id
stringlengths 47
47
| text
stringlengths 176
666k
| safety_metadata
dict | metadata
dict |
---|---|---|---|
<urn:uuid:b8f818a6-60b5-4bb1-bade-4cd8561da402> | I already had several projects I was working on at the time so I thought about the idea for a couple of months before I actually sat down with a box of paperclips and started trying to make a machine. During those months I figured out the design and process for making the machine parts and a way to assemble them. I found that I only needed a few items and tools to get started. I found the process to be easy. Paperclip machines are interesting to design and build, and fun to operate when finished. I think the sculptural form of these machines take on an artistic element as well.
For educators this project is a great way to teach students the physics of mechanical machines including cranks, levers, fulcrum points, rotary and linear motion all while stirring their curiosity and developing their mechanical aptitude. In PLTW: this could go under Modeling and Design as a miniature working model or as a machine prototype in manufacturing or structural systems. It could also go under the Power/Energy section. In STEM: it could go under nearly all of the categories. Many thanks to dauphin 1974 who shared a link to a project called FAT Friday at MIT. http://web.mit.edu/museum/programs/fat.html) In that program groups and individuals build machines and then link them together in a row to create a chain reaction. I would think it would be pretty simple to come up with a way to do something similar with paperclip machines. That would allow a whole class of students to each build their own paperclip machine and then link them all together to create a chain reaction.
PS - If I win the Grand Prize in the Shop Bot Contest - and I sure hope I do - I will use it to make proto boards for this project and others for middle and high school students in the STEM program.
Here is a video of the paperclip machine I built. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text discusses a creative project involving the design and construction of paperclip machines, which is educational and appropriate for various STEM and educational contexts. There are no unsafe elements, inappropriate language, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "730-0",
"llm_safety_score": 0,
"reason": "educational content with no unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.instructables.com/id/Building-Machines-From-Paperclips/",
"date": "2013-05-18T17:41:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.963968277,
"token_count": 389,
"score": 2.953125,
"int_score": 3
} |
<urn:uuid:b36663a3-c451-4cf9-96ed-4dd88401a1df> | (9 of 12)
By 1984, in good time for his re-election campaign, the GNP was growing a robust 6.8%, while inflation had dropped to 4.3%. And from then on, despite the spectacular but brief stock-market crash in 1987, the boom kept right on booming. Those gains, however, were unequally distributed. Reagan liked to say that the government provided a "safety net" for the "truly needy," but it was during these years that, for the first time since the Depression, there appeared those huddled figures who became known as "the homeless."
Another pillar of Reagan's approach was to get government out of the way of growing businesses. Deregulation had started tentatively under Carter with the airlines, but Reagan applied it broadly, to energy and broadcasting and butressed it with a dismantling of antitrust laws. Reagan was a staunch free-trader and did little to stop the onslaught against sluggish American corporations from aggressive Japanese manufacturers. Reagan's term coincided with the height of Japan's economic boom, and his instinct was that in the long run, it would be better to let most companies fend for themselves.
Under pressure from foreign competition, and with the antitrust lawyers looking the other way, Wall Street tumbled into a fever of mergers, leveraged buyouts, massive restructurings and corporate raids. It was painful, it was chaotic, it hurt a lot of workers, both blue and white collar. But in the end it seems to have produced a more competitive economy, with companies more nimble, more responsive to customers and more innovative, even if their workers felt less secure or loyal. The 1980s shakeout helped prime the economy for its leap into the high-productivity, technology-fueled boom of the next decade.
A philosophical offshoot of Reagan's impulse to deregulate was the 1986 tax-reform bill. Although the primary goal was to lower tax rates a lot, to encourage work and investment, the trick was to pay for it by eliminating most of the exemptions and special tax breaks and shelters, all the ways the government tried to micromanage the economy and control behavior. Reagan and the reformers believed in letting individuals make decisions based on their own view of economic self-interest, not the tax code's. By the end of Reagan's term, the ground had shifted to the point that it became all but impossible for politicians to propose big new spending programs in the face of so much red ink. "Reagan's policies," said Stanford economist Michael Boskin, "were all designed to do what public policy could do to transform a badly ailing economy into a highly competitive one."
During his campaign for the White House, Reagan asked the voters not only whether they were better off but also whether the nation was stronger than it had been four years earlier. And there was little doubt about the answer. At the time, America's diplomats were being held hostage in Iran, a rescue attempt had crashed in flames in the desert, and the Army--by its generals' own admission--was going "hollow." Though Presidents Nixon, Ford and Carter had all promoted the development of new weapons systems--the MX missile, F-117 fighter, the B-2 bomber, the M1 tank--it was under Reagan that those programs bore fruit, along with a mighty, imaginary weapon born all of Reagan's own instincts. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a historical analysis of economic and political policies during Reagan's presidency. It does not contain any unsafe, inappropriate, or harmful content. The language is neutral and factual, discussing economic growth, deregulation, and the impact of policy decisions on the economy and society. There are no references to illegal activities, violence, or offensive language."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "731-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.time.com/time/magazine/article/0,9171,994446-9,00.html",
"date": "2013-05-18T17:50:49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9845811129,
"token_count": 692,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:e46b2c55-5ba5-4c67-ab3a-68dac11cdaf8> | Calluses are typically not a serious health problem, yet they tend to be a highly unaesthetic one. Although prevention in the form of reducing friction is the best idea, there are several ways in which calluses can be removed.
Calluses are essentially a hardening of the skin in response to
excessive friction. Typically occurring on the surface of the feet,
this distressing beauty problem is a basic protective mechanism of
the skin that can occur due to pressure that is applied on the feet
by certain types of footwear. Although calluses are typically seen
as relatively harmless from a health stand point, neglecting this
issue can result in pain and even infection.
Understanding the causes is often helpful as it can reveal possible prevention strategies. The most common causes of this problem are: wearing high heels often or very tight fitted shoes, excessive body weight, highly ached feet or flat feet, short Achilles tendon or activities that increase the pressure normally applied on the skin.
Although not all of these causes can be eliminated, some simple
changes, such as choosing more comfortable shoes or wearing socks
that offer a better cushioning are easy prevention strategies that
can be applied immediately. Padded shoe inserts are an equally good
solution for those who suffer from recurring calluses due to feet
In addition to these simple tips, there are also some self care strategies that can help minimize this problem. Soaking your feet in warm water for approximately 20 minutes is not only relaxing, but also beneficial. Adding Epsom or seas salt, baking soda , chamomile tea or apple cider vinegar can help reduce swelling and deal with the calluses a lot easier. A paste of aspirin and lemon juice applied to the affected areas overnight is a home remedy that can be tried as well.
Using a pumice stone to lightly remove some of the hardened skin or a gentle exfoliator can also be helpful. Investing in a good moisturizing cream and applying it religiously will also help speed up the healing process. Looking for topical skin care creams that contain salicylic acid is recommended as this ingredient is believed to accelerate the healing process the most.
Although cutting calluses has become a rather common practice, this method is highly unrecommended as it can lead to injuries and infection. The risks are particularly high for those who have diabetes or cardiovascular problems who should consult a professional rather then trying to solve this problem themselves. Despite the fact that calluses are a relatively trivial problem for generally healthy people, as long as it is painless, there are some cases which might require seeking medical assistance. If calluses become painful or inflamed or worse, they start to bleed, seeking a podiatrist is by far the best solution for fast healing.
Photo credit: Thinkstock Photos | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"safe content\", \"score\": 0}\n```\n\nThe text discusses calluses and provides information on their causes, prevention, and removal. It is written in a neutral, informative tone and does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "733-0",
"llm_safety_score": 0,
"reason": "safe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.becomegorgeous.com/body-and-skin/perfect_skin/how_to_get_rid_of__calluses-3713.html",
"date": "2013-05-21T17:11:35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9570057392,
"token_count": 566,
"score": 2.734375,
"int_score": 3
} |
<urn:uuid:93037d58-1e22-4911-9062-68679682952d> | Public librarians use Dr. Dewey’s classification many times during the day. It is one thing to know we have the book, but quite another to be able to find it. The Dewey Decimal System makes this much easier. His system is the one that most customers are familiar with, and it is used in over 200,000 libraries worldwide. Dewey published his system in 1876. It continues to remain up to date with the 23rd revision published in 2011. Dr. Dewey did the revisions himself while he was alive.
Ok, you have arrived at the Library, and you need to find some information about World War II. So, you go the computer, enter WWII, and up comes this number. You write down this random, seemingly meaningless, number on a piece of paper and head off into the stacks to find. When you locate the number and your book, you notice that the other books around it also appear to be about WWII. You assume that the number somehow indicates books on WWII, but you have no idea why. Nor do you probably care. You just want to get your book. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the Dewey Decimal System and its use in libraries, specifically mentioning its application in finding books on World War II. There is no unsafe, inappropriate, or harmful content in the text. It is fully appropriate for all audiences and does not contain any offensive language, adult themes, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "734-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.mymcpl.org/blog-tags/Dewey%20Decimal%20System",
"date": "2013-05-21T17:43:54",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9725010395,
"token_count": 231,
"score": 3.265625,
"int_score": 3
} |
<urn:uuid:65828445-04a4-4bba-a311-f69ac03f9cd4> | The terms "pigeon" and "dove" are informal and are not used to imply taxonomic divisions within the group. The terms are often used interchangeably, although there is a tendency for the term "pigeon" to be used when referring to larger species and "dove" to be used when referring to smaller species.
