics course on PBL and will continue with a module of your choice. During this experimental online course on PBL the university will gather feedback from the participants and try to innovate and improve the PBL model to see whether it could be applied in a worldwide setting. If you want to get to know people from all over the world, work with them on interesting topics in small online groups, and experience PBL on a global level, sign up and join this new experience! Sign up here Watch the trailer via YouTube
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is entirely focused on promoting an educational initiative (MOOC) related to Problem-Based Learning (PBL) at Maastricht University. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to education and collaboration, making it fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85332-0", "llm_safety_score": 0, "reason": "educational content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://edlab.nl/um-mooc-introducing-the-world-to-problem-based-learning/", "date": "2023-03-20T14:59:30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00738.warc.gz", "language": "en", "language_score": 0.9527564645, "token_count": 378, "score": 2.53125, "int_score": 3 }
<urn:uuid:dc021ab0-8e51-48f8-9933-4d0738a4c5bc>
What Is Glass Microsphere? Hollow Glass Microspheres and Other Similar Systems Hollow glass microspheres and similar systems are increasingly popular, thanks to various environmental factors. In addition to being used in environmental remediation, they are an effective way to reduce the number of greenhouse gases (GHG) produced. Multiple countries have implemented policies to help mitigate the effects of these emissions. In the United States, for example, several states have recently committed to reducing their GHG emissions through executive action plans. What Is Glass Microsphere? A glass microsphere is a microscopic sphere made from glass. They are used in a variety of applications. Their sizes usually range from one micrometer to one thousand micrometers. However, they can also be smaller or larger. The diameter of a glass microsphere depends on its application. A solid glass microsphere is also known as a glass bead and is commonly used as a resin extender. While it does not offer the low density of hollow spheres, it can enhance a material's physical properties. Potters Industries produces Spheriglass made from 30% solid glass microspheres. Glass microspheres have many uses, and their density can influence the formulation of a part. The typical loading for a glass microsphere is 25 percent of the volume of the resin. This density is enough to affect the overall part's weight and VOC content. This property allows glass microspheres to be used in products where weight is a key consideration. Microspheres can be made opaque or partially translucent. They can be conductive, fluorescent, or magnetic. In addition, surface treatments can improve the bonding between the microsphere and its matrix. One company specializing in coating glass microspheres with metals is Microsphere Technology Ltd., in Edinburgh, Scotland. The coating can be as thin as a nanometer or as thick as several micrometers. Where is hollow glass or glass microsphere used? Hollow glass microspheres are a type of glass particle with low specific gravity. These particles are used in various applications and exhibit good thermal conductivity and heat resistance. Additionally, they exhibit a low dielectric constant and can be used in applications that require low dielectric constants. These spheres are made of different materials, such as silica and multi-oxide glass. While pure silica microspheres are the most common, it is possible to manufacture them using a proprietary Borosilicate-Sodalime glass blend. Zirconia and silica are also popular materials used in the fabrication of microspheres. The surface tension effect helps achieve almost perfect spherical shapes. A hollow glass microsphere is an excellent vehicle for various therapeutic agents, as they have unique capabilities. Because of their size and shape, they can effectively encapsulate fragile drugs, extending their stay in the gastric region. They can also help control the release of drugs by providing a uniform surface area. While hollow glass microspheres are commonly used in a wide range of applications, they differ in their chemical composition, size, and texture. Some are made of glass, while others are made of plastic. Some microspheres are more susceptible to heat damage and chemical interactions. The molding process and the product's end use can affect these properties. Another important property of hollow glass microspheres is their low density. These microspheres can be used to extend the properties of liquids and resins. The disadvantage of solid glass microspheres is that they do not have a low density of hollow glass microspheres. However, their higher density can enhance their physical properties. Some manufacturers, such as Potters Industries, use 30% or more solid glass microspheres in their products, significantly reducing warpage. What are glass microspheres used for? Hollow glass microspheres are small, hollow particles typically made of low-density glass. They are often used as resin extenders because they do not lose their density when crushed and thus improve the physical properties of a material. For example, 3M's iM30K hollow glass microspheres have a high isostatic compressive strength of 30,000 psi and a density of 0.6 g/cc. Because of their low density, iM30K microspheres can be used in molded parts up to 20% without compromising their impact strength. Furthermore, their small particle size means they can reduce the final weight of the part by 15 percent. Hollow glass microspheres are used in many different applications. They can be used in pharmaceutical applications for controlling the release of radioactive tracers or in manufacturing plastics for use in electronics. They are also used to fill polymer resins and seal surfaces. For instance, surfboard shapers use them to seal EPS foam blanks with epoxy. Another application for hollow glass microspheres is in flip-chip technology, where they can be used as components of flip-chip electronics. Hollow glass microspheres are an excellent choice for coating applications. Their low surface area and density allow easy rolling through a coating material. They also increase the solid composition of a coating. This helps ensure proper application and increases the value of the manufactured coating. Moreover, they are resistant to chemicals and heat. These hollow glass microspheres are often made from ceramic materials. Some are coated with special materials and have unique properties. Furthermore, they can be opaque or paramagnetic. In addition, they can also have fluorescent or phosphorescent properties. How are hollow glass microspheres made? Hollow glass microspheres are made using an organic process. The main ingredients are Sio2 and Al2o3. These glass particles have a low density and good heat insulation performance. This makes them a useful raw material for thermal insulation coatings. In addition, they are relatively light. Hollow glass microspheres have a high ball-type rate, which increases their mobility, reducing the viscosity of the resin mixture. They also reduce the internal stress of composite materials. This means that they will produce less heat during manufacturing. This reduces the risk of inadequate lubrication or partial thermal decomposition. Furthermore, hollow glass microspheres can increase production efficiency by 15% to 20%. They are available in a wide range of sizes and qualities. One way to create these microspheres is to heat them and remove the sulfur content. Treating glass makes the amount of sulfur as low as 0.5%. The boron content in the glass also facilitates the transformation into microspheres. The amount of boron in the glass can range from 1 to 15%. High-quality microspheres are more expensive than their cheaper counterparts. Low-cost microspheres may have poor shape and uniformity, wide particle-size distribution, and dust or debris. They may also contain a small proportion of non-spherical particles, which can negatively affect the finished product. A microsphere of a higher density can be obtained by reducing the particle feed delivery. It is important to start with a smaller particle size to achieve this. Tests carried out under five micrometers have shown that this method is feasible, although it does reduce yield. Which is the disadvantage of glass microspheres? Hollow glass microspheres are small, hollow spheres made of borosilicate glass. The material has properties that make it useful in various applications. They are lightweight, have low thermal conductivity, and are non-toxic, non-combustible, and highly stable. They are particularly effective as product fillers in artificial marble, putty, and building materials. A thin-shelled hollow glass microsphere's compressive strength is similar to that of talc, yet the density is much lower. A typical hollow glass microsphere has a density of 0.6 g/mL, or one-fourth that of talc. However, the density of a hollow glass microsphere varies considerably. Soda lime glass microspheres are the most popular and economically viable type of hollow glass microsphere. For higher-temperature applications, Borosilicate glass is preferred. Barium titanate glass is another popular glass formulation because it offers a high density and index of refraction. But most hollow glass microspheres are made from a proprietary Borosilicate-Sodalime glass blend. Ceramic materials like zirconia and silica are also commonly used as microspheres. Hollow glass microspheres are used for drug delivery in a variety of applications. Traditionally, targeted drug delivery has relied on controlled dosage. However, this approach had several drawbacks. First, these small spheres were hard to hold in the gastrointestinal tract. This resulted in variations in the rate of gastric release and decreased the amount of medicine absorbed by the patient. In addition, it made the medication less effective because of the short residence time in the tract. The second disadvantage of hollow glass microspheres is their fragility. Chemicals can easily damage this material, but the advantage is that it is less brittle than a traditional polymer. Hollow glass microspheres supplier Luoyang Tongrun Nano Technology Co. Ltd. (TRUNNANO) is a trusted global chemical material supplier & manufacturer with over 12-year-experience in providing super high-quality chemicals and Nanomaterials, including boride powder, nitride powder, graphite powder, sulfide powder, 3D printing powder, etc. If you are looking for high-quality Hollow Glass Microspheres, please feel free to contact us and send an inquiry. (email: email@example.com)
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the properties and applications of glass microspheres. It does not contain any unsafe, inappropriate, or harmful content.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the properties and manufacturing process of hollow glass microspheres. It does not contain any unsafe, inappropriate, or harmful content. The language is technical and informative, suitable for educational and professional contexts." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85334-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85334-1", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.mis-asia.com/Answers/What-Is-Glass-Microsphere.html", "date": "2023-03-23T08:12:50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00738.warc.gz", "language": "en", "language_score": 0.9423133731, "token_count": 1991, "score": 3.5, "int_score": 4 }
<urn:uuid:7e967dba-9caa-4aee-8228-1339bb5d345c>
Background: Excessive internet game use frequently leads to various physical, psychological, and social problems, and internet gaming disorder (IGD) has become a serious public health issue worldwide. Recently, virtual reality (VR) therapy has emerged as a promising method to increase psychological treatment motivation and accessibility. However, few studies have examined the potential of VR technology for the management of IGD, and VR content tailored to IGD characteristics remains scarce. Objective: This preliminary study aimed to examine the potential of a VR-based program that was designed to help users identify their leisure time use patterns, especially those related to gaming, and to modify their gaming overuse by alternative activities provided in the VR content. Moreover, to investigate whether users’ VR activities reflect various clinical variables of IGD in youth, we examined the relationships among the leisure time activity selection pattern, built-in response, and speech data obtained from the VR program, as well as symptom severity of internet gaming, psychiatric comorbidities, and motivation of participants reported through relevant questionnaire data. Methods: Three types of VR content (understanding my daily activities at home, finding an alternative activity to internet gaming at home, expressing contradictory opinions toward a friend’s gaming beliefs) were developed by simulating the daily situations in which patients with IGD can select alternative free-time leisure activities. We examined internet addiction, mental health problems, and motivation for 23 IGD and 29 control participants. Behavioral and self-rated responses from VR, such as alternative activity selection data and speech patterns (speech time, speech satisfaction, and speech accordance), and results from various questionnaires were compared between groups. The correlations between IGD behaviors in VR and real-life behaviors assessed by questionnaire measures were analyzed. Results: Significant correlations were found between internet gaming behavior and user activity data, such as speech and activity selection pattern, in our VR program. Our results showed that the IGD group had fewer leisure activities and preferred game or digital activities to other types of activities compared to controls, even in VR. There was a positive relationship between the viability of alternative leisure activities the participants selected in VR and the amount of perceived satisfaction from that activity (r=.748, P<.001). Speech accordance in the IGD group was lower than in the control group and was correlated negatively with Internet Addiction Test and Internet Addiction Test–gaming scores (r=.300, P=.03) but positively with users’ motivation (r=.312, P=.02). Conclusions: The results from our VR program can provide information about daily activity patterns of youths with IGD and the relationship between user VR activities and IGD symptoms, which can be useful in applying VR technology to IGD management. Internet gaming is the most common leisure activity among adolescents in East Asian countries, including South Korea [, ] and China [ ]. While some studies have proposed positive effects of internet gaming [ , ], excessive internet game use frequently leads to various physical, psychological, and social problems [ - ]. The concept of internet gaming disorder (IGD), defined as the persistent and recurrent use of the internet to engage in games despite negative consequences, has been controversial. Diagnostic criteria or guidelines for IGD have been proposed by several investigators, but there has been continued debate around the conceptualization of IGD. Therefore, studies of IGD-targeted treatment mechanisms are needed to help with the classification of behavioral addiction and the effective management of individuals with IGD [ - ]. Regarding IGD treatment, theories based on cognitive behavioral therapy (CBT) and motivational enhancement therapy (MET) have been promising approaches to explain addictive behaviors , and they have been commonly used as effective treatment for IGD [ - ]. The CBT model claims that the identification and modification of maladaptive cognition on internet gaming are crucial factors for treatment [ ]. Maladaptive cognitions such as excessive preoccupation with internet gaming, impaired cognitive control, and cognitive inflexibility contribute to compulsive internet gaming activity [ , , ]. Additionally, the motivation-focused model of addiction has been employed for the management of IGD, as motivational drives linked to reward-seeking also contribute to problematic gaming behavior [, ]. Individuals with IGD are reported to have enhanced reward sensitivity and decreased loss sensitivity, leading to stronger motivation to play compared to people without IGD [ , , ]. Taken together, CBT and MET models of addiction suggest that treatment for IGD requires assessing the individual’s cognitive and behavioral patterns and motivation before a specific therapeutic plan is implemented. Therefore, the management of the selection process for gaming activities is important for finding the triggering factors that motivate and maintain people’s excessive gaming behaviors [, ]. Since people with IGD often do not have insight on their excessive preoccupation with gaming, it is necessary for patients with IGD to identify the pattern and underlying motivation of their leisure activities to manage their problematic gaming effectively. For example, identification of the times and places that elicit people’s craving for gaming in their free time and a technique to control this craving and the motivational components of internet gaming is necessary for IGD management [ ]. For this purpose, therapists also need to observe and intervene in the behavior of individuals with IGD in response to exposure cues for leisure activities in situations that increase the patients’ risk of gaming. However, it is difficult to reproduce the actual reality of the gaming cue exposure through the process of traditional treatment. Besides, in a real-world situation, it is also difficult to follow up and collect patients’ behavioral data in real time. Alternatively, CBT using virtual reality (VR) technology is a promising method to increase motivation for and accessibility of mental health treatments, especially among youth who are generally positive to the appeal of modern digital technology [- , - ]. Moreover, VR features are immersive and interactive, simulating reality without space and time limits [ ]. Gestures and voice inputs are effective means of interacting with avatars in virtual space while also maintaining full potential for flow and immersion [ , ]. The VR program also automatically records users’ activity and verbal data, allowing for real-time data analysis. Despite these advantages of VR-CBT, few studies have examined the effects of VR for IGD management, and VR content tailored to IGD characteristics is scarce. Regarding the embodiment of IGD management techniques, we mainly used the self-speech technique. The definition of “self-speech” in our program was the verbalization of one’s opinions in their own words in response to the questions asked by avatars. Self-speech is reported to help to self-regulate cognition and behavior in addition to positively influencing self-control [, ]. It also helps people accomplish self-distancing and objectification, enabling individuals with IGD to reappraise their cognition on gaming guided by objective viewpoints in the VR program [ ]. As computer technologies related to voice recognition and processing have developed, speech has also become a viable interaction modality in VR environments. Given this background, the objectives of this study were to examine the potential of a VR-based program that was designed to help users identify their leisure time use patterns, especially those related to gaming, and to modify their gaming overuse by alternative activities provided in the VR content. More specifically, to investigate whether behavioral responses to our VR program were associated with various IGD clinical variables, we examined the relationships among leisure time activity selection pattern, built-in response and speech data (speech time, speech satisfaction, and speech accordance) obtained from our VR program, and IGD symptom severity, psychiatric comorbidities, and motivation of participants reported through relevant questionnaire data. Sample Size (Power) Power analysis for an independent t test was conducted in the G*Power program to determine the necessary sample size, with an alpha of .05, power of 0.80, large effect size (f =0.8), and 2 tails . The results from our sample size calculation suggested that the desired sample size was estimated to be 26 in each group, totaling 52 subjects, to detect the group difference in our dependent measures. Participants were recruited from online community and social network sites in South Korea and through flyers. Since men are known to have a higher prevalence of IGD than women, and to avoid gender-specific confounding factors related to the pattern of gaming craving and motivations affecting the results, only male participants were recruited . Participants were 52 men aged 11-25 years, and 44 (44/52, 85%) were either high school or university students, aged between 16 and 25 years. Age was matched between the 2 groups during the assignment procedure, but other variables in our study were the result of simple randomization. All participants were evaluated for internet use patterns and interviewed by a psychiatrist for IGD diagnosis according to the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) [ ]. In the control group, no one had ever been diagnosed with IGD or other DSM-5 psychiatric disorders. Exclusion criteria for all participants were current use of psychotropic medication and history of substance use disorder, serious neurological or medical disorder, bipolar I disorder, and psychotic disorder according to the Mini-International Neuropsychiatric Interview for Children and Adolescents (MINI-KID 6.0) [ ] for participants younger than 18 years and the MINI 5.0 for adult participants [ ]. However, 3 participants with psychiatric comorbidities were included (1 attention deficit hyperactivity disorder [ADHD], 1 depressive disorder, 1 adjustment disorder) in the IGD group. IQ was assessed using the short form of the Wechsler Intelligence Scale for Children—Third Edition and Wechsler Adult Intelligence Scale—Revised [ , ]. The Internet Addiction Test (IAT) [ ], one of the most utilized diagnostic instruments for internet addiction, was used to assess IGD symptom severity (Cronbach α=.90). All participants completed a modified version of the IAT that replaced the term “Internet” with terms such as “Internet games” to assess specific subtypes of internet addiction [ - ]. As IGD is frequently comorbid with other psychiatric disorders [ ], participants completed the short version of Conners-Wells’ Adolescent Self-Report Scale (CASS-S) for adolescents (Cronbach α=.88) [ ] and Conner’s Adult ADHD Rating Scale (Cronbach α=.87) [ ] for adult participants to measure ADHD symptoms [ , ], Center for Epidemiological Studies Depression Scale (CES-D) for depression (Cronbach α=.91) [ , ], and Beck Anxiety Inventory (BAI) for anxiety (Cronbach α=.92) [ ]. The Free Time Motivation Scale for Adolescents (FTMS-A; Cronbach α=.75) was also administered to measure 5 subscales representing various types of motivation to engage in certain types of leisure time activities [ ]. The presence questionnaire (PQ; Cronbach α=.84) [, ], Simulator Sickness Questionnaire (SSQ) [ ], and Client Satisfaction Questionnaire (CSQ) [ ] were used to measure the users’ experience with our system. PQ is a measure of users’ presence in virtual reality, which is a psychological state of “being there” and an important element of VR experience. Presence can enhance users’ active engagement in content, involving their senses and capturing their attention. SSQ assesses simulator sickness resulting from the discrepancy between simulated visual motion and the sense of movement coming from the vestibular system. Simulator sickness is negatively correlated with users’ enjoyment of VR programs. Finally, CSQ was used to rate the users’ general satisfaction with our VR training session. A between-subjects user study was conducted for about 1 hour. Participants were asked to complete written questionnaires about their demographic background and internet usage patterns, including the average hours they spent online gaming, frequency of internet usage, and name of a game they mainly play. Participants were adjusted to the virtual environment during the training session and then were asked to play 3 types of VR content, described in the following sections. The content was counterbalanced to prevent systemic order effect. Upon completing the program, participants were debriefed about their VR experience, using the postquestionnaire form. The VR system was a desktop computer running Microsoft Windows 10 containing an NVIDIA GeForce GTX 970 graphics card and an Oculus Rift head-mounted display with tracker (Oculus VR, LLC, Irvine, CA; HD resolution of 1080 × 1200 per eye with 51.6 diagonal field of view, a 3-DOF tracker for head rotation, and built-in headphones). Mounted on the headset, the Leap Motion Controller (Leap Motion Inc, San Francisco, CA), a new device suitable for hand gesture–controlled user interfaces, was used for interactions with executable objects and avatars during the VR experience (). The microphone built into the VR headset gathered verbal data from users’ self-speech in real time. Three-dimensional virtual environments included a virtual house and appliances using Autodesk 3D max. User instruction was provided verbally. The virtual environment was integrated with Unity software. User data such as type of selected activities and selection time, head movement, hand gesture, speech content, and speaking time were recorded and stored in the main server computer. Menu navigation on screen was performed by virtual hands positioned to match the user’s hands. This system allowed the therapist to track patient performance and analyze behavioral information. Our VR training system emphasized the development of motivation for change based on the implementation of CBT and MET principles by: (1) identifying situations, thoughts, and behavior associated with internet game use by providing situations that increase the patients’ risk of gaming and dysfunctional beliefs that support the maintenance of behavioral addiction issues; (2) conducting cognitive restructuring with these dysfunctional beliefs by describing the pros and cons of his or her online activity, expressing contradictory opinions against irrational beliefs about games; and (3) raising one’s motivation by devising a self-determined choice of activities to modify one’s maladaptive leisure time use pattern. Content 1 involved “understanding my daily leisure activities at home” and was designed to understand the pattern of participants’ choice of leisure activities in daily life. It provided real-life situations that increase the patients’ risk of internet gaming and their dysfunctional behavioral patterns that support the maintenance of gaming issues.A shows a blueprint menu of an indoor apartment showing the whole space for finding leisure activities. It consisted of a porch, participant’s room, small room, living room, kitchen, and restroom. At the start of each level, the entrance of the apartment was displayed from the first-person perspective. When users selected a room in the House Map menu with their hands, the scene automatically started at the entrance of the chosen room. The program then suggested users explore and select a set of leisure activities by choosing virtual objects placed in each room ( B). After selecting each activity, 2 questions were presented on the head-mounted display screen. Users determined the proportion of the chosen activity during daily life measured using a visual analog scale (VAS) ranging from 0% to 100%. Missions A and B consisted of the same virtual environment, but Mission A aimed to discover leisure activities during the daytime, while Mission B targeted activities during the nighttime. explains the list of leisure activities users can select in each room. Content 2 involved “finding an alternative activity to internet gaming at home” and was designed to encourage users to discover alternative activities the user can substitute for game playing. This is analogous to the alternative thought recording, which is one of the most commonly used CBT techniques to modify an individual’s irrational cognition. We tried to figure out the behavioral differences between the IGD group and control group through the alternative activity selection pattern in VR and self-reported viability. The virtual environment of Content 2 was identical to that of Content 1. The program asked users to find leisure activities commonly found at home to replace internet gaming. Once an activity was selected, the self-assessment for perceived viability (“How likely are you actually to do the selected activities at home in your daily life?”) and perceived satisfaction (“How satisfied do you think you will be when you participate in the selected activity?”) of the selected activity were measured using a VAS (). Additionally, an Add Activity menu was provided to add custom activities that are not found in the apartment to maximize user autonomy. After choosing all leisure activities, visualized training feedback results that were analyzed based on the participants’ own activities in VR were displayed as a pie diagram ( C). The program also automatically recorded activity type and corresponding response, allowing for real-time data analysis. The activities on a computer, mobile phone, and console game were included in the digital activity category for analysis. Content 3 involved “expressing contradictory opinions toward friend’s gaming beliefs” and was designed for users to reappraise their cognition regarding games, rebutting common motivations for playing games. In Mission A, we collected participants’ self-speech data in which they express contradictory opinions against male avatar’s beliefs about games and recommend alternative activities they chose in Content 2 to the avatar friends in VR. Then, users were asked to express contradictory opinions toward the avatar peers’ beliefs regarding games through self-speech about 6 topics that are based on gaming motivation theory of socialization, achievement, and dissociation (see the detailed scripts of these topics in). Also, the users were given a VR content wherein an avatar peer-pressured the user to play a game together to relieve stress from exams or to win a battle against their opponents. The users were instructed to refuse the avatar’s invitations to play the game by stating the reason or to provide alternative activities to gaming; whether the users could refuse their peers’ proposals to play the game was observed. Through this training, users could also review their gaming motivations and ensure that self-assertiveness is achieved properly. In Mission B, the users’ own selection of alternative activities from Content 1 and Content 2 were displayed as a mind map on the TV screen, helping users to make a 1-minute speech about the strengths of alternative activities on physical, social, and psychological aspects in comparison to gaming and internet use. All the speech content was automatically recorded when users pressed a speech button during the VR program. After each speech session, participants were required to rate their speech using a VAS in terms of 3 elements: speech time (duration of speech measured in milliseconds), speech satisfaction (self-assessment of satisfaction of one’s speech), and speech accordance (concordance of self-speech contents they spoke and users’ actual thoughts; “How much does your opinion in reality match what you just said?”). The main dependent variables in each group were normally distributed, as assessed by a Shapiro-Wilk test (P>.05). All demographic and clinical symptom measures were compared between the IGD and control groups using independent t tests (2-tailed). Bivariate correlation analysis (Pearson r) was conducted to examine the association between behavioral and speech results on VR tasks and IGD symptom severity assessed by IAT and IAT-gaming and various clinical questionnaire measures, such as CASS-S, CES-D, BAI, and FTMS-A. All analyses were conducted using SPSS 20.0 (SPSS Inc, Chicago, IL). In all cases, P<.05 (2-tailed) was considered statistically significant. The current study was approved by the Institutional Review Board of Yonsei University College of Medicine, Gangnam Severance Hospital, and written informed consent was obtained from all participants after they had received a detailed explanation of the study. In case of adolescents, written informed consent of their parents was also obtained. Comparison of Clinical Symptom Measures Between IGD and Control Groups shows the result of the 2-tailed independent t tests between the IGD and control groups in demographic and clinical variables. There were no differences in age and IQ between groups. As expected, the IGD group had higher IAT and IAT-gaming scores. A significantly higher CASS-S score was also reported for the IGD group, suggesting that the IGD group showed higher ADHD symptoms compared to controls. Moreover, IAT and BAI (r52=.314, P=.02), IAT and CES-D (r52=–.274, P=.049), IAT-gaming and BAI (r52=.339, P=.01), and IAT-gaming and CES-D (r52=–.260, P=.06) were significantly correlated, indicating that the severity of anxiety and depression symptoms was significantly associated with IGD severity. |Characteristics||IGDa group, (n=23), mean (SD)||Control group, (n=29), mean (SD)||t testb||P value| |Age (years)||18.91 (3.87)||19.75 (3.87)||0.788||.44| |IQ||113.6 (14.37)||117.6 (13.06)||0.038||.32| |IATc||64.87 (15.53)||37.68 (11.58)||−6.998||.00| |IAT-gaming||64.23 (15.09)||35.08 (12.76)||−8.940||.00| |CES-Dd||14.83 (9.01)||10.83 (8.07)||−1.860||.07| |BAIe||7.09 (7.39)||3.76 (4.05)||−2.068||.44| |ADHDf score||26.61 (14.73)||16.17 (9.03)||−3.146||.003| |PQg||122.87 (26.67)||133.10 (17.84)||1.654||.10| |SSQh||24.35 (7.64)||25.28 (10.26)||0.361||.72| |CSQi||11.65 (2.85)||13.31 (2.46)||2.246||.29| aIGD: internet gaming disorder. bThe degrees of freedom for all t tests were 51. cIAT: Internet Addiction Test. dCES-D: Center for Epidemiological Studies Depression Scale. eBAI: Beck Anxiety Inventory. fADHD: Attention Deficit Hyperactivity Disorder. gPQ: Presence Questionnaire. hSSQ: Simulator Sickness Questionnaire. iCSQ: Client Satisfaction Questionnaire. Leisure Activity in VR Content and Symptoms of IGD In Content 1, we tried to analyze the number and patterns of daily leisure activities in VR in the IGD and control groups. Our results showed that the IGD group had fewer activity domains than controls (t51=3.529, P<.001;A). Interestingly, even in the VR content, there were significant differences in the percentage of digital or game activities (ratio of game or digital leisure activities to total selected activities) between the IGD group and controls (t51=−2.79, P=.007; B and C). The IGD group preferred game or digital activities to other types of leisure activities more than controls did, and chosen activities were mostly in the mobile and computer category rather than being varied ( D). In Content 2, correlation analysis showed that the number of alternative activities chosen by each participant was negatively correlated with both the IAT (r52=−.341, P=.01) and IAT-gaming (r52=−.280, P=.04) scores (A). Additionally, the percentage of digital activities in VR was positively related to depression (r52=.416, P=.002) and anxiety (r52=.321, P=.02; B), indicating that selected activity in VR can closely relate to psychiatric symptoms. Lastly, there was a positive relationship between the viability of alternative leisure activity participants selected in the VR environment and the amount of perceived satisfaction from that activity (r52=0.748, P<.001). Speech Patterns About the Choice of Leisure Activities in VR In Content 3, the independent t tests showed that users’ speech time and speech satisfaction were not significantly different between the IGD and control groups, but speech accordance in the IGD group was lower than in the control group (t51=2.762, P=.008;A). Additionally, speech accordance was negatively correlated with IAT (r52=–.375, P=.006; B) and IAT-gaming scores (r52=–.376, P=.006; C), but positively correlated with motivation (r52=.300, P=.03; D). The average speech satisfaction score in VR was positively correlated with motivation (r52=.312, P=.02) and perceived pleasure of the activity (r52=.31, P=.03;A and B). Speech satisfaction score was negatively associated with depression (r52=−.392, P=.004) and frequency of digital activity in VR content (r48=.290, P=.04; C and D). Independent t tests reported no significant differences in PQ, SSQ, and CSQ scores between the 2 groups. This shows that both IGD and control groups had similar experience in terms of immersion, simulator sickness, and program usability. Our VR program aimed to help IGD patients to identify their game-related behavior patterns by simulating the daily situations where they can select leisure activities and manage risky situations that lead to gaming. We also found significant relationships between the behaviors of youth with IGD in VR and in daily life by presenting the significant relationships among leisure activity selection patterns, built-in response data obtained from the VR program, and IGD symptom severity, psychiatric comorbidity, and motivation of participants reported through relevant questionnaire data. With varied VR content, users were expected to autonomously engage in self-help training with enhanced accessibility and without face-to-face supervision from therapists. Based on CBT and MET principles, our VR program was constructed in a way that participants could practice managing malcognition about internet gaming and foster motivation and self-determination skills in an immersive virtual environment. Users were encouraged to think reflectively about their previous gaming behaviors and irrational game-related cognition. For example, one of the representative maladaptive patterns for cognition of patients with IGD who had “excessive preoccupation with internet gaming” was revealed through their overuse of digital-related activities, even in VR. Also, the real-time visual feedback report of selected activities using pie charts (C) was intended to help patients to recognize their maladaptive leisure time behavior patterns and can potentially be useful to establish objective behavioral evidence to assess their IGD symptoms. Moreover, the users were encouraged to increase their motivation to change by being given the opportunities for their own choice and self-direction while choosing free-time activities in our VR program. For example, the users were allowed to add their own activities in the Add Activity menu. Also, the self-rating component of perceived viability and perceived satisfaction of selected activities made it possible for the users to evaluate their motivation and acknowledge their own feelings related to this motivation. In addition, through self-speech in our VR program, users were given chances to voluntarily develop reflective thought-processing skills by considering the pros and cons of internet gaming. The