Pigeons and doves are small to medium size birds. They have short legs, a portly body, short neck and small head. Their plumage usually consists of various tones of grey and tan although some species have iridescent swatches of feathers adorning their neck as well as bars and spots on their wings and tail. Pigeons and doves have short bills which are hard at the tip but softer at the base where the bill meets with a naked cere (a waxy structure that covers the portion of the bill closest to the face).
The diet of pigeons and doves consists primarily of seeds and fruit. Most species forage on the ground or by picking food from bushes and trees. Some species also eat insects.
Pigeons and doves are most successful in open habitats such as grasslands, fields, deserts, agricultural lands and urban areas. They also inhabit temperate and tropical woodlands and mangrove forests to a lesser extent. Some species have extensive natural ranges while others are more restricted in distribution. The species with the widest range of all pigeons and doves is the rock dove (Columba livia), the city-dwelling species most commonly referred to as simply "a pigeon.
As a group, pigeons and doves are cosmopolitan birds, inhabiting a near worldwide range that excludes only the driest and coldest of habitats such as the Sahara Desert, the Arctic and Antarctica. They are present on may oceanic islands.
Pigeons and doves are monogomous and pairs often remain together for more than one breeding season. Pairs often produce multiple broods each year and share in the incubation and rearing of the young.
Pigeons and doves build platform nests constructed out of twigs and occasionally lined with pine needles or other soft materials such as root fibers. They build their nests on the ground, in trees, bushes or cacti, trees or on ledges. Some species build their nest atop the vacant nests of other birds.
Pigeons and doves usually lay one or two eggs per clutch (sometimes up to four). The male and female switch-off sitting on the eggs. The incubation period lasts between 12 and 14 days (although the incubation period varies from species to species). After hatching, adults feed their chicks crop milk, a liquid produced by the lining of the crop and which provides fats and proteins that nourish the young. When young reach about 10 to 15 days old, the adults feed them regurgitated seeds and fruit. Young fledge at about 11 to 16 days of age.
Pigeons and doves are divided into two groups, the Raphidae (an extinct group of flightless birds that included the dodo) and the Columbidae (the group that includes all living pigeons and doves).
Pigeons and doves are a coherent group of birds that are quite convincingly closely related, yet scientists are uncertain which bird group represents their closest living relatives. The fossil record for the group is sparse, a matter that further complicates a clear understanding of their evolutionary relationships.
There are two well-known members of the group that are now extinct, the dodo and the passenger pigeon. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"informative content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the taxonomy, physical characteristics, diet, habitat, behavior, and evolutionary relationships of pigeons and doves. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "735-0",
"llm_safety_score": 0,
"reason": "informative content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://animals.about.com/od/pigeons-doves/p/pigeons-doves.htm",
"date": "2013-05-24T01:30:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9603538513,
"token_count": 736,
"score": 3.875,
"int_score": 4
} |
<urn:uuid:334df525-4434-4c82-8cc6-2a1344bb2df1> | Emory dynamic simulation model shows targeted use of antiviral agents might be effective intervention until adequate supplies of vaccine become available
ATLANTA – In a future outbreak of pandemic influenza, such as the three pandemics that sickened millions and killed hundreds of thousands of people during the 20th century, supplies of flu vaccine might not be available quickly enough to contain the spread of disease. However, according to research by biostatisticians in Emory University's Rollins School of Public Health, many thousands of deaths could be prevented if antiviral agents were given to the close contacts of those with suspected cases of flu until adequate supplies of vaccine could be manufactured and distributed. The results of the research by Emory professors of biostatistics Ira Longini, Jr,, PhD, and M. Elizabeth Halloran, MD, DSc, and their colleagues Azhar Nizam, MS, and Yang Yang, BSc, will appear online on March 26, and will be published as a special article in the American Journal of Epidemiology on April 1, 2004.
The Emory scientists used a dynamic stochastic simulation model of an influenza pandemic or bioterrorist attack for an agent similar to influenza A(H2N2), which caused the Asian influenza pandemic of 1957-58 and resulted in approximately 70,000 deaths in the U.S. (A stochastic model includes elements of chance or probability). They determined that if no interventions were used in a similar pandemic, 33 percent of the population would become ill, resulting in a death rate of 0.58 per 1,000 people. If antiviral prophylaxis was given to close contacts of 80% of suspected influenza cases, however, in a strategy that the authors call "targeted antiviral prophylaxis" (TAP), the epidemic could be contained. If TAP were begun within one day of identifying suspected flu cases and used for up to eight weeks, only 2 percent of the population would become ill, and the death rate would be only 0.04 per 1,000 people. The researchers found that eight weeks of TAP would be nearly as effective as vaccinating 80 percent of the population.
"The ability to rely on targeted antiviral therapy in the case of a major public health threat from influenza would be an extremely valuable strategy, due to the characteristics of influenza pandemics," Dr. Longini said. "Epidemics are usually due to strains of flu that acquire genetic variations that differ slightly from earlier strains, while pandemics occur when there is a dramatic shift in the current flu strain. Annual flu vaccines are designed to counter the strain of flu from the previous season, and often there is insufficient time to catch up with making enough vaccine to counter the first wave of a new outbreak. Manufacturing and distributing a vaccine to match a newly identified strain can take six to eight months."
Although the surveillance and containment strategy (i.e., isolation of cases and quarantine of close contacts) was recently used to successfully contain the spread of severe acute respiratory syndrome (SARS), influenza has a much shorter incubation period (1.9 days as opposed to 6.4 days), and has a much broader range of clinical illness, from asymptomatic to primary pneumonia. Thus the surveillance and containment strategy is unlikely to work in containing an influenza epidemic.
"Because surveillance and containment would be an ineffective strategy to contain an influenza epidemic, stockpiling antiviral drugs, along with a well-planned distribution strategy, could be an effective first line of defense while an adequate supply of vaccine is being produced to counter subsequent waves of infection," Dr. Longini explained.
Scientists already know that antiviral drugs can be used prophylactically to help prevent infection after exposure, to reduce the probability of clinical illness after infection, and to reduce the probability of transmission by infected individuals, as well as used therapeutically to reduce clinical illness and transmission after infection. The Emory model simulates what the population level effects would be for various TAP strategies. These include the indirect effects to people not directly receiving the intervention. The model population consisted of people whose characteristics simulated the age distribution and approximate household sizes from the U.S. 2000 Census. The spread of influenza was simulated through measuring typical numbers of close and casual contacts during the course of a day.
Although the researchers acknowledged that vaccination, if available, would be the most effective strategy to prevent an epidemic, they found that using TAP for up to four weeks would be almost as effective as vaccinating 50 percent of the entire population. TAP when used for up to eight weeks would be nearly as effective as vaccinating 80 percent of the entire population. If only limited quantities of vaccine were available, they found that vaccinating 80 percent of children younger than 19 would be nearly as effective as vaccinating 80 percent of the entire population.
"Although we know that vaccination is the best intervention for influenza, vaccine supplies may be limited," Dr. Halloran emphasized. "Using 80 percent TAP for six to eight weeks is almost as effective as vaccinating 80 percent of the entire population, but even given more limited supplies of antiviral agents, TAP for just one week could prevent millions of cases of influenza and save thousands of lives."
The researchers also addressed possible concerns about the emergence of drug-resistant influenza due to the widespread use of antivirals. Two classes of antiviral drugs– adamantanes and neuraminidase inhibitors – currently are used for influenza, either therapeutically or prophylactically. Drug resistance developing from prophylactic use of these agents has been shown to be much lower than for therapeutic use. The Emory scientists emphasize that the properties of neuraminidase inhibitors would lead to minimal spread of resistant strains with the TAP strategy, suggesting that this class of antiviral drug would be the best to stockpile for such use, followed by adamantanes.
"Effectiveness of the TAP strategy is based on systematic identification of index cases of influenza, and could be particularly effective in institutional settings such as schools, nursing homes and the workplace, and also for health care workers and first responders," Dr. Longini said. "If the logistical and financial details can be managed, the targeted use of antiviral drugs would be an effective first-line strategy for containing a pandemic influenza epidemic."
Source: Eurekalert & othersLast reviewed: By John M. Grohol, Psy.D. on 21 Feb 2009
Published on PsychCentral.com. All rights reserved.
That which does not kill me makes me stronger.
-- Frederick Nietzsche | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses a scientific study on the use of antiviral agents during a pandemic influenza outbreak. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to public health and medical research, making it fully appropriate for all audiences.",
"{\"reason\": \"philosophical quote\", \"score\": 0}\n```\n\nThe text provided discusses the effectiveness of antiviral strategies for managing influenza outbreaks and does not contain any unsafe or inappropriate content. It is suitable for educational and public use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "736-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "736-1",
"llm_safety_score": 0,
"reason": "philosophical quote"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://psychcentral.com/news/archives/2004-03/euhs-tap030104.html",
"date": "2013-05-24T01:50:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9578368664,
"token_count": 1348,
"score": 2.984375,
"int_score": 3
} |
<urn:uuid:6d23094f-9f87-44f7-8cef-fd4a14fe5003> | by David De La Croix and Axel Gosseries
- For a given technology, two ways are available to achieve low polluting emissions: reducing production per capita or reducing population size. This paper insists on the tension between the former and the latter. Controlling pollution either through Pigovian taxes or through tradable quotas schemes encourages agents to shift away from production to tax free activities such as procreation and leisure. This natalist bias will deteriorate the environment further, entailing the need to impose ever more stringent pollution rights per person. However, this will in turn gradually impoverish the successive generations: population will tend to increase further and production per capita to decrease as the generations pass. One possible solution consists in capping population too.
De La Croix, D. and A. Gosseries (2011). "The Natalist Bias of Pollution Control." CORE Discussion Paper No. 2011-27, Jun 2011. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is an academic discussion on environmental and economic policies related to pollution control and population management. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful, and the themes are focused on economic and environmental policies, which are suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "737-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.economicsclimatechange.com/2011/10/natalist-bias-of-pollution-control.html",
"date": "2013-05-24T01:51:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8928328156,
"token_count": 192,
"score": 2.921875,
"int_score": 3
} |
<urn:uuid:edf386dd-2bac-4867-9724-863fb95f4d6d> | The traditional line-up of the brasses is: Horns, Trumpets, Trombones, Tubas. The numbers and combinations of these instruments vary greatly according to historical period, geographical location and, of course, composer choice. Probably the most common orchestral combination is:
but there are numerous variations on this, including massively expanded groupings where required.
Horns are often used in combination with woodwind, and generally have a weaker sound than the other brass. The convention when writing for four horns is to give high parts to horns 1 and 3, and low parts to 2 and 4 (with 1 taking the highest, and 4 taking the lowest). A fifth horn may well be used even when only four are required by the score, to cover the less important passages in the Horn 1 part, allowing the principal to concentrate on important solos. A quartet of horns will be very effective and unobtrusive when carrying the harmonic background to a passage.
Use the various collections of clips in this section to listen to different brass scorings from the Philharmonia's recorded archive .
Rollover the image below to find out more about the brass section... | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"Safe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the composition and usage of brass instruments in orchestral settings. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "738-0",
"llm_safety_score": 0,
"reason": "Safe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.philharmonia.co.uk/thesoundexchange/the_orchestra/sections/brass/",
"date": "2013-05-24T01:45:19",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9260885119,
"token_count": 238,
"score": 3.0625,
"int_score": 3
} |
<urn:uuid:ec2ab1d5-943c-49db-a1a5-34fb2a0e6492> | Middle School - Online Resources
Use the integrated search engine to search all or selected databases simultaneously.
America the Beautiful - state history, geography and facts
American History - An ABC-CLIO database
BrainPop - Animated Science, Health, Technology, Math, Social Studies, Arts & Music and English movies, quizzes, activity pages and school homework help for K-12 students
CultureGrams - Up-to-date facts about countries of the world with photos, recipes, maps
eLibrary - Articles from magazines, newspapers, and reference works. Includes maps and images. User Guide (PDF)
InfoTrac Jr. - Articles from magazines, newspapers and reference books on current events, science, popular culture, health, people, government, history, sports.
Issues & Controversies - 800+ hot topics in business, politics, government, education, and popular culture
Literary Reference Center - Full-text database that combines information from major respected reference works, books, literary journals as well as original content from EBSCO Publishing
SAFARI Montage - Thousands of educational videos and multimedia titles available from school or home (LCPS network name and password to log in)
Science Reference Center - Full text for nearly 640 science encyclopedias, reference books, and periodicals
Student Research Center - Search by keyword or by topic to find the most useful search results in magazines, reference books, photos, flags, etc.
TumbleBookCloud - Online collection of read-along titles for all levels including an audio narration while the pages turn automatically. Select from fiction, nonfiction and the classics.
United States Geography - An ABC-CLIO database
Virtual Reference Library - Database of encyclopedias, e-books, and specialized reference sources
World History: Ancient and Medieval Eras - An ABC-CLIO database
World History: The Modern Era - An ABC-CLIO database
Foreign Language Resources
Enciclopedia Estudiantil Hallazgos - World Book’s content, media, and interactive features in Spanish.
La Nueva Enciclopedie Cumbre - Spanish language encyclopedia.
L'Encyclopedia Decouverte - World Book's content, media and interactive features in French.
Biblioteca TumbleBook - Colección en linea de títulos de lectura.
Click the Encyclopedia link for a full list of available encyclopedias.
Click on the above link to go to a list of the databases arranged in subject categories.
Click on the above link to go to a list of professional databases. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a list of online resources and databases that are suitable for educational use. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "740-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://cmsweb1.loudoun.k12.va.us/domain/4523",
"date": "2013-05-19T02:07:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.7604656816,
"token_count": 543,
"score": 3.3125,
"int_score": 3
} |
<urn:uuid:7732dd10-e7b4-4a79-afa3-ad2924566cf2> | stacywellis on Web Links
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
Each table group developed a simple machine (lever, wheel, incline plane, etc) in order to move an object from their table to a chair. As they constructed their device, they discussed gravity, height, angle, incline and weight. The materials they were given included: string, yarn, Popsicle sticks, pipe cleaners and tape. As you can see, they worked very well together and were VERY creative!
The Cryptic Sky Project
Due February 14, 2013
(no late projects accepted)
2nd Grade Science Unit
In second grade, students learn about stars, the sun and the moon. In this unit, students will research, create, and present a project of their choice about the cryptic sky. Students should use this opportunity to answer questions they might have about the cryptic sky. The project should consist of a ONE page report, along with a visual representation/aid to support their research.
Each project should be clearly labeled with student’s question.
Presentation of projects will allow students to answer the question they posed before and during the research and creation of their projects. Students will practice the IB learner profile of inquiry. Students become inquirers when their natural curiosity has been nurtured and they actively enjoy learning. Students will “step up” beyond the confines of learning within subject areas to practice the transdisciplinary theme of “How the World Works”.
Some probing question ideas for projects:
*What mythologies relate to stars and the constellations?
*Why are galaxies different shapes?
*How many stars are in the universe?
*Why are stars different colors?
*How many planets are in the Milky Way Galaxy?
*Why do astronauts need to wear special suits?
* Are all stars spherical? Why?
*How would you compare the size of the solar system to the Milky Way galaxy?
*How would you compare the size of the Milky Way galaxy to the universe?
*How does the Earth’s orbit effect seasons?
*How is the sun used in various ways to calculate time?
*How is the Northern hemisphere’s night sky different from the Southern hemisphere’s night sky?
*There are countless possible project ideas! Be creative and have fun! | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and suitable for a second-grade science class. It discusses topics such as simple machines, gravity, and a science project related to the cryptic sky, which are appropriate for young students. There is no inappropriate language, harmful content, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "741-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://stacywellis.wordpress.com/",
"date": "2013-05-19T02:00:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9530870914,
"token_count": 584,
"score": 3.703125,
"int_score": 4
} |
<urn:uuid:30dd1fc3-b49c-4bbd-a019-c05b3d5e1bab> | Sensors measuring separation distance
In the early 1980s, Josef Frauscher developed the "analogue sensor". This is an inductive sensor system that measures the separation distance of a metal part and provides the information in the form of an injected analogue current.
Initial applications were realised in retaining walls for power stations, where these sensors detect the structure's deviation from the vertical. Frauscher analogue sensors are manufactured for a range of applications, such as to determine the location of switch blades, to monitor retaining walls, to display levels, etc. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content detected\", \"score\": 0}\n```\n\nThe provided text discusses technical details about sensors and their applications in various fields. There is no unsafe, inappropriate, or harmful content present in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "742-0",
"llm_safety_score": 0,
"reason": "No unsafe content detected"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.frauscher.com/en/separation_distance/",
"date": "2013-05-19T02:01:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9147238135,
"token_count": 112,
"score": 2.859375,
"int_score": 3
} |
<urn:uuid:b8356647-f3e3-455b-b008-cc7a6128870f> | |Claim this listing|
Spend the afternoon at the Computer History Museum’s new state of the art large-scale exhibition. Learn about 2000 years of computing, from ancient times to today’s Internet. You will enjoy 1,000+ unique artifacts, hundreds of videos, docent-led tours and vintage technology demonstrations. The museum also has a new café, gift store and plenty of parking.
About the Museum
The Computer History Museum is the worlds leading institution exploring the history of computing and its ongoing impact on society. It is home to the largest international collection of computing artifacts in the world, including computer hardware, software, documentation, ephemera, photographs, and moving images. The Museum brings computer history to life through an acclaimed speaker series, dynamic website, on-site tours, and physical exhibitions.
Revolution: The First 2000 Years of Computing.
Everyone uses computers. Few know the story of how they came to be. Revolution chronicles the evolution and impact of modern computing from the abacus to the smart phone. This 25,000 sq. ft multimedia experience is a technological wonderland that immerses visitors in the sights, sounds, and stories of the computer revolution.
Babbage Difference Engine No. 2
The Story of the First Computer Pioneer
Charles Babbage (1791-1871) designed the first modern programmable computer – complete with a printer - but he failed to build it. Engineers at the London Science Museum finally built the first working Babbage Engine in 2002. The Babbage Difference Engine No. 2 on display at the Museum has 8,000 parts, weighs five tons and measures 11 feet in length. Learn more about this extraordinary object and the people who built it.
Mastering the Game: A History of Computer Chess
The history of computer chess is a five-decade long quest, beginning in the earliest days of computing and reflecting the ongoing advances in hardware and software. Chess presented the perfect computing challenge: a simple set of rules enabling games of stupefying complexity. Learn more about the journey to build a computer that challenged the world’s best chess players.