data from our VR program can provide information about daily activity patterns of youths with IGD, as well as the relationship between user VR activities and IGD symptoms. This suggests that IGD symptoms can influence the users’ selection patterns for leisure activities and ability to discover alternative activities to gaming. The finding that the IGD group had fewer leisure activities and preferred game or digital activities to other types of activities, even in VR, may reflect the lack of interest or pool of leisure activities in youth with IGD beyond games [, ]. This was consistent with previous studies reporting cognitive bias (eg, attention and approach) to addiction-related stimuli in addiction-prone individuals [ ]. Similarly, patients with IGD are known to have a general preoccupation with internet gaming and overvaluation of game-related activities and reward [ , , ]. Our result was consistent with motivation-focused models postulating that addiction may be a disorder of misdirected motivation, in which greater priority is given to addiction-related stimuli [ , , ]. Additionally, there was a positive correlation between the viability of alternative leisure activities participants selected and the amount of perceived satisfaction of the activities or user’s motivation. This suggests that it is important to train youths with IGD to recognize and engage in various types of alternative activities, rather than indulging only in internet gaming, during their leisure time. Through our VR program, individuals with IGD may broaden their range of leisure activities by getting more exposure to new alternatives to replace internet gaming. This finding also shows the potential of our VR-based training to predict and prevent IGD-related symptoms, by providing the opportunity for people to observe their behavior patterns in VR and practice selecting alternative activities of their own choice. For IGD treatment, VR therapy is efficacious in decreasing craving and severity of internet addiction [, ]. However, unlike VR therapy for substance addictions or pathological gambling, few studies have formally examined the efficacy of VR therapy for IGD, and evidence-based treatment components have not been well-established [ , ]. To base our program on clinically proven evidence, our program tried to incorporate the treatment component of traditional CBT and MET models of addiction [ , ]. Furthermore, adopting the motivational aspect of addiction, our results, such as the positive correlation between speech satisfaction or accordance and users’ motivation, negative correlation between speech satisfaction and the percentage of digital activities in the VR content, the IAT and IAT-gaming scores, and depressive symptoms indicating the behavior pattern, speech satisfaction, and speech accordance measured in our VR program, may be useful to assess motivation, IGD symptom severity. and affective aspects of youth [ ]. Regarding the results of the PQ, SSQ, and CSQ, the IGD and control groups had similar levels of satisfaction in terms of immersion, simulator sickness, and program usability. Although our findings showed that our VR may predict IGD-related symptoms through VR-based user activities, this study had several limitations to consider. The small sample size, inclusion of only male participants, and relatively mild level of IGD severity among our participants limit the generalizability of our findings to female populations and those with severe symptoms. Also, participants of a diverse age range were recruited for this study. Children, adolescents, and young adults may have their own unique characteristics in gaming motivation and various leisure activities. Therefore, a detailed subgroup analysis regarding the difference between age groups is needed in future studies. Moreover, 3 patients with comorbid psychiatric disorders were included, for which the presence of a comorbid condition may be a confounding factor. However, the main findings of our study generally remained the same as those when including participants with comorbidities. Additionally, symptoms of IGD or other psychopathologies were measured by self-report instruments, and objective behavioral observation of users or reports from caregivers are required. Also, the FTMS-A, originally developed for the adolescent population, was used for adult participants for the ease of comparison between adolescent and young adult groups; however, the use of a motivation scale for the adult population is still needed. Moreover, the measured variables of self-speech were limited to speech time or users’ subjective self-rated variables. For deeper qualitative analysis, meaning-based speech content analysis is required. Furthermore, with the current technical limitations, previously reported simulator sickness [, - ] made it difficult for people to experience VR content that exploit user motion or the implementation of a moving environment in VR. In addition, the avatar cannot give any verbal or nonverbal feedback to the users or afford any other form of interactivity; thus, our program was limited in terms of responsiveness and realism in the virtual interaction landscape. With future technical advancement in motion capture, face capture, speech recognition, and acoustic, meaning-based speech analysis, inputs from VR systems will be fed into an artificial intelligence model that can determine the user’s goals and provide appropriate outputs that can be translated into speech and gestures of avatars. Also, some discrepancy may exist between leisure activities chosen in the VR and those in real life, as shown by the low speech accordance rate in IGD participants. Although our experiment was conducted in a controlled hospital setting with assistance from experimenters, further research is needed in the home environment using mobile or wearable devices to investigate the potential of our program as a standalone self-help therapy tool. Additionally, the role of gaming motivation as a mediating factor in the development of IGD was not fully explored in this study. It would be informative to investigate whether different motivations for playing internet games mediate or moderate the relationship between anxiety or depressive symptoms and IGD severity. Lastly, our preliminary study design did not allow for validation of our program to reduce IGD symptoms or related outcomes, such as the time spent on gaming or depressive symptoms, and various reliability measures, such as test-retest reliability, were also not measured. In future studies, different types of validity testing should be conducted with larger sample sizes to validate the clinical usefulness of our program. Our results showed significant correlations between behaviors of adolescent and young adults with IGD in VR and in daily life, in terms of the selection and verbalization of their leisure activities and related cognition. If a database is accumulated for more precise speech content analysis with a larger sample size, this system can potentially serve as a useful tool for researchers to understand IGD more deeply and also have a considerable impact on designing interaction and interface in VR content for patients with IGD. This work was supported by the Brain Research Program through the National Research Foundation of Korea, funded by the Ministry of Science, ICT & Future Planning (NRF- 2015M3C7A1065053). Conflicts of Interest Virtual reality system and experimental environment.PNG File , 419 KB Leisure activities in each room in Contents 1 and 2.DOCX File , 13 KB Screenshots for Content 2: (A) friend avatar's opinion; (B) self-speech; (C) self-report on accordance between speech and their opinion.PNG File , 309 KB Script of Content 3a based on 3 gaming motivations.DOCX File , 14 KB - Jeong EJ, Kim DH. Social activities, self-efficacy, game attitudes, and game addiction. Cyberpsychol Behav Soc Netw 2011 Apr;14(4):213-221. [CrossRef] [Medline] - Kim K, Ryu E, Chon M, Yeun E, Choi S, Seo J, et al. Internet addiction in Korean adolescents and its relation to depression and suicidal ideation: a questionnaire survey. Int J Nurs Stud 2006 Feb;43(2):185-192. [CrossRef] [Medline] - von Deneen KM, Yuan K, Qin W, Tian J, Liu Y, Gold MS. Internet Addiction. Directions in Psychiatry 2014;34(2):119-127. - Durkin K, Barber B. Not so doomed: computer game play and positive adolescent development. Journal of Applied Developmental Psychology 2002 Nov;23(4):373-392. [CrossRef] - Gamberini L, Barresi G, Maier A, Scarpetta F. A game a day keeps the doctor away: A short review of computer games in mental healthcare. Journal of CyberTherapy and Rehabilitation 2008;1(2):127. - Allison SE, von Wahlde L, Shockley T, Gabbard GO. The development of the self in the era of the internet and role-playing fantasy games. Am J Psychiatry 2006 Mar;163(3):381-385. [CrossRef] [Medline] - Davis R. A cognitive-behavioral model of pathological Internet use. Computers in Human Behavior 2001 Mar;17(2):187-195. [CrossRef] - Young KS, Rogers RC. The Relationship Between Depression and Internet Addiction. CyberPsychology & Behavior 1998 Jan;1(1):25-28. [CrossRef] - Rumpf H, Achab S, Billieux J, Bowden-Jones H, Carragher N, Demetrovics Z, et al. Including gaming disorder in the ICD-11: The need to do so from a clinical and public health perspective. J Behav Addict 2018 Sep 01;7(3):556-561 [FREE Full text] [CrossRef] [Medline] - Saunders JB, Hao W, Long J, King DL, Mann K, Fauth-Bühler M, et al. Gaming disorder: Its delineation as an important condition for diagnosis, management, and prevention. J Behav Addict 2017 Sep 01;6(3):271-279 [FREE Full text] [CrossRef] [Medline] - Chen KH, Oliffe JL, Kelly MT. Internet Gaming Disorder: An Emergent Health Issue for Men. Am J Mens Health 2018 Jul;12(4):1151-1159 [FREE Full text] [CrossRef] [Medline] - Young KS. Cognitive behavior therapy with Internet addicts: treatment outcomes and implications. Cyberpsychol Behav 2007 Oct;10(5):671-679. [CrossRef] [Medline] - Dong G, Potenza MN. A cognitive-behavioral model of Internet gaming disorder: theoretical underpinnings and clinical implications. J Psychiatr Res 2014 Nov;58:7-11 [FREE Full text] [CrossRef] [Medline] - King DL, Delfabbro PH, Griffiths MD, Gradisar M. Cognitive-behavioral approaches to outpatient treatment of internet addiction in children and adolescents. J Clin Psychol 2012 Nov;68(11):1185-1195. [CrossRef] [Medline] - King DL, Delfabbro PH. The cognitive psychology of Internet gaming disorder. Clin Psychol Rev 2014 Jun;34(4):298-308 [FREE Full text] [CrossRef] [Medline] - King DL, Delfabbro PH. Is preoccupation an oversimplification? A call to examine cognitive factors underlying internet gaming disorder. Addiction 2014 Sep 15;109(9):1566-1567. [CrossRef] [Medline] - Wiers RW, Gladwin TE, Hofmann W, Salemink E, Ridderinkhof KR. Cognitive Bias Modification and Cognitive Control Training in Addiction and Related Psychopathology. Clinical Psychological Science 2013 Jan 09;1(2):192-212. [CrossRef] - Jeong EJ, Kim DJ, Lee DM. Why Do Some People Become Addicted to Digital Games More Easily? A Study of Digital Game Addiction from a Psychosocial Health Perspective. International Journal of Human–Computer Interaction 2016 Sep 20;33(3):199-214. [CrossRef] - James RJE, Tunney RJ. The relationship between gaming disorder and addiction requires a behavioral analysis. J Behav Addict 2017 Sep 01;6(3):306-309 [FREE Full text] [CrossRef] [Medline] - King DL, Herd MCE, Delfabbro PH. Tolerance in Internet gaming disorder: A need for increasing gaming time or something else? J Behav Addict 2017 Dec 01;6(4):525-533 [FREE Full text] [CrossRef] [Medline] - Bekele E, Bian D, Peterman J, Park S, Sarkar N. Design of a Virtual Reality System for Affect Analysis in Facial Expressions (VR-SAAFE); Application to Schizophrenia. IEEE Trans. Neural Syst. Rehabil. Eng 2017 Jun;25(6):739-749. [CrossRef] - Patel V, Flisher AJ, Hetrick S, McGorry P. Mental health of young people: a global public-health challenge. The Lancet 2007 Apr 14;369(9569):1302-1313. [CrossRef] [Medline] - Vanheusden K, Mulder CL, van der Ende J, van Lenthe FJ, Mackenbach JP, Verhulst FC. Young adults face major barriers to seeking help from mental health services. Patient Educ Couns 2008 Oct;73(1):97-104. [CrossRef] [Medline] - Schuemie MJ, van der Straaten P, Krijn M, van der Mast CA. Research on presence in virtual reality: a survey. Cyberpsychol Behav 2001 Apr;4(2):183-201. [CrossRef] [Medline] - Park S, Hwang HS. Understanding Online Game Addiction: Connection between Presence and Flow. In: Jacko JA, editor. Human-Computer Interaction. Interacting in Various Application Domains. HCI 2009. Lecture Notes in Computer Science. Heidelberg, Germany: Springer; 2009. - Lidstone JSM, Meins E, Fernyhough C. The roles of private speech and inner speech in planning during middle childhood: evidence from a dual task paradigm. J Exp Child Psychol 2010 Dec;107(4):438-451. [CrossRef] [Medline] - Manfra L, Davis KD, Ducenne L, Winsler A. Preschoolers' motor and verbal self-control strategies during a resistance-to-temptation task. J Genet Psychol 2014;175(3-4):332-345. [CrossRef] [Medline] - Su W, Fang X, Miller JK, Wang Y. Internet-based intervention for the treatment of online addiction for college students in China: a pilot study of the Healthy Online Self-helping Center. Cyberpsychol Behav Soc Netw 2011 Sep;14(9):497-503. [CrossRef] [Medline] - Faul F, Erdfelder E, Lang A, Buchner A. G*Power 3: a flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behav Res Methods 2007 May;39(2):175-191. [CrossRef] [Medline] - Dong G, Wang L, Du X, Potenza MN. Gender-related differences in neural responses to gaming cues before and after gaming: implications for gender-specific vulnerabilities to Internet gaming disorder. Soc Cogn Affect Neurosci 2018 Nov 08;13(11):1203-1214 [FREE Full text] [CrossRef] [Medline] - American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders. Washington, DC: American Psychiatric Association; 2013. - Sheehan DV, Sheehan KH, Shytle RD, Janavs J, Bannon Y, Rogers JE, et al. Reliability and validity of the Mini International Neuropsychiatric Interview for Children and Adolescents (MINI-KID). J Clin Psychiatry 2010 Mar;71(3):313-326. [CrossRef] [Medline] - Sheehan DV, Lecrubier Y, Sheehan KH, Amorim P, Janavs J, Weiller E, et al. The Mini-International Neuropsychiatric Interview (M.I.N.I.): the development and validation of a structured diagnostic psychiatric interview for DSM-IV and ICD-10. J Clin Psychiatry 1998;59 Suppl 20:22-33;quiz 34 [FREE Full text] [Medline] - Donders J. A short form of the WISC--III for clinical use. Psychological Assessment 1997;9(1):15-20. [CrossRef] - Silverstein AB. Two- and four-subtest short forms of the Wechsler Adult Intelligence Scale-Revised. Journal of Consulting and Clinical Psychology 1982;50(3):415-418. [CrossRef] - Wechsler D. Wechsler adult intelligence scale–Fourth Edition (WAIS–IV). San Antonio, TX: NCS Pearson; 2008:816-827. - Chan PA, Rabinowitz T. A cross-sectional analysis of video games and attention deficit hyperactivity disorder symptoms in adolescents. Ann Gen Psychiatry 2006 Oct 24;5:16 [FREE Full text] [CrossRef] [Medline] - Kim EJ, Namkoong K, Ku T, Kim SJ. The relationship between online game addiction and aggression, self-control and narcissistic personality traits. Eur Psychiatry 2008 Apr;23(3):212-218. [CrossRef] [Medline] - Pawlikowski M, Brand M. Excessive Internet gaming and decision making: do excessive World of Warcraft players have problems in decision making under risky conditions? Psychiatry Res 2011 Aug 15;188(3):428-433. [CrossRef] [Medline] - Kim NR, Hwang SS, Choi J, Kim D, Demetrovics Z, Király O, et al. Characteristics and Psychiatric Symptoms of Internet Gaming Disorder among Adults Using Self-Reported DSM-5 Criteria. Psychiatry Investig 2016 Jan;13(1):58-66 [FREE Full text] [CrossRef] [Medline] - Bahn GH, Shin M, Cho SC, Hong KE. A preliminary study for the development of the assessment scale for ADHD in adolescents: reliability and validity for Conners-Wells' Adolescent self-report scale-short form. Korean J Child & Adol Psychiatr 2001;12(2):218-224. - Park J, Lee WH, Lee S, Kim S, Bahn GH. Reliability and Validity of Korean Version of the Conners Adult Attention Deficit Hyperactivity Disorder Scale in General Population. J Korean Neuropsychiatr Assoc 2013;52(5):342. [CrossRef] - Conners CK. Conners' Rating Scales-revised (CRS-R) CRS-R Technical Manual: CRS09M. Toronto, ON: Multi-Health Systems; 1997. - Chon KK, Choi SC, Yang BC. Integrated adaptation of CES-D in Korea. Korean Journal of Health Psychology 2001;6(1):59-76. - Radloff LS. The CES-D Scale. Applied Psychological Measurement 2016 Jul 26;1(3):385-401. [CrossRef] - Beck AT, Epstein N, Brown G, Steer RA. An inventory for measuring clinical anxiety: psychometric properties. J Consult Clin Psychol 1988 Dec;56(6):893-897. [CrossRef] [Medline] - Baldwin CK, Caldwell LL. Development of the Free Time Motivation Scale for Adolescents. Journal of Leisure Research 2017 Dec 13;35(2):129-151. [CrossRef] - Witmer BG, Jerome CJ, Singer MJ. The Factor Structure of the Presence Questionnaire. Presence: Teleoperators & Virtual Environments 2005 Jun 21;14(3):298-312. [CrossRef] [Medline] - Witmer BG, Singer MJ. Measuring Presence in Virtual Environments: A Presence Questionnaire. Presence 1998 Jun 21;7(3):225-240. [CrossRef] [Medline] - Kennedy RS, Lane NE, Berbaum KS, Lilienthal MG. Simulator Sickness Questionnaire: An Enhanced Method for Quantifying Simulator Sickness. The International Journal of Aviation Psychology 1993 Jul;3(3):203-220. [CrossRef] - Attkisson CC, Zwick R. The client satisfaction questionnaire. Psychometric properties and correlations with service utilization and psychotherapy outcome. Eval Program Plann 1982;5(3):233-237. [CrossRef] [Medline] - Cox WM, Klinger E, Fadardi JS. The motivational basis of cognitive determinants of addictive behaviors. Addict Behav 2015 May;44:16-22. [CrossRef] [Medline] - Hilgard J, Engelhardt CR, Bartholow BD. Individual differences in motives, preferences, and pathology in video games: the gaming attitudes, motives, and experiences scales (GAMES). Front Psychol 2013;4:608 [FREE Full text] [CrossRef] [Medline] - Park SY, Kim SM, Roh S, Soh M, Lee SH, Kim H, et al. The effects of a virtual reality treatment program for online gaming addiction. Comput Methods Programs Biomed 2016 Jun;129:99-108. [CrossRef] [Medline] - Zhang Y, Ndasauka Y, Hou J, Chen J, Yang LZ, Wang Y, et al. Cue-induced Behavioral and Neural Changes among Excessive Internet Gamers and Possible Application of Cue Exposure Therapy to Internet Gaming Disorder. Front Psychol 2016 May 09;7:675 [FREE Full text] [CrossRef] [Medline] - Shin Y, Kim J, Kim M, Kyeong S, Jung YH, Eom H, et al. Development of an effective virtual environment in eliciting craving in adolescents and young adults with internet gaming disorder. PLoS One 2018 Apr 19;13(4):e0195677 [FREE Full text] [CrossRef] [Medline] - Markland D, Ryan RM, Tobin VJ, Rollnick S. Motivational Interviewing and Self–Determination Theory. Journal of Social and Clinical Psychology 2005 Sep 21;24(6):811-831. [CrossRef] [Medline] - Morina N, Ijntema H, Meyerbröker K, Emmelkamp PMG. Can virtual reality exposure therapy gains be generalized to real-life? A meta-analysis of studies applying behavioral assessments. Behav Res Ther 2015 Nov;74:18-24. [CrossRef] [Medline] - Jinjakam C, Hamamoto K. Simulator sickness in immersive virtual environment. 2013 Presented at: Biomedical Engineering International Conference (BMEiCON); December 5-7, 2012; Ubon Ratchathani, Thailand. [CrossRef] - Moss JD, Muth ER. Characteristics of head-mounted displays and their effects on simulator sickness. Hum Factors 2011 Jun 27;53(3):308-319. [CrossRef] [Medline] - Sharples S, Cobb S, Moody A, Wilson JR. Virtual reality induced symptoms and effects (VRISE): Comparison of head mounted display (HMD), desktop and projection display systems. Displays 2008 Mar;29(2):58-69. [CrossRef] |ADHD: Attention Deficit Hyperactivity Disorder| |BAI: Beck Anxiety Inventory| |CASS-S: Conners-Wells’ Adolescent Self-Report Scale| |CBT: cognitive behavioral therapy| |CES-D: Center for Epidemiological Studies Depression Scale| |CSQ: Client Satisfaction Questionnaire| |DSM-5: Diagnostic and Statistical Manual of Mental Disorders, 5th edition| |FTMS-A: Free Time Motivation Scale for Adolescents| |IAT: Internet Addiction Test| |IGD: internet gaming disorder| |MET: motivational enhancement therapy| |MINI-KID: Mini-International Neuropsychiatric Interview for Children and Adolescents| |PQ: presence questionnaire| |SSQ: Simulator Sickness Questionnaire| |VAS: visual analog scale| |VR: virtual reality| Edited by N Zary; submitted 14.03.20; peer-reviewed by MH Park, T Cahill, D Schwartz; comments to author 30.03.20; revised version received 07.06.20; accepted 11.11.20; published 11.12.20Copyright ©Narae Lee, Jae-Jin Kim, Yu-Bin Shin, Hyojung Eom, Min-Kyeong Kim, Sunghyon Kyeong, Young Hoon Jung, Sarang Min, Joon Hee Kwon, Eunjoo Kim. Originally published in JMIR Serious Games (http://games.jmir.org), 11.12.2020. This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Serious Games, is properly cited. The complete bibliographic information, a link to the original publication on http://games.jmir.org, as well as this copyright and license information must be included.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational and research content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is an academic and research-based discussion on internet gaming disorder (IGD) and the potential use of virtual reality (VR) therapy for its management. The content is entirely focused on educational and research purposes, discussing theories, methodologies, and findings related to IGD. It does not contain any unsafe, inappropriate, or harmful elements. Therefore, it is fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a detailed description of a study related to the use of virtual reality (VR) in the treatment of Internet Gaming Disorder (IGD). The content is entirely academic and does not contain any unsafe, inappropriate, or harmful elements. It discusses therapeutic methods, research objectives, and participant details without any offensive language, illegal activities, or other concerning content.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed description of a research study and does not contain any unsafe, inappropriate, or harmful content. It discusses the use of various questionnaires and VR systems for measuring psychological symptoms and user experiences, which is entirely appropriate for academic and research purposes.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a detailed explanation of a research study and does not contain any unsafe, inappropriate, or harmful content. It discusses the methodology and findings of a study related to internet gaming disorder (IGD) and does not include any language, themes, or references that would be considered unsafe or inappropriate for public use.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a scholarly analysis of a study related to internet gaming disorder (IGD) and does not contain any unsafe, inappropriate, or harmful content. It discusses statistical data and correlations without any offensive language, illegal activities, or harmful advice.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the results of a study on the use of VR to help individuals with Internet Gaming Disorder (IGD) manage their behavior and preferences. The content is entirely academic and does not contain any unsafe, inappropriate, or harmful elements. It focuses on research findings and recommendations for therapeutic interventions, making it fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text discusses the potential of VR-based training to predict and prevent Internet Gaming Disorder (IGD)-related symptoms. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to health and research, making it fully appropriate for all audiences.", "{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```", "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is a collection of references and citations from academic articles related to internet gaming disorder and addiction. There is no unsafe, inappropriate, or harmful content present in the text.", "{\"reason\": \"academic references\", \"score\": 0}\n```\n\nThe provided text consists of academic references and citations from various journals and publications. There is no unsafe or inappropriate content, and the text is fully appropriate for all audiences, including educational environments.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a collection of references to academic articles and studies related to clinical anxiety, motivation scales, presence in virtual environments, and virtual reality treatments. There is no unsafe, inappropriate, or harmful content in the text.", "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a list of acronyms and abbreviations related to mental health and research, along with publication details. It contains no unsafe, inappropriate, or offensive content. Therefore, it is fully appropriate for all audiences and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85335-0", "llm_safety_score": 0, "reason": "educational and research content" }, { "custom_id": "85335-1", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-2", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-3", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-4", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-5", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-6", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-7", "llm_safety_score": 0, "reason": "No unsafe content identified" }, { "custom_id": "85335-8", "llm_safety_score": 0, "reason": "No unsafe content" }, { "custom_id": "85335-9", "llm_safety_score": 0, "reason": "academic references" }, { "custom_id": "85335-10", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85335-11", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://games.jmir.org/2020/4/e18473", "date": "2023-03-25T22:49:51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00738.warc.gz", "language": "en", "language_score": 0.9055598974, "token_count": 11114, "score": 2.71875, "int_score": 3 }
<urn:uuid:015b0f02-b477-4587-9792-c97624651d04>
School is a fact of life. Every year since 1900, schoolhouses have enrolled an ever-greater share of American children, produced ever-larger cohorts of high school graduates, and received ever-increasing investment and oversight by all levels of the American state. The unprecedented interruption of schooling by the COVID-19 pandemic provides an occasion to look back on the history of our “schooled” society. This seminar explores major historiographical issues in the study of American schooling, with Chicagoland as a case in point. We’ll examine the rise of mass schooling, the movement for teacher unionism, the struggles for educational desegregation, and the emergence of choice-and-accountability reform. As a working group, we’ll also explore how K-12 teachers can use their own schoolhouses and communities as tools in the project-based teaching of American history. Our students are surrounded by artifacts—from the architecture, artwork, and equipment of the school plant, to the old yearbooks and trophies in libraries and display cases, to the living networks of alumni in our communities. Together, we’ll learn methods of caring for this heritage, of mobilizing it as a source for historical inquiry, and of using these projects to hook students on the work of doing history. Please note that attendance in all scheduled seminar sessions is required for full CPDU credit.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a description of a seminar on the history of American schooling. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and historical in nature, making it fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85336-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.newberry.org/calendar/histories-of-schooling-and-schools-as-history", "date": "2023-03-27T08:24:02", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00738.warc.gz", "language": "en", "language_score": 0.952383697, "token_count": 287, "score": 2.984375, "int_score": 3 }
<urn:uuid:7718ae74-c060-4290-9125-07a553159231>
|18 May 2014||Issue 0320||Register to receive our free e-newspaper by email each week||Advanced Search| NEWSLETTERUniversities tackle climate change – Humankind’s greatest challenge Our species is confronting its greatest challenge: ensuring the survival of humankind and that of a multitude of animals and plants. Without united action by governments and their citizens across the globe, the consequences of a changing climate – largely caused by human activities – will lead to an upheaval in the lives of billions of people on a scale we have never experienced. Researchers in the world’s universities are playing a key role in revealing what is happening and explaining what needs to be done to prevent the looming catastrophe. In this Special Edition of University World News – the first given over entirely to one crucial global issue – our contributors describe what they and higher education institutions are doing to shift human attitudes from a focus on consumption to one of sustaining this precious planet so that the generations that follow will still have lives worth living. Geoff Maslen – UWN Science Editor SPECIAL REPORT: Climate change GLOBALJacqueline McGlade, Chief Scientist, UNEP The latest science cited by the Intergovernmental Panel on Climate Change provides conclusive evidence that human activities are causing unprecedented changes in the Earth's climate. As many have stated, it is time to take immediate and robust action to mitigate the impacts of climate change against the risks of a greater than 2ºC temperature rise. GLOBALJeffrey D Sachs Tackling the great environmental problems will require an unprecedented integration of insights across various disciplines, including earth systems sciences, public health, civil engineering, information technologies, economics, politics and much more. Only universities bring together this range of knowledge and, to an unprecedented extent, they must partner with government, business and civil society to take on the challenges of sustainable development that lie ahead. GLOBALJeffrey D Sachs Our generation can end the ancient scourge of extreme poverty but it can also destroy the Earth’s life-support system through human-induced environmental devastation. By necessity, then, we have entered “the age of sustainable development”. So I was excited in January this year to launch a free, global online university course by the same name. Two years ago, United Nations Secretary General Ban Ki-moon launched a new independent global network of research centres, universities and technical institutions to help find solutions to some of the world’s most pressing environmental, social and economic problems. Ban said the Sustainable Development Solutions Network would collaborate with stakeholders including universities, businesses, UN agencies and other international organisations to identify and share the best pathways to achieve sustainable development. A former leading member of the Nobel prize-winning Intergovernmental Panel on Climate Change has called for changes to the panel’s regular and increasingly long reports. In a provocative paper in Nature, Professor Dave Griggs says the IPCC has gained a justified reputation for producing the most up-to-date, comprehensive and authoritative statements of knowledge on climate change. But this has come at a cost to the scientific community. Launched in 2012, the Monash Sustainability Institute's sustainable development goals project aims to lead input into and influence the national and international discussion on practical solutions to sustainability challenges, indicators and development goals and the green economy. The project is one initiative the institute carries out under the UN Sustainable Development Solutions Network programme. Around the world, academics in universities, other tertiary education organisations and students have joined forces to establish associations aimed at promoting and supporting sustainability within their own and other institutions. Climate change deniers argue that there is uncertainty about what the impacts will be – but scientific uncertainty should be the spur for greater efforts as it means the risk is higher. ASIAKo Nomura and Osamu Abe Diversity and globalisation pose major challenges to sustainability in the Asia-Pacific region. The rich diversity of this region is reflected in each of the three pillars of sustainable development: environmental, economic and social sustainability. In such a situation, efforts to achieve sustainability – including education about it – require diverse action. Universities are in a unique position in building a sustainable future for the world, not just because they bring together the different disciplines needed to combat climate change, but also because they give students the skills they will require for the future. Institutions need to work together to embed sustainability within their existing priorities. Environmental boycotts, including those led by universities, are having successes – but the Australian government is looking to ban them. The stand-off between a pro-business government and free speech advocates is being watched around the world. In December of 2015 the international community is set to adopt a comprehensive action plan to combat climate change. With Paris having been chosen as the meeting place, the French government is showing more interest in climate issues and trying to mobilise the European Union on rapid agreement of its 2030 climate objectives. At present, however, it looks extremely unlikely that the Paris conference next year will turn out to be a thrilling success. The old German saying stadtluft macht frei – ‘urban air makes you free’ – is the defining injunction of modernity. Modern Western cities were launched as the vessels of liberation from a human era darkened by power and enchantment. The city was the escape raft from a life of servitude and grubbing. Modernisation has, however, failed miserably on many accounts and in many quarters. More than half the world’s human population now lives in urban areas and cities are increasingly facing the challenge of ensuring decent standards of living for their inhabitants. Demand for a higher quality of life is increasing despite growing pressures on natural resources and ecosystems. GLOBALCynthia Rosenz and Aromar Revi There is widespread agreement on the importance of urbanisation and urban centres for sustainable development in rich and poor countries alike. There is less agreement on how they should be included in the UN’s Sustainable Development Goals. It seems there are two options: a dedicated urban sustainable development goal with targets focused on social, economic and environmental priorities; or urbanisation could be ‘mainstreamed’ into other goals and data could be disaggregated by urban and rural populations. Preventing dangerous climate change is a strategic priority for the European Union. Europe is working hard to cut its greenhouse gas emissions substantially while encouraging other nations and regions to do likewise. Never has humanity faced as many major challenges as it does today. Issues related to the relationship between energy and climate change, water, food, infectious diseases and demographic issues must all be addressed and resolved. Perhaps our greatest challenge, however, is to learn to live together in a globalised world – to be able to see the future in a perspective that tackles the impact of climate change and includes equity and fairness between cultures and generations. German universities have made considerable contributions to the country’s energy transition policy. However, the policy has come in for a bit of a bashing recently concerning the economic viability of renewables. Also, non-governmental organisations and politicians have criticised the government for continuing to fund nuclear options. EUROPEJan Petter Myklebust Countries across Europe are increasingly becoming involved with Climate-KIC, one of the Knowledge and Innovation Communities created in 2010 by the European Institute of Innovation and Technology. This is the European Union body tasked with creating sustainable growth while dealing with the global challenges of our time. A deadline is looming in a competition open to young researchers around the world for achievements in making their societies more sustainable. The winners will enjoy fully-funded trips to Germany. NORTH AMERICASarah King Head There is no denying that the appeal of sustainability has become especially strong in our world of increasingly dramatic climate changeability. But is it feasible for a university to strive to implement this goal? The University of British Columbia on Canada’s west coast is proving that sustainability is more than just an idea: in fact, it has become very much a reality. LATIN AMERICAMaría Elena Hurtado Each new report of the Intergovernmental Panel on Climate Change on the impact of global warming on Latin America jolts the region’s universities into action. Droughts in Amazonía, increased flooding in other areas and temperature hikes of up to 3ºC in Central America are some of the scenarios predicted for the American continent in the 2014 IPCC assessment report. UNITED KINGDOMNic Mitchell In one of the most ambitious projects of its kind, the University of Greenwich, overlooking London’s dockland regeneration, will soon open its landmark US$128 million Stockwell Street development in a drive to become the United Kingdom’s greenest university. The project is one of the clearest physical signs yet that climate change and environmental concerns are moving up the British higher education agenda. A British student-run organisation last year ranked Manchester Metropolitan University as the United Kingdom’s greenest university, having jumped nine places to take the top spot with the highest score ever achieved of 59.5 out of 70. But that was after failing the first Green League assessment in 2007. Exceptional sustainability initiatives undertaken by universities and colleges across Britain are rewarded with Green Gown Awards. Organised by the Environmental Association for Universities and Colleges, the awards are now in their 10th year. Strapped by a lack of knowledge generation in Africa, researchers are using global paradigms from the north to study climate and other environmental change. “We take northern models and massage them – often beat them – to make them fit and try to trust the answers that come out,” says South African hydrologist Professor Graham Jewitt. Based on the recent global assessment report from the Intergovernmental Panel on Climate Change, in the next six years 200 million people in Africa will be exposed to a scarcity of clean water because of the impacts of climate change. During the same period, agricultural production from rain-fed farming will drop by 50% while the prevalence of malaria will increase by 5% to 7% by the end of the 21st century. Between 25% and 40% of mammal species in national parks in Sub-Saharan Africa will become endangered. The stark reality of global vulnerability to the vagaries of climate change presented by higher temperatures, changes in rainfall patterns, rising sea levels and frequent weather-related disasters and conflicts has prompted the United Nations Environment Programme to rope in universities and scientists in search of environmental sustainability solutions. The African Climate and Development Initiative is one of Africa’s biggest university-based climate change efforts. The three-year-old initiative at the University of Cape Town gathers together more than 100 academics from across disciplines to conduct research, train postgraduates and engage the community around climate and development issues. SOUTH AFRICAPeta Lee On a planet and a continent increasingly aware of its eco-frailty, South African universities are ramping up their green initiatives and sustainability efforts. ‘Green’ campuses are being established, climate change research features at nearly all institutions and numerous student groups are joining the fight to conserve and protect their environment and the wider world. NORTH AFRICAWagdy Sawahel To counter the negative impact of climate change in North Africa, several higher education initiatives and scientific programmes are producing scientific workforces with the required skills, as well as carrying out research for promoting renewable energy for sustainable development. The Arab world has been late to join the ‘green’ universities movement, which strives for lower emissions and less water consumption. Only 12 out of about 500 universities implement environmentally friendly policies and programmes to reduce their carbon emissions and help to combat global climate change. With the world’s ecosystems declining at an unprecedented rate, the United Nations has established an ‘Intergovernmental Platform on Biodiversity and Ecosystem Services’. Known as IPBES, the organisation is the leading intergovernmental body for assessing the state of the planet's biodiversity, its ecosystems and the essential services they provide to society. An international team of earth and climate scientists from the United States, Korea and Australia estimates that up to half of the recent global warming in Greenland is caused by natural climate variations. An international team of 20 researchers has found that the nutritional quality of major food crops will be depleted as atmospheric carbon dioxide rises to levels expected in 2050. Led by Dr Sam Myers at Harvard University, the study gathered data from seven locations across three continents for 40 cultivars of six crops. The International Alliance of Research Universities is holding a sustainable universities conference at the University of Copenhagen to address key issues regarding university sustainability. Professionals from all alliance universities and throughout the university sustainability field will be attending. University World News has a popular Facebook group. If you are not a member, do consider joining to see our regular updates, post on our wall and communicate with us and other University World News fans. You can also follow University World News on Twitter @uniworldnews Subscribe / Unsubscribe / Sent to: Terms and Conditions / ISSN 1756-297X / © University World News 2007-2014