Digital Equipment Corporation’s (DEC) PDP-1 was the first commercial computers designed to interact with a single user. The Museum’s restoration team brought the PDP-1 back to working condition. They retrieved data from its main memory, restored all the peripherals and loaded the machine with vintage games, including SpaceWar! Please see the admissions desk to find out more about PDP-1 demonstrations. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely informative and educational, detailing the history and exhibits of the Computer History Museum. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "743-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.sfstation.com/computer-history-museum-b12419",
"date": "2013-05-19T02:25:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.891710639,
"token_count": 521,
"score": 2.71875,
"int_score": 3
} |
<urn:uuid:4e1aaca3-522a-49ef-a5ec-43e1390a9036> | Broadway Elementary School, built on a raised lot behind the E & M Market. The first three grades were on the first floor, and grades four through six were on the second; the playground was in front of the school, which was demolished after centralization. The River Street School was of a similar design. Photograph from the 1960s. Board of Education Report, Oct. 3 & 4, 1928
See also: Regional Public Schools
The first school was built in 1838 in the Pines, on the Old Military Road; it belonged to District Number 4 of the town of North Elba. The school was said to be on the site of Henry Reynolds' "mansion" on Pine Street, the largest house north of Albany during the early part of the century. The first teacher was Mary A. Miller, and the second was Mary Elizabeth Wise; 1 another early teacher was Mrs. Gabriel Lathrop Manning. 2 In 1843, a second school was built in the center of the village on a small lot just east of the Berkeley Hotel deeded to the town of Harrietstown by Pliny Miller. In 1854, the school was moved "out toward the Algonquin on Lake Street, where it became generally known as the school-house on the hill." In 1870, "the two school districts were consolidated and the school 'on the hill' was moved back to the center of the village again." 3
Van Buren Miller was an advocate of higher salaries for teachers, and he "secured the passage of a law giving the taxes on a large area of wild lands to the school district, and then merged the two existing districts into one. [...] The outcome was the building, in 1870, of a new school-house opposite the Berkeley." 4 Annie O. Miller taught for many years in the Main Street School. This new school consolidated the two earlier schools. It soon proved inadequate— the old school building was moved to Academy Street, and used for a while in conjunction with the new building, which required constant enlargement until, in 1910, two new large brick school houses were built at opposite ends of the village. 5
The first private school was opened in 1905 by a Mrs. Decker; two years later, she sold out to Ernest H. Baldwin, the brother of Dr. E. R. Baldwin. The Baldwin School opened in 1908, and in 1909 moved into a new, brick building. 6 This school was primarily attended by the children of doctors and the wealthy. 7
In 1921, the village had three school houses. 9
In 1925, a new school was built on Petrova Avenue at a cost of $650,000. 10
In the early years, all students graduated with the same type of diploma; specialization did not appear until 1925. All students were required to take English and Civics classes. Rural schools in this period were typically one-room affairs covering grades one through eight, after which they attended high school in Saranac Lake, for which they paid tuition. 11
The first parochial school was run in an old farm house near the church in which the Sisters of Mercy lived. St. Bernard's School was built in 1925 to accommodate 300 children as an elementary school, grades one through eight. In 1959, it was changed to grades one through six. In the early 1960s, a small kindergarten was added. 12
The first parochial high school, Pius X, opened in 1959, initially for grades seven through ten; the first class graduated in 1962.
Early Saranac Lake school days
Mrs. Buckingham taught five grades at the Algonquin School
Now that schools are once again in session, perhaps many of our local senior citizens are reminiscing about their own days of many years ago. Some recent letters from William "Ed" Rice, an 82-year-old former resident of Saranac Lake shed some light on a couple of long-gone edifices of education that once served the village.
Ed is a retired school teacher living in Middletown. He retains sharp recollections of his school days.
The old Algonquin School was sandwiched between the Henry Leis home and Mr. Eppie's bar and bowling alley on Algonquin Avenue. It was a small, wood frame building with one classroom and one teacher to handle all of the first five grades. The students faced the entrance door while the teacher's desk was off to one side together with a blackboard and a pot bellied stove.
Out back was a "his" and "her" comfort station of the Chic Sales variety. Mrs. Buckingham was the lone teacher to serve all five grades and maintain discipline. She could not even leave the school at noon, because many students carried their lunches. More astonishing prior to Ed's time, the school had eight grades and still only one teacher!
Upon completion of the 5th grade the students were transferred to the Main Street High School which was located where the Hotel Saranac stands today. Mrs. Danforth was the 6th grade teacher, and Mrs. Starr was junior high principal. Classes began at 8:40 a.m., and the noon break was from 12 to 1:15 p.m. All students had to go home for lunch, which, in Ed's case, meant a mile-and-a-half trip to reach 205 Lake Street. Others who lived near him were Henry Leis, Joe Thompson and George and Herb Clark. Ed wrote that "we kept a fast pace."
There was no transportation system, and the winter snows were often deep, yet school was never closed because of weather. Lake Street and Algonquin Avenue students used the old wooden foot bridge as a shortcut to Main Street, while a single horse-drawn snow plow attempted to clear the village streets.
An unusual event took place in study hall when Ed reached high school. Some junior boys had swiped some senior class ribbons, and the senior boys were determined to recover them. A fight broke out, and the principal, a Mr. Strickland, ordered the rivals to cease and return to their seats. They failed to obey. Strickland took off his glasses, approached the battle zone and once again called for a cessation to the hostilities. The fighting continued. Strickland returned to his desk, put on his glasses and walked out of the study hall. He left the school and never came back. Mrs. Eileen Benham was appointed to fill the vacancy, and she had no problem in maintaining discipline.
Ed graduated in the class of 1924, which was the last class to graduate from the old Main Street High School. Mrs. Benham went on to serve as principal in the new Petrova School. Many, can remember her driving an air-cooled Franklin car from her home on Pine Street. Ed spent the summer as a bellhop at Knollwood Club and, after stints at George L. Starks and Walton & Tousley hardware stores, he went on to Oswego, where he earned his teaching degree.
Howard V. Littell held the office of superintendent of schools at both the old and new schools except for the time he served in the Army during World War I. He was a stern disciplinarian and had the habit of dropping in on a class without any warning. Most students cringed, hoping that they would not be called on to answer during his visit. Whenever a teacher couldn't handle a "wise guy" the miscreant wound up cooling his heels outside of Littell's office. After a brief seminar in the inner sanctum a subdued student returned to his class. Needless to say, H.V. Littell was greatly respected by both students and faculty. Many of us had a favorite teacher, somewhere along the line, who helped us over the hurdles while some other teachers are remembered for their oppressive attitude. For sheer longevity of dedicated service it would be hard to beat "Me" Benham and "Maggie" Seymour, who not only taught us but also our mothers and fathers, our aunts and uncles for two generations.
The high school which Ed Rice attended on Main Street was not the original school on that site. As early as 1870, a smaller school was built there but an increasing number of students soon out-grew the building's capacity. The structure was moved one block to the rear on a side street, which of course took the name of Academy Street. In September of 1890, President Benjamin Harrison came to Saranac Lake to dedicate the new High School. Twenty years later two new brick grade schools had been built, one on River Street and one on Upper Broadway.
In 1922 St. Bernard's Parochial School came into being on River Street. In addition to these, a small private school known as the Baldwin School on Pine Street was operated by Dr. E. R. Baldwin's brother in the house at 34 Pine St., presently occupied by the Robert Hagar family.
Well beyond the limits of our personal memories, we must rely on "Donaldson's History" to inform us that the first school to be built in what was to become Saranac Lake was located in the pines at the end of River Street in 1838. Here Mary Miller, a granddaughter of early settler Capt. Pliny Miller, taught a handful of children.
Although the Broadway School has completely vanished from the scene, the River Street School has survived to become an extension of the North Country Community College campus. Also on River Street, the original 1922 wood frame schoolhouse was replaced with a modern brick building in 1924 at St. Bernard's, and a second brick structure has since been added to handle the student overflow.
The former Petrova High School was converted to an elementary facility to serve the needs of the ever-increasing number of grade schoolers, while nearby a brand new high school has risen from a marshland.
Perhaps the most fitting of all these changes, however, has to be the resurrection of an educational institution on the same site that was once occupied by the old Main Street High School. Presently, the Hotel Saranac serves as a training center for students of Paul Smith's College while next door on Church Street, a brand new dorm nears completion to house members of this college complex.
Saranac Lake can well be proud of its education history. Here we are a century and a half after that little schoolhouse in the pines, and we are still growing. What do you suppose Ed Rice would think about all of this?
Malone Palladium, January 25, 1872
Saranac Lake Grade School.
It may be observed that this School is in session during nearly the whole of the colder part of the year, thus enabling students employed during the summer season to avail themselves of two terms each year. Our first winter term closed Jan. 17th, 1872. The succeeding term will commence Jan. 31, and continue fourteen weeks. The marked success which has attended this School of late may be greatly attributed to the interest taken in its welfare on the part of parents and citizens of Saranac Lake and vicinity. The people of Saranac should be highly commended for their worthy example in this respect. Students from abroad, anxious for improvement, will be welcomed among our number, and will meet here with a congenial class of students, who by their close application and constant effort have won for themselves high place in the opinion of their teachers and observing friends.
Tuition and board at very reasonable rates.
For particulars address ENSINE MILLER, Saranac Lake, N. Y
Franklin Gazette, April 14, 1893
The students of the academy and grammar departments of the Saranac Lake Union School have issued the first number of The Mountaineer, a monthly publication which will be continued through the school year. It is filled with original matter entertainingly written, under the management of a corps of student editors, who have shown excellent taste and judgment in their work. Francis H. Slater is editor-in-chief; Nathan M. Skelly, business manager; Blanche M. Baker, treasurer; Nellie M. McNulty, secretary; Fannie Taylor, Bessie Hale, Bertha R. Baker, Hattie Bryant and Mina H. Woodruff complete the editorial staff. The object of The Mountaineer is to furnish Information relative to Saranac Lake Academy, to give Its students an opportunity for practice and experience in writing and to encourage a wider knowledge of the subjects taught by the school. Saranac Lake, surrounded as it is by the varied beauties of the Adirondacks, furnishes a fertile and interesting field for the students who will contribute to the pages of The Mountaineer, and we notice that several of the contributory in the first number have availed themselves of the abundant material which nature has spread so lavishly about them. School publications of this kind should always be heartily encouraged and we hope that the students of Saranac Lake Academy will continue in the work which has certainly been well commenced. We should like to see Franklin Academy follow In the same line.
Malone Palladium, March 15, 1894
Principal Goddard of Saranac Lake academy has introduced the trial by jury scheme into his school with great success. Parents and guardians have made many complaints because their children were punished, while other children were the ones in fault. This worried the professor, and he determined that when a serious breach of discipline occurred a jury of twelve boys and girls should hear all the evidence in the case and decide upon the kind and amount of punishment. Majority rules, and when a tie occurs the professor votes. Chateaygay Record
Malone Palladium, April 12, 1894
RALPH BAKER has resigned his position as principal of the intermediate department of the Saranac Lake union school. He will enter Union College in September.
Malone Palladium, January 25, 1894
The union school at Saranac Lake has been admitted to supervision by the regents of the University of New York.
Malone Gazette, July 5, 1894
Miss CHARLOTTE C. MERRILL, who graduated from the normal school on Tuesday, was on Wednesday appointed as a teacher in the Saranac Lake union school. Her salary will be $400...—Telegram.
Malone Palladium, June 26, 1902
The sixth annual commencement of the Saranac Lake High School occurred last Thursday evening. Following are the members of the class: Maud Jackson, Mary Liscomb, Eleanor McMaster, Raymond McManus and Carroll Ferry.
Malone Palladium, May 21, 1903
A special school meeting if to be held at Saranac Lake on Monday, June 8th, to vote on the question of raising $10,000 for the purpose of erecting an addition to the school building, which has been found to be too small for the present needs of the village. The number of students is constantly increasing, there being at present 720 scholars enrolled.
Malone Palladium, August 8, 1903
The contract for the new addition to the school building was let Saturday night, by the School Board, to Branch & Callanan for $9,985. This includes the foundation and framework. The building will be brick veneer and the work commenced Tuesday morning.—Saranac Lake Enterprise.
Malone Palladium, July 20, 1905
Uniform examinations for teachers of the first commissioner district of Franklin county for uniform, elementary and academic certificates will beheld at the Saranac Lake High School on Aug. 10-11. All teachers holding temporary licenses and desiring to teach in the future are required to attend these examinations. Teachers will furnish themselves with pen and ink, compasses and rules for drawing. Uniform paper must be used, and may be purchased of the commissioner. The examinations will be held by School Commissioner ADDIS K. BOTSFORD, of the first district.
Malone Palladium, August 10, 1905
Malone Palladium, August, 1906
At the annual village school meeting at Saranac Lake, held last week, W. E. Trombley was elected to succeed himself as trustee for a term of three years, and Dr. J. C. Russell, a well known physician of that village, was elected as trustee for two years, to succeed Tuffield Latour, whose term had expired.
Malone Palladium, September 27, 1906
The recent school census of the village of Saranac Lake shows the number of boys to be 385 and the number of girls 440.
Malone Palladium, April, 1908
Prof. I. M. Gast, of Fairport, Monroe County, has been engaged as principal of the Saranac Lake school for the balance of the school year. He entered upon his duties last Monday.
- 1Seaver, Frederick J., Historical Sketches of Franklin County, Albany, NY: J. B. Lyon Co., 1918
- 2Donaldson, Alfred L. A History of the Adirondacks, New York: The Century Co., 1921, pp. 238, 269. (reprinted by Purple Mountain Press, Fleischmanns, NY, 1992)
- 3Donaldson, Alfred L. A History of the Adirondacks, New York: The Century Co., 1921, p. 238. (reprinted by Purple Mountain Press, Fleischmanns, NY, 1992)
- 4Donaldson, Alfred L. A History of the Adirondacks, New York: The Century Co., 1921, p. 220. (reprinted by Purple Mountain Press, Fleischmanns, NY, 1992)
- 6ibid., p. 238
- 7Duquette, Ruth, "Saranac Lake Schools", unpublished manuscript D946, Adirondack Research Room, Saranac Lake Free Library
- 8Duquette, Ruth, "Saranac Lake Schools", unpublished manuscript D946, Adirondack Research Room, Saranac Lake Free Library
- 9ibid., p. 235
- 10Duquette, Ruth, "Saranac Lake Schools", unpublished manuscript D946, Adirondack Research Room, Saranac Lake Free Library
- 11Duquette, Ruth, "Saranac Lake Schools", unpublished manuscript D946, Adirondack Research Room, Saranac Lake Free Library
- 12Duquette, Ruth, "Saranac Lake Schools", unpublished manuscript D946, Adirondack Research Room, Saranac Lake Free Library | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text provided is purely historical and educational in nature, detailing the history of schools in Saranac Lake. It contains no unsafe content, inappropriate language, or themes that would make it unsuitable for public use or educational environments.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text provided is a historical account of the educational system in Saranac Lake, detailing the evolution of schools and the teachers who served. It does not contain any unsafe or inappropriate content, offensive language, or references to illegal activities. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a historical account of the educational institutions in Saranac Lake, New York. It discusses the evolution of schools, student publications, and educational practices without any unsafe or inappropriate content. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"historical and educational content\", \"score\": 0}\n```\n\nThe text provided is a series of historical and educational records from the early 20th century, detailing appointments, school events, and administrative matters. There is no unsafe content, inappropriate language, or themes that would warrant a score higher than 0.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text sample is a series of bibliographic references and citations. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and does not require any safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "744-0",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "744-1",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "744-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "744-3",
"llm_safety_score": 0,
"reason": "historical and educational content"
},
{
"custom_id": "744-4",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://hsl.wikispot.org/Saranac_Lake_Schools",
"date": "2013-05-22T00:15:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9791939259,
"token_count": 3837,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:78edd8b1-4289-44dc-bb51-eccb26bcc67b> | Canopied chairs carry a sense of drama and ceremony fit for a monarch. Kelly Wearstler, glam queen, loves to use them in restaurants, to add a touch of romance (images 1 & 2). So it surprised me to discover that historically, they were used as chairs for hall porters to sit in while they kept watch at the doors of grand homes and palaces — like very well-appointed bouncers!
Porter's chairs originated in 16th-century France, where they were often made of cane or wicker, and were known as "guérites" (French for "sentry") with high backs and sides. These chairs were commonly used for invalids and the elderly to protect them from draughts (images 3 & 4), though the association of the form with the word for "sentry" suggests that their true original purpose was for hall porters.
An essential position in the homes of the well-to-do, the hall porter was the gatekeeper, admitting or refusing callers based on his memory for faces and names of his employer's acquaintances, his knowledge of the acceptable members of high society, and even on his learned understanding of class attributes and distinctions. In an 1857 book, The Household Manager, Charles Pierce writes of the hall porter:
"If his master be a rich man, and a charitable one, that master is being for ever applied to by the distressed, the needy, and the impostor … Hence is called into exercise the necessity for the porter's searching and discriminative eye, and his scrupulous pause before receiving a letter or answering an inquiry."
Entrusted with such a crucial role in the security and well-being of the people he served, the hall porter was expected to maintain his post at all times, even sleeping in his chair after dark, and occasionally taking meals there, as well. Some porter's chairs were equipped with drawers under the seat where supplies could be kept, or where hot coals could be placed keep them warm (they were often stationed in chilly, damp entrance halls). The chairs occasionally had a hinged shelf that could be propped up at night to hold a lantern (you might be able to make one out on the right side of the chair in image 5).
Many porter's chairs were hooded, or at least were ample, with high sides, in order to protect him from draughts (images 5-9). The hooded chairs were also thought to be acoustically helpful, so as to help the porter be as vigilant as possible.
Hall porter's chairs were already considered old-fashioned by the mid-19th century, and they became obsolete in the early 20th century, thanks mostly to the rise of the latch key as the preferred security measure of countless homeowners. Presumably, advances in interior climate control and of course the dwindling number of households full of servants contributed to the chair's demise, as well.
Hooded wicker chairs were also an appropriate form of sun and wind protection out of doors. Scheveningen Beach, outside the Hague, was famous for its canopied beach chairs (image 10) until the 1970s. Apparently, some German beaches still feature chairs like these (image 11) — a cozy option on a windy day.
You can find more traditional porter's chairs at antique sales, or buy them new from places like Restoration Hardware (image 12) and Jayson Home & Garden (image 13), or even updated in a sleek, modern idiom by Hayon Studio (image 14).
Source: Charles Pierce, The Household Manager. London: Routledge & Co., 1857. Via Google Books.