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is an academic discussion about urbanization, sustainability, and climate change. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```" ], "llm_harm_scores_by_chunk": [ { "custom_id": "85337-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85337-1", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85337-2", "llm_safety_score": 0, "reason": "No unsafe content identified" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.universityworldnews.com/newsletter-archives.php?mode=archive&pub=1&issueno=320&format=html", "date": "2023-03-28T14:03:42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00738.warc.gz", "language": "en", "language_score": 0.926915586, "token_count": 2691, "score": 2.671875, "int_score": 3 }
<urn:uuid:e0194641-967f-4904-b9d6-4c381d884d0a>
Location: Water Management Research2022 Annual Report U.S. dairy industry’s economic value is estimated at $51.4 billion. About 30% of the total U.S. milk production comes from the Western states with 20% of it from California. Alfalfa production in California is heavily dependent on irrigation. Competition for declining water resources for domestic, industrial, and agricultural uses, combined with frequent droughts, have resulted in reduced alfalfa acreage. With high milk producing dairy cows requiring high-quality forage, sustainable management strategies are needed for alfalfa production in the West with maximized water productivity and forage quality. The overall goal of this multidisciplinary project is to develop new tools and strategies for alfalfa production in the Western U.S. that conserve scarce water resources and lead to high yield and quality dairy forage. Objective 1: Develop new tools and strategies for management of alfalfa production in the Western U.S. that conserves scarce water resources, maintains water quality, and leads to high-quality dairy forage and the delivery of environmental services. Sub-objective 1A: Determine the effects of irrigation and cutting schedules management on forage yield, quality, water use efficiency and water extraction patterns of non-dormant reduced-lignin and conventional alfalfa varieties under semi-arid growing conditions. Sub-objective 1B: Utilize remotely sensed data products to quantify differences in consumptive water use and water productivity for commercial alfalfa produced with different irrigation techniques, on different soil types, and considering inter-annual variability of growing conditions. Objective 2: Develop agronomic management strategies for production of alfalfa forage with improved yield, quality, nutritional and economic value. Sub-objective 2A: Optimize yield and quality of reduced-lignin alfalfa varieties by altering cutting schedules. Sub-objective 2B: Determine effects of specific traits on growth, yield, quality and plant stand persistence of new and conventional varieties. Objective 1, Sub-objective 1A: The research goal for this study is to develop a sustainable irrigation strategy for alfalfa that can ensure optimum forage yield, stand persistence, and nutritional and economic values. Field experiments with frequent and infrequent irrigation are planned for alfalfa varieties with reduced- and non-reduced lignin traits. Yield, quality, and plant biophysical parameters of alfalfa will be determined and analyzed to evaluate the interactive effect of irrigation frequency and varietal traits. If the pre-selected irrigation level is too low in the first year, adjustments will be made to avoid the loss of alfalfa stands and the experimental treatments. Sub-objective 1B: The research goal for this study is to utilize remote sensing data to evaluate sub-surface drip irrigation for increasing alfalfa water use efficiency and water productivity compared to flood irrigation on dairy farms in the San Joaquin Valley of California. We will assess methodological accuracy and uncertainty of model estimation of crop evapotranspiration using satellite imagery and evaluate the hypothesis that sub-surface drip irrigation increases water use efficiency in actual production settings. Remote-sensing data products will be combined with USDA crop statistics to evaluate soil type, irrigation water source, and irrigation technology associated with optimal water use for alfalfa production. If the daily evapotranspiration estimates provided by commercial systems are not adequate for evaluating time-dependent variability, short-term targeted field experiments will be conducted using eddy-covariance and supporting sensor systems. Objective 2, Sub-objective 2A: The research goal of this study is to develop a sustainable cutting schedule management strategy for reduced-lignin alfalfa varieties that can ensure optimum yield, dairy quality forage, stand persistence, and nutritional and economic values. The field experiment treatments include 3 cutting schedules (28-day, 35-day, and staggered/alternating between 21- and 35-day) and 8 varieties. Treatment effects on alfalfa yield, quality, stand persistence, and nutritional and economic values will be determined annually. This study will be located at a University of California field facility, and we rely on farm labor support from the university. If the farm support becomes unavailable, we will provide labor support from ARS project employees and work with the university collaborator to continue the project as planned. Sub-objective 2B: The research goal of this study is to evaluate 20 diverse alfalfa varieties for growth, biomass, and quality dynamics, yield forming traits, and plant biophysical characteristics to improve variety development and to develop a growth model using a regression analysis approach for predicting growth dynamics, forage yield and quality. Plant samples will be collected at each harvest for forage quality analysis. For model development, plant height, biomass, leaf area index, photosynthetic rate, and stomatal conductance will be measured. Planting is in the spring and if some varieties do not establish well, they will be classified as poor performers. Under Sub-objective 1A, the initial year of full production with field experiments involving irrigation, cutting schedules and alfalfa variety interactions was completed. Backlogged plant samples were processed for quality analysis. Irrigation treatments were applied as non-frequent irrigation at only one irrigation per cut and frequent irrigation at once a week, both at 110% evapotranspiration (ET) levels. This was based on potential ET values obtained from a California Irrigation Management Information System (CIMIS) weather station located near the study area. Alfalfa yield was measured following the 28 day and 35 day cuttings schedule treatments. One day before plot harvest, alfalfa samples were hand-collected for quality analysis. Soil moisture was measured at different soil depths using a neutron gauge every two to three weeks during the growing season. Leaf stomatal conductance was measured using a porometer. The data generated will be used for testing an alfalfa crop model to simulate and determine growth, yield, and forage quality dynamics. Forage yield and applied water use efficiency data were analyzed to prepare an abstract for presentation at the 2022 World Alfalfa Congress. Under Sub-objective 1B, protocols were developed for utilizing remote sensing data products to determine water productivity of alfalfa under various management strategies and water productivity trends were analyzed for a 12 year period. Preliminary field experiments were conducted for a three month period in plot trials, using the eddy-covariance and other methods to estimate actual crop utilization of applied irrigation. A second field experiment was conducted in conjunction with ongoing research into groundwater recharge in winter-irrigated alfalfa. A proposed agreement with a cooperating farmer is under evaluation to conduct new field research extending previous work on calibrating remote sensing of crop water requirements (OpenET). Field data from this project year will be used to improve error estimation of the eddy-covariance method applied to calibrate remote sensing models. Research published in Agricultural Water Management documented interannual trends in water productivity for alfalfa, compared to wheat and barley, for the period 2009-2020 in the East Snake Plain of Idaho. This published technique will be applied to analyze recent satellite models (OpenET) to determine water productivity for cultivation of alfalfa in California. A newly hired postdoctoral scientist is analyzing the OpenET. Under Sub-objective 2A, the research goal is to develop a sustainable cutting schedule management strategy for reduced-lignin alfalfa varieties that can ensure optimum yield, dairy quality forage, stand persistence, nutritional and economic values. This is the third production year following crop establishment. The field experiment includes three cutting schedules (28-day basis: 28 days, 35 days and staggered i.e. alternating between 21 and 35 days) and eight alfalfa varieties including reduced-lignin and conventional types. Parameters measured involved forage yield, quality and stand persistence. Plant samples were analyzed for quality. Soil samples were taken for nutrient analysis. Following alfalfa’s termination, forage winter wheat in January and corn in June of 2022 were planted. The rotational benefit of alfalfa on winter wheat and corn forage yield and quality will be examined. Partial research results were presented at the 2022 North American Alfalfa Improvement Conference. Results on alfalfa yield-quality tradeoff of higher quality varieties under different cutting schedules were presented at the 2022 World Alfalfa Congress. Under Sub-objective 2B, research continued with alfalfa to determine delayed cutting schedule (35-day basis) effect on forage yield and quality of 20 diverse varieties. Weekly destructive plant sampling of four varieties was conducted during early-, mid- and late-cropping season for modeling plant growth dynamics. Leaf area index and stomatal conductance measurements were also taken on these four varieties three times during the cropping season. Crop establishment and initial yield data were published in the December 2021 Issue of the University of California Agronomy Progress Report Extension Publication. 1. Forage yield and quality of a winter canola–pea mixed cropping system. Forage crop–dairy farming is an important agricultural industry that involves an intensive system requiring high-input forage crops, primarily annual grass-type crops in monocropping approaches. Winter canola and pea have the potential to provide forage crop diversity options, but information on yield and quality of the canola–pea mixed cropping system is limited. ARS scientists in Parlier, California, collaborated with researchers at New Mexico State University to study winter canola and pea in mono- and mixed-cropping using different seeding ratio combinations to assess yield and quality. Canola–pea mixed cropping achieved high yields and land productivity. This cropping strategy has potential to improve mechanical harvestability of vining pea and strengthen the diversity and sustainability of forage crop–dairy farming in the Southern Great Plains under limited irrigation and may be applicable in other regions with similar agroecosystems. This cropping strategy can be used by dairy and crop producers to diversify their forage crops and strength forage crop-dairy farming systems. Kelley, J.R., Olson, B. 2022. Interannual variability of water productivity on the Eastern Snake Plain in Idaho, United States. Agricultural Water Management. 265. Article 107532. https://doi.org/10.1016/j.agwat.2022.107532. Angadi, S., Umesh, M., Begna, S.H., Gowda, P.H. 2021. Light interception, agronomic performance, and nutritive quality of annual forage legumes as affected by shade. Field Crops Research. 275. Article 108358. https://doi.org/10.1016/j.fcr.2021.108358. Paye, W., Begna, S.H., Ghimire, R., Angadi, S., Singh, P., Umesh, M., Darapuneni, M. 2021. Winter canola yield and nitrogen use efficiency in a semiarid irrigated condition. Agronomy Journal. 113(2):2053-2067. https://doi.org/10.1002/agj2.20611. Begna, S.H., Angadi, S., Mesbah, A., Umesh, M., Stamm, M. 2021. Forage yield and quality of winter canola-pea mixed cropping system. Sustainability. 13(4). Article 2122. https://doi.org/10.3390/su13042122.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a detailed report on a research project focused on water management and alfalfa production in the Western U.S. It does not contain any unsafe, inappropriate, or offensive content. The language is professional and the themes are related to agricultural and economic research, making it fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a detailed report on agricultural research and field experiments. It discusses various aspects of alfalfa cultivation, irrigation methods, and yield analysis. There is no unsafe, inappropriate, or offensive content in the text. The language used is professional and technical, and the themes are related to agricultural research and field experiments, which are suitable for educational and public use.", "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses agricultural research and strategies for improving forage crop-dairy farming systems. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85339-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85339-1", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85339-2", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.ars.usda.gov/research/project/?accnNo=440524&fy=2022", "date": "2023-04-01T14:42:49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00738.warc.gz", "language": "en", "language_score": 0.913441956, "token_count": 2436, "score": 2.609375, "int_score": 3 }
<urn:uuid:fb1e992d-1a74-427e-a906-4c12ca808b36>
Good nutrition for seniors makes sure that the body fights off chronic illnesses like heart disease and diabetes. It also helps with keeping the body in excellent working order, maintaining high energy levels and boosting the mood. Unfortunately, a large number of people over the age of 65 are either malnourished or at risk of malnourishment. The problem is widespread and it is vital to prevent it from getting worse. Malnutrition occurs when nutrition needs change as we get older alongside our diets not being able to adapt to the change. Additional Protein Intake As we get older, muscle mass and strength can reduce significantly, even if we remain active. The loss of muscle mass can pose a higher risk of fractures making you frailer. Consuming more protein while maintaining a healthy lifestyle can help you keep a healthy muscle mass and avoids you to become weaker. Start with basic chair exercises to avoid muscle loss as you age. Additional Fibre and Water Intake Constipation is common in seniors which could sometimes be very painful and uncomfortable. This leads to a lack of appetite which in turn slows down the digestive system. Additional fiber intake helps to combat constipation and gets your digestive system moving. Older people also tend to get dehydrated easily, thus a higher intake of water is also needed. Different Nutritional Needs Muscle and bone density loss comes as we get older, although a good level of exercise can avoid these issues. Issues that are unavoidable as you age are problems such as, firstly, less need for calories, which leads to a lower food intake resulting in a lesser opportunity to intake calories dense, nutritious food. Secondly is the inability to recognize hunger or thirst, and lastly, less stomach acid leads to the malabsorption of minerals and vitamins. The fact is that we need to take in the same amount of nutrients even though we eat less as we age. Eating too much may cause other issues such as obesity which is unhealthy that could lead to another set of problems. To combat these issues, eat a balanced diet including, lean meat, fish, fruit and vegetables and a healthy source of calcium like low-fat cheese. It is ideal to consume vitamin D, B12 and calcium as supplements to ensure that your body takes the essential nutrients. Nutritious Dense Food Fewer calories are needed for our system as we get older. We tend to have a lower appetite because of certain medications. Older people sometimes struggle to cook their own food and usually rely on a spouse or family member for years. The moment that spouse or family member is not there to help anymore, he or she will have a difficult time cooking up a meal and maintaining a nutritious system in their body. Thus, more nutrients in a smaller amount of food are ideal and a really good goal. Our diet is a fundamental piece of our overall well-being and deserves attention. Having a balanced nutrition as a senior is the difference between a carefree lifestyle and one that requires around-the-clock care.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on the importance of good nutrition for seniors and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and public use." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85340-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.summerhouseseniorliving.com/senior-living-blog/benefits-of-educating-your-loved-one-about-good-nutrition-habits/", "date": "2023-03-20T21:33:05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943562.70/warc/CC-MAIN-20230320211022-20230321001022-00138.warc.gz", "language": "en", "language_score": 0.9679499865, "token_count": 605, "score": 3, "int_score": 3 }
<urn:uuid:7a0b892a-c956-48ff-b883-849e3671a9fb>
Robots have been around us for a long time now and have been helping us in many aspects of everyday life. They have been developed for factories and labs, for the purpose of being able to access “restricted” areas, be present in conferences and to help us solve many challenges across sectors. Technological advancements are enabling robots to sense the world in ways beyond our capabilities. Those include watching the floor at the end of a hallway to picking up movements reflected from the other side that the human eye can’t detect. Robots are also used to assist elderly people in nursing homes, fight crime, help with medical procedures in hospitals, educate kids in school and protect our homes. So what is the latest robotic invention to help humans? The latest invention has been created by California startup Embodied. The company has built an educational robot called Moxie. Moxie has a small head rested upon a tube-shaped baby blue body. It has been designed to promote cognitive, emotional and social learning. It helps kids ages six to nine. The creators’ inspiration to build the robot is helping kids with social-emotional development and communication skills through daily interactions, and the demand arose from parents asking for a solution that comprises of those features. Some of Moxie’s features help kids with various tasks/activities, including inventive, improvised play like drawing and mindfulness practice through breathing exercises. Children can read with Moxie and explore ways to be sympathetic to others, as well as encouraging interest in children to discover the world around them. Its mission is teaching a child the importance of friendship and improving cognitive, emotional and social skills by encouraging the child to train the robot to better suit their individual needs. The important element in this interaction is content and making sure kids do not lose interest with a diverse program of fun, new tasks and activities to keep kids engaged. Moxie has the ability to handle a kid’s tough response like, “I don’t want to help you” or “I don’t want to share more” or “I don’t want to talk about it” by using a gentle approach of insistence or moving on to something else and addressing the important topics later. Regarding security concerns, the social home robot’s data will be encrypted with parents having the ability to access it. However, the concern still arises when looking at the structure of Moxie which contains four microphones located in its head and a camera on the front which can all be used to interact with and observe those nearby. It has been created this way because Moxie’s effectiveness relies on data, which helps it interact with kids providing valuable feedback for parents. Moxie will be available for free through a beta program, for Embodied to receive feedback from larger groups of families – with the aim of shipping robots to everyone by October 2020. People can reserve a Moxie for a fully refundable deposit of $50, which goes toward the full retail price of $1500.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the development and features of an educational robot named Moxie, which is designed to help children with social-emotional development and communication skills. There is no unsafe, inappropriate, or harmful content in the text." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85341-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://insidetelecom.com/state-of-the-art-robot-to-promote-fun-learning-for-kids/", "date": "2023-03-23T14:27:49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00138.warc.gz", "language": "en", "language_score": 0.9631340504, "token_count": 632, "score": 3.4375, "int_score": 3 }
<urn:uuid:3e9fb205-75ee-4e39-aa6d-36ae38308274>
Jon Mychal Heatherly A Weed or a Super Green? Bitter and earthy Photo by olena ivanova on Unsplash Dandelions, also known as blowballs, originate from Eurasia and belong to the Aster/Daisy family. They provide an early source of nectar for pollinators in the spring, and they reproduce asexually. Many people like to make a wish and blow the mature seeds off its flower head. You can eat any part of the dandelion. Some add its baby greens to a salad, or you can brew it dried in a tea. Homeopathists use it to treat things like inflammation, eczema, bruises, and constipation. In the US, you most likely have the standard yellow dandelion growing outside. Nomenclature: Taraxacum officinale Tastes: bitter, earthy, tangy Uses: tea, salad, stir fry, folk medicine Recipe: Sautéed Dandelion Ingredients: dandelion, salt, oil, garlic, onion, chili pepper, black pepper, parmesan. See link.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text is purely educational and informative about dandelions, their origin, uses, and a recipe. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85342-0", "llm_safety_score": 0, "reason": "educational content with no unsafe elements" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.murfreesborocommunitygardening.com/post/a-weed-or-a-super-green", "date": "2023-03-26T06:04:36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00138.warc.gz", "language": "en", "language_score": 0.886800468, "token_count": 237, "score": 2.546875, "int_score": 3 }
<urn:uuid:178dd109-1c9b-46f5-8230-07ad4931d92d>
CBSE Class 9 Civics Chapter 5 - Working of Institutions Brief Information: In this chapter, students will get to know how the government works in India. They will also understand the types of Institutions running in a democratic government. Watch the video given below for understanding NCERT CBSE Class 9 Civics Chapter 5 – Working of Institutions explanation in Hindi (for easy and better understanding) - How is the major policy decision taken? - Political Executive Chapter 5 – Working of Institutions
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is educational and informative, discussing the working of institutions in a democratic government. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85343-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://indiaexamalerts.in/cbse-class-9-civics-chapter-5-working-of-institutions/", "date": "2023-03-30T04:58:01", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949097.61/warc/CC-MAIN-20230330035241-20230330065241-00138.warc.gz", "language": "en", "language_score": 0.874478817, "token_count": 104, "score": 3.1875, "int_score": 3 }
<urn:uuid:0dbebcf3-b985-41b1-8f1c-5e96a308d5f4>
Medical Terminology A Living Language, by Fremgen, Bonnie F.; Frucht, Suzanne S. - ISBN: 9780134701202 | 0134701208 - Cover: Paperback - Copyright: 1/4/2018 For courses in medical terminology. Build a strong foundation of medical terminology, step by step Medical Terminology: A Living Language uses a carefully constructed learning system to help readers master medical language and apply this knowledge to real-world contexts. Rather than memorizing medical terms, students learn how to use word parts to build terms, within the context of basic A&P. The updated 7th edition includes a comprehensive list of word parts and additional practice problems targeting spelling, adjective formation, and grasp of basic A&P. Also available with MyLab Medical Terminology MyLab™ is the teaching and learning platform that empowers you to reach every student. By combining trusted author content with digital tools and a flexible platform, MyLab personalizes the learning experience and improves results for each student. With MyLab Medical Technology, students build a solid foundation of medical language through interactive games, Dynamic Study Modules, and narrated lectures. Note: You are purchasing a standalone product; MyLab Medical Terminology does not come packaged with this content. Students, if interested in purchasing this title with MyLab Medical Terminology, ask your instructor for the correct package ISBN and Course ID. Instructors, contact your Pearson representative for more information. If you would like to purchase boththe physical text and MyLab Medical Terminology, search for: 0134760611 / 9780134760612 A Living Language PLUS MyLab Medical Terminology with Pearson eText - Access Card Package, 7/e Package consists of: - 0134701208 / 9780134701202 Medical Terminology: A Living Language - 0134713478 / 9780134713472 MyLab Medical Terminology with Pearson eText -- Access Card -- Medical Terminology: A Living Language
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a book description and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would be considered unsafe or inappropriate." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85344-0", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.biggerbooks.com/medical-terminology-living-language-7th/bk/9780134701202", "date": "2023-03-31T13:11:55", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00138.warc.gz", "language": "en", "language_score": 0.8028285503, "token_count": 408, "score": 2.625, "int_score": 3 }
<urn:uuid:20dcc40e-26e7-4576-9cb7-1d249d2b48ae>
MIT researchers investigated the potential energy consumption and carbon emissions if autonomous vehicles became widely used. They calculated that 1 billion autonomous vehicles, each driving for one hour per day and powered by an 840-watt computer, would consume enough energy to produce roughly the same amount of emissions as data centers currently do. Data centers currently account for about 0.3 percent of global greenhouse gas emissions, or roughly the same amount of carbon as Argentina produces each year. The study was published today in the January-February issue of IEEE Micro. The model is determined by the number of vehicles in the global fleet, the computing power of each computer, and the number of hours driven by each vehicle. To put that in context, each day, all of Facebook’s data centres make a few trillion inferences (1 quadrillion is 1,000 trillion). Some research suggests that the amount of time spent driving in self-driving vehicles may increase because people can multitask while driving and the young and elderly may drive more. He claims that because autonomous vehicles would be used to transport both goods and people, a massive amount of computing power could be distributed along global supply chains. Their model only considers computing; it ignores the energy used by vehicle sensors or the carbon emissions produced during manufacturing. To keep emissions under control, the researchers discovered that each autonomous vehicle must consume less than 1.2 kilowatts of computing power. To achieve this, computing hardware must become significantly more efficient at a much faster rate, doubling in efficiency every 1.1 years. One way to improve efficiency is to use more specialised hardware designed to run specific driving algorithms. After demonstrating this framework, the researchers intend to continue investigating hardware efficiency and algorithm improvements. Furthermore, they claim that characterising embodied carbon from autonomous vehicles — the carbon emissions generated when a car is manufactured — and emissions from a vehicle’s sensors can improve their model. “We hope that people will consider emissions and carbon efficiency as important metrics in their designs. (…) An autonomous vehicle’s energy consumption is critical not only for extending battery life, but also for sustainability “explains Vivienne Sze, associate professor in the Department of Electrical Engineering and Computer Science (EECS)
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text discusses a study on the potential energy consumption and carbon emissions of autonomous vehicles. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to environmental and technological research, which are suitable for public and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85345-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://rightpart.org/2023/01/15/does-autonomous-vehicles-av-are-green-technology/", "date": "2023-03-22T09:16:44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00338.warc.gz", "language": "en", "language_score": 0.9509529471, "token_count": 451, "score": 3.640625, "int_score": 4 }
<urn:uuid:18e81e5f-59e0-457d-b3b6-6185b8e4709e>
Hello, and welcome to Spectrum’s Community Newsletter. Autism researchers on Twitter pondered questions around autism prevalence this week after two new estimates came out. Jack Underwood, a clinical research fellow at the University of Cardiff in Wales, posted a thread about new work that found an eightfold increase in autism diagnoses among Welsh women from 2001 to 2016. Very pleased to say this has now been published (online first) in @journalautism, free and open access. Full thread ????, key findings are a dramatic increase in recorded autism diagnoses from 2001 to 2016, including an 8x increase in women. https://t.co/hZrBlfaCM1 https://t.co/OhgFkrt5qn — Jack Underwood (@JFGUnderwood) November 30, 2021 In a longer thread, written when the paper was accepted, Underwood broke the findings down: The team reviewed more than 3.6 million people’s medical records across Wales and anonymously identified 0.51 percent with an autism diagnosis. Yearly incidence, they found, had risen steadily throughout the 15 years of data they reviewed. The jump reflects better public awareness of the condition, he writes, but because the estimates are lower than previous ones based on population sampling or clinical cohorts, diagnoses are clearly still being missed in medical records. On Thursday, the U.S. Centers for Disease Control and Prevention also released new prevalence figures from its Autism and Developmental Disabilities Monitoring Network. Among 8-year-olds across 11 sites, it found an autism prevalence of 1 in 44 children in 2018, up from 1 in 54 in 2016. David Mandell, professor of psychiatry at the University of Pennsylvania, tweeted about the new numbers — and why they should be treated with “a healthy dose of skepticism.” For one thing, he writes, the numbers are based solely on education and health records, not on clinical assessments. As they do every 2 years, the CDC has put out its surveillance report on autism in 8-year olds, reporting that the prevalence now is 1 in 44. Let's talk about why we should treat these numbers with a healthy dose of skepticism. https://t.co/Mjtmq77Ytq 1/8 — David Mandell (@DSMandell) December 2, 2021 Jonathan Sebat, professor of psychiatry at the University of California, San Diego, seconded that view in a retweet, commenting how “CDC estimates of autism ‘prevalence’ reflect services and diagnostic practices but are not great estimates for the actual prevalence of the disorder.” CDC estimates of autism "prevalence" reflect services and diagnostic practices but are not great estimates for the actual prevalence of the disorder https://t.co/px7xPix7Qi — Jonathan Sebat (@sebatlab) December 2, 2021 In other Mandell news, he has stepped down from his role as editor-in-chief of Autism, an announcement that drew an outpouring of mournful tweets. It's been one of the great privileges of my professional life to edit this journal for the past 10 years, and to work with its extraordinary editorial team. I very much look forward to seeing where the next editor-in-chief takes it. https://t.co/bZGHxPNMbt — David Mandell (@DSMandell) November 28, 2021 Replying to Brittany Rudd, instructor of psychology at the University of Illinois at Chicago, he served up an enviable list of activities to fill the newfound gaps in his calendar: “Bake. Woodworking. Gardening. Respond to the bewildering reviews of my most recent grant proposal. Get through my inbox.” That’s it for this week’s Community Newsletter! If you have any suggestions for interesting social posts you saw in the autism research sphere, send an email to [email protected]. Cite this article: https://doi.org/10.53053/JGJP7249
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```" ], "llm_harm_scores_by_chunk": [ { "custom_id": "85346-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.spectrumnews.org/news/community-newsletter-new-prevalence-estimates-journal-chief-steps-down/", "date": "2023-03-23T16:58:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00338.warc.gz", "language": "en", "language_score": 0.9328081012, "token_count": 838, "score": 2.65625, "int_score": 3 }
<urn:uuid:eb1d1949-a4dd-4ee4-b96a-5607fde1148f>
To get a wifi connection in your laptop, you’ll need to change a few settings. These settings include the wireless channel on your router, updating the wireless driver in your laptop, and changing the network adapter’s password. These options are available in the System Preferences menu, which is located on the left side of the Settings screen. Change the wireless channel in the router Changing the wireless channel of your router can help you get a better wifi signal for your laptop. The default wireless channel used by most routers is 2.4 GHz, but you can change this to a different channel if your laptop is not receiving a strong signal. To do this, access the wireless settings menu on your router, then click the Channel option in the drop-down menu. After that, click Save or Apply. Note that your router may need to reboot to implement the changes. Some router models do not allow you to change the channel manually, but you can try contacting the manufacturer to find out how to do it. Usually, they have a customer support number that will be able to assist you in the process. In the meantime, you can try the manual method described above. Typically, routers require a user name and password. The username is usually admin, and the password is usually printed on the device itself. If you cannot find it, try Googling the router model number and “password”. You can also try calling the manufacturer or asking a fellow user. If you still cannot figure out how to do this, you can ask for help in the MetaGeek Community. Alternatively, you can use a Wi-Fi scanning application to scan the available channels and determine which one is best. Most of these apps allow you to search for networks nearby and help you change the wireless channel in your router. The Wi-Fi scanning tool will also list available networks and the channel names and numbers. Changing the wireless channel in your router can help boost the WiFi signal. However, if the channel is too crowded or too close to too many other devices, the network will experience poor performance. This is especially true if you are sharing the channel with other devices. You can also use a Wi-Fi network analyzer to check which channels are less crowded. These tools can scan the entire 2.4 and 5 GHz bands and tell you which channels are the least used. Choosing the less-used channels will improve the performance of the wireless network. Update the wireless driver in the laptop If you’re experiencing problems with your wifi connection, you may need to update the wireless driver in your laptop. You can do this by going to the manufacturer’s website and searching for your model number and the name of your adapter. From there, you can download the latest version of the driver. You’ll then need to install the driver on your laptop to make it work. To find the correct version of the wireless driver, open the Device Manager (from the Start menu) and locate the Wi-Fi adapter. You’ll see this under the network adapters category. Next, find the driver’s name and the version number. If you don’t see this, click ‘Action’ and select ‘Scan for recent hardware changes’. If Windows didn’t recognize the driver, try to manually install it again. If your computer doesn’t have a driver disc, you can try downloading it from the manufacturer’s website or using a third-party application. However, you should only use trusted sites to download these drivers. Third-party apps tend to use a lot of system resources and provide little or no benefit. If you want to get a WiFi connection on your laptop, try updating the wireless driver in Windows. This process is very simple, so you should try it first before using any other option. After downloading the drivers, you’ll need to update them in Windows. This will take some time, depending on your internet speed. However, if you don’t want to wait until your wifi connection is fixed, you can roll back the driver update. This will fix any issues that may have come up after the update. Once you have updated the wireless driver in Windows, you can check the configurations of your network adapter and wireless driver. If the wireless connection is still broken, you may need to connect directly to the gateway using an Ethernet cable. You should be able to see the details of your network adapter and which version is the latest. To update the wireless driver in Windows 10, you need to open Device Manager and select “Update Driver Software.” Once you’ve made this selection, your computer will search for a compatible WiFi driver. After that, you’ll need to restart your computer to make the changes to your network. You can also use the Windows key to open Device Manager. Then, you’ll have to choose the network adapter you want to update, which is probably the WiFi adapter. Change the wireless adapter’s software If you’re experiencing trouble getting wifi on your laptop, you may have to change the software for your wireless adapter. Windows 10 and Windows 8 disable the WiFi adapter by default, but some laptops have a switch to turn the WiFi adapter on and off. After you change the software, restart your computer. Your computer might be having problems connecting to the internet because of outdated network adapter drivers. You can update the driver by visiting the Device Manager in your system. Click on Network Adapters and then choose Update Driver. This will reinstall the drivers for your wireless adapter. You can also try resetting the wireless adapter to fix the problem. Resetting the wireless adapter will reset the TCP/IP stack, IP address, and DNS cache. If this isn’t the solution, you can also try reinstalling the network settings. After that, you need to reconfigure the router. The wireless adapter may not be recognized by the computer. If this happens, you need to install the appropriate drivers to enable it. You can do this manually or automatically. There are a number of ways to update the driver, depending on your Linux distribution. You can also look for help on web chats or mailing lists. If you are not getting a wireless connection on your laptop, it may be a faulty driver or outdated network adapter. To update the drivers for your wireless adapter, right-click on the wireless network card icon in your laptop’s left-hand navigation pane. You can then enable or disable the wireless adapter in the menu. Lastly, you can also open the Network and Sharing Center and click on Change adapter settings. Change the network adapter’s password To change the password of the Wi-Fi connection on your laptop, go to your computer’s settings. Click on the Network icon on the taskbar’s bottom right corner and choose Change adapter options. Choose Wireless properties, and check the box to show characters. Then, enter a new password. Once you have changed the password, you can reconnect to the wireless network. Windows 10 lets you find the WiFi password from Control Panel. You can use this password to connect other computers to your wireless network. You can also use it to reconnect after resetting the network connection. You can also find the password in the Command Prompt. Make sure to run the command prompt as an administrator. If you are not able to connect to the wireless network on your laptop, try rebooting your laptop. The reboot will reload the network adapter’s driver software. Once you have done that, you should be able to use your wireless connection in your laptop. If the wireless network connection is still not working, you should try resetting the wireless network adapter. This will help reset the IP address, DNS cache, and TCP/IP stack. You may have to reconnect to the network and enter the password again. Fortunately, there are several methods you can use to get a working Wi-Fi connection in your laptop. The next problem you may encounter is the network adapter’s driver. In some cases, this can be a problem with your internet provider or router. If this is the case, you may need to contact your internet provider to fix the problem. Until then, you can try the steps below to get your laptop connected to WiFi.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a technical guide on how to improve WiFi connectivity on a laptop. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to technology and troubleshooting, which are appropriate for a general audience.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on technical instructions and troubleshooting for network and WiFi issues. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85347-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85347-1", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://laptoponlinespot.com/how-to-get-a-wi-fi-connection-in-laptop/", "date": "2023-03-26T09:45:53", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00338.warc.gz", "language": "en", "language_score": 0.9129444957, "token_count": 1714, "score": 2.59375, "int_score": 3 }
<urn:uuid:8702a778-9452-40fa-8f8d-e5775581a486>
What is the Boiling Point of Caesium? The Boiling Point of Caesium is 671°C What is the Melting Point of Caesium? The Melting Point of Caesium is 28.44°C What is the Ionic Radius of Caesium? The Ionic Radius of Caesium is 1.74 (+1) Å Who discovered Caesium? Caesium was discovered by Gustov Kirchoff, Robert Bunsen. What period is Caesium located? Caesium is in the Period 6. What block is Caesium located? Caesium is located in the S Block block. What does the name Caesium come from? Latin: coesius (sky blue); for the blue lines of its spectrum. What is the electronegativity of Caesium? Caesium has an electronegativity of 0.79. What are the orbitals of Caesium? The orbitals of Caesium are [Xe] 6s1.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is purely educational and contains information about the physical and chemical properties of caesium. There are no unsafe elements, inappropriate language, or harmful themes present." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85348-0", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.breakingatom.com/elements-attributes/caesium", "date": "2023-03-27T17:05:27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00338.warc.gz", "language": "en", "language_score": 0.8947491646, "token_count": 231, "score": 2.984375, "int_score": 3 }
<urn:uuid:ec2f84c1-0442-4598-98a5-4a16c84409aa>
Comparison of Catechetical Activities and Religious Education |✅ Paper Type: Free Essay||✅ Subject: Religion| |✅ Wordcount: 2178 words||✅ Published: 18th May 2020| The first learning area in the Catholic school curriculum as well as the first priority in the system is Religious Education (CECWA, Policy Statement, 2004). The Religious Education program in Catholic schools is implemented to guide students in learning the teachings of the Gospel as proclaimed by the Catholic Church. It is there to help students develop a sense of Christianity and proclaim the mystery of Christ to non-Christians (CECWA, Policy Statement, 2004). Religious Education must permeate through the whole school. It is important to recognise the moral convention which is supported by the catholic faith. The Gospel of Christ must be valued across the whole curriculum. Catholic schools today play a vital role in the mission of the Church and in particular in Australian society. The mission of the Church translates through Religious Education teachers, as teachers we are able to evangelise. We are able to bring the good news of God into all of the community, spreading the word of who God and Jesus were and what they did (Paul VI, Evangelisation in the Modern World, 1975). The evangelisation of God has 2 important components, the Christian witness and the ministry of the word. As a Christian witness, all teachers are involved, t is when all staff must act in a Christ like manner, living and supporting the ethos. Whereas the ministry of the word is when the gospels are the word, living in the scripture. This essay will cover the difference between catechetical activities and religious education, the structure and content of Religious education units in Western Australia and the link to the divine revelation and the different faith situations that can be encountered in a classroom. If you need assistance with writing your essay, our professional essay writing service is here to help!Essay Writing Service According to Ryan (2014), there are 3 approaches to the teachings of religious education; catechetical, comparative and educational. Catechesis and Religious education are 2 components of the ministry of the word. In the modern religious education classroom, there has been a shift from using the catechetical approach to using the educational approach. The catechetical approach that was used nearly fifty years ago is based around nurturing the existing faith of individuals, it aims to help people grow in their faith (Goldburg, 2008). Whereas the educational approach, such as religious education, is the process of learning about faith. Both catechism and religious education are activities of evangelisation, they both contribute and develop the Christian faith through the spreading of the good news in different ways. According to Holohan (1999), Religious education and catechetical activities support each other in times of negative attitudes towards religion. For example, students can resist the discussion of faith, they may be closed off to the effects of the ministry of the word. In situations such as this, religious education can still provide evangelisation of students. Religious education can always be offered to the non-Christians and non-believers. Although, religious education and catechesis have their similarities they also have their differences. The main difference of the educational and catechetical approach is that religious education does not just assume that students have Christian faith, it is open to non-believers. Whereas the catechetical approach, assumes a level of Christian faith in those that will be acknowledging and receiving it (Hologan, 1999). The receivers are different for these approaches, students within the same school year level will progress through religious education, where groups and individuals of the same stage of conversion will progress though catechesis. Some other differences between these 2 approaches include the methodology and principles. For example, the catholic educational principles are reflected through religious education and catechetical principles are reflected through catechesis. It is still common today for there to be confusion between religious education and catechetical activities and whether or not they are the same activity, but it is said by CECWA (2004), that religious education compliments the catechetical activities of the individual’s school, parish and family. In schools, the Religious Education program plans to help students to understand and learn the teachings of the Gospel as proclaimed by the Catholic Church. Throughout the Religious Education program students will develop a sense of Christianity and how as Christians they are able to live their lives as part of their learning. There are 8 principles of the Religious Education curriculum that must be followed in all Catholic schools in Western Australia; the RE program must completement catechesis, the RE program is promulgated by the diocesan Bishop, RE must always respect parents as the first educators of their children, the RE curriculum must have the same commitment as all other learning areas, RE must serve the evangelisation process, RE shall relate all Catholic faith to students life experiences, RE must always present catholic beliefs in the context of Christian promise of Salvation and most important teachers of RE shall be committed Catholics (CECWA, 2004). These principles are a guideline of how a religious education class should be structured and outlines the content and how to teach it. In regard to revelation, students should be experiencing God through these principles using their life experiences and experiences of faith. Revelation, at its most basic, is a way of communication, it’s a way of telling or expressing to someone who we are. It is the process in which God self-discloses and self-communicates with humanity. Knox (1999) proclaimed that God communicates who God is to us, God wants to be known and wants to be experienced and we are able to accept and recognise his revelation. The content being taught in religious education activities in Western Australia is done through the revelation of God. This revelation is done through teaching content based around student life experiences, faith, creation, history, prophets, Jesus Christ and the Church. Religious education courses have independent and different programmes that are designed for students who are non-believers, who are searchers or doubters and who are believers. These Religious Education programmes will differ in how much content and exposure of God is presented, the language that is used by the teacher or educator and how each one of these programmes in Religious Education relates to life experiences of the students. For example, for those students that are believers of God, less time will be needed to explain the teachings about Jesus, where as those students who are non-believers or doubters and searchers will need more explanation about these teachings. The teachings of Religious Education to non-believers and doubters or searchers seeks to show the mystery of Christ. As teachers, you need to demonstrate and explain what faith in Jesus looks like, feels life and expose the knowledge behind the message of Christ without imposing and forcing it on students. Teacher also need to account for the students who are baptised Christians that are no longer engaging in their faith. These students cannot be categorised as non-believers and teachers must respond with New Evangelisation. The process and response of new evangelisation proclaims the message to these students, it gives the students an opportunity to re awake their faith and live an active Christian life. The content of Religious Educations needs to be appropriate the students situations of faith, when teaching non-believers and searcher or doubters, the content must not be adjusted or simplified. It needs to be authentic which will assist in the developed of the student’s faith (Holohan, 1999). Adolescents today may not be concerned with attending Church on a regular basis, but they are concerned with what makes life worthwhile. The only way to guide an understanding for these concerns, is to understand the concept of spirituality and the yearning of youth. Spirituality can be defined multiple ways, whether it be the way we understand the meaning of our lives, the guidance that gets you out of bed in the morning or the sense of a relationship and connectedness to self, others and the world. Just like human spirituality, Christian spiritualty sees life as the Spirit of God and understands that Christ is always the centre of energy and power (Hackett & McGunnigle, 2015). Students religious yearnings for identity, purpose and guidance can be achieved through the inculturation of numerous practices. According to Holohan (1999), inculturation is the catholic belief that every human culture should incorporate Gods presence and influence. Holohan (1999) also suggested that inculturation needs to frame and identify what God is already doing in different cultures. The spirituality and yearnings of adolescents can be fulfilled and strengthened through the inculturation practices in Religious education. Prayer, meditation and journaling are a few of the practices that enrich and enlighten student’s faith (Canales, 2009). Prayer is modelled into the Christian community through the person of prayer, Jesus Christ. Prayer is sometimes used to express individual spirituality amongst youth, but more commonly it is used to reflect. Teaching youth to pray in Religious Education classes and offering them numerous prayer experiences can empower their spirituality and allow them to develop a more compelling relationship with God, in which they can then address throughout different aspects of their life (Canales, 2009). Meditation is an intense form of prayer that can stimulate the reflective practices of spirituality, which requires a strong sense of self identity in youth. Through meditation in religious education classes, adolescents will deepen their awareness of God and use their life experiences to understand the nearness and relatedness to Christ. The use of regular journaling activities can help adolescents discovers patterns of spirituality in their lives. These individuals can use journaling to account for the patterns of God being present in their lives. Ultimately, these few practices of inculturation help develop the spirituality of adolescents which moves these individual’s closer towards Christianity and understanding faith. Religion must always be the first priority of learning in a Catholic school. It is implemented to help students learn the teachings of God through the Gospel which is proclaimed by the Catholic Church. Catechesis and Religious Education work hand in hand to offer these teachings to students who are of faith, students who are non-believers and to students who are doubters or searchers. Religious Education use the revelation of God to teach the content and form the structure of these classes. It reveals God through creation, faith, life experiences, history and the Church. For those students who religiously yearn for identity, purpose and guidance can use practices of meditation, journaling and prayer to move closer to God. The process of inculturation gives students the opportunity to use these practices in different areas of their life. Canales, A. D. (2009). A noble quest: Cultivating Christian spirituality in Catholic adolescents and the - usefulness of 12 pastoral practices. International Journal of Children’s Spirituality, 14(1), 63-77. Catholic Education Commission Western Australia. (2004). Religious Education. Retrieved from: - Goldburg, P. (2008). Teaching religion in Australian schools. Numen, 55(2-3), 241-271. Holohan, G. J. (1999). Australian Religious Education-: Facing the Challanges: a Discussion on Evangelisation, - Catechesis and Religious Education Questions Raised for Parishes and Catholic Schools by the General Directory for Catechesis. National Catholic Education Commission [for] Australian Catholic Bishops’ Conference Education Committee. - Know, I. (1999). Theology for Teachers. (3rd ed). Ontario, Canada. Novalis. McGunnigle, C., & Hackett, C. (2015). Spiritual and Religious Capabilities for Catholic Schools. eJournal of - Catholic Education in Australasia, 2(1), 6. Oppong, S. H. (2013). Religion and identity. American International Journal of Contemporary Research, 3(6), Cite This Work To export a reference to this article please select a referencing stye below: Related ServicesView all DMCA / Removal Request If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please:
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is an academic essay discussing the differences between catechetical activities and religious education in Catholic schools. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and relevant to religious studies. Therefore, it is fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"no unsafe content identified\", \"score\": 0}\n```\n\nThe text provided is entirely focused on educational and religious content, discussing principles of the Religious Education curriculum, the process of revelation, and the importance of inculturation in religious education. There are no instances of unsafe language, inappropriate themes, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the benefits of meditation, journaling, and prayer in religious education and spiritual development. It does not contain any unsafe, inappropriate, or harmful content. The text is focused on educational and spiritual practices that are suitable for all audiences, including children and sensitive environments. The language used is respectful and the themes are appropriate for an educational setting." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85349-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85349-1", "llm_safety_score": 0, "reason": "no unsafe content identified" }, { "custom_id": "85349-2", "llm_safety_score": 0, "reason": "No unsafe content identified" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://sg.ukessays.com/essays/religion/comparison-of-catechetical-activities-and-religious-education.php", "date": "2023-03-31T16:34:50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00338.warc.gz", "language": "en", "language_score": 0.9439610839, "token_count": 2511, "score": 2.890625, "int_score": 3 }
<urn:uuid:6b0ec45e-c136-4aff-9ad9-29c1d5db7bd7>
"Every army practices deception. If they don't, they can't win, and they know it." -General Wesley Clark, U.S. Army (Beyer and Sayles, 2015) "A member of the [Ghost Army] stands in front of an inflatable tank destroyer." (Caption: Ghost Army Legacy Project, Photo: National Archives, c. 1944) "Members of the Signal Service Co. stand in front of an equipped sonic halftrack." (Caption: Ghost Army Legacy Project, Photo: National Archives, c. 1944) Dummy plane and fake airstrip (Photo: Iron and Air, c. 1944) From 1944-1945, the U.S. Army 23rd Headquarters Special Troops, a top secret group known as the Ghost Army, used a wide array of deceptive communication tactics in over twenty military operations. Through masterful miscommunication, the Ghost Army successfully deceived German troops, which aided Allied advancement to victory in World War II, saved lives, and demonstrated the critical role of deception in achieving military success.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical context of deception\", \"score\": 0}\n```\n\nThe provided text discusses the historical use of deception in military operations during World War II. It does not contain any unsafe, inappropriate, or harmful content. The quotes and descriptions are educational and appropriate for public use and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85351-0", "llm_safety_score": 0, "reason": "historical context of deception" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://52322125.nhdwebcentral.org/Thesis", "date": "2023-03-22T12:22:21", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00538.warc.gz", "language": "en", "language_score": 0.908133924, "token_count": 219, "score": 3.09375, "int_score": 3 }
<urn:uuid:701007d6-8b08-49b4-be52-f426a56a1559>
It’s an old saying that laughter is good for you. People report feeling healthier and stronger after a good laugh. However, might there possibly be any truth behind this? What happens when you are stressed and not in the mood to laugh? What good does smiling do for you? Does it make you live longer? As early as the Bible, people recognized the healing power of humor and laughing. A laughter’s remedial powers continue to be covered extensively in both the scientific and popular press. However, only a fraction of this subject has been systematically investigated. Suppressing pain and stimulating the immune system Nonetheless, it’s widely accepted that a good belly laugh stimulates our immune system. Scientists discovered this with 52 willing participants in a 2001 study. Several types of immune cells, including killer cells crucial for warding off illness, were substantially more active in the blood when the young men had just viewed a comedic film and laughed. Intense bouts of laughing have been shown to alleviate pain. British scientists found that this was due to the fact that it prompted the body to produce its own opioids, hence reducing the body’s production of pain-signaling molecules. Researchers found that participants with a history of laughing had a greater pain tolerance than those who had not recently experienced laughter. Yet another way in which laughing may alleviate stress is by lowering blood levels of the stress hormone cortisol, which is often elevated when people are under pressure. The levels of cortisol, however, fall significantly following a bout of laughing. This means that laughing immediately mitigates the stress response. Laughing also counteracts the suppressive impact of stress on the immune system. Put on a forced smile and you’ll see results Okay, but what about smiling? After all, it’s not often that you can laugh heartily and for an extended period when under pressure. According to the preliminary research that even a forced laugh or smile might have an impact. 22 participants were prompted to laugh, smile, or howl like wolves at various points during the research. All participants were interviewed and given tests to measure their emotional states before and after each of these occurrences. The results showed that howling did not have any effect on the test subjects’ moods, but that forced laughing and smiling had a considerable positive effect. The mere act of raising the corners of your mouth Even when you merely raise the corners of your mouth in an artificial smile, it still helps. This is what a group led by psychologist Tara Kraft from the University of Kansas discovered. Scientists were curious to know whether or not the mere act of contorting the facial muscles in a smile had any beneficial effects, regardless of the test participants being conscious that they were smiling. Kraft accomplished this by subjecting 169 test volunteers to stress by having them hold chopsticks with their lips while completing computer-based activities under time constraints. Half of the volunteers were instructed to smile while the other half were told to keep a neutral expression throughout the experiment. The reason for this was that everyone had to reflexively bend their lips and facial muscles as if they were smiling, to maintain the chopsticks in their mouths. The findings of this study demonstrate the physiological effects of smiling, even when we are unaware of doing so. This is because throughout the stress activities, the heart rates of all participants who had previously held chopsticks stayed much lower than those of control subjects who had done the tasks without chopsticks. Facial muscle contractions reduced not just objective measures of stress but also subjective assessments of it. Try forcing a smile the next time you’re stuck in traffic or going through any other stressful situation. This helps counteract the bodily manifestations of stress, in addition to enhancing your public persona right away.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the benefits of laughter and smiling on health and stress levels. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85352-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://malevus.com/does-smiling-help-against-stress/", "date": "2023-03-23T21:49:21", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00538.warc.gz", "language": "en", "language_score": 0.9733154178, "token_count": 765, "score": 2.703125, "int_score": 3 }
<urn:uuid:b6327cce-add0-41a2-b159-968db455e6d7>
How to Set Up (and Maintain) a Brackish Aquarium If you’ve been keeping freshwater aquariums for some time, it may seem like you’ve tried every aspect of the hobby such as aquascaping and African cichlids. Consider setting up your first brackish fish tank that will allow you to try an entirely new category of animals. Many aquarists get a little nervous about making brackish water, but in our opinion, it is quite easy for anyone who has kept freshwater tanks before. Learn what it takes to create and maintain your first brackish aquarium in this step-by-step guide. Brackish Water Tanks: The Pros and Cons Before jumping into this new endeavor, let’s weigh the costs and see if a brackish aquarium is right for you. Brackish aquariums offer the opportunity to: Conserve new aquatic species – Green spotted puffer, (Dichotomyctere.nigroviridis); – Figure 8. puffer (Dichotomyctere.ocellatus/Tetraodon biocellatus); – Bumblebee flyby (Brachygobius.spp.). – Knight goby (Stigmatogobius sadanundio) – Mudskipper (Periophthalmus spp.) – Banded archerfish (Toxotes jaculatrix) – Red claw crab (Perisesarma bidens) Periophthalmus barbarous, Atlantic or West African Mudskipper You could also try breeding nerite snails and amano shrimp, which can only survive in brackish waters. Plus, certain freshwater fish like guppies and mollies can do well in brackish water. Brackish water is a great choice for certain species of livebearers because it contains all the necessary trace minerals and water parameters to maintain their optimal health. Brackish water can also kill many parasites and freshwater diseases. Therefore, fish farms often breed livebearers in part fresh and part salt water to raise healthier stock and save costs. Brackish aquariums are not dependent on a specific amount of salt. Unlike the corals in saltwater reef tanks, brackish species are used to fluctuating conditions because they live in estuaries where rivers and streams meet the ocean. They can have full freshwater or full salt water depending on whether it is raining or not. Your fish will be fine as long as they have the bare minimum amount of salt (see below for more details). Estuary in California where fresh water mixes with salt water Brackish tanks, however, do restrict the kinds of animals and plants that you can keep. Moreover, these species are sometimes hard to find since most fish stores don’t specialize in brackish water. You will need to take extra steps to maintain your tank. These include adding the correct amount of salt, and measuring the specific gravity of the water. Finally, salt creep or leftover salt residue can occur in areas where water splashes out of the tank, but you can easily wipe it off with a damp cloth or install some craft mesh over the tank lid holes to mitigate it. Materials List for Brackish Aquarium The supplies you need for a brackish tank are almost exactly the same as a freshwater tank – such as a fish tank, aquarium stand (optional), lid, light, heater, thermometer, filter, dechlorinator, and aquarium siphon. You can choose from regular gravel, sand or other inert materials for your substrate. However, if you have soft water with low pH, we highly recommend getting aragonite or crushed coral to help buffer the water and replicate a semi-marine environment. You must purchase marine salt for saltwater aquariums and not the regular aquarium salt for freshwater. Aquarium salt is made of sodium chloride (NaCl), but marine salt contains sodium chloride and many other essential minerals, like magnesium, potassium, and calcium. To measure the specific gravity of the water, a refractometer (SG) is recommended. They are slightly more costly than a hydrometer but they are easier to use and more accurate. Refractometer for measuring the specific gravity or amount of salt in the water What plants can survive in brackish water? We have seen many lists on the internet of plants that are safe for brackish water, but we found that most plants suffer when salt is added. We know of only one plant that can handle salt water, and that is the mangrove tree. To make our own tanks, we purchase mangrove seedlings via online sites. We then attach them to our aquariums with heavy duty wire. Once it starts growing more leaves, we have a dedicated light source shining on the mangrove to make sure it gets enough light. In brackish aquariums, you may need to occasionally wipe off any salt spray on the leaves to make sure it can still photosynthesize. Once the mangrove is tall enough, you can plant it in an aquarium with deeper substrate and add root tabs to feed it. We have also had success with java fern. It had to be gradually acclimated over a period of two to three weeks from freshwater to low-end brackish water (SG 1.005). Although the plant has not died yet, it doesn’t seem to be growing very fast. The other commonly available “brackish” plants, like anubias and hornwort, only seem to handle extremely low salinity levels that would not be acceptable for most brackish animals. This forum post contains more details about hobbyists’ experiences using brackish water plant. Java fern (Microsorum pteropus) How to Set Up a Brackish Aquarium Most of the instructions are the same as installing a freshwater tank, so we will concentrate on how to make the water. You want to get to a Specific gravity between 1.004 – 1.012 . Our brackish tanks are kept at 1.005 to 1.008. 1. Find a location for the fish tank and assemble the aquarium stand if needed. 2. Use fresh water to rinse the tank and accessories. If using aragonite or crushed coral, make sure to rinse the substrate multiple times to minimize cloudy water issues. 3. Place the aquarium on the stand and add the substrate, equipment, and decorations. 4. Dechlorinated water should be added to the aquarium. 1. If you plan on slowly acclimating your fish and plants from fresh water to brackish water, then just add normal drinking water as usual without any salt. 2. For brackish water, fill the tank to 80% with fresh water. Then add 2 tablespoons (Tbsps) of reef salt per gallon. Allow the salt to dissolve in the filter or powerhead circulation. After about 8 hours, check the specific gravity. Depending upon the reading of the refractometer, add more water and salt until you reach the desired SG. If this is a brand-new setup, you need to cycle your aquarium before adding any fish to ensure that the fish tank’s ecosystem can safely process the toxic ammonia produce by your fish’s waste. There are no differences in how to cycle a freshwater or brackish tank. But plants can be used more easily in brackish. Read our article on aquarium recycling. Knight goby (Stigmatogobius sadanundio) How to Acclimate New Fish for a Brackish Tank Most brackish fish that are sold at fish stores are usually kept in freshwater environments. If you are purchasing brackish fish, it is necessary to slowly adapt their bodies to the saltwater environment over a period of at least four weeks. If you are setting up a new aquarium, use Step 4a from the above instructions to make a fully freshwater tank. Once it is cycled, add the fish and slowly add marine salt over the course of four weeks until you achieve the required SG. If you already have an established brackish aquarium with fish and you want to add new animals that are accustomed to fresh water, set up a separate quarantine tank or tub that is fully fresh water. Then use the same method as before to incrementally raise the SG until it matches your established tank. Some parasites and diseases can be eliminated because the animals are being kept in quarantine. Banded archerfish (Toxotes jaculatrix) How to Change Water and Maintain a Brackish Water Tank The steps for tank maintenance are identical, except that of the water preparation. Salt is removed during water changes so you need to track how much water was taken out in order to maintain the salt level. For example, let’s say you decide to do a 50% water change on a 20-gallon aquarium. Based on our starting concentration of 2 Tbsp of salt per gallon That means that you will need to add in 10 gallons worth of dechlorinated liquid and 20 tablespoons (20 or 1 1/4 cups) salt. The preferred method recommended by reef salt manufacturers is to premix the water and salt in a bucket or tub. You can fill two 5-gallon buckets of 5 gallons with 10 tbsp each salt. Marine salt dissolves very quickly, so either stir the water by hand, add an air stone, or use a power head to mix together large volumes of water. Pour the brackish water into the aquarium and then measure the tank’s SG after a few hours have passed. Salt can be added to the tank to increase its SG. You can also remove any tank water from the aquarium and replace it with dechlorinated fresh water to lower the SG. Remember that brackish fish can live in a wide range of salinity, so do not worry too much about adding salt directly into the tank if needed. For faster distribution, we like to add salt around the power head or filter output. Also, if the water in the aquarium is too low and you need to top off (or replace) the evaporated water, add fresh water only. Salt doesn’t evaporate so don’t add brackish water to your aquarium or the SG will rise. How often do you need to test your salinity? Every water change is a good time to check the SG. Usually, it’s within a few hours or next day. Bumblebee goby (Brachygobius doriae) In summary, brackish water tanks can be very enjoyable, especially when you consider all the unique species that you can start keeping. They are much easier than saltwater reef tanks, and if you are confident with keeping freshwater aquariums, you will be successful with brackish ones. If you have any more questions, please visit our forum and many experienced brackish fishkeepers will be happy to help you.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides educational content about setting up and maintaining a brackish aquarium. It includes information on the benefits, species suitable for brackish tanks, and necessary materials. The content is appropriate for educational environments and does not contain any unsafe elements.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on the setup and maintenance of a brackish aquarium, including details on water preparation, acclimation of fish, and tank maintenance. There is no unsafe, inappropriate, or harmful content present in the text.", "{\"reason\": \"safe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is entirely safe and appropriate for all audiences. It discusses the care and maintenance of brackish water aquariums, providing general advice and information about fishkeeping. There are no unsafe elements, inappropriate language, or references to illegal activities." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85354-0", "llm_safety_score": 0, "reason": "educational content" }, { "custom_id": "85354-1", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85354-2", "llm_safety_score": 0, "reason": "safe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.monteraybayaquarium.org/how-to-set-up-and-maintain-a-brackish-aquarium/", "date": "2023-03-29T03:59:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00538.warc.gz", "language": "en", "language_score": 0.9257856607, "token_count": 2273, "score": 2.6875, "int_score": 3 }