Images: 1 & 2 Images from the Kelly Wearstler-designed BG restaurant at Bergdorf Goodman, featuring updated porter's chairs, via Kelly Wearstler; 3 Jacob Jordaens, The Satyr and the Peasant, Flemish, ca. 1620-21, via Wikipedia; 4 Jacob Jordaens, As the Old Sang, so the Young Pipe, Flemish, ca. 1638-40, via Wikipedia; 5 Antique porter's chair from Aston Hall, a 17th-century mansion in England; 6 Pair of vintage caned porter's chairs sold at Pieces, an Atlanta furniture store, via Have Degree Will Travel; 7 An English Regency (early 19th c.) hall porter's chair sold by Christie's in 1999 for $5737; 8 A hall porter's chair from the early 20th century, sold by Christie's in 2009 for $4362; 9 Pair of 20th-century wicker hall porter's chairs from the Breakers, Newport, Rhode Island, via Meghan Mary Morrow; 10 1906 image from Scheveningen Beach, near the Hague, via Happy Hotelier; 11 Contemporary wicker beach chair, via Chair Blog; 12 Porter's chair at Restoration Hardware; 13 Porter's chair from Jayson Home & Garden; 14 Updated porter's chair form by Hayon Studio. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context without explicit unsafe content\", \"score\": 0}\n```\n\nThe text discusses the historical context and usage of porter's chairs without any unsafe or inappropriate content. It is fully appropriate for all audiences and does not contain any offensive language or themes.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a list of descriptions and images related to various porter's chairs from different time periods and locations. There is no unsafe, inappropriate, or offensive content in the text. It is fully appropriate for all audiences and does not contain any language, themes, or references that would be considered unsafe or inappropriate."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "745-0",
"llm_safety_score": 0,
"reason": "historical context without explicit unsafe content"
},
{
"custom_id": "745-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.apartmenttherapy.com/canopy-chairs-or-porters-chair-112117",
"date": "2013-05-22T00:09:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9687764049,
"token_count": 1041,
"score": 2.53125,
"int_score": 3
} |
<urn:uuid:b1bb3986-50b0-4fd9-be5a-58402a9b88ec> | The Republican Party was first symbolized as an elephant in a cartoon drawn by Thomas Nast in Harper's Weekly magazine.
Jeannette Rankin of Montana became the first woman elected to Congress.
Vladimir Lenin's forces overthrew Alexander Kerensky's government in Russia's Bolshevik Revolution.
President Franklin D. Roosevelt won a fourth term in office, defeating Thomas E. Dewey.
Former first lady Eleanor Roosevelt died in New York City at age 78.
Carl Stokes of Cleveland became the first African American mayor of a major U.S. city.
L. Douglas Wilder was elected governor of Virginia. He became the nation's first elected black governor.
The U.S. went to the polls to choose between George W. Bush and Al Gore. The outcome wouldn't be known for more than a month because of disputed votes in Florida.
24 X 7
||24 x 7 Tutor Availability
||Unlimited Online Tutoring | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a historical summary of events and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not require any further review or filtering."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "746-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.infoplease.com/dayinhistory/November-7",
"date": "2013-05-22T00:24:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9553144574,
"token_count": 198,
"score": 3.109375,
"int_score": 3
} |
<urn:uuid:feed6ceb-cdf5-4599-b7b6-c951b68db932> | Mexico's southern state of Quintana Roo is often perceived by archaeologists as a blank spot on the map of the Maya world, a region generally assumed to hold little of interest thanks to its relative
isolation from the rest of Mexico. But salvage archaeology required by recent development along the "Maya Riviera," along with a suite of other ongoing and recent research projects, have shown that
the region was critical in connecting coastal and inland zones, and it is now viewed as an important area in its own right from Preclassic through post-contact times.
It is an important touchstone for Maya and Mesoamerican archaeologists, demonstrating the shifting web of connections between Quintana Roo sites and their neighbors
The first volume
devoted to the archaeology of Quintana Roo, this book reveals a long tradition of exploration and discovery in the region and an increasingly rich recent history of study. Covering a time span from
the Formative period through the early twentieth century, it offers a sampling of recent and ongoing research by Mexican, North American, and European archaeologists.
Each of the
chapters helps to integrate sites within and beyond the borders of the modern state, inviting readers to consider Quintana Roo as part of an interacting Maya world whose boundaries were entirely
different from today's. In taking in the range of the region, the authors consider studies in the northern part of the state resulting from modern development around Cancún; the mid-state sites of
Muyil and Yo'okop, both of which witnessed continual occupations from the Middle Preclassic through the Postclassic; and new data from such southern sites as Cerros, Lagartera, and Chichmuul.
The contributions consider such subjects as ceramic controversies, settlement shifts, site planning strategies, epigraphic and iconographic materials, the impact of recent coastal
development, and the interplay between ancient, historic, and modern use of the region. Many of the chapters confirm the region as a cultural corridor between Cobá and the southern lowland centers
and address demographic shifts of the Terminal Classic through Postclassic periods, while others help elucidate some of Peter Harrison's Uaymil Survey work of the 1970s.
Archaeology unfolds a rich archaeological record spanning 2,500 years, depicting the depth and breadth of modern archaeological studies within the state. It is an important touchstone for Maya and
Mesoamerican archaeologists, demonstrating the shifting web of connections between Quintanarooense sites and their neighbors, and confirming the need to integrate this region into a broader
understanding of the ancient Maya. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is an academic and historical description of archaeological research in Quintana Roo, Mexico. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "747-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.uapress.arizona.edu/Books/bid1635.htm",
"date": "2013-05-22T00:08:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.935195446,
"token_count": 531,
"score": 3.0625,
"int_score": 3
} |
<urn:uuid:f36b928f-547e-4354-a8c7-642f243712e5> | Philadelphia, Pa--A study conducted by researchers at The Children's Hospital of Philadelphia has demonstrated that computer crash simulation software can successfully predict the likelihood and severity of injuries to children from airbag activation. Flaura Koplin Winston, M.D., Ph.D., Kristy Arbogast, Ph.D., and Rajiv Menon, Ph.D., co- authors of a study appearing in the March 15 issue of Archives of Pediatrics and Adolescent Medicine, used standard, validated crash simulation software, to evaluate the effect of front passenger airbags on child passengers- seated in the front seat -in crashes of high and low severity. Both restrained and unrestrained children were simulated and the results were compared to children seated in the rear seat. For front seat passengers, the results confirmed previously identified risks of airbags to unrestrained children and demonstrated a substantial risk to restrained children.
"This software is very exciting. Along with determining the likelihood of injuries, the computer models allowed us to efficiently test the effects of changes in characteristics of the crash such as whether or not the child was wearing a seat belt, their exact seating position or head rotation. Our modeling provides compelling scientific evidence that airbags, in their current design, are not beneficial to restrained children," said Dr. Winston.
The computer models tested the effect of airbag activation for a 6-year old child both restrained and unrestrained. The results were then compared to those for an adult occupant in similar crash scenarios. For the unrestrained child passenger, crash simulations predicted serious head, neck and chest injuries with airbag activation, regardless of the severity of the crash. For the restrained child passenger, crash simulations predicted similar severe injuries for high-severity crashes only. No serious injures were predicted for an unrestrained adult male exposed to an airbag or for child pas
Contact: Maria Stearns
Children's Hospital of Philadelphia | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a scientific study report from The Children's Hospital of Philadelphia. It discusses the results of a study on the effects of airbags on child passengers in car crashes. The content is entirely educational and does not contain any unsafe, inappropriate, or harmful elements. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "748-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://news.bio-medicine.org/medicine-news-2/Computer-crash-simulations-accurately-predict-injuries-to-children-in-auto-crashes--say-researchers-at-The-Childrens-Hospital-of-Philadelphia-9914-1/",
"date": "2013-05-24T08:50:52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9483591914,
"token_count": 383,
"score": 2.546875,
"int_score": 3
} |
<urn:uuid:41bfacb1-ecb4-4131-903e-bfaa99b4194e> | Is there any common english answer explaining how various
anticoagulants work? EDTA,Sodium Fluroide,Sodium Heparin, Lithium
Heparin, Potassium Oxalate.
I am having mid-terms next week and I really have not grasped the concept
yet. All I understand is that they prevent the clotting of blood. That is
not good enough!
Blood clotting is actually a very complicated process. There are two
pathways-the intrinsic system and the extrinsic system and there are 12 steps
in the pathway for a blood clot to form. If you think about it, you don't
want blood clots to form unless you really need them, so there are many steps
which must be completed. When you first get an injury, the cells lining the
capillaries are damaged and they release a chemical which attracts platelets
to the area. The platelets are cells which stick together and form a
temporary plug until a clot can be made. Then platelets release a factor
which starts the clotting process on its way. Each step must happen in the
right order for a clot to be finally formed. Also, some of the steps require
chemicals such as calcium. So.... anticoagulants interrupt the process
somewhere along the way. EDTA, sodium citrate and potassium oxalate for
instance remove calcium from the blood. Heparin interrupts the last few
steps of the process preventing thrombin from becoming fibrin. Diseases like
Hemophilia are caused by lack of certain factors needed in steps along the
way-ie. hemophilia is a lack of factor VIII (not actually the 8th step, they
were named in the order they were discovered!) Hope this helps.
Hi Pat! Yes they are substances that prevent blood
clotting and so they are called anti-coagulants.
Blood coagulation is a very complex phenomena and
it is not easy to explain it without the use of
some biological terms.
The anti-coagulation action is one that cuts
of difficult that process at some of its stages.
Let's see if telling you quite simply the
coagulation process will let you undestand
the anti-coagulation one.
When a blood vessel is broken, blood escapes as
long as the flesh wound still is open, and the
pressure within the vessel exceeds the outside
one.Pressure can be equalized by different factors.
Anyway usually shed blood clots quickly.
Coagulation is a change that is studied by many
scientists with different theories.
The clotting of blood is due to the sudden appearance
of fibres that entangle the blood cells.
During the very complex process, it occours
the formation of a polymerized protein called fibrin
from another protein, the fibrinogen.
Fibrinogen is produced by the liver and is converted
to fibrin by the way of thrombin.
Thrombin does not exist in the normal circulation
but is generated from a precursor, the prothrombin.