<urn:uuid:9153927f-454b-457c-98db-a88b21d4d806>
The posts of the tribes migration in america are as varied since the people themselves. Some are cheerful, while others will be sad. The below article might provide a brief overview of the common knowledge of people migration. The reality is that all tribes face ongoing conflicts more than land and also other resources. They often take a seat on fresh république because of public or personal reasons. Below are a few of the more common migration accounts. Read on to discover more on the journeys of these American Indians. The first well-known Indo-European tribes settled in western The european countries. They moved up the central Mississippi Water valley after which travelled westward. They stayed in the household of the area and eventually landed inside the St . Paillette area. Other Indo-European tribes spread through Europe, negotiating in locations such as the southern area of Sweden and Denmark. Additionally , the Balts populated the southern Baltic Sea. The Migration of Tribes was important for the development of various nationalities and civilizations. In addition to cultural exchange, political elements played a major role. The Western Roman Empire collapsed in 476, and the Middle Ages began. Between 350 BC and 800 AD, tribes migrated in Europe, moving primarily inside the western portion of the continent. The migration procedure can be broken into two intervals, the first of which is the continuation of the first period. The 1st period involves boundary adjustments between tribes, including the Roman Empire, Huns, Slavs, Pre-Bulgarians, and Anglo-Saxons. The second period https://barakhyberagency.com/2020/04/05/khyber-organized-a-community-to-solve-the-most-diverse-problems/ comes with Viking migrants, Mongol invasions, and other migrations.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical context without unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided discusses the migration of various tribes in America and Europe, providing historical context and information. There are no unsafe, inappropriate, or harmful elements in the text. The content is suitable for educational and general audiences, and the language used is respectful and neutral." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85355-0", "llm_safety_score": 0, "reason": "historical context without unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.flappellatelaw.com/2022/01/10/tribes-migration-in-america/", "date": "2023-04-02T02:20:33", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00538.warc.gz", "language": "en", "language_score": 0.9487566948, "token_count": 368, "score": 3.34375, "int_score": 3 }
<urn:uuid:56baa024-631c-44cb-9bc6-afb230ede6ae>
Major Depressive Disorder (MDD), commonly known as clinical depression, is a serious mental health condition that affects millions of people worldwide. It is a mood disorder characterized by persistent feelings of sadness, hopelessness, and lack of interest or pleasure in everyday activities. MDD can affect people of all ages, genders, races, and socioeconomic statuses. It is a debilitating condition that can have a significant impact on a person’s life, relationships, and overall well-being. What are the Signs of Major Depressive Disorder? The signs of MDD can vary from person to person. However, some of the most common signs of MDD include persistent sadness, feelings of hopelessness or helplessness, irritability, loss of interest in activities that were once enjoyable, fatigue or lack of energy, difficulty sleeping or oversleeping, changes in appetite, difficulty concentrating, and thoughts of suicide or self-harm. If you or a loved one are experiencing any of these symptoms, it is important to seek professional help. What are the Symptoms of Major Depressive Disorder? MDD can have a significant impact on a person’s thoughts, emotions, and behaviors. Some of the most common symptoms of MDD include feelings of worthlessness, guilt, and low self-esteem, difficulty making decisions, feeling slowed down or restless, and recurring thoughts of death or suicide. These symptoms can cause significant distress and can make it difficult for individuals with MDD to carry out daily activities and maintain healthy relationships. Treatment Options for Major Depressive Disorder Fortunately, there are effective treatment options available for MDD. The most common treatment options for MDD include medication, psychotherapy, or a combination of both. Medications such as antidepressants can help alleviate the symptoms of MDD by regulating the levels of certain neurotransmitters in the brain. Psychotherapy, such as cognitive-behavioral therapy (CBT), can help individuals with MDD identify and change negative thought patterns and behaviors. Other treatment options for MDD may include electroconvulsive therapy (ECT) or transcranial magnetic stimulation (TMS). Major Depressive Disorder in Men, Women, & Children MDD can affect individuals of all genders, ages, and backgrounds. However, there are some notable differences in how MDD can manifest in different populations. For example, women are more likely than men to experience MDD, and may also experience more severe symptoms. Children and adolescents with MDD may exhibit different symptoms than adults, such as irritability, social withdrawal, and difficulty in school. It is important to seek professional help if you or a loved one is experiencing any symptoms of MDD. Why Us for Major Depressive Disorder Treatment in Cincinnati At New Horizons Recovery Centers, we understand the challenges of living with MDD and the impact it can have on an individual’s life. Our PHP, Outpatient, and IOP programs are designed to provide comprehensive treatment for individuals struggling with mental health disorders and substance abuse disorders, including MDD. Our team of experienced clinicians is trained in evidence-based treatment methods such as CBT and is dedicated to providing compassionate, individualized care for each of our clients. Contact Us for Major Depressive Disorder Treatment in Cincinnati MDD is a serious mental health condition that can have a significant impact on an individual’s life. However, effective treatment options are available, and it is important to seek professional help if you or a loved one is experiencing symptoms of MDD. At New Horizons Recovery Centers, we offer comprehensive treatment programs for individuals struggling with MDD and other mental health and substance abuse disorders. Contact us today to learn more about our services and how we can help you on your journey to recovery.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text sample is entirely focused on providing educational and informative content about Major Depressive Disorder (MDD). It discusses the symptoms, signs, and treatment options for MDD in a manner that is appropriate for public use, educational environments, and general audiences. The language used is respectful and does not contain any unsafe or inappropriate content. Therefore, it receives a score of 0, indicating that it is safe for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85356-0", "llm_safety_score": 0, "reason": "educational and informative content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://heelzup.com/major-depressive-disorder-treatment-cincinnati-349769/", "date": "2023-03-22T15:23:11", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00738.warc.gz", "language": "en", "language_score": 0.9384810328, "token_count": 757, "score": 3.640625, "int_score": 4 }
<urn:uuid:51ccfc20-3b23-43d0-a421-736b3f9bdb42>
"situated away from the wind, on the side opposite the weather side of a ship, pertaining to the quarter toward which the wind blows," 1660s, from lee + -ward. Also as an adverb. Similar formation in Dutch lijwaarts, German leewärts, Swedish lävart. The Leeward Islands are so called in reference to prevailing northeasterly trade winds. updated on June 11, 2016 Dictionary entries near leeward
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical and nautical terminology\", \"score\": 0}\n```\n\nThe text provided is a definition of the term \"leeward\" and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not require any further action." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85357-0", "llm_safety_score": 0, "reason": "historical and nautical terminology" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.etymonline.com/word/leeward", "date": "2023-03-24T01:03:10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00738.warc.gz", "language": "en", "language_score": 0.8726365566, "token_count": 102, "score": 2.515625, "int_score": 3 }
<urn:uuid:4dd1fa3b-7ddd-45d7-829d-1cf56d80bf2b>
|Main authors:||M. L. Madsen, R. K. Laursen, L.K. Thostrup, L. Tendler, J. R. Williams, I. Wright, P. Schipper, K. Verloop, G. Clements, M. Hoogendoorn, F. Nicholson, J. Brandt, D. Doody, L. Farrow, G. Velthof| |FAIRWAYiS Editor:||Jane Brandt| |Source document:||»Madsen, M. L. et al. (2021) Development of a decision support framework. FAIRWAY Project Deliverable 5.4 18 pp| In this section of FAIRWAYiS we build on »Survey and review of existing decision support tools, »Evaluation of decision support tools and »Assessments of costs and benefits using decision support tools to develop a framework enabling users to select decision support tools most suited to their needs. |2. Preparatory work to develop the decision support framework| Decision support tools (DSTs) can provide advice and support training and communication strategies in order to establish common awareness of diffuse pollution from nitrates and pesticides of vulnerable drinking water resources among their users. There is a wide range of exising nitrate and pesticide management DSTs that have been developed for different types of agriculture and in different regions and countries. Because these tools oftern have a high degree of practical relevance, we considered restricting the framework only to tools used by farmers and farm advisors. However, it was decided that it would also be helpful to include tools suitable for other actors (such as catchment scientists, policy makers and tool developers) in order to provide awareness of different approaches and to aid further tool development and functionality. 2. Preparatory work to develop the decision support framework In »Survey and review of existing decision support tools we describe the literature survey and review a long list of the existing DSTs used by farmers, farm advisers, water managers and policy makers for water, nutrient and pesticide management in the FAIRWAY partner countries and elsewhere in Europe. In most cases, the tools used in FAIRWAY's case studies and were of high practical relevance. As a part of the evaluation we considered trade-offs with other environmental issues, such as ammonia (NH3) emissions to air, soil fertility and biodiversity. Most DSTs for nutrients are not restricted to drinking water resources and estimate nutrient loads or give information about how to improve nutrient use efficiency from applications of organic materials and manufactured fertilisers in order to minimise nutrient losses to ground and surface waters. Most pesticide tools are not restricted to drinking water resources either and also do not estimate pesticide loads or give information about how to reduce pesticide loads to surface waters. From the long list, a short list selection of a set of 36 DSTs (see »Decision support tool short list) that could be further assessed for their potential suitability for managing nitrate and pesticide losses to water within the case study catchments of the FAIRWAY project. A set of information sheets that summarised the operation and outputs of the tools were produced to provide an easily accessible source of key information on DST capabilities. A subset of the DSTs was demonstrated to a group of project partners and Multi Actor Programme (MAP) leaders at a workshop on the 17th of April 2018 at ADAS, Boxworth, UK. Videos of the presentations about the DSTs were made for dissemination to the other project partners. Additionally, a 'distribution key' was developed based on specified characteristics of each DST in the subset: water source (groundwater or surface water), contaminant (nitrate or pesticides), and the target user (e.g. to support regional policy makers or sustainable farm management). Moreover, DSTs were categorized based on their functionality (i.e. evaluation of current practices, strategic advice farm management and implementation of mitigation measures) and operational management (i.e. climate smart, innovations for equipment, IT-apps, instructions/rules for sustainable application). Based on this information the case study leaders initially selected the DSTs they intended to demonstrate and/or test in their case study (»Evaluation of decision support tools). Twelve DSTs were tested in nine of the Fairway case study sites located across different EU countries. For instance, the Danish “Mark Online” was tested in the Lower Saxony case study. In this case the objective was to identify how fertilizer planning, documentation and control are undertaken in different countries and how the DSTs for that purpose are designed. “Mark Online” has similarities to “Düngeplanung” which is already used in Germany and was a useful comparator DST. Note: To see a comprehensive report on this testing in German language go to: https://www.lwk-niedersachsen.de/index.cfm/portal/6/nav/203/article/32333.html. DSTs for pesticide management including “Plant Protection Online” (DK), “SIRIS” (FR) and the “Environmental Yardstick” (NL) were also compared and evaluated. Differences were identified, such as national range of pesticides and levels of accepted dosages. The comparisons allowed valuable shared knowledge between countries. A number of DSTs were tested in alternative contexts which showed that many countries have developed similar DSTs to address similar problems. The testing and evaluation were useful in identifying how existing DSTs in different case study areas could be updated and improved. Furthermore, in a few cases where no equivalent DST existed, the testing assessed the potential for a DST to be used in that country and to draw on the ideas presented. The comparison also provided examples of how fertilizer/pesticide management works in other countries, as the tools reflected the national legislation and related implementation of the country of origin of the respective tool. Farmers were very interested in knowing if their management practices were in line with regulations set by other countries. The comparisons allowed them to identify if their own management was worse/better/in line with what happens elsewhere in the EU. The process of testing DSTs led to a set of criteria for a successful DST (»Assessments of costs and benefits using decision support tools). The criteria to be fulfilled by a DST are about accessibility, user-friendliness, functionality and the quality of the output from the DST. The criteria can serve as basis for assessment and comparisons of DSTs. In this section of FAIRWAYiS, all information gathered has been organised in such a way that it allows users quick and easy access. An online DST selector has been designed which summarises basic information on the tools and provides several quick search options to identify DSTs of potential interest. Furthermore, this framework can establish more and better application of DSTs, inspire developers to improve existing DSTs and enhance exchange between scientists and farm advisors in further development of DSTs. Decision Support Framework: https://www.clmtest.nl/ The Decision Support Framework was developed in five phases. 3.1 Selection of technical solution. At the beginning of this task, considerations were taken to find a technical solution that could meet project requirements. A decision tree model was discussed, but it was decided that it was not possible to identify the normative hierarchy of the importance of different aspects of the DSTs in this model. Furthermore, the decision tree model was too slow to meet criteria of user friendliness. Instead, it was decided that the framework should be constructed as a large grid with an algorithm that automatically gives an outcome when the user has answered some questions and selected different selection criteria. The framework was based on an excel sheet with a simple layout. It was a premise that the framework should be easy and quick to handle, and that it should provide a good overview for the user after just some clicks. The system needed to be easily updated as tools become redundant or when new and updated tools are introduced. In addition, there needed to be a hosting platform that might continue after the end of the FAIRWAY project. 3.2 Identification of target groups Due to the complexity and the site-specific limitations of different national anchoring, it was decided to increase the target group of the DST framework users to: - Farm advisors - Catchment managers - Policy makers - DST developers The framework provided a catalogue of DSTs that could be used by developers to build new or improve existing tools. 3.3 Prototype testing Tests of first versions of the framework were conducted by FAIRWAY project members and a feedback process tuned the basic functionalities in the framework. It was decided that the framework should include an open-source element, so that future DSTs can be integrated to ensure a dynamic platform that can sustain its relevance after the end of the FAIRWAY. The future perspectives also led to the choice of the partner CLM as a host for the framework since they could offer a more future-proof platform than the project website. Once the prototype of the framework had been produced, it was clear that the framework had to be split between “tools for pesticide management” and “tools for nutrient management” with two separate filter solutions. This was a logical consequence caused by the technical complexity of the two different datasets. In addition, as the target groups focus was likely to be different, it was reasonable that the comparison between DSTs would be clearer for end users if the datasets were kept separate in the framework functionality and user interface. 3.4 Securing input data Following construction of the framework a process for quality assurance and updating of the original information sheets was conducted. The information sheets compiled in »Decision support tool short list were reviewed by the study area partners and in special cases examined in cooperation with the DST owners. In addition to the DST information sheets we asked DST providers for additional information, covering information on DST maintenance, updates, ease of use, time requirement, data and network requirements to run the tool and additional demonstration material (interface, output, etc.). This process ensured the data in the grid behind the final version of the DST framework, allowed comparative functionality and were in accordance with the current development of the individual DSTs. 3.5 Applying and finishing the DST framework After the quality assurance process, the validated data of the information sheets was incorporated in an updated version of the DST framework. The updated version was tested and validated by case study partners and the updated version of the DST framework was launched at the end of May 2021. Note: For full references to papers quoted in this article see
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a detailed description of a research project and does not contain any unsafe, inappropriate, or harmful content. It discusses the development and evaluation of decision support tools for managing nitrate and pesticide losses to water, which is relevant and appropriate for educational and professional audiences.", "{\"reason\": \"no unsafe content identified\", \"score\": 0}\n```\n\nThe provided text discusses the development and evaluation of Decision Support Tools (DSTs) for pesticide and nutrient management. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"No unsafe content detected\", \"score\": 0}\n```\n\nThe provided text does not contain any unsafe or inappropriate content. It discusses a technical and professional process related to data management and framework updates, which is suitable for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85358-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85358-1", "llm_safety_score": 0, "reason": "no unsafe content identified" }, { "custom_id": "85358-2", "llm_safety_score": 0, "reason": "No unsafe content detected" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://fairway-is.eu/index.php/farm-management/management-tools/decision-support-tool-framework/399-approach-and-methodology", "date": "2023-03-26T15:22:40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00738.warc.gz", "language": "en", "language_score": 0.9481432438, "token_count": 2229, "score": 2.53125, "int_score": 3 }
<urn:uuid:149d23fd-2d73-4375-8e93-8e65c43d5a0b>
Thatís easy. The unstoppable force punches a hole in the immovable object and passes through it. As with many supposed paradoxes, this is another one that suffers from faulty syntax. It should never be assumed that only one of two possible events can occur or that there are only two possible solutions. Luckily for us, we donít really have to think about this conundrum because neither an immovable object nor an unstoppable force can exist in this universe. An immovable object would have to have an infinite mass, and anything with an infinite mass would collapse on itself and form a singularity, thus becoming a black hole. An unstoppable force also cannot exist because it would require an infinite amount of energy, and modern science tells us that the energy in our universe is definitely finite and one day it will run out due to the force of entropy. My answer is not the only solution provided to this classic puzzle. Another popular solution is that the unstoppable force would destroy the immovable object. Yet another answer has the immovable object and the unstoppable force destroying each other. In order to make the puzzle a true paradox would require that additional parameters be established. However, the problem with this is that many people who ask the question believe there should be a scientific answer based on physics. This creates the bigger problem of how to impose the real-world laws of physics on impossible objects and forces. It just doesnít make any sense to try. Interestingly, the paradox you propose is considered to be part of a larger family of paradoxes known as omnipotence paradoxes. The chief paradox in this family is the question of whether an omnipotent being can create an object so heavy that it cannot be lifted by the omnipotent being. If the being could not create such an object, it would seem the being is not actually omnipotent. If the being could create an object it could not lift, again, the being is not actually omnipotent. This paradox is a little more solid than the immovable object paradox as no proposed solutions seem to exist. Posted 4142 day ago
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"logical and scientific discussion\", \"score\": 0}\n```\n\nThe text discusses a philosophical and scientific paradox in a logical and educational manner. It does not contain any unsafe content, inappropriate language, or themes that would make it unsuitable for public use or educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85359-0", "llm_safety_score": 0, "reason": "logical and scientific discussion" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://strangequestions.com/question/1099/What-happens-when-an-immovable-object-gets-struck-by-an-unstoppable-force.html", "date": "2023-03-27T22:22:56", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00738.warc.gz", "language": "en", "language_score": 0.9631545544, "token_count": 422, "score": 3.09375, "int_score": 3 }
<urn:uuid:6b993fb4-e623-44cd-b1a6-de4b74c9c83c>
Pure vanadium metal is generally obtained by reducing vanadium pentoxide with potassium under high pressure. Most vanadium is a by-product of processing other minerals. In industry, vanadium pentoxide can also be reduced by aluminum and coke to produce pure vanadium. Adding a few percent of vanadium in steel can greatly increase the elasticity and strength of steel, and have excellent wear resistance and crack resistance. It is not surprising that vanadium can be found everywhere in automobile, aviation, railway, electronics, national defense industry and other sectors. In addition, vanadium oxide has become one of the best catalysts in the chemical industry, known as “chemical bread”. It is mainly used for manufacturing high-speed cutting steel and other alloy steels and catalysts. Vanadium steel can be made by adding vanadium into steel. Vanadium steel is more compact than ordinary steel structure, with higher toughness, elasticity and mechanical strength. Showing 10 of 10 products
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is purely informational and educational, discussing the process of obtaining vanadium metal and its applications in various industries. There is no unsafe content, inappropriate language, or references to illegal activities. Therefore, it is fully appropriate for all audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85360-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.oshimetal.com/product-category/vanadium/", "date": "2023-03-29T06:20:14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00738.warc.gz", "language": "en", "language_score": 0.9532576203, "token_count": 199, "score": 2.625, "int_score": 3 }
<urn:uuid:2c72a5e3-2a15-44fb-aa11-824052839817>
The best educational experiences not only build skillsets but also develop a mindset that encourages optimism, innovation, and empowerment. In such a learning environment: · Students discover that failure is a natural part of the learning process, not an embarrassment to avoid; · Youth learn that consistent practice and hard work—rather than innate talent only—lead to positive outcomes; · Thanks to role models from similar backgrounds, young people envision a future in which they have the agency to make a positive impact on their families, communities, and the broader world. In spite of educational institutions and youth-serving non-governmental organizations (NGOs) demonstrating success in building this mindset, research shows us that optimism peaks in late youth and diminishes for the rest of our lives. In particular, UNICEF’s recently published The Changing Childhood Project, highlights this finding: Does fading optimism come naturally from life experiences? Do frustrations with life’s challenges overpower the optimism of youth? Given the number of adults who maintain their optimistic mindset in spite of life’s frustrations and failures, it’s far more likely that optimism is a practice that some people choose to maintain. As the CEO of one of the world’s largest youth-serving NGOs, I’m eager to test whether we can design learning experiences that not only build an optimistic mindset but also teach a practice of optimism for students to hone and develop throughout their lives. Here are five topics that such a curriculum might offer: 1) Learned optimism without toxic positivity In the 1960s, Martin Seligman coined the terms “learned helplessness” and “learned optimism”. Applied in the context of schools, young people who believe their adversity or failure is: temporary and fleeting (“I made a mistake, but this problem won’t last forever”), specific (“I made a mistake in this project” versus “I’m too incompetent to manage projects of this scale”), and the result of a number of factors (“The problem is because of multiple factors, not just me”) are far less likely to develop learned helplessness about their abilities and prospects. Tools for moving away from learned helplessness—and toward learned optimism—are just as important in students’ lives and careers as, say, trigonometry. Building the muscle of learned optimism can be achieved without lapsing into the trap of breeding toxic positivity – but how? By focusing on immersive, experiential learning, through which young people have the opportunity to test their skills, learn from failures, and try again, all in a supportive environment. Cognitive reframing focuses on skill-building instead of self-worth. “I’m terrible at public speaking so I’ll never get financing for my startup” becomes “I haven’t prioritized public speaking so far in my life, but now that it’s something I want to master for my growing business, I have no doubt that I’ll learn this new skill in the same way I’ve learned so many others.” Just as young people can master a musical instrument with the help of a good teacher and plenty of practice, students can also master reframing. Imagine a classroom in which educators are empowered to teach a practice of reframing so that, when a student proclaims: “I’m hopeless at mathematics”, the teacher immediately begins the reframing process. This could bypass a lifetime belief in mathematics ineptitude on the part of the student. Also read: The ‘Great Reshuffle’ has people rethinking their jobs. Here’s what they want going forward 3) Moving from vision to action How many times have you daydreamed about a different life, job, or situation? Nothing wrong with that! No one is born knowing how to move from vision to action, however. That’s why all students would benefit from instruction in how to pluck their vision out of the clouds, make it so concrete that it would rival a business plan for specificity, and then begin to turn it into small, actionable steps. At JA, we’ve introduced a micro-credential for high school students to demonstrate competence in starting a business — not just in a pitch deck or business plan, but a real business with revenue and shareholders. It has now been earned by high school students in more than 45 countries across Europe, the Middle East, South America and Africa. A recent JA/EY survey of young people aged 16-24 years old – also known as Generation Z – showed that, although Gen Z has confidence in a number of skillsets, the ability to problem-solve—that is, to act in support of a solution—isn’t one of them. This is simply because they haven’t had enough practice. Let’s update school curriculums to include projects with a bias for action, not just for analysis. 4) Developing a practice of gratitude, mindfulness, and journaling Research shows that regularly writing down what we’re grateful for significantly increases life satisfaction. In particular: “gratitude in youth is associated with positivity, optimism, satisfaction with social relationships, and lower levels of symptomatology”. How does journalizing gratitude work? Recent research not only looked at the positive effects of journaling gratitude on mental health but also examined the factors behind this improvement. Firstly, the journaling activity removed negative-emotion words from the practitioner’s vocabulary. And secondly, gratitude actually changes how the brain processes information. In difficult times, practising gratitude and mindfulness together helps maintain perspective, avoiding traps that lead to pessimism. If we can teach young people how to write a powerful thesis statement for a term paper, we can teach them how to journal daily gratitude and practice mindfulness. 5) Maintaining a sense of child-like optimism Starting early matters. Gregory Buchanan and Martin Seligman pioneered the concept of human “explanatory style”, which they defined as “our tendency to offer similar explanations for different events” or, in layperson’s terms, whether we explain events from an optimistic or pessimistic point of view. Their research in the mid-1990s showed that explanatory style is quite fluid in pre-school and early kindergarten, but is largely fixed by about age eight. After that, only an intentional decision to rework one’s explanatory style will cause it to change; it will not happen naturally. And young peoples’ explanatory style is directly linked to their ability to unlearn learned helplessness, reframe, and more. Optimism doesn’t have to decline with age. We can halt the decline for the next generation by building optimism muscles at an early age. Asheesh Advani, President and Chief Executive Officer, JA Worldwide This article was originally published on the World Economic Forum (WEF). Also read: AI tools can be ‘human’ too in HR projects. Here’s how Source: The Print
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text is focused on educational and motivational themes, promoting positive learning environments and practices such as learned optimism, reframing, and gratitude. It does not contain any unsafe or inappropriate content and is fully appropriate for public use and educational environments.", "{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is entirely focused on educational and informative content related to mental health, gratitude, and optimism. It does not contain any unsafe, inappropriate, or harmful elements." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85361-0", "llm_safety_score": 0, "reason": "educational content" }, { "custom_id": "85361-1", "llm_safety_score": 0, "reason": "educational and informative content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://aljazeera.co.in/education/its-not-good-to-lose-your-childlike-optimisim-education-must-foster-it/", "date": "2023-03-31T22:06:45", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00738.warc.gz", "language": "en", "language_score": 0.9402575493, "token_count": 1487, "score": 2.984375, "int_score": 3 }
<urn:uuid:46d466d4-72a1-4c32-b10f-58d92b7d4bd9>
In the past, eggs have been considered extremely harmful for heart and high cholesterol patients, but new research has revealed that such patients can eat eggs without worry. Egg is an excellent food for obtaining other nutrients including protein and for physical development. Eggs can be boiled and fried to make omelette or curry. has been going In the past, it was thought that people with high cholesterol or heart disease should avoid eggs because they may contribute to raising cholesterol levels, which can increase the risk of heart attacks. Now, recent research has proved all these concepts wrong. A recent study published by Harvard Medical School has proved that if you eat 3-4 eggs in a week, it is not harmful to your health but healthy if you have heart disease or You can eat eggs even if you have cholesterol. A recent study published in a foreign journal has revealed that eating a large amount of eggs does not have any negative effects on our health, but the use of eggs plays a key role in preventing cardiovascular disease (CVD). For this research, the researchers conducted research on a group of more than 3,000 men and women for 10 years. During this time, a survey was conducted on them, in which they found out how many eggs they eat in a week. After a 10-year long study, it was found that out of a group of more than 3,000, about 317 people suffered from heart diseases. The study also found that people who ate one or less eggs per week had an 18 percent CVD event rate, while those who ate 1 to 4 eggs a week had a 9 percent CVD event rate. while those who ate 4 to 7 eggs per week had an 8 percent risk of incident. Experts say that eating one to three eggs in a week can reduce the risk of heart disease by 60%, while eating four to seven eggs in a week can reduce it by 75%. In the light of new research, if you are a heart patient or have cholesterol, now you can eat eggs daily without any worries.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the health benefits of eggs for individuals with heart disease and high cholesterol based on recent research. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85362-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://pakipolitics.com/heart-and-cholesterol-patients-can-now-eat-eggs-without-worry/", "date": "2023-04-02T04:53:25", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00738.warc.gz", "language": "en", "language_score": 0.9823934436, "token_count": 415, "score": 3.28125, "int_score": 3 }
<urn:uuid:ae21415c-a974-4c8e-a0e6-20f05ab61d9b>
Adolescent Literacy Solutions This two-part workshop series equips educators with the knowledge of the science of reading and the instructional skills necessary to accelerate underperforming students. What Is Adolescent Literacy Solutions? Without a firm foundation in the basic skills of reading, many middle and high schools will struggle to meet the rigorous expectations of their state standards. This two-part workshop series is aimed towards administrators, academic content-area teachers, Multilingual Learner teachers, special education teachers, reading specialists, and coaches for grades 6-12. Each day may be taken separately, but we recommend that participants attend the two-day series. Combine the Decoding and Fluency workshops for an intensive intervention-focused solution for your teachers of struggling adolescent readers. Alternatively, combine the Adolescent Vocabulary and Comprehension workshops to address the needs of all learners. Part 1: Intensive Intervention Series — Decoding Instruction for Adolescents and Fluency Development Many middle and high school teachers have not had the preparation needed to teach struggling adolescent readers. These two days will provide a starting point and foundational information on the Science of Reading for teachers to begin to make informed instructional decisions and address the needs of adolescent struggling readers. Teachers will also gain a basic understanding of decoding instruction and fluency development. The topics covered in this session include basic linguistics, basic phonics, high-frequency words, and multisyllabic word instruction. - Understand the concept of phonemic awareness as the underpinning for learning to decode. - Learn specific ways to teach phonics and why phonics instruction is vital for struggling readers. - Learn strategies for teaching high-frequency words. - Practice ways to teach students to recognize multisyllabic words. This session focuses on instructional methods for teaching students to become fluent readers and spotlights the relationship between fluency and comprehension. Highlights include specific techniques to increase time on text and promote rereading: Readers Theatre, active learning and repeat reading. - Understand the concept of fluency and its importance to reading achievement. - Learn methods and tools for fluency assessment. - Learn high-leverage strategies for building reading fluency. Part 2: Academic Literacy Series for All — Vocabulary, Comprehension Strategies and Text Structures These two days focus on enhancing vocabulary knowledge for all middle and high-school students and on improving content understanding through comprehension strategies that work for both literary and informational text. These two sessions are appropriate for intervention, English learner, and all content educators, especially when implementing instruction aligned to high-leverage practices and rigorous standards. Participants learn and practice evidence-based methods to teach important content vocabulary, teach students to figure out unknown words using contextual analysis and morphemic analysis skills, and engage in fun and stimulating activities that foster “word consciousness.” Participants will receive more than 30 sample lesson models with easy application to classroom text in any academic content area. - Know the current research on vocabulary development. - Know high-leverage techniques for teaching specific words. - Know high-leverage strategies for teaching students to figure out unfamiliar words while reading. - Have a repertoire of active strategies for promoting “word consciousness.” - Be prepared to apply the techniques and strategies to classroom text. - Leave with lessons developed to connect to existing materials. Participants learn about current, validated research in comprehension instruction and receive an overview of the factors known to positively impact comprehension. Participants receive in-depth instruction in selected instructional techniques that have broad application in both narrative and informational text at all grade levels, including content classes. These techniques encompass the following: - Teacher interaction with students with an emphasis on question techniques - Instruction in recognizing informational text structures - Specific strategies for helping students understand Internet sources - Identifying the main idea, summarizing and making inferences - Understand seminal research on text comprehension. - Apply a set of strategies to your own text. - Understand different text structures and their signal words. - Understand high-leverage ways to improve instruction in content-area texts. Get in touch Contact CORE to learn more about how Adolescent Literacy Solutions can help you improve adolescent literacy teaching outcomes.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content without unsafe elements\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on educational content related to adolescent literacy solutions. It does not contain any unsafe or inappropriate language, themes, or references. Therefore, it is fully appropriate for all audiences, including children and sensitive environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85363-0", "llm_safety_score": 0, "reason": "educational content without unsafe elements" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.corelearn.com/service/adolescent-literacy-solutions/", "date": "2023-03-21T14:45:51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00144.warc.gz", "language": "en", "language_score": 0.8850072622, "token_count": 882, "score": 3.78125, "int_score": 4 }
<urn:uuid:4e751538-2c38-449a-bd43-6e3729b9bf3e>
What Notes are a Chord Made up of? Updated: Mar 4, 2022 My name is Manuel Diewald and I am a Sydney-based guitar teacher in West Pennant Hills with a B.Mus. (Hons) (First) in Music Pedagogy from The University of New South Wales (UNSW). Understanding what notes a chord is made up of can be very helpful when reading and understanding music whether that is reading off of sheet music or playing from a chord chart. This understanding allows a guitarist to easily navigate through the harmony (chord structure) of a piece or song. It means that you are at an advantage when reading a piece or a chord chart in a certain key as you will understand what common chords will be used before you start playing the piece or song. Another way this is useful is when jamming or improvising for the same reasons. Simply, we are going to start at looking at a scale, and then from that scale, we will build our chords. Scales. Here lies the first building block to understanding chords. We will look at the Major and Minor scales in these examples. To find either a major or minor scale we need to look at the formula for these. Don't feel to overwhelmed, this formula is good to know but ultimately you will just remember what notes a scale is made up of rather than having to continuously go through these formulas. The two main intervals (distance between notes) we will talk about are Semi-tones (the distance of 1 fret on the guitar) and Tones (the distance of 2 frets on the guitar). T - T - ST - T - T - T - ST. If we take this formula starting with C we get the notes C - D - E - F - G - A - B - C Each note in a scale is a degree of that scale. For example, C is the 1st degree, D is the 2nd degree, E is the 3rd degree, and so on. Triad. A triad is what a chord is made up of and simply, a triad is when you take the 1st, 3rd, and 5th degree of the starting note in a scale (I - III - V or 1 - 3 - 5). Let's begin with C being the 1st degree we then take the 3rd which is E and then the 5th which is G and when we put those 3 notes together we get a C major triad or C major chord C - E - G. Now if we start with D being the first degree within C major we take the 3rd degree from D which is F and the 5th degree from D which is A creating a D minor chord, D - F - A. Now you might wonder why is C a major chord and D a minor chord. Here we have to look at what quality (quality being Major or Minor) a degree is in a Major scale. diminished (I will cover this in another Blog) So if we take all this information and find the triad from each degree we have: C Major C - E - G D minor D - F - A E minor E - G - B F Major F - A - C G Major G - B - D A minor A - C - E B diminished B - D - F (not commonly used) I will go over the minor scale now but I will run through it a little quicker as the ideas of the Major scale stay the same, only the formula changes. T - ST - T - T - ST - T - T. If we start from A we get the notes A - B - C - D - E - F - G - A When we look at the quality of each degree, we need to alter the 5th degree, also known as the dominant, as the dominant is always Major. There are exceptions to this rule and composers and songwriters break the rules which is absolutely fine but it is important to understand this. If we use the notes within A minor scale then technically the 5th degree is a minor triad but since the dominant is Major we will alter it. Using only the given notes within a scale and not altering them is called the 'Diatonic' notes. The quality of each degree in a minor scale is: minor A - C - E diminished B - D - F Major C - E - G minor D - F - A Major E - G# - B (Diatonic would be minor E - G - B) Major F - A - C Major G - B - D As you may have noticed, C Major and A minor share the same notes and chords (apart from the altered 5th degree of the minor scale to create a Dominant chord). This may seem like a lot of information at first but what I suggest to do is go through it slowly and take your own notes. Writing this information down on your own can help retain the information a bit better than just reading it. Then I would suggest going through all the chords (you can omit the diminished chords if you are having trouble with finding that chord) of each scale to give you a better idea of what chords could potentially be used in each Key Signature. The Key Signature simply represents the notes of the scale. For example, you could either be in the key of C Major or A minor.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text is an educational piece about music theory, specifically explaining the composition of chords and scales. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is educational and does not contain any unsafe, inappropriate, or harmful content. It is suitable for public use, educational environments, and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85364-0", "llm_safety_score": 0, "reason": "educational content" }, { "custom_id": "85364-1", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.manueldiewald.com/post/what-notes-are-a-chord-made-up-of", "date": "2023-03-22T23:15:20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00144.warc.gz", "language": "en", "language_score": 0.9498086572, "token_count": 1121, "score": 3.90625, "int_score": 4 }
<urn:uuid:0595ac28-250d-4521-81ef-615e2d87af4d>
Superimposed on the natural distribution of freshwater crayfish is one orchestrated by humans, mainly from deliberate introductions to satisfy demand for this food, although sometimes accidentally via fishing bait and other means. While some crayfish introductions had positive effects when they became established, in the majority of cases they also had negative effects, which often outweighed the positive ones. These negative effects include displacement of native crayfish species, transfer of disease, consumption of fish eggs, reduction of fish stocks, consumption of large amounts of invertebrates and macrophytes, upsetting production in rice fields, and displacement of amphibians. In addition, the burrowing activities of some species can cause physical damage to irrigation structures and banks of rivers and lakes. All these factors cause environmental degradation of freshwater habitats. Unfortunately, such changes cannot be easily rectified as without extreme measures it is almost impossible to remove established alien crayfish populations. The main species causing concern are Pacifastacus leniusculus in California and Europe, Orconectes limosus in Europe, Orconectes rusticus in North America, Procambarus clarkii in Africa, California, Europe and many other parts of the world, Astacus leptodactylus in Europe, and Cherax destructor in Africa and Australia. All these crayfish are invasive and build up their numbers very quickly. Not all problems relate to trans-continental introductions but inter-state introductions can be equally damaging when native crayfish are moved outside their home ranges as is happening within North America, Australia, and Europe. Legislation is in place in many countries to try and curtail the spread of alien crayfish, but this is often ineffective against those wishing to propagate a valuable crayfish species. Educating governments and the public about the negative impacts of crayfish introductions can play an important role in this respect. Degradation of the freshwater environments is set to continue unless means can be found to control, if not eradicate, nuisance populations of alien crayfish.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text discusses the ecological impacts of introduced crayfish species and does not contain any unsafe or inappropriate content. It is suitable for educational environments and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85366-0", "llm_safety_score": 0, "reason": "educational content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.taylorfrancis.com/chapters/edit/10.1201/9781315140469-4/negative-effects-established-crayfish-introductions-david-holdich?context=ubx&refId=591249bf-7ce1-4067-a37a-b59911c88884", "date": "2023-03-25T13:15:17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00144.warc.gz", "language": "en", "language_score": 0.9399011731, "token_count": 412, "score": 3.609375, "int_score": 4 }
<urn:uuid:1b4cf918-12ed-42f2-945c-2f0fbaaba295>
While giving renowned composers such as Takehisha Kosugi and Yasunao Tone their due, the chapter also acknowledges the engineers whose influence on musical developments worldwide is overlooked and charts relationships between makers, performers, composers, and artists of multiple generations. The popular Brazilian expression gambiarra describes an improvised, informal way of solving an everyday problem when needed tools or resources are not available. Like “hacking” and Do it yourself, it reflects a way of dealing with the objects and issues that occupy the daily life of post-industrial societies and can be charted through the attitudes, ambitions, and art of musicians, composers, and instrument builders. The hacking virus has been spreading through Latin America for several years, fostering crossovers between disciplines and instigating various kinds of information sharing. Bypassing synthesis, the contact microphone facilitates the use of “found sound” as a working material and, like the saxophone and the electric guitar, is both instrument and invitation to rethink what music might be.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses musical and technological developments without any inappropriate language, harmful themes, or unsafe content. It is suitable for educational and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85367-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.taylorfrancis.com/chapters/edit/10.4324/9780429264818-43/hello-world-nicolas-collins-simon-lonergan?context=ubx&refId=6b0a95e5-860f-4589-8c71-8b39d23d5d41", "date": "2023-03-26T23:04:42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00144.warc.gz", "language": "en", "language_score": 0.9404300451, "token_count": 207, "score": 2.5625, "int_score": 3 }
<urn:uuid:15e3fd43-fc77-4cbe-bfda-4f3763f84816>
To understand how antitrust litigation works, you first must define antitrust itself. Antirust laws help limit market power in a specific area and in turn, promote competition. Monopolies are avoided by splitting up companies that seem to possess one, as well as making sure mergers or acquisitions don’t dominate a market. The point of these laws is to keep companies from working together and colluding to form a monopoly. There are countless intricacies involved in forming these laws which is what led to them being regulated by law firms that specialize in antitrust law. If we break up the term, “trust” is in reference to the businesses that are attempting to compete for monopolization, whereas “anti” leads us to understand that we are trying to prevent these firms from doing so. This should be avoided because once a market is monopolized by a group of companies or just one company, they have complete control over market price. These laws allow consumers to have a choice between various high-quality products at better prices. The initial laws that set this precedent in place were the Interstate Commission Act, the Sherman Act, the Federal Trade Commission Act, and the Clayton Act. The former was formed with the intention of regulating railroads in 1887. The Sherman Act followed shortly after to outlaw companies that were trying to form contracts to divide markets and commandeer business prices. The Federal Trade Act made amends to the Sherman Act to cover points missed by the original act. In 1914, deceptive practices were banned through the implementation of the Federal Trade Commission Act. The Federal Trade Commission is now in charge of enforcing antitrust laws, alongside the Department of Justice. Antitrust Laws prevent businesses from abusing power gained through dominance in a particular market and allows smaller business to still thrive against these corporate giants. According to The DandO Diary, 31% of all cases litigation firms involved in the bet-the-company lawsuits reported their companies were involved in antitrust law cases. The relevance and necessity of antitrust lawyers are on the rise as companies grow and continue to attempt market monopolization. Give Lowey Dannenberg a call today to talk to an antitrust attorney and to see what other services we offer.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe provided text is purely educational and informative, discussing antitrust laws and their importance in promoting competition. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85368-0", "llm_safety_score": 0, "reason": "educational content with no unsafe elements" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://lawterminology.net/understanding-antitrust-litigation/", "date": "2023-03-29T12:20:40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00144.warc.gz", "language": "en", "language_score": 0.9772908092, "token_count": 444, "score": 3.34375, "int_score": 3 }
<urn:uuid:48de5198-7002-4e79-bc36-5b17c64fda0f>
This large Ethiopian Gospel Book was made in the first half of the sixteenth century and is written in Ge'ez, the traditional liturgical language of the Ethiopian Orthodox Church. Containing eleven full-page miniatures, six canon tables, and five elaborately ornamented harags, or headpieces, this manuscript represents the golden age of what has been termed the Gunda Gunde style, named after a monastery in the district of Agame. The Gunda Gunde style is characterized by bold blocks of color defined by detailed and often delicate linear motifs. Figures are highly stylized and expressive, while the accompanying canon tables and harags are filled with intricate interlace and geometric forms. The manuscript is exceptionally well preserved, and is an excellent and rare example of Ethiopian illumination from one of its important artistic centers. The Evangelist is depicted as having already copied Mk. 1:1-2. source
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical and cultural description\", \"score\": 0}\n```\n\nThe text describes a historical and cultural artifact without any unsafe or inappropriate content. It is fully appropriate for all audiences and does not contain any offensive language, adult themes, or references to illegal activities." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85369-0", "llm_safety_score": 0, "reason": "historical and cultural description" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://sdcason.com/portrait-of-the-evangelist-mark-16th-century-ethiopian-public-domain-illuminated-manuscript/", "date": "2023-03-30T20:55:10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00144.warc.gz", "language": "en", "language_score": 0.9441662431, "token_count": 183, "score": 2.59375, "int_score": 3 }
<urn:uuid:426a8fc9-d9c2-455d-86f0-018f64db92f9>
The Hate U Give, The Poet X, Children of the Blood and Bone, The Fault in Our Stars, The Hunger Games, Harry Potter. If you have heard of any of these titles (which I’m sure you have) you are probably familiar with Young Adult Literature. This genre is a category of fiction typically written for readers from the ages of 12 to 18 years old. Even though the target audience for the genre are teenagers, around half of the people who consume YA fiction are adults. This may be surprising to hear, but when you break it down, it’s pretty easy to understand why this is such a popular genre. One big factor about YA’s appeal is that it is coming of age. This simply refers to most of the young protagonists in these novels are on progression towards maturity and growth. This is relatable to many readers because throughout the course of our lifetimes, we are constantly growing, changing, and experiencing the world for ourselves. Why not read something that relates to our own personal journeys and give us some potential guidance along the way? In YA Literature, you can find some of the most diverse protagonists in fiction. This is important because all different kinds of people can find someone that they can identify within this genre. One powerful example of representation within YA literature is Angie Thomas’ The Hate U Give, which follows a young Black teenager’s struggle with police brutality and racism in her own community. Personally, I love YA literature not only because of the diverse characters and story lines, but because there is no limit to what YA can be. There are YA mystery, fantasy, romance, and many other sub genres. There are also novels that are written in regular prose or verse (like The Poet X). One of my favorite YA novels that I have read recently is Renée Ahdieh’s Flame in the Mist, which follows a samurai’s daughter who disguises herself as a boy to get revenge on a clan who tried to kill her. In this story in particular, Japanese folklore is woven throughout which seeps the book in amazing magical realism. Young Adult Literature is not just a genre for younger teens. It’s a genre for anyone who wants to explore diverse characters, worlds, and stories. It’s a genre that embodies the art of storytelling and coming of age narratives. It is not an ‘immature’ genre as some like to categorize it. YA literature has touched upon important and heavy topics such as race, gender, and injustice. It is a genre that should never be underestimated. If this sounds like a genre you may be interested in, Eastern also offers a Young Adult Literature class online over the summer that is taught by Sarah Todd. Previous books that have been covered include The Hate U Give, The Poet X, and several others. It also counts as an Arts class for those who may still need their general education art requirement. Young Adult Literature is an amazing and powerful genre. Check it out, or sign up for Eastern’s class, either way, you won’t regret it.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"diverse and appropriate content\", \"score\": 0}\n```\n\n*Explanation:*\nThe text discusses Young Adult Literature and its appeal without containing any unsafe or inappropriate content. It mentions various books and themes that are suitable for a wide audience, including adults and teenagers. The language used is respectful and the themes are relatable and educational." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85370-0", "llm_safety_score": 0, "reason": "diverse and appropriate content" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://waltonian.eastern.edu/ae/advocation-for-a-genre-why-you-should-look-more-into-young-adult-literature/", "date": "2023-04-01T05:24:42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00144.warc.gz", "language": "en", "language_score": 0.9581142664, "token_count": 647, "score": 2.578125, "int_score": 3 }
<urn:uuid:7b6cdc8d-c279-4115-8503-9077dcb6321e>
Grammar and Term Review for 9th Grade Home Runs and Figures of Speech Figures of speech All about language Match the description to the correct words Know Your Poetry! You'll review poetry in African-American literature. 2nd grade reading map vocabulary Examples of Repetition and Sound Devices With examples, this game teaches the various literary terms used to describe repetition and sound. Baseball: Types of Repetition or Sound Devices Myths and Legends Vocabulary Battle Try your best to rack up numerous points. The more points you earn, the more points you will earn to add to your battle gear. Rainbow Fish Game Kindergarten Comprehension Questions for Rainbow Fish Book Unit 1: Wonders Vocabulary Third grade Unit 1 Weeks 1-3 reading vocabulary practice.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content appropriate for all audiences\", \"score\": 0}\n```" ], "llm_harm_scores_by_chunk": [ { "custom_id": "85371-0", "llm_safety_score": 0, "reason": "educational content appropriate for all audiences" } ] }
{ "dump": "CC-MAIN-2023-14", "url": "https://www.wisc-online.com/arcade/games/humanities/literature?gameTypes=CHAKALAKA_HAVEUHERD_SNAKE_SQUIDHUNT_BASEBALL_BLDKNOW", "date": "2023-04-02T12:43:02", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00144.warc.gz", "language": "en", "language_score": 0.8192623854, "token_count": 170, "score": 3.890625, "int_score": 4 }
<urn:uuid:17a9b14f-e35e-4278-87d6-75b96ad1751e>
We recommend using the latest version of IE11, Edge, Chrome, Firefox or Safari. This page provides links to resources for multiple approaches to researching a social issue and potential solutions, with the goal of guiding you towards resources and strategies for gathering multiple points of view. In determining what type of information to integrate into your research, consider the following questions related to stakeholders and information sources: Who are the EXPERTS on this issue? Where can you access the VOICES of these experts? Identifying useful resources is context specific. In small groups, briefly share the issues you're planning to explore. Choose one issue from the group and make a research plan outlining what types of resources might be most useful for gaining multiple perspectives for understanding the issue and possible solutions. Record your responses on the Google Doc. In addition to these databases, you may want to identify and search local news sources such as Chicago Reader or Block Club Chicago, or WTTW.com. You can also try a Google Search using the News filter. Books and book chapters are an excellent source for getting a broad overview on a topic and understanding the historical context of an issue. Explore the UIC Library's collection of print and electronic books using the Library Search on the UIC Library homepage (try narrowing by Resource Type to books).
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is entirely appropriate for public use, educational environments, and general audiences. It does not contain any unsafe or inappropriate content, offensive language, or references to illegal activities." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85372-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://researchguides.uic.edu/c.php?g=252534&p=8910640", "date": "2023-05-30T17:51:59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646076.50/warc/CC-MAIN-20230530163210-20230530193210-00338.warc.gz", "language": "en", "language_score": 0.8827234507, "token_count": 265, "score": 2.65625, "int_score": 3 }
<urn:uuid:f4d6c682-9773-4cd1-9b26-6accf3a2bccc>
Three-dimensional (3D) printing is beginning to reshape medical practice, but its implications for healthcare may be complex, according to an opinion article published online December 2 in JAMA. Although questions remain about how best to use the technology, experts agree that 3D printing is already changing patient care. "While not a panacea, 3D printing is increasingly finding its place in patient care, from its expanding use in surgical planning to the vision of printing whole new organs for transplantation," write Mark H. Michalski, MD, from the Investigative Medicine Program, and Joseph S. Ross, MD, from the Robert Wood Johnson Foundation Clinical Scholars Program, both at Yale University School of Medicine in New Haven, Connecticut. "Indeed, 3D printing may serve as a means of distributing manufacturing in the same way that the Internet distributes information." 3D printing has been used in dentistry for more than 10 years, they note, because it provides the capability to produce molds for many dental implants. Head and neck surgeons also have begun using 3D printing to make preoperative models for complex surgeries. "For example, several facial reconstructive surgeries are performed by first harvesting the fibula, which is then fashioned in the operating room into new bony structures," they write. "These surgeries can now be augmented using computer planning programs to generate surgical plans that determine the ideal way to harvest and incise the fibula to create a reconstructive graft." Researchers outside clinics and hospitals are using 3D printing to create medical devices for a broad range of conditions that are tailored to an individual patient's anatomy. The authors write that a biocompatible polymer splint has been use to prevent airway collapse in one case of neonatal bronchomalacia. It was designed to be naturally resorbed within 3 years. 3D printing also has been used to create prosthetics, with digital blueprints made freely available for download and reproduction, they write. However, they note, few studies have evaluated how 3D printing has performed regarding safety and regulatory issues. "At this early phase, it is unclear what the ultimate value of 3D printing will be for health and how it will specifically affect outcomes." Questions also remain as to how regulation may affect use of 3D printing, they add. "As 3D printing continues to integrate into medical practice, physicians and patients face the challenge of understanding this complex technology, taking advantage of its potential, and weighing its potential risks," they conclude. "I think it's very prescient for [JAMA] to publish this," Leonard S. Marks, MD, a urologist at the University of California, Los Angeles, Medical Center, told Medscape Medical News. He is coauthor of a study published earlier this year on using 3D imaging to develop molds for prostate organs after their removal. "There are lots of applications in medicine for 3D printing. Our interest in this began about 3 or 4 years ago. We are interested in the correlation between prostate cancer seen on [a magnetic resonance imaging] image and prostate cancer as it appears in the organ after it's removed," he explained. "The question being: Is [magnetic resonance imaging] an accurate predictor of what's actually there?" he continued. "To make the correlation more perfect, we use 3D printing to make a custom mold for the prostate to go into after it is removed so that it can then be sliced in a systematic fashion." His group has videos on YouTube, on the Target Prostate Biopsy channel. 3D printing "has been a big help to our work," he said, without costing a lot of money. "A cool thing about 3D printing is that it's cheap. We don't have the best printer out there. I think we paid about $2500 3 years ago for a 3D printer that does our work just fine. Our biomedical engineers thought that they had won the lottery when we got that printer." It helps provide information that is used to determine treatment levels, he added. "It's allowed us to predict what's actually in the prostate. We've never had that opportunity before," he said. "It allows us to find the serious cancers more quickly and to find the insignificant cancers, which are very common in the prostate, and put them in proper perspective more quickly and to save people the worry that they may have a serious disease when in actuality there's not. "You know who's got a bad one and who doesn't." Dr Michalski has reported serving as a consultant to Butterfly Network and Hyerfine Research; Dr Ross has reported receiving grant support from Medtronic and Johnson & Johnson and federal agencies and serving as an advisor for FAIR Health; Dr Marks has disclosed no relevant financial relationships. JAMA. Published online December 2, 2014. Medscape Medical News © 2014 WebMD, LLC Send comments and news tips to firstname.lastname@example.org. Cite this: 3D Printers Bring Specialized Options to More Patients - Medscape - Dec 02, 2014.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the use of 3D printing in medical practice and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and public use.", "{\"reason\": \"content is appropriate and safe\", \"score\": 0}\n```\n\n*Explanation:*\nThe text provided is a citation for a medical article and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would be considered unsafe or offensive." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85373-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85373-1", "llm_safety_score": 0, "reason": "content is appropriate and safe" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://www.medscape.com/viewarticle/835762", "date": "2023-06-01T02:38:03", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00338.warc.gz", "language": "en", "language_score": 0.963028729, "token_count": 1047, "score": 3.359375, "int_score": 3 }
<urn:uuid:02972bb7-0222-411f-aa0c-9f5b3b96fcc2>
The Weddell Seal is able to hold its breath for 30 minutes at a time while diving in frigid Antarctic waters. To avoid running out of oxygen during this long dive, the seal collapses its lungs and restricts blood to only essential organs. In other mammals, the process of cutting off blood flow and the supply of oxygen to a tissue, only to reoxygenate those tissues at a later point (when the seal resurfaces) generates reactive oxygen species. The process causes oxidative stress, which damages the tissue. This summer I am studying some of the physiological adaptations that enable Weddell seals to avoid the detrimental effects of oxidative stress at a cellular level. At the moment I am focusing on catalase, an antioxidant enzyme that is good at breaking down hydrogen peroxide (a reactive oxygen species), to see if its activity is higher in seal tissues than in other mammals. The long-term goal of this research is to apply our understanding of how seals cope with oxidative stress to human organ transplants. Realities of Research This is my first time working in a lab so most everything has been entirely new to me, from the constant buzz of the -80 degree freezers to the techniques of growing cells to the precise technology. Besides learning many science skills, I’ve spent the last several weeks seeing how rare (and exciting!) it is for an experiment to work and yield significant results. Fingers crossed for the rest of my project! Life of a Scientist Besides working on my own research, I’ve been involved in numerous projects throughout the lab, so I’ve seen how research questions evolve and overlap and shift as researchers collaborate with one another. The aspect of collaboration within my lab has been one of the coolest things to witness this summer, especially since each researcher is doing distinct work. I’ve also loved getting to know my coworkers, and we’ve had cool conversations about new scientific discoveries and endless career options. Throughout the summer, I’ve really appreciated being able to hold on to a big picture – of the real, live seals – even as I work at the microscopic, cellular level. I think this seal research is pretty darn cool. Your project sounds so interesting! I agree that collaboration within the lab is so important. I have learned so much just by talking with the graduate students and postdocs in my lab.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"content is entirely appropriate and educational\", \"score\": 0}\n```\n\nThe text discusses scientific research and educational content about Weddell seals and their physiological adaptations. It does not contain any unsafe, inappropriate, or harmful elements." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85374-0", "llm_safety_score": 0, "reason": "content is entirely appropriate and educational" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://blog.lifescitrc.org/ugresearch/2019/03/12/new-exciting-title/", "date": "2023-06-03T20:50:34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00338.warc.gz", "language": "en", "language_score": 0.9529961348, "token_count": 484, "score": 2.578125, "int_score": 3 }
<urn:uuid:f2392dfb-27b2-409e-a797-9fe4785e5c13>