Now prothrombin is a rather stable protein formed in
the liver by a process requiring vitamin K,
and any deficiency of this vitamin depress the
production of prothrombin and also of other
Anyway if intravascular blood clotting is not
prevented immediate death happens as the
result. So there are natural inhibitory systems
that destroy every activated clotting factor
within a few seconds in the bloodstream.Their
action, natural or induced (by drugs), correspond
to the inhibition of the clot formation mentioned
above.Six different factors inhibit thrombin
formation. This action is greatly enhanced by
heparin, a substance formed by connective
In a simple way we can say that the anticoagulant
effect of any drug is to disturb the coagulation
process.This can be done at different stages
during that complicated process, acting
differently upon the place and stage.
Hope that helps you, and thanks for
(Dr) Mabel Rodrigues
Click here to return to the Biology Archives
Update: June 2012 | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text is purely educational and informative, explaining the process of blood clotting and the function of anticoagulants. It does not contain any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "750-0",
"llm_safety_score": 0,
"reason": "educational content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.newton.dep.anl.gov/askasci/bio99/bio99813.htm",
"date": "2013-05-24T08:50:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9275517464,
"token_count": 888,
"score": 3.484375,
"int_score": 3
} |
<urn:uuid:721c4d92-8364-4209-8e00-d4de90998160> | Knowledge of bat roosting and foraging requirements is essential to development of forestry practices that promote conservation of bats in our national forests. Yet the needs of several western species remain a mystery. From June 16 to July 24, 1993, seven BCI members will have the opportunity to participate in a major project to radio-track some of America's least-known bats to their roosting and feeding sites. This is a cooperative project jointly sponsored by BCI, the Coconino National Forest, and the Arizona Game and Fish Department.
Participants must be in excellent physical condition, willing to work either day or night, and able to hike long distances in difficult terrain. Bats will be radio-tracked to roosts, and their behavior will be observed using night-vision equipment. The work area is in beautiful forest at elevations of 6,000 to 9,000 feet above Flagstaff, Arizona.
Volunteers must be available for at least three weeks, preferably six, to be considered. For details, write to Janet Debelak at BCI. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on a scientific and conservation project related to bat research. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and beneficial for promoting conservation efforts."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "751-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://batcon.org/index.php/media-and-info/bats-archives.html?task=viewArticle&magArticleID=572",
"date": "2013-06-18T22:24:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9463204145,
"token_count": 220,
"score": 3.203125,
"int_score": 3
} |
<urn:uuid:36ecb913-5153-4155-8a44-356df23d6ed2> | This Date In History: Israel’s First Orchestra Inaugurated In 1936
Over a decade before the State of Israel declared independence, it was inaugurated. On December 26th, 1936, the Palestine Symphony Orchestra (now called the Israel Philharmonic Orchestra) played its first note, and with it, ushered in a new era for the Jewish people, and marked the start of their amazing impact on the world’s music stage.
Formed earlier that year by Polish violinist Bronislaw Huberman, the recruitment process for the Orchestra carried with it enormous consequences. During the rise of Nazi Germany, and throughout Europe, where Jewish musicians were being persecuted, Huberman made it his personal mission to form the Palestine Symphony Orchestra by rescuing Europe’s Jewry. “With Hitler firing the best musicians in Europe,” Huberman said, “it suddenly became clear to me that this was an extraordinary opportunity to give this wonderful audience in Palestine a first-class orchestra.” The Orchestra served not just to employ 75 musicians, but brought to the land of Israel almost 1000 members of their family, sparing them from the Holocaust, and saving countless future generations. For this reason, Huberman has been called the “Jewish Schindler.”
Huberman was an enormously talented violinist. A child prodigy, he performed at Carnegie Hall at just 12 years old in 1896. Following his first visit to Israel in 1929, where he was enthusiastically received, he later helped organize the American Association of Friends of the Palestine Orchestra, with none other than Albert Einstein as its chair.
On this date, in the city of Tel Aviv, itself only a few decades old, the Palestine Symphony Orchestra played it inaugural concert, led by famed Italian conductor Arturo Toscanini. It was fitting that Toscanini lead the orchestra of Jewish exiles, as he himself had left his native country in protest of the harsh of Mussolini.
In attendance on opening night were the “who’s who” of both the British mandate in Palestine and the founding fathers of Israel, including the British High Commissioner, Sir Arthur Wauchope, and Chaim Weizmann, then head of the Jewish Agency and would later become Israel’s first President. The Palestine Symphony Orchestra opened with the British national anthem before playing the Hatikvah, the unofficial national anthem for the Jewish state that was once banned from being publicly performed by the British government.
The inaugural performance included such classics as the opera “La Scala di seta” by Gioachino Rossini, and work from Franz Schubert, Johannes Brahms and Carl Maria von Weber.
Wrote TIME magazine in the January 4th, 1937 issue, “Arturo Toscanini was proving again his art, and allaying the fears of those who had heard the orchestra rehearse. A week prior it had been ragged, particularly in winds & strings. But the great master made the Brahms Second come out so clear and controlled. Schubert’s Unfinished Symphony sing with such freshness that the audience could forget the flocks of frightened sparrows which swooped and twittered above their heads. There was no raggedness when, partly as a taunt to Nazi Germany, he led them through a scherzo by Jewish Felix Mendelssohn.”
Following the founding of the State of Israel in 1948, the orchestra was renamed the Israel Philharmonic Orchestra. Over the last seven decades, it has been one of Israel’s greatest cultural exports, being led for much of its history by Indian-born composer Zubin Mehta, who was made Music Director for Life in 1981.
To learn more about the amazing story behind the founding of the Palestine Symphony Orchestra, check out the new documentary Orchestra of Exiles, by Academy Award nominated director Josh Aronson (click here to find screenings near you). | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides historical information about the Palestine Symphony Orchestra and its significance in the context of Jewish history and culture. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and historical in nature, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "752-0",
"llm_safety_score": 0,
"reason": "historical context"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.isrealli.org/this-date-in-history-israels-first-orchestra-inaugurated-in-1936/",
"date": "2013-06-18T22:45:04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9721221924,
"token_count": 807,
"score": 3.578125,
"int_score": 4
} |
<urn:uuid:d13aacd6-3fe5-43aa-9d82-af07a3ec9853> | Reading Guide for Week Seven
Text: Divine, Chapters 7 and 8: 2/29/00
Special Topics: Origins of Political Parties
Was the American Revolution Radical?
Answer one of the following text questions:
Answer at least two of the following primary source
How did Jefferson's and Hamilton's views on human
nature and beliefs about individual freedom differ and what was the significance
of these differences for government policy in the 1790s?
What role did England and France play in American
domestic politics and foreign policy in the 1790s? In the early 1800s?
Did U.S. diplomacy succeed or fail at this time?
What was the role of technology in the new republic?
Did it have implications for American freedom?
What was the role of the Supreme Court in the
new republic? What impact did it have on relations between the federal
government and the states? The different branches of government?
Washington's Farewell Address, September 17, 1796
Primary Source Questions:
What advice did George Washington give his fellow
Americans about the role of the federal government in American life?
What advice did he give them about politics?
About foreign relations?
What is the paradox he perceived in the relationship
between government and liberty?
Do you think this address was a statement of political
principles or partisan preferences? Why? | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe provided text is a reading guide for a history course and does not contain any unsafe or inappropriate content. It focuses on historical topics and does not include any harmful language, themes, or advice."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "754-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://historians.org/teaching/AAHE/H67/WeekSeven.htm",
"date": "2013-05-19T10:25:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9552702904,
"token_count": 283,
"score": 4.03125,
"int_score": 4
} |
<urn:uuid:8a54dd81-9c3c-4b6e-a129-8fb0e6fd6e37> | Science Fair Project Encyclopedia
Frank Owen Gehry (born Ephraim Goldberg on February 28, 1929) is an architect known for his interesting use of metal sheathing for his buildings. He was born in Toronto, Canada, but moved to California at age 17 where he graduated from the University of Southern California School of Architecture. He is today a naturalized American citizen and lives in Los Angeles. He is best known for building curvaceous structures, often covered with reflective metal. His most famous work, and the clearest expression of his style, is the Guggenheim Museum in Bilbao, Spain, which is covered in titanium.
Gehry's style is derived from late modernism. The tortured, warped forms of his structures are considered expressions of the deconstructivist (DeCon) school of modernist architecture. The DeCon movement departs from modernism in its de-emphasis of societal goals and functional necessity. Unlike early modernist structures, DeCon structures are not required to reflect specific social ideas (e.g. speed, universality of form), and they do not reflect a belief that form follows function. DeCon, which Gehry has continued to refine, is also known as the Santa Monica school of architecture. This region of the United States has produced the greatest range of experimentation in the field of DeCon design and contains the largest concentration of the structures.
Gehry is considered a modern architectural icon and celebrity. He has appeared in Apple's black and white "Think Different" pictorial ad campaign that associates offbeat but revered figures with Apple's design philosophy. His buildings, including his private residence, have become tourist attractions. Many museums, firms, and cities seek Gehry's services as a badge of distinction, regardless of the product he delivers.
Seattle's EMP music museum represents this phenomenon at its most extreme. Microsoft's Paul Allen chose Gehry as the architect of an urban structure to house his public collection of music history artifacts. Gehry, on the strength of his celebrity status, was selected to design the building. While the result was undeniably unique, critical reaction came in the form of withering attacks. The bizzare color choices, the total disregard for architectural harmony with the built and natural surroundings, and the mammoth scale led to accusations that Gehry had simply "got it wrong." Admirers of the building remind critics that similar attacks were levelled against the Eiffel Tower in the late 19th century, and that only historical perspective would allow a fair evaluation of the building's merits.