- Birds are much smarter than humans once thought. Many birds use tools, are smarter than other animals, recognize faces, solve puzzles, plan for the future, show empathy and recognize abstract concepts. - Crows are the smartest birds on our list. If you’ve ever thought a flock of crows is talking about you, you’re probably right. - Many birds have complex languages and can even tell lies. You can learn a lot about a bird’s intelligence by observing its behavior. Some birds find food, build nests and perform everyday tasks in the same way throughout their lives. Other birds seemed more curious. Some of the birds on this list are adept at using tools to achieve their ends, while others have a talent for outsmarting their feathered friends. There’s even a bird that can recognize faces. Read on to learn about the unique behaviors that landed these nine fliers on the list of the world’s smartest birds. #9: Western Scrub Jay – Fooling the Competitors In the fall, western scrub jays look for food that can be stored for winter. While many birds store food, western scrub jays add a twist to the process. These birds know that their stored food may be stolen by other birds or even squirrels. So when a western scrub jay hides food, it pays close attention to its surroundings. If the jay thinks a bird is watching, it will hide the food in another location. It may even change the location of the food several times to fool other birds. If that wasn’t enough to earn it a spot on the list of the smartest birds, the western scrub jay goes one step further. Scientists have observed the bird pretending to hide food in specific places. But, in reality, they take the food to another location for safe storage. #8: The Magpie – Passing the Test Magpies are known for their chirping, chirping, whistling and chattering. These birds are also known for their intelligence. The scientists put them through a challenging test, which they passed with flying colors. First, the scientists put a small sticker on the magpie. Then, they put the bird in front of a mirror. The magpie looked in the mirror and immediately wanted to tear off the stickers on the feathers. The bird saw its reflection and knew the sticker didn’t belong there. Other types of birds just tap the mirror, thinking it’s another bird. #7: Clark’s Nutcracker – Win the Memory Game The Clark Nutcracker lived in the mountains of the American West. They have soft gray feathers on the head and back as well as black tail feathers. Although it lives in the mountains, this bird is known for its ingenuity. In short, this feathered creature has an excellent memory. Pine nuts are the main food in Clark’s Nutcracker. These small birds spend a lot of energy storing pine seeds during the summer so they have food throughout the winter. They store as many as 30,000 pine seeds in one summer. However, they don’t store all torrents in one location. Instead, they only store three or four seeds in one place. That means Clark’s Nutcracker has to remember thousands of hiding places. This begs the question: How does the bird find buried seeds after snowfall? The scientists concluded that it uses tree stumps, fence posts and other landmarks to help it remember where the seeds are buried. No wonder it’s one of the smartest birds in the world. #6: Crows – Collaboration is smart Ravens are known for their solid black plumage and black eyes. There are many famous stories, songs, myths and poems about this famous bird. What you may not know is that these birds are considered to be some of the smartest birds in the world. Instead of finding prey on its own, a crow pairs with another crow to make the process more efficient. When a pair of crows spots a nest of chicks, one of them flies to the mother and makes a lot of noise to lure her away from the area. After she left, another crow came and grabbed one of the chicks. Pairs of ravens will do this a few times so they are all well fed. Another reason this bird is on the list of the smartest birds in the world has to do with mastering a mind-bending challenge. Crows can complete various challenges set by scientists. One challenge demonstrated the crow’s ability to push a stone out of a box with the help of a stick held in its beak. Once the bird has retrieved the stone, place it in the tube to trigger the release of a piece of food. The crow is able to figure out the steps involved in completing the challenge! #5: Jackdaws – Brainpower in Action Jackdaws are named for their calls. It will make a sound that sounds like a “click”. For some reason, this curious bird earns its place on lists of the world’s smartest birds. For one thing, it’s notorious for taking shiny items like coins and jewelry. These birds see shiny objects and can’t resist! Sometimes they take shiny items with a specific purpose. Jackdaws sometimes remove shiny caps from milk bottles that sit on porches and doorsteps. But taking the hat is not enough. The jackdaw started to drink the milk in the bottle! Jackdaws use many different materials for their nests, including animal hair. Scientists have seen jackdaws follow herds of deer so that they can land on the backs of these mammals. These birds pluck hair from deer to build their nests. These birds know how to use their brains to their own benefit! Chough is an interesting bird name. It’s easy to pronounce the bird’s name if you pronounce it as if you were saying the word “chuff.” These birds have black plumage similar to other birds on this list. However, they also have bright red beaks and legs. Choughs are considered to be very intelligent birds due to their ability to use objects as tools to open their shells. For example, these birds sometimes eat molluscs. They can use the cracked shell of one mollusk to open the shell of another mollusc. resourceful! #3: Rook – The problem solver Rooks are black with a white face and a pointed black beak. This car is included in the list of the smartest birds due to its ability to solve simple problems. A famous experiment with rooks involved a bottle half full of water. A small worm was floating on the water in the bottle. Of course, the crow saw the worm and wanted to eat it. Although it knows to stick its beak into the bottle, the worm cannot reach it due to the low water level. Rooks will throw rocks into bottles to raise the water level to reach the worms. The problem is solved! When you think of woodpeckers, you probably picture a large bird with a sharp beak that you use to bang on tree trunks. Although the bird is a woodpecker, it is small, with a small beak, like a finch. In their Galapagos habitat, they feed on worms and grubs found in trees. Unfortunately, the bird’s short beak cannot effectively scoop out larvae from tree trunks or branches. This is where the woodpecker brain comes into play! These birds use twigs, twigs and even cactus spines as tools to retrieve larvae from trees. Dinner is ready! #1: Raven – Putting Two and Two Together No list of the smartest birds is complete without a crow! Crows are considered the smartest of all birds for a number of reasons. Plus, it’s the variety of things they can do that puts them at the top. In Japan, crows have been seen throwing nuts onto a busy road. Of course, the nuts were crushed by the tires of passing vehicles. Crows sit on power lines above the street, waiting for traffic to slow down. When it happens, they fly down and eat the nut chips. This is causal thinking. Additionally, crows can make tools out of leaves, twigs, and twigs to approach insects from the ground or in trees. Last but not least, crows can remember human facial features. Click here to learn about the 10 smartest animals in the world! The 9 smartest birds in the world vs the 9 dumbest birds When it comes to AZ-Animals’ animals, we like to look at both ends of the spectrum. Here’s a side-by-side comparison of the 10 smartest and 10 dumbest birds in the world.To learn more about birds that don’t score high on intelligence scales, check out 10 dumbest birds in the world. |rank||smartest bird||stupidest bird| |2||woodpecker||red neck coral| |3||car||Purple Breast Roller| |4||Red-billed chough||killer deer| |9||siscruger||Northern tube nose storm| I am broadly interested in how human activities influence the ability of wildlife to persist in the modified environments that we create. Specifically, my research investigates how the configuration and composition of landscapes influence the movement and population dynamics of forest birds. Both natural and human-derived fragmenting of habitat can influence where birds settle, how they access the resources they need to survive and reproduce, and these factors in turn affect population demographics. Most recently, I have been studying the ability of individuals to move through and utilize forested areas which have been modified through timber harvest as they seek out resources for the breeding and postfledging phases. As well I am working in collaboration with Parks Canada scientists to examine in the influence of high density moose populations on forest bird communities in Gros Morne National Park. Many of my projects are conducted in collaboration or consultation with representatives of industry and government agencies, seeking to improve the management and sustainability of natural resource extraction. Leave a Reply
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content about bird intelligence\", \"score\": 0}\n```\n\nThe text sample discusses the intelligence of various bird species, including their ability to use tools, recognize faces, and solve puzzles. This content is educational and appropriate for all audiences, making it safe for public use and general audiences.", "{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is an educational piece about various bird species, their behaviors, and cognitive abilities. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are suitable for all audiences, including children. Therefore, it is fully appropriate and safe for public use and educational environments.", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text does not contain any unsafe or inappropriate content. It discusses collaborative projects aimed at improving natural resource extraction, which is a neutral and appropriate topic." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85375-0", "llm_safety_score": 0, "reason": "educational content about bird intelligence" }, { "custom_id": "85375-1", "llm_safety_score": 0, "reason": "educational content" }, { "custom_id": "85375-2", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://unianimal.com/9-smartest-birds-in-the-world/", "date": "2023-06-05T07:45:19", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00338.warc.gz", "language": "en", "language_score": 0.9507029057, "token_count": 2124, "score": 3.3125, "int_score": 3 }
<urn:uuid:b1fd3f86-70d7-44f4-bc8e-c65fe963033e>
The essence of truth seeking is questioning assumptions. This involves looking at a claim, statement or idea, and not only questioning the reasoning in support of it, but also the assumed premises the claim rests on. This means, checking the logical starting points of the reasoning, as well as the validity of the reasoning process itself. Most crucially, we must be prepared to check assumptions that are ‘already considered knowledge’ that we are using in the reasoning. With each component idea that underpins a claim we must check both the premises and the logical connection, or inference, in the reasoning that links the premises to the conclusion. In other words, we must find the beginning of the logical sequence of reasoning, and check the assumptions here — always being prepared to check what we think we already know. You may not always have to do this, but you must at least be willing to do so. The first job, therefore, is to do some intellectual digging, with appropriate questions, to get down to the base layer — the fundamental ideas the whole thing rests upon. I repeat, the two major components under scrutiny are the reasoning process itself, and all of the assumed premises in the structure of the argument. It’s not as hard as it may sound. Your common sense can usually spot most illogical connections provided you are aware of the need to continually monitor them, and that you have some ability at, and guidance in, logical thinking — which is precisely what you will get from this guide. I will leave the reasoning process aside for now. Initially, I want to focus on some of the things you need to be familiar with, in terms of questioning assumed premises — examining the component ideas that go to make up the individual pieces of the bigger idea that you are questioning. Don’t assume, check! Assumptions are great! We assume hundreds, if not thousands, of things all day long, and these assumptions are very appropriate in the context of every day life. We assume because we don’t want to have to endlessly check and re-check the obvious. Its the same with speech; to avoid stating and restating the obvious, we assume things, otherwise we would never get to communicate anything new. But it’s important to appreciate that when just one assumption at the beginning of a chain of reasoning is false, all logically downstream conclusions will, necessarily, also be false. Think of the computer analogy of ‘garbage in – garbage out’. As soon as the input of any logical connection in the reasoning chain is false, the outcome cannot be true. Culturally speaking we over-rely on assumptions to an unhealthy degree. In schools, children are discouraged from questioning what is presented as fact. They are not taught to question the material they are presented with. In any course of study, we assume we are being presented with truth. In general: doctors don’t question what they are taught, economists don’t question what they are taught, political scientists don’t question what they are taught, and virologists don’t question what they are taught. Assumptions pile up on top of assumptions across all interrelating aspects of human life. It shouldn’t surprise anyone to learn that there are hundreds of popular ideas out there, assumed as knowledge, that are false. If we fail to check our assumptions, it can leave the sum of our (claimed) knowledge peppered with false conclusions. Then, as we draw on it to interpret new events and ideas, our conclusions will depart further and further from the facts of reality, thus leaving us increasingly vulnerable to error, failure and suffering. Just like a ship or an airplane steering just one degree of course, over a long distance this adds up to being considerably off-track. Imagine how off track a person can get, if, when they read news reports, they assume truth, dropping context of other knowledge they possess, and failing to factor in that politicians lie, that there are political agendas being played out, and that people have been manipulating and controlling each other throughout human history! Checking premises, and making sure assumptions are true, takes time and effort. The trick is to know when to do so, and when it’s not necessary. This requires both mental vigilance and common sense. These days, logically antecedent premises are assumed to be true by the average person almost all the time — even when the context demands they be checked. This is largely as a result of schooling and social conditioning. People are complacent, and the validity of the premises on which they both think and act are taken for granted. Most people still assume that cholesterol causes heart disease, that fluoride in tap water somehow protects teeth, and that their political leaders have their best interests at heart. Available evidence contradicts all of these. The implicit premises at the base of most of the ideas discussed in your national news media are assumed to be true. So it’s important to understand the need to check these assumed premises in the process of discerning truth on any particular issue. But perhaps most importantly, before we even begin to research specific issues, we must be willing to check our own assumed premises — the most important ones we hold. The ones that influence our thinking. We must even be prepared to fully consider our understanding of the concept truth and the fundamental philosophical ideas it necessarily rests on. Otherwise we can find ourselves unwittingly supporting other ideas that implicitly undermine the concept. Discerning truth is a process of thought. So the first thing to do is to check everything we think we know that effects the way we think. Be prepared to question everything, not one of your convictions should be placed beyond questioning. It cannot be over stated how important it is to check assumptions if your intention is to discern truth. Incorrect conclusions are most often a result of assuming one or more basic premises to be true, that later turn out to be false. Every link in the chain of reasoning must be good, every floor of the building must be structurally sound. The hierarchical structure of knowledge All knowledge fits into a contextual structure; it builds upon itself, one step at a time. We learn the foundational things first, and then build on that. A child learn basic concepts first and then builds greater complexity on top of what he then knows. We cant begin by studying for a degree, and finish up by learning the alphabet! Think of the sum of your knowledge as a massive and complex skyscraper. Of course, many of the things we know can be at an equivalent level in the hierarchy, but others must be identified as logically antecedent in the same way that a lower floor in a building is logically antecedent of the floors above. You could learn how to make a dozen different dishes during a course on cookery, but all this knowledge would rest on top of your pre-existing knowledge of food, the concept of heating things to cook them, cooking with gas or electricity, the uses of various pots and pans, etc. Every word we use, with the exception of proper nouns (names), represents a conceptual idea. There are simple ones pertaining to objects, such as chairs, trees, cars, etc; and there are those for attributes such as colour, length, rough or smooth, etc; and those for actions and relationships, and so on and so forth. The most basic concepts (those of objects) rest on the direct perception of reality and are all on the same level. But as things get more complex, concepts rests on earlier concepts, that in turn rest on still earlier concepts, with the whole structure ultimately resting on the self-evident — the direct perception of reality. This means that when we consider complex ideas containing multiple higher concepts, there are necessarily a great many previous, more fundamental concepts ‘underneath’ the ones being considered. These antecedent concepts are implicitly assumed, just like the lower floors of a tall building holding up the ones above. For example, when you go to your doctor to consult him on some illness, what is the theory of health and disease from which his thinking stems? This necessarily informs his whole process of diagnosis and treatment. Similarly, to speak of bachelors implies knowledge of marriage, because a bachelor is an unmarried man. The concept bachelor implies and logically necessitates the concept of marriage. The concept of motion implies and necessitates the antecedent concept of entity — the thing that moves. The concept of change implies the concept of identity and the concept of time — that identity then, this identity now. Our concepts are the tools of thought, each one an idea in itself, and if we are unaware of the hierarchical structure of knowledge, the higher concepts we use, such as energy, love, freedom, prosperity, can become like floating balloons (abstractions) in our minds. They float freely, disconnected from the antecedent concepts that provide the context to give them precise meaning. These floating abstractions are disconnected from the direct perception of reality which is ultimately their base. If the tools of our thinking are loose and ill-defined the efficiency with which we arrive at conclusions is compromised, and if the hierarchical structure of knowledge is not appreciated then we lose the ability to trace our ideas back to reality, to give them meaning, to literally make them real. This is what it means to understand an idea — to be able to integrate it with the rest of your knowledge, and thus connect it to reality. But perhaps the worst consequence of failing to grasp the hierarchical structure of knowledge is this: we can contradict ourselves when we unwittingly argue against genetically antecedent concepts, while implicitly using them in our argument. Ayn Rand identified this as the fallacy of the stolen concept. I like to think of it as trying to cut off the branch you are intellectually standing on! For example, if someone argues that thought creates reality on the one hand, but demands evidence and proof that the climate emergency is real, they are contradicting themselves. Because to hold that thought creates reality destroys the concept of truth. More on this later. The truth seeker must be aware of the hierarchical structure of knowledge and integrate this awareness into the thinking process. It will help to automatise the need to dig beneath any claim, to uncover the assumptions (premises) it allegedly rests on, to look back down the chain of causality, and see what in turn supports these premises, if anything. For example, if we are talking about vaccinations, what is the premise(s) that the idea of taking vaccinations rests on? It rests on the idea of a virus that causes disease. It rests on a particular model of the cause of disease. It rests on something called ‘germ theory’ – the idea that a particular microorganism is responsible for each particular disease. If one investigates these ideas it quickly becomes apparent that there are serious questions around their validity and the truth about those claims is very far from certain. In fact, depending on how deep you dig you will discover that many of the assumptions made by modern virologists haven’t been logically proven at all. And worse, there is much evidence that contradicts them. If you want to know truth, you must be prepared to dig deep, and question the assumptions that others dare not. This same mental process of observing cause and effect is then used in the other direction to examine possible knock-on effects and implications of the idea or claim. To continue with the virology example, what would be the implications if the idea of the ‘germ theory of disease’ was wrong? There would be no purpose in having vaccinations. Then one would have to ask, what is the effect of all the toxic ‘adjuvants’ listed in the insert (contents list) on the human body? Implicit and explicit A premise is a logical starting point we assume to be true at the beginning of a reasoning process. In the well-known syllogism ‘all men are mortal, Socrates is a man, therefore Socrates is mortal’, the premises are that Socrates is a man, and that all men are mortal. In this case they are obvious because they are explicitly stated. However, we are not usually conscious of all the assumed premises we use in our reasoning, and they are almost never stated in any claims made in the news media, or by politicians. In normal daily discourse most premises remain implicit for good reason, and this is appropriate. But this inevitably means that ‘implicit assumed premises’ can slip out of our conscious awareness altogether. The investigator, wanting to the know the truth of a particular claim, has a specific task that requires a different mental mode of operation. The same applies to those who aspire to know truth in a time of censorship, propaganda and deceit. They must raise their mental game to become more conscious of implications. Implied ideas are those not mentioned or verbalised, yet they remain logically necessitated within the claim being made. Implications are commonly understood to be results, or knock-on effects, of a particular choice or action. However, the truth seeker must become aware of the implicit ideas that are logically antecedent in the reasoning chain. You have to trace the line of reasoning that supports a particular conclusion both backwards, to see what it fundamentally rests upon (implicit premises), as well as forwards to see where it ultimately leads (implicit consequences). You can think of it as observing cause and effect with respect to conceptual ideas, always obeying logic. Another way of thinking of it is, being aware of the things that must also be true, for any particular idea to be true. The method, as we shall see later, is to un-pack ideas — to keep digging with questions, to uncover implicit premises. Suppose that you are contemplating a medical procedure with potentially life-threatening consequences. In such a case you would want to know what theory and evidence the proposed treatment is based on, as well as all possible consequences. You would want to trace the line of reasoning back to see what is rests on, and forwards to see where it might lead. Ideas implicitly rest on top of other ideas — whether or not they are true! A line of reasoning can be valid, yet yield a false conclusion because of a false premise. If we are being sold a dubious idea, we can identify it as false, even if the reasoning is sound, if we trace it back to an implicit premise that can be shown to be false. Similarly, if we accept a particular idea as true, we should be conscious of the other ideas it necessarily and implicitly rests on, which we are implicitly accepting as true. Generally speaking, the more fundamental a premise is, the less likely we are to be aware of it, and the greater the potential negative impact if it turns out to be false. This is an important consideration when you are trying to discern the truth about a specific claim. But once again, its just as important when examining one’s own thinking. We all hold fundamental beliefs that implicitly shape our world view, or personal philosophy, with little conscious awareness of them. We might not be able to express them at all. For example, few people are aware of the most basic premises that inform their concept of morality – what constitutes a good action or a bad one. But these beliefs and ideas remain implicit in all of their subsequent thinking and actions, continually affecting both the reasoning process and conclusions drawn. Some people believe in destiny, or fate. This idea implies that everything is pre-written in some way, and contradicts the idea of freewill. As we shall see later, acceptance of the idea of free will is an essential foundation of the concept of truth. It is only the capacity for choice that can enable humans to test their ideas, discern ‘truth’, and acquire ‘knowledge’. The concepts of truth and knowledge are both derived from the human ability to choose. Another common example of a lack of awareness of the implicit is when people discuss which particular government policy should be enforced relating to some issue or other. Rarely are people aware that the fundamental principle beneath their discussion is whether or not people should be coerced by governments at all. However, by discussing which particular policies should be enforced, such people have already unknowingly agreed with the fundamental premise that people should be coerced by government. That becomes the given, the implicit basis, or starting point, of the current discussion. It is the more fundamental issue, after which comes the debate about which particular action people should best be coerced into performing. A fundamental premise is contained within a particular belief with or without it being made explicit. It doesn’t go away because we don’t see it, or don’t grasp that it is logically necessary. When you board a ship, you implicitly accept that there is no breach in the hull. The fact that it is floating implies that there is no such breach. We can think of these implicit premises as being bundled up, or packaged within, the more superficial idea being discussed. It’s like dealing with boxes and parcels without knowing their precise contents and only being vaguely aware of what’s inside. You can only be sure someone is conscious of an underlying premise, if they make it explicit in their language, or if you ask them. And the only way YOU can be aware of assumed premises in your own thinking is by asking yourself! The aspiring truth seeker must be prepared to examine the fundamental premises implicit in their own thinking, as well as those packaged within any issue they subsequently investigate. Ask yourself questions like, “Why do I believe that?”, or “If I believe this, what else does it imply?” or “for this to be true, what else must be true?” Learning to make ideas explicit is a very important component of learning to discern truth. It is how we get the whole issue ‘on the table’, mentally speaking, so that we can clearly see what we are dealing with. You need to be aware of the principle of making everything explicit right from the outset, because, initially, you are going to examine the implicit ideas buried within your subconscious mind. You need to examine the essential fundamental ideas that support the concept of truth and its discernment. The truth seeker must be aware of the need to question assumptions, including one’s own deepest held beliefs that have a bearing on one’s mindset and thinking. Nothing should be beyond question, including the things we think that we already know, and especially the things that ‘everybody knows’. We must do this with an awareness of both the hierarchical structure of knowledge, and the implicit — premises and consequences. You must make all the components of the argument supporting a claim explicit, in order to properly examine their logical strength. Leave a Reply
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe text provided is a philosophical and educational discussion about the importance of questioning assumptions and seeking truth. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are appropriate for all audiences. Therefore, it is fully safe and appropriate for public use, educational environments, and general audiences.", "{\"reason\": \"philosophical and conceptual ideas without harmful content\", \"score\": 0}\n```\n\nThe text discusses philosophical and conceptual ideas related to truth, knowledge, and the hierarchical structure of ideas. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"educational and philosophical content\", \"score\": 0}\n```\n\nThe text provided is purely educational and philosophical in nature, discussing critical thinking, the importance of questioning assumptions, and the process of logical reasoning. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"philosophical discussion without explicit harmful content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses philosophical and moral concepts without any explicit unsafe content, inappropriate language, or harmful themes. It focuses on the importance of making implicit beliefs and premises explicit in reasoning and understanding truth. Therefore, it is fully appropriate for all audiences and does not require any safety concerns." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85376-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85376-1", "llm_safety_score": 0, "reason": "philosophical and conceptual ideas without harmful content" }, { "custom_id": "85376-2", "llm_safety_score": 0, "reason": "educational and philosophical content" }, { "custom_id": "85376-3", "llm_safety_score": 0, "reason": "philosophical discussion without explicit harmful content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://lawfulrebel.com/preparing-the-mind-to-discern-truth/", "date": "2023-06-09T10:08:58", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00338.warc.gz", "language": "en", "language_score": 0.9532355666, "token_count": 3868, "score": 2.78125, "int_score": 3 }
<urn:uuid:059d9ce7-4236-42c9-b152-f8964894f4db>
- Key facts about Canada's ozone... Key facts about Canada's ozone-studying SCISAT mission 12 Apr 2023 The Canadian Space Agency's SCISAT-1 satellite was launched in 2003 to measure the depletion of Earth's ozone. The satellite is still operating 20 years later, obtaining valuable data on changes in ozone, the climate, and air quality. SCISAT-1 is part of ESA's Third Party Missions programme, in which ESA has an agreement to promote the availability of free data products from the mission. Learn more about SCISAT-1 in our new infographic: Subscribe to our newsletter to receive highlights of recent news from Earth Online
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely factual and educational, discussing the SCISAT mission of the Canadian Space Agency. It does not contain any unsafe, inappropriate, or harmful content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85377-0", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://earth.esa.int/eogateway/news/key-facts-about-canadas-ozone-studying-scisat-mission", "date": "2023-05-30T22:27:37", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00538.warc.gz", "language": "en", "language_score": 0.9137185216, "token_count": 138, "score": 3.828125, "int_score": 4 }
<urn:uuid:9247a097-e67d-4b2e-9928-f3743044d002>
What is a Corporate Responsibility Plan? A corporate responsibility plan is a strategic plan that outlines an organization's commitment to socially responsible practices. It outlines the goals, objectives, and initiatives that the organization will undertake to achieve its vision of a more responsible and ethical future. Corporate responsibility plans are created to guide organizational decisions and actions in accordance with the mission and values of the organization. What's included in this Corporate Responsibility Plan template? - 3 focus areas - 6 objectives - 6 projects - 6 KPIs Each focus area has its own objectives, projects, and KPIs to ensure that the strategy is comprehensive and effective. Who is the Corporate Responsibility Plan template for? This Corporate Responsibility Plan template is for organizations of all sizes and industries. This template provides a comprehensive framework for creating a plan that outlines the organization's commitment to social, environmental, and ethical responsibility. It includes an overview of the organization's focus areas, objectives, key performance indicators, and projects that will be undertaken to achieve these objectives. 1. Define clear examples of your focus areas Focus areas are areas of an organization that need to be managed in order to meet its corporate responsibility goals. Examples of focus areas for a corporate responsibility plan include corporate social responsibility, human resources, and technology. Each focus area should be addressed separately, with its own set of objectives, actions, and key performance indicators. 2. Think about the objectives that could fall under that focus area Objectives are the specific goals that an organization sets out to achieve in order to meet its corporate responsibility goals. Objectives should be specific, measurable, and time-bound. Examples of some objectives for the focus area of Corporate Social Responsibility could be: Increase positive impact on environment, and Promote environmental sustainability in operations. 3. Set measurable targets (KPIs) to tackle the objective Key performance indicators (KPIs) are metrics used to measure the progress of an organization towards achieving its objectives. KPIs should be measurable and time-bound, and they should relate directly to the objectives they are measuring. An example of a KPI for the focus area of Corporate Social Responsibility could be: Reduce energy consumption. 4. Implement related projects to achieve the KPIs Projects, also known as actions, are the initiatives that an organization will undertake to achieve its KPIs. Projects should be specific and measurable, and they should be related to the KPIs they are trying to achieve. For example, an action to reduce energy consumption may be to implement energy efficiency initiatives. 5. Utilize Cascade Strategy Execution Platform to see faster results from your strategy The Cascade Strategy Execution Platform provides organizations with the tools and resources to create, manage, and track corporate responsibility plans. It allows organizations to easily set objectives, define KPIs, and implement projects to achieve their goals. With the Cascade Strategy Execution Platform, organizations can see faster results from their corporate responsibility plans.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text sample is entirely focused on explaining what a Corporate Responsibility Plan is, its components, and how to create one. There are no unsafe, inappropriate, or harmful elements in the text. Therefore, it is fully appropriate for all audiences and educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85378-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://www.cascade.app/templates/corporate-responsibility-plan-template?hsLang=en", "date": "2023-06-01T05:33:58", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00538.warc.gz", "language": "en", "language_score": 0.9457547665, "token_count": 596, "score": 2.765625, "int_score": 3 }
<urn:uuid:69ca235b-2f09-4853-8fb0-3d61156a13ba>
For the first time, telescopes observe a planeta 10 times heavier than Jupiter being swalloed by a star at 12,000 light-years of distance. The beginning of JUICE mission JUICE is a long mission of European Space Agency (ESA), to explore Jupiter and it’s three biggest moons: Ganymede, Calisto and Europa. Successful test of RLV LEX The RLV LEX is a reusable vehicle with autonomous landing for space missions. Was built by the Indian Space Research Organization (ISRO). James Webb measures an exoplanet’s temperature For the first time, James Webb Space Telescope (JWST) measures the temperature of an exoplanet of star system TRAPPIST-1, and it’s 230ºC (446ºF). The first ultrathin and compact metalens Was developed the metalens, a new type of lens for telescopes and cameras, which can be flat and operates on near-infrared region. E-skin: electronic skin for robots Was developed the e-skin, an electronic skin light and flexible for robots, to obtain more information about the environment. The green comet approaches Earth The green comet C/2022 E3 (ZTF) will reach to shortest distance from Earth on the first day of February. This comet’s last visit was 50,000 years ago. The launch of HAKUTO-R M1 The HAKUTO-R M1 is a lunar lander built by Japanese company ispace. Was launched by SpaceX’s Falcon 9. Self-healing robot that detects damage Was built a quadrupedal self-healing robot, that detects damage and stops moving until it finishes to self-repair. 3D priting of nanostructures New materials can be 3D printed, to create many nanostructures and improve materials’ resistance without increasing weight.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text discusses various scientific and technological advancements without any unsafe or inappropriate content." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85379-0", "llm_safety_score": 0, "reason": "No unsafe content found" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://www.electricalelibrary.com/en/category/news/", "date": "2023-06-02T16:24:56", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00538.warc.gz", "language": "en", "language_score": 0.8518730998, "token_count": 411, "score": 3.25, "int_score": 3 }
<urn:uuid:f15d9597-e72c-4156-8a7a-a3903bd83fb5>
Humphried (Gunfried, Onfroy) ( fr. Onfroi , German Humfried, Hunfrid , died after 876 ) - Count Bona 856 - 863 , Autun , Chalon , Macon ( 858 - 863 ), Marquis of Burgundy 858 - 863 , Gothia 858 - 864 , count of Barcelona , Roussillon and Narbonne 857/858 - 864 , count of Ampuryas , Gerona and Besalu 857/858 - 864 , count of Toulouse and Rouerga 863 - 864 , Limoges 862 - 862 , count in Zurichgau at 872 - 876 . |Humfried (Humfred, Humfrid, Onfroi)| |Predecessor||Bernard I Septimansky| |Successor||Bernard II Gothic| |Successor||Bernard II Gothic| |Predecessor||Raimund I of Toulouse| |Successor||Bernard II Calf| |Successor||Ed i de trois| There are 3 versions of its origin. According to the first version, Humphried was descended from the noble Swabian family of Burchardingers . The ancestor of this genus, Gunfried (Humphrid) I , was a margrave in Istria in 799 , later (in 806/808 ) he was a count in Retsii . His son, Gunfried (Humphrid) II, was also a count in Retsii. He had a childless son, Gunfried (Gumphreid) III, with whom Gumfried was identified. According to the second version, Humphried could have been the son of Unrosch , Count Turnois, and Ingiltrudy, and, accordingly, his mother’s brother Odalric , whom Humphryd had replaced in Barcelona. According to the third version, Humphried was the son of the Marquis of Burgundy Gwerin II and brother of Izembard , whom Humphried succeeded in Burgundy. Humphried took part in the uprising against the king of the East Frankish kingdom (Germany) Louis II of Germany , after which he was forced to flee to the West Frankish kingdom , whose king, Charles II the Bald , accepted the fugitive. In 856, Humphried received the Burgundy county of Bon. For his faithful service, Carl until 858 also appointed Gumfried ruler of several counties in the Spanish brand - Barcelona , Gerona , Ampourias , Roussillon and Narbonne , and also gave the title of Marquis of Gothia . At the beginning of 858, Humphried negotiated a truce with the governor of Zaragossa Abd al-Rahman. Then, leaving the county to manage the viscount, he went to King Charles. In February he was in Bon, and in August he participated in the battle against the Normans . This war attempted to take advantage of Louis the German, invading France, and Humphried participated in the struggle of Charles the Bald against Louis. In September, Humphried was in Bon to recruit an army. And on January 15, 859, he participated in the battle of Saint-Quentin, in which Louis was defeated. In addition, in 858, Carl handed over to Gumfried of the county of Autun , Chalon and Macon with the title of Marquis of Burgundy . In 861 , after the end of the truce, the Arabs attacked Barcelona, besieging it. But Gumfried managed to negotiate a new truce, after which the siege was lifted and the Arabs left. In 862, Charles the Bald decided to seize Provence , whose king would be the son of the late Emperor Lothair I. His uncle, Gerard , Count of Lyon and Vienne, a relative of Gumfried, ruled over the infant king. Aquitaine, including Gumfried, opposed the plan. As a result, a rebellion broke out in Aquitaine. Karl the Bald accused Gumfried of treachery and deprived him of a part of his possessions. County Ampourias and Peralada were transferred to Count Sunie II , Gerona and Besalu - Count Otgeru . In April 863, Humphried captured Toulouse , driving out the marquis Raimund I. In response, Karl Lysy sent troops to Burgundy and confiscated the possessions of Gumfried, distributing them to his entourage. Humphried himself until 864, unsuccessfully fought against Charles, after which he fled to Italy , and from there to Swabia . The remainder of the possession in Gothia was also confiscated. In 872-876 he is referred to as a count in Zurichgau . After 876 there is no information about him. It is not known whether he was married, nothing is known about his children. - ↑ There are many other spellings of his name: Hunfrid, Humsfrid, Humfried, Unifred, Unifredo, Hunifredo, Onfroi, Onfroy. - ↑ From this clan came the first Duke of Swabia Burchard I - ↑ The grandson of Unrosch was Berengar Friulsky , the king of Italy. - Lewis, Archibald R. The Development of Southern and the Catalan Society, 718-1050 . University of Texas Press: Austin, 1965. - Calmette, J. "Onfroy, Marquis de Gothie." Études Médiévales. - Chaume, M. "Onfroi, Marquis de Gothie, ses origines et ses attachés familiales." Annales du Midi, LII (1940).
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a historical account of Humphried, detailing his titles, territories, and actions during the 9th century. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful and the themes are historical and educational in nature, making it fully appropriate for all audiences.", "{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a historical description of a medieval figure and his lineage. It does not contain any unsafe, inappropriate, or harmful content. The text is suitable for educational and general audiences and does not include any offensive language, adult themes, or references to illegal activities." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85380-0", "llm_safety_score": 0, "reason": "historical context" }, { "custom_id": "85380-1", "llm_safety_score": 0, "reason": "historical context" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://clever-geek.imtqy.com/articles/1121676/index.html", "date": "2023-06-05T10:06:47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651815.80/warc/CC-MAIN-20230605085657-20230605115657-00538.warc.gz", "language": "en", "language_score": 0.9259951115, "token_count": 1232, "score": 2.6875, "int_score": 3 }
<urn:uuid:cb880b8e-d4b3-4d29-b173-961140e5c7fa>
UNDERSTANDING ANTLER DEVELOPMENT A solid understanding of the “mystery” of antler growth is key to producing the shooter bucks you’re looking for next fall. While we can visibly see antlers growing in the spring and summer, don’t assume those are the only important months of growth. Antlers grow in an annual cycle that requires optimal nutrition year-round for a buck to reach his full potential. The Antler Cycle Digging deeper into antler development, we know the yearly cycle of growing and shedding antlers begins in early spring with pedicle development and ending in late winter when antlers drop off. This whole process is governed by hormones and response to the “photo period” or the length of daytime hours as the seasons change. As days get longer in the spring, the brain signals a change in hormones, increasing the amount of testosterone and triggering the start of antler growth. Testosterone levels continue to increase, peaking during the rut and then falling off rapidly resulting in shedding antlers. This timing allows bucks to quickly start refueling and recovering after the rut to prepare for that new set of antlers coming in the spring. The Growth Process The physical process of growth happens at the antler tips. Blood circulates up through the pedicle creating a semi-soft tissue covered in a thick skin of velvet. Throughout the growing season, the velvet provides for the flow of blood and nutrients to support antler development. During this growing period, antlers are only about 20% dry matter. This will increase to about 60% dry matter as antlers harden and mature. Brow-tines and forks are typically the first to appear, usually visible by late spring. As summer hits, we see a major spike in antler growth and most points are noticeable. Bucks in good health with adequate nutrition can add a half inch or more of growth in a single day during this period. Final inches of tines are added toward the end of the summer before bucks start shedding velvet in early fall. Mature antlers will remain through the rut and into late winter when they are shed and the process begins again. The Role of Nutrition Aside from understanding the basic cycle of antler growth, it’s important to remember that bucks will always add body condition before utilizing nutrients for antler growth. When looking at the growth cycle and the timing of each stage, it’s easy to see that nutrition becomes a critical factor all year long. The nutrition process really begins immediately following the rut, as this is when bucks are recovering and packing on the pounds for the winter. If nutritional needs aren’t met and body condition fails, those bucks will have to regain that body condition in the spring before they can begin their antler growth, putting them behind the curve to be at max growth in the fall. Providing supplemental energy is crucial during these months. Rack Revolution Magnify is a great choice with much higher energy content than other pelleted feeds to help meet those maintenance requirements sooner. Throughout the spring and summer, the nutrition game is about filling gaps in the natural browse and keeping the deer healthy. Supplementing protein and energy will support growth, but Rack Revolution Magnify also provides necessary minerals for overall health, as well as natural digestion aids to maximize utilization of the native forage. Additionally, Magnify includes essential oils and diatomaceous earth to help with parasite insect control. It’s All in the Cycles While the antler cycle can give you some clues on the most important time period for your male deer, don’t forget to pay attention to the growth and reproductive cycles of fawns and does. Fawns won’t begin antler growth until about 10 moths of age, but their nutrition up to that point plays a major role in their ability to thrive and grow. To raise and wean a healthy fawn, does must meet huge nutritional requirements during pregnancy and lactation. Understanding how all of these cycles work together will not only make you a more educated manager, but also a more succesful one.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text discusses antler development in deer and provides educational information about the antler cycle, nutrition, and the importance of year-round care for deer. There is no unsafe content, inappropriate language, or themes that would make it unsuitable for public use or educational environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85381-0", "llm_safety_score": 0, "reason": "educational content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://rackrevolution.com/understanding-antler-development/", "date": "2023-06-08T05:02:00", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00538.warc.gz", "language": "en", "language_score": 0.9410790801, "token_count": 854, "score": 2.921875, "int_score": 3 }
<urn:uuid:06ba9fb6-4156-4ff8-85d8-a549bcfa2f12>
For those embarking on a curriculum review, choosing a Common Core-aligned review tool is a daunting decision that must be made right up front. The tool will determine the structure of the reviews, the information the reviews surface, and ultimately, the textbooks that do (or don’t) end up in front of students. An effective tool is one that will keep the Shifts and Standards at the center of the review while allowing enough flexibility to accommodate local needs and priorities. One of the benefits of having shared Standards is that we don’t need to reinvent the wheel when it comes to rubrics for instructional materials reviews. One review tool many districts are successfully using is the Instructional Materials Evaluation Tool (IMET) developed by Student Achievement Partners. Why was the IMET created? The IMET was created in response to the need of states and districts for specific criteria to determine if textbooks were making the changes the Standards demand. Doing a “crosswalk” of the old standards to the new ones or matching lessons with standards to measure coverage could no longer sufficiently identify alignment. Reviewing for Common Core-alignment requires deeper analysis that will surface whether textbooks are making broader changes like linking math topics coherently across a grade or including literary texts of appropriate complexity for each grade. Who should use the IMET? Review teams and decision makers at the state, district or school level should use the IMET to evaluate comprehensive textbooks or textbook series (to review individual lessons, see the EQuIP rubric produce by Achieve). You can use the IMET to: - Evaluate textbook options you are considering purchasing - Evaluate your current textbooks to determine where they should be supplemented or amended to better support Common Core instruction How does the IMET work? The IMET guides reviewers to find and record evidence that certain criteria are present in the materials they are investigating. The IMET criteria fall into three categories: - Non-Negotiable Criteria - Alignment Criteria - Indicators of Quality Each criterion includes a set of metrics that help the reviewer zero in on evidence that the criterion is present. Each Non-Negotiable must be met completely for the curriculum to be considered aligned. The Alignment Criteria section as a whole must also be “Met”, but this can happen in a variety of ways. There is a point-based scoring system for the Alignment Criteria, and instructional materials must exceed a certain overall score to be considered aligned. Finally, the Indicators of Quality section suggests additional items that could be included in a review, but are not directly related to alignment to the Shifts. The review tools used historically are not likely to give you the information you need to identify Common Core-alignment; most fail to take into account key instructional changes teachers are being asked to make. As reviewers and decision makers, you’ll need a tool that puts the Common Core Shifts – the work teachers are doing in classrooms – at the center of the review. As you continue reading the blog, you’ll see examples of states and districts that did just this and learn more about how they’ve used the IMET in a variety of different ways to meet their needs. 5 thoughts on “Instructional Materials Evaluation Tool (IMET)” I am creating a research paper promoting IMET. What schools/ states or countries are using this tool. Also, where do I find documentation of the success of IMET? First, I’d recommend speaking to the folks at edreports.org. They are a third party that convenes groups of educators to conduct reviews of all the major curricula. Their review rubric is based on the IMET. We also have a number of case studies of districts that have used the IMET, such as Walla Wall, Washington, https://achievethecore.org/aligned/customizing-the-imet-pd-training-for-a-local-setting/. And members of the Instructional Materials Taskforce: https://achievethecore.org/aligned/why-do-this-work/ and https://achievethecore.org/aligned/traditional-reviews-vs-the-imet/. You should also review the Louisiana Believes website. They led one of the most publicized review and selection process and have published their reviews on their website. They used a version of the IMET. You can see a case study series here: https://achievethecore.org/aligned/series/?series=Louisiana%20Case%20Study Is there an online version of the IMET tool? Similar question to the one Sherri had- Are there Google Forms for the IMET tool? I’m afraid there isn’t an online/interactive version of the IMET at this time, but we are actively considering revisions to the tool and how we guide users through a selection process. I’ll pass this request along to the team reviewing the tool and it’s functionality!
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"educational content, no unsafe elements\", \"score\": 0}\n```\n\nThe text sample provided is focused on educational content related to curriculum review and the use of a specific tool (IMET) for evaluating textbooks and instructional materials. There are no unsafe elements, inappropriate language, or harmful themes present in the text. Therefore, it is fully appropriate for public use, educational environments, and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85382-0", "llm_safety_score": 0, "reason": "educational content, no unsafe elements" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://achievethecore.org/peersandpedagogy/intro-to-the-imet/", "date": "2023-05-28T06:13:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00738.warc.gz", "language": "en", "language_score": 0.9282081723, "token_count": 1047, "score": 2.84375, "int_score": 3 }
<urn:uuid:66d50d5d-97d5-4cf9-8818-5d3e27599075>
PPPL By John Greenwald September 25, 2015 At the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL), world-leading fusion research resumes later this fall. After more than six years of planning and construction — including three years of building and 574,000 hours of labor — the National Spherical Torus Experiment-Upgrade (NSTX-U) is ready to play a critical role in the quest to develop fusion energy as a clean, safe and virtually limitless fuel for generating electricity. The $94 million overhaul has made the machine the most powerful spherical tokamak in the world. The upgrade has doubled its heating power and magnetic field strength, lengthened its operation from one second to five seconds and increased its plasma performance by a factor of 10. The improvements create a flexible research platform that will enable some of fusion’s most outstanding puzzles to be directly addressed for the first time, thus supporting continued U.S. leadership in the quest for fusion systems that can form the basis of commercial fusion power. . “This achievement signifies the completion of an extremely successful challenge, which opens the door to a decade or more of exciting research,” said PPPL Director Stewart Prager. “The world will now be watching to see if this experiment can serve to further improve our vision for future reactors.” Passing stringent tests The new machine passed stringent tests to reach construction completion. On May 11, operators produced 40,000 electron-volts from a second neutral beam — a device used to heat the plasma — to demonstrate the first step in doubling the heating power. Then, on Aug. 10, engineers produced a 100,000-amp plasma — the fuel for fusion reactions. The twin achievements easily met the Key Performance Parameters (KPP) that the project had to satisfy to be completed. “This is not a little spherical torus anymore,” said Al von Halle, the head of NSTX-U engineering and operations. “This machine has 10 times the capability of the original NSTX.” Reaching this point required some 250 staff members, or more than half the Laboratory, to bring the project in on time within the DOE’s budget. “It took the work of physicists, engineers, technicians and many others to solve all the problems that cropped up along the way,” said Mike Williams, associate director of engineering and infrastructure, who is retiring this month after 39 years at the Laboratory. “This was a joint effort in every sense of the word.” The many challenges reminded project head Ron Strykowsky of remodeling a house that’s already been built. “It’s easier to build a brand new house than to modify one that’s already standing,” Strykowsky said. “This forced us to adapt to what was there instead of building from the ground up.” Strengthening every nut, bolt and support Among the major hurdles was the need to strengthen every nut, bolt and support system throughout the machine to accommodate the higher magnetic fields. Doubling the fields created torque — or twisting forces — that could have destroyed the machine when it ramped up to full strength during operation. Analysts led by Pete Titus spent 28,000 hours supporting the Laboratory’s design and cognizant engineers by analyzing the components they designed to tolerate the higher currents and loads required for the upgrade. “This was quite a task,” said Titus, whose team began working three years before construction started and used a software program called ANSYS to analyze and reconfigure the support components. There were many more challenges to face. The increased power of the machine will require constant monitoring to protect the magnets, and the overall vessel, from forces and stresses that could cause them to fail. To keep constant watch, engineers designed and built a Digital Coil Protection System that makes 1,200 computations every 200 microseconds to ensure that all is running smoothly. Aligning the second neutral beam that pumps heat into the machine created another big challenge. Engineers headed by Timothy Stevenson had to cut a port into the tokamak vacuum vessel and aim the beam to within 80 thousands of an inch of the target inside. The spot the beam hit required reinforced armor to keep it from melting right through the vessel. Pushing the envelope “We had to push the envelope of everything we did,” Stevenson said of the overall upgrade, “and the review was highly complimentary.” Indeed, the DOE committee that conducted the closeout report recognized “the entire project team for their very high-quality work delivered over the course of the project, and resilience in overcoming expected and unexpected obstacles.” PPPL, on Princeton University’s Forrestal Campus in Plainsboro, N.J., is devoted to creating new knowledge about the physics of plasmas — ultra-hot, charged gases — and to developing practical solutions for the creation of fusion energy. Results of PPPL research have ranged from a portable nuclear materials detector for anti-terrorist use to universally employed computer codes for analyzing and predicting the outcome of fusion experiments. The Laboratory is managed by the University for the U.S. Department of Energy’s Office of Science, which is the largest single supporter of basic research in the physical sciences in the United States, and is working to address some of the most pressing challenges of our time. For more information, please visit science.energy.gov
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```", "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the research activities and management of PPPL (Princeton Plasma Physics Laboratory) and does not contain any unsafe, inappropriate, or harmful content. It is fully appropriate for all audiences and does not include any language, themes, or references that would warrant a higher safety score." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85383-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85383-1", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://fusion4freedom.com/construction-completed-pppl-is-set-to-resume-world-class-fusion-research-later-this-fall/", "date": "2023-05-31T00:01:29", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00738.warc.gz", "language": "en", "language_score": 0.9487344623, "token_count": 1139, "score": 2.53125, "int_score": 3 }
<urn:uuid:337b3618-cb21-4646-9010-871b83bfaa2b>
Electric Bike makes riding easier Riding Electric bikes can be a great way to get your daily exercise, but it can also be daunting if you’re not used to it. That’s where the Electric Bike comes in – this type of bike uses electric power instead of gasoline or diesel, so you don’t have to worry about the fumes and noise of a traditional bike. Plus, they’re much easier to ride than a regular bike, so you’ll be able to get around town quickly and easily. What is an Electric Bike? Electric bikes are bicycles that use electric power to assist with pedaling. They come in many shapes and sizes, from small and lightweight bikes to large, heavy bikes. There are many differences between an electric bike and a regular bike. Regular bikes use pedals to create energy, which is used to move the rider along. Electric bicycles use an electric motor to help you pedal. This means that you don’t have to work as hard as you would on a regular bike, making them more comfortable to ride. Moreover, there are so many benefits of using an electric bike, including the fact that they are more comfortable to ride than regular bikes. They also tend to be easier to operate, making them perfect for first-time riders. What are the disadvantages of using an electric bike? One disadvantage of using an electric bike is that it can be more expensive than regular bikes. They also require a small battery, which can be difficult to find in some cases. How does an Electric Bike work? An electric bike is powered by electricity. The electricity goes through the motor and helps you pedal. An electric bike is a lot easier to ride than a regular bike because you don’t have to pedal as hard. Electric bikes work by using a small battery to store energy, which is then used to power a motor that helps you pedal. This means that you can travel further without having to worry about getting tired. How do Electric Bikes make riding easier? Electric bicycles make riding easier for a few different reasons. For one, they don’t require pedaling, so you can focus on the ride. They also have motors that help you to get up hills and over long distances quickly. Finally, they typically have lower maintenance costs than traditional bikes, making them a great option for people who are looking to invest in a good bike but don’t want to spend a lot of money on it. Benefits of riding an Electric Bike Electric bikes are great for commuting, and they offer many benefits over traditional bikes. Here are the seven of the most notable advantages: - They’re environmentally friendly. Ebikes don’t produce emissions, so they’re a good choice for environmentally conscious riders. - They’re quiet. Electric bikes are much quieter than traditional bikes, which makes them ideal for urban environments. - They’re efficient. Ebikes are much more efficient than traditional bikes, which means they use less energy to get you where you’re going. - They’re versatile. Ebikes can be used for a variety of purposes, including commuting, recreational riding, and fitness workouts. - They’re easy to ride. Ebikes are relatively easy to ride, which makes them great for beginners and those who are new to cycling. - They’re ergonomic. Ebikes are designed with ergonomic features that make them comfortable to ride, even for long distances. - They’re affordable. Ebikes are typically cheaper than traditional bikes, making them a good option for budget-conscious riders. How to Ride an Electric Bike? Electric bikes make riding easier because they provide a smooth, quiet ride. You don’t have to worry about the wind or hills getting the best of your ride. With an electric bike, you can go at your own pace and enjoy the surrounding scenery. There are many types of electric bikes on the market, so it’s important to find one that fits your needs. Here are some tips on how to choose the right electric bike for you: Choose a bike that is comfortable for you. The weight and size of the bike don’t matter as much as the fit. You want to find a bike that is comfortable for you to sit on and pedal. If possible, try out different models to see which one feels most comfortable. Moreover, consider your budget. Electric bikes can range in price from around $1,000 to $10,000+. It’s essential to select a bike that fits your budget and meets your needs. Don’t overspend on a bike just because it’s an electric one; instead, find a model that is affordable and meets your needs. Things to avoid while Riding an Electric Bike When you’re out on your electric bike, there are a few things that you should keep in mind to make sure that your ride is as safe and enjoyable as possible. Here are a few tips to help keep you safe while riding: -Make sure that you’re wearing a helmet. This is not only the law in many states, but it’s also a good idea for your safety. Even if you’re not using the bike for transportation, wearing a helmet can help protect your head in the event of an accident. -Stay alert while riding. Don’t let your guard down; even though an electric bike is slower than traditional bikes, accidents can still happen. Watch out for cars and pedestrians, and stay within the speed limit. -Be cautious when turning. It’s easy to lose control when turning a wheel on an electric bike, so be careful and use caution when making turns. -Never ride an electric bike without proper training. In order to be safe while riding an electric bike, you need to have some understanding of how to ride one safely. There are plenty of opportunities for accidents when you don’t know what you’re doing, so make sure that you take the time to learn. If you’re looking for an easier and faster way to get around town, an electric bike is a great option. Not only do they offer a more environmentally friendly alternative to traditional bikes, but they also allow you to reach your destination in a shorter amount of time. With the right battery and motor kit, you can easily ride your electric bike anywhere you want-without the hassle of dealing with traffic or searching for parking.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample discusses electric bikes and their benefits, advantages, and tips for riding them. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.", "{\"reason\": \"safe and appropriate content\", \"score\": 0}\n```\n\nThe text provides safety advice and information about the responsible use of electric bikes. It does not contain any unsafe or inappropriate content, and it is fully appropriate for all audiences, including children and sensitive environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85384-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85384-1", "llm_safety_score": 0, "reason": "safe and appropriate content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://webnews21.com/electric-bike-makes-riding-easier/", "date": "2023-06-01T08:27:14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00738.warc.gz", "language": "en", "language_score": 0.9614142179, "token_count": 1345, "score": 2.71875, "int_score": 3 }
<urn:uuid:37e8c951-2c43-4718-bff1-9808d58ba273>
Answers for Biology Questions and Biology Important Facts: Biology is a vast subject that encompasses the study of living organisms and their interactions with each other and their environment. As a biology enthusiast, you may find it challenging to remember all the intricate details of the subject. - What is DNA? DNA is a double-stranded molecule that carries genetic information and is responsible for the transmission of hereditary traits. - What is a gene? A gene is a unit of heredity that is responsible for the expression of a particular trait or characteristic. - What is Photosynthesis? Photosynthesis is the process by which plants convert sunlight, carbon dioxide, and water into oxygen and glucose. - What is the difference between mitosis and meiosis? Mitosis is the process by which a single cell divides into two identical daughter cells, while meiosis is the process by which a single cell divides into four non-identical daughter cells. - What is a virus? A virus is a small infectious agent that replicates only inside living cells and can cause a range of diseases in humans, animals, and plants. - What is natural selection? Natural selection is the process by which organisms that are better adapted to their environment are more likely to survive and reproduce. - What is a food chain? A food chain is a series of organisms that are linked by their feeding relationships, with each organism being eaten by the one that follows. - What is evolution? Evolution is the process by which species change over time as a result of genetic variation and natural selection. - What is the cell theory? The cell theory is the idea that all living organisms are composed of one or more cells, which are the basic unit of life. - What is the function of the nervous system? The nervous system is responsible for transmitting signals between different parts of the body and coordinating responses to external stimuli. Biology Important Facts - DNA stands for deoxyribonucleic acid and carries genetic information in living organisms. - Mitosis is the process by which a single cell divides into two identical daughter cells. - Photosynthesis is the process by which plants convert sunlight, water, and carbon dioxide into glucose and oxygen. - The cell membrane is a thin layer that surrounds the cell and regulates the passage of substances in and out of the cell. - The heart is a muscular organ that pumps blood throughout the body. - Homeostasis is the process by which the body maintains a stable internal environment despite external changes. - Enzymes are proteins that catalyze biochemical reactions in the body. - The respiratory system is responsible for exchanging gases between the body and the environment. - The nervous system is responsible for transmitting signals between different parts of the body. - Meiosis is the process by which cells divide to produce gametes, such as sperm and eggs. - The circulatory system is responsible for transporting oxygen and nutrients to the body’s tissues and removing waste products. - ATP (adenosine triphosphate) is the primary source of energy in living organisms. - The endocrine system produces and releases hormones that regulate various bodily functions. - The digestive system breaks down food into small molecules that can be absorbed by the body. - Ecosystems are communities of living organisms and their physical environment, including air, water, and soil. 10 Most Interesting Human body facts The human body is a fascinating and complex organism, and there are countless amazing facts that can be learned about it. Here are 10 incredible human body facts that you may not have known before. - The brain can process information at a rate of up to 120 meters per second. This means that the information from your eyes can reach your brain faster than you can blink. - The human nose can detect over 1 trillion different scents. This is due to the fact that the olfactory system in the nose is capable of distinguishing between different molecules in the air. - The average human produces enough saliva in their lifetime to fill two swimming pools. Saliva is essential for breaking down food and keeping the mouth healthy. - The human heart beats over 100,000 times per day, pumping blood to all parts of the body. It is one of the most important organs in the body, and keeping it healthy is essential for overall well-being. - The human body is made up of approximately 60% water. This is why staying hydrated is so important for maintaining good health. - The human eye can distinguish between 10 million different colors. This is due to the fact that the retina contains special cells called cones, which are responsible for color vision. - The human skin is the largest organ in the body, and it is responsible for protecting us from the outside world. It also plays a role in regulating body temperature and eliminating waste through sweat. - The human body contains over 600 muscles, which work together to allow us to move and perform a variety of activities. - The human skeleton is made up of 206 bones, which provide support and structure for the body. They also protect vital organs and allow for movement. - The human digestive system is approximately 30 feet long. It is responsible for breaking down food and extracting nutrients, which are then used by the body for energy and growth.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is an educational and informative piece about biology, containing no unsafe or inappropriate content. It discusses various biological concepts and facts in a respectful and appropriate manner, making it fully suitable for all audiences.", "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a factual statement about the human digestive system and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would be considered unsafe or offensive." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85386-0", "llm_safety_score": 0, "reason": "no unsafe content" }, { "custom_id": "85386-1", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://gyanvigyan.in/answers-for-biology-questions-and-biology-important-facts/", "date": "2023-06-05T14:19:31", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00738.warc.gz", "language": "en", "language_score": 0.9492312074, "token_count": 1082, "score": 3.609375, "int_score": 4 }
<urn:uuid:4c3ad438-f688-4a40-a2b9-d69b537195a6>
We've got 6 definitions for BROC » What does BROC stand for? What does BROC mean? This page is about the various possible meanings of the acronym, abbreviation, shorthand or slang term: BROC. Filter by: Sort by:PopularityAlphabeticallyCategory Bennington Rutland Opportunity Council Budgetary Responsibility Oversight Committee Baton Rouge Orthopaedic Clinic Blue Ridge Opportunity Commission Burst Record On Command Black Recruitment Orientation Committee What does BROC mean? - Broc (French: [bʁo]; Arpitan: Broc, locally Bro [bʁo] (listen)) is a municipality in the district of Gruyère in the canton of Fribourg in Switzerland. Still can't find the acronym definition you were looking for? Use our Power Search technology to look for more unique definitions from across the web! Use the citation options below to add these abbreviations to your bibliography. "BROC." Abbreviations.com. STANDS4 LLC, 2023. Web. 9 Jun 2023. <https://www.abbreviations.com/BROC>. Discuss these BROC abbreviations with the community: We're doing our best to make sure our content is useful, accurate and safe. If by any chance you spot an inappropriate comment while navigating through our website please use this form to let us know, and we'll take care of it shortly. You need to be logged in to favorite.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided does not contain any unsafe or inappropriate content. It is a list of definitions for the acronym \"BROC\" and a discussion about the term. There are no profanity, derogatory terms, or references to illegal activities." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85388-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://www.abbreviations.com/BROC", "date": "2023-06-09T18:17:18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00738.warc.gz", "language": "en", "language_score": 0.8265545964, "token_count": 323, "score": 2.546875, "int_score": 3 }
<urn:uuid:77f1f760-96dd-4460-8849-5d14f40f3b7a>
Posted on Friday, November 12, 2010 • Category: Power Supplies Amateur radio has been somewhat slow to accept switching power supplies for powering communication equipment. This is a pity, because "switchers", as they are often called, offer very attractive features, like small size, low weight, high efficiency, and low heating. True, they are generally more complicated than linear power supplies, but this is easily compensated by the fact that they can be built for a lower cost. Some early switchers produced an objectionable amount of RF noise, bringing the whole switching technology into bad reputation. But by proper design techniques and careful EMI filtering it is possible to build very quiet switchers. Bench Power Supply Soft Start for Power Supply DIY USB 5V Solar Power Pack High Current Regulated Supply By LM317 DIY Power Supply for Home Server Dual Adjustable Power Supply 15V / 28V 4A Transmitter Power Supply +/- 15V Power Supply LM317 Variable Power Supply 0-30V Mini Bench Power Supply Circuit-Zone.com © 2007-2023. All Rights Reserved.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a technical discussion about power supplies and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not require any safety score." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85389-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://circuit-zone.com/index.php?electronic_project=321", "date": "2023-05-29T21:04:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644913.39/warc/CC-MAIN-20230529205037-20230529235037-00138.warc.gz", "language": "en", "language_score": 0.9271616936, "token_count": 222, "score": 2.875, "int_score": 3 }
<urn:uuid:f4f85da4-2b08-45ad-bdc9-abf605de7173>
What are parts of the arm called? Each arm consists of four main parts: - upper arm. What is the muscle in the forearm called? The superficial compartment of the flexor surface of the forearm contains the pronator teres, the flexor carpi radialis longus, the palmaris longus, the flexor carpi ulnaris, and the flexor digitorum superficialis. All of these muscles originate primarily from the medial epicondyle of the humerus.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a straightforward explanation of anatomical terms and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational environments and general audiences." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85390-0", "llm_safety_score": 0, "reason": "No unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://studioinessence.com/meals/what-is-the-bicep-called.html", "date": "2023-06-10T22:05:53", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00138.warc.gz", "language": "en", "language_score": 0.7539758086, "token_count": 105, "score": 3.421875, "int_score": 3 }
<urn:uuid:7b178f88-a9ee-464c-9d79-1e4fff64aee8>
No biologist has ever seen one in the wild, and they were only confirmed to exist in 1992 becoming one of a very rare group of mammals only discovered in the last few decades. Camera traps have photographed them a handful of times, and possibly even local villages have tried to keep them in captivity. Unfortunately, they have never survived -presumably because they were not given suitable food. In 1992 2 skills and a pair of trophy horns were discovered. Over the next few years about 20 more specimens including a full skin were collected, and in 1993 DNA evidence revealed it was not only a species unknown to science, but exists in a new genus of the Bovid family (which include cattle antelope goats and sheep). The name means spindle horns. Although not directly hunted, poaching has exploded in its range – likely reducing its population further. While efforts to mount more patrols have been undertaken, there are thousands of people setting up snares, with millions in the forest. Other species like the Large-antlered Muntjac have also become critically endangered. In 2001 the Saola population was estimated to number 70 to 200 individuals. More recently, this has been reduced to ‘no more than 100’. It was last camera trapped in 2013 with villagers continuing to report its presence. The problem with species like this is simple. If you imagine looking for a small antelope with a small population in a large forest, it is clear how rarely you would stumble upon it; if you add that it is shy and good at hiding, it makes it particularly hard to protect. Its thought that the Saola has lived on earth for 8 million years, as it is present in the fossil record. At the moment, there is an effort underway to find and catch enough to create a captive breeding program; though we must hope that if they succeed, the scientists will be more successful than the villagers in keeping them alive.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the Saola, a rare and endangered species of mammal. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and informative about wildlife conservation." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85391-0", "llm_safety_score": 0, "reason": "no unsafe content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://seeanimalswild.com/tag/unicorn/", "date": "2023-06-01T16:12:59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647895.20/warc/CC-MAIN-20230601143134-20230601173134-00138.warc.gz", "language": "en", "language_score": 0.9811280966, "token_count": 393, "score": 3.796875, "int_score": 4 }
<urn:uuid:26bdcbcb-4323-4d01-b55c-fe6df0c83a39>
An 11 slide editable PowerPoint to use in the classroom when learning about coniferous forests. Use this teaching resource in the classroom when learning about how climate can influence the vegetation and animals found in a coniferous forest. This teaching presentation includes key information, discussion points and class activities for a coniferous forest: Write a review to help other teachers and parents like yourself. If you'd like to request a change to this resource, or report an error, select the corresponding tab above.
{ "final_harm_score": 0, "embedding_harm_score": 0, "llm_harm_score": 0, "llm_score_assessment_by_chunk": [ "{\"reason\": \"appropriate content\", \"score\": 0}\n```\n\nThe text sample provided is entirely educational and suitable for classroom use. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for all audiences, including children and sensitive environments." ], "llm_harm_scores_by_chunk": [ { "custom_id": "85392-0", "llm_safety_score": 0, "reason": "appropriate content" } ] }
{ "dump": "CC-MAIN-2023-23", "url": "https://www.teachstarter.com/us/teaching-resource/coniferous-forest-powerpoint-us/", "date": "2023-06-03T01:50:19", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00138.warc.gz", "language": "en", "language_score": 0.8770985603, "token_count": 102, "score": 3.125, "int_score": 3 }