Recently, Gehry has appeared to repeat himself. The disjointed metal panoply that has become Gehry's trademark may be on the verge of over-exposure. Almost all of his recent work seems derivative of his landmark Bilbao Guggenheim. His critics and admirers alike are watching with anticipation to see whether Gehry is able produce equally compelling forms in a different idiom.
- Exhibit Center , Merriweather Post Pavilion, and Rouse Company Headquarters, Columbia, Maryland, USA (1974)
- Loyola Law School, Los Angeles, California, USA (various buildings, 1978-2002)
- Santa Monica Place , Santa Monica, California, USA (1980)
- Edgemar Retail Complex , Santa Monica, California, USA (1984)
- Chiat/Day Building , Venice, California, USA (1985-1991)
- Frederick Weisman Museum of Art, University of Minnesota, Minneapolis, Minnesota, USA (1990)
- Center for the Visual Arts, University of Toledo, Toledo, Ohio, USA (1993)
- American Center , Paris, France (1994)
- Fred and Ginger (officially Rasin Building ), Prague, Czech Republic (1995)
- Guggenheim Museum Bilbao, Bilbao, Spain (1997)
- Der Neue Zollhof, Düsseldorf, Germany (1999)
- Vontz Center for Molecular Studies, University of Cincinnati, Cincinnati, Ohio, USA (1999)
- DG Bank building, Pariser Platz 3 , Berlin, Germany (2000)
- Experience Music Project, Seattle, Washington, USA (2000)
- Gehry Tower, Hanover, Germany (2001)
- Peter B. Lewis Building, Weatherhead School of Management , Case Western Reserve University, Cleveland, Ohio, USA (2002)
- Richard B. Fisher Center for the Performing Arts, Bard College, Annandale-on-Hudson, New York , USA (2003)
- Maggie's centre, Dundee, Scotland (2003)
- Walt Disney Concert Hall, Los Angeles, California, USA (2003)
- Art Gallery of Ontario renovation, Toronto, Ontario, Canada (2004)
- Ray and Maria Stata Center, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA (2004)
- Pritzker Pavilion, Millennium Park, Chicago, Illinois, USA (2004)
- Museum of Tolerance, Jerusalem, Israel (expected completion in 2008)
- New wing for Corcoran Museum of Art, Washington, DC, USA (construction begins in 2006)
- Science library, Princeton University
- Ohr-O'Keefe Museum, Biloxi, Mississippi, USA (open 2005; all buildings expected to be complete by 2007)
- Arnold W. Brunner Memorial Prize in Architecture, American Academy of Arts and Letters (1977)
- Pritzker Architecture Prize (1989)
- Wolf Prize in Art (Architecture), Wolf Foundation (1992)
- Praemium Imperiale Award for Architecture, Japan Art Association (1992)
- Dorothy and Lillian Gish Award (1994)
- National Medal of Arts (1998)
- Friedrich Kiesler Prize (1998)
- Gold Medal, American Institute of Architects (AIA) (1999)
- Gold Medal, Royal Institute of British Architects (RIBA) (2000)
- Gold Medal for Architecture, American Academy of Arts and Letters (2002)
- Companion of the Order of Canada (2002)
- Gehry's company website
- Pritzker Prize page on Gehry
- Collection of links to articles and picture collections about Gehry.
The contents of this article is licensed from www.wikipedia.org under the GNU Free Documentation License. Click here to see the transparent copy and copyright details | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a factual and educational description of Frank Gehry and his architectural style. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to architecture and art, which are suitable for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a list of buildings designed by Frank Gehry and his awards. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and does not require any safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "755-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "755-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.all-science-fair-projects.com/science_fair_projects_encyclopedia/Frank_Gehry",
"date": "2013-05-19T09:47:26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9179216623,
"token_count": 1331,
"score": 3.375,
"int_score": 3
} |
<urn:uuid:a191eed2-5add-4c00-b97b-c6ce7cbc2bf0> | By at least fourth grade, most schools offer some form of computer use. In private schools, this may happen earlier. To some degree, the amount of training may depend on the funds available for equipment. When terminals are available for everyone, there's no waiting for a turn. The content of computer classes can vary widely, from learning to point, click and type, to studying programming languages like LOGO. Most, however, emphasize using the computer as a tool. During fourth or fifth grade, children may start using junior word-processing programs to write reports. They might be shown how to find research information on the Internet. They'll be taught how to save, print and correct their work. In other cases, the computer is used for drills in subjects like math and spelling. This is done through special software or games, which many children find less judgmental than regular quizzes. Or, children may be given open-ended programs, that let them experiment with drawing and music. But beyond the curriculum, it's important that children simply become acquainted with computers, so they'll be comfortable using them later in life. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text discusses the use of computers in schools and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any offensive language, adult themes, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "756-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.kmtr.com/guides/parenting/curriculum/story/Computer-classes/d4vwsQKjAk6KiO0IGoz6OA.cspx",
"date": "2013-05-19T10:04:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9619137645,
"token_count": 225,
"score": 3.90625,
"int_score": 4
} |
<urn:uuid:11a10506-097b-4f03-9735-47a09b833659> | Time is right for inspecting, pruning bare trees
BY World Special Publications
Wednesday, December 05, 2012
Leaves are now on the ground, but trees still need attention. The dormant season is actually a good time to inspect most non-flowering trees for potential hazards and to prune them accordingly.
Trees are dormant in the winter, making pruning easier because you can better see a tree’s structure when no leaves are on the branches. Without leaves, it is easier to spot dead or broken branches that need to be removed to help avoid breakage from harsh winter weather.
Deciding what to prune and where involves an understanding of basic tree biology, sharp tools, and an artful eye. The International Society of Arboriculture offers practical suggestions for reducing the likelihood your trees will not fall victim to Mother Nature’s unpredictable temperament.
“Recognizing and reducing tree hazards not only increases the safety of your property and that of your neighbors, but also improves the tree’s health and may increase its longevity,” said Jim Skiera, executive director of ISA.
Beware of potential hazards. Being aware of problems before they present themselves could spare you money in repairs. Survey your property for trees that show signs of decay. ISA suggests looking for these signs of instability:
• Cracks in the trunks of major limbs;
• Hollow, aged and decayed trees;
• Conks on trunk or mushrooms at the base of the tree;
• Dead branches;
• Carpenter ants, honey bees, woodpeckers and other animals which live in decayed or hollow trees; and
• One-sided or significantly leaning trees.
Take action to remedy potential targets. Inspect your trees for branches that could cause damage to your property before a storm hits, including:
• Branches that hang over the house, near the roof.
• Branches in close proximity to power lines.
Take precautions to prevent damage. Once problems have been detected, a proactive approach to tackling them is advised:
• Remove dead, diseased or damaged limbs.
• Consider removing trees with large cavities of decay.
• Leaning trees may indicate a root problem so have them inspected.
• Branches too close to your house, a building or the street should be pruned to provide clearance.
• Branches that are too close or touching utility lines need to be pruned or removed. If this work is needed, report it to your local utility company. Do not prune the tree yourself.
Know your tree species. Some species are more inclined to storm damage. An ISA Certified Arborist will have the knowledge necessary to determine which trees have the hardiness needed to withstand harsh weather conditions.
Do not top your trees. Untrained individuals may urge you to cut back all of the branches, on the mistaken assumption that it will help avoid breakage in future storms. However, ISA Certified Arborists warn against the dangers of “topping,” the cutting back of main branches to a predetermined point without regard to the tree’s natural structure. The stubs that remain are not strong enough to grow back as a single, dominant branch. Instead, a flush of regrowth surrounds the stub. Trees that have been topped are also prone to internal decay. While healthy trees are able to seal wounds that careful pruning leaves, topping leaves a tree with many severe wounds that it is unable to properly compartmentalize, resulting in deterioration. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on providing information about tree inspection and pruning during the dormant season. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "757-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.tulsaworld.com/site/printerfriendlystory.aspx?articleid=20121205_484_0_Laeron292479",
"date": "2013-05-19T10:34:47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9345986843,
"token_count": 720,
"score": 3.0625,
"int_score": 3
} |
<urn:uuid:65350b4e-17d3-4092-a482-e6e28f4f962d> | July 12, 2010, 6:00 pm
The Cyprus laws regulate the structure of companies and legal forms, and are very similar to the ones of the United Kingdom. In order to function, every company in Cyprus must be registered within the Registrar of Companies, a procedure that can be done by nationals or foreigners, with few differences. Most of the business entities in Cyprus are limited companies, and only a small percentage is in the form of partnerships. The regulations are included by the Cyprus Companies Law.
Incorporation of Cyprus Private Company Limited by Shares (LTD)
This is the most common type of company used in Cyprus and it is founded by one ore more partners, up to 50. The company must have a registered office in Cyprus. The shareholders subscribe shares, monetary or non monetary, which are given a nominal value and cannot be transferred. The members of a private company limited by shares are liable to the company's debts and obligations only to the extent of the nominal value of their shares. In a private company limited by shares there is no minimum required capital.
Incorporation of Cyprus Public Company Limited by Shares (PLC)
The public company limited by shares functions the same as a private company limited by shares, except that shares are freely transferable and there is no restriction as to the maximum number of partners. The minimum share capital of a public company limited by shares is CYP 15.000 (Cyprus pounds, currency of Cyprus).
Incorporation of Cyprus Company Limited by Guarantee
This is a company usually used for non-profit and charitable purposes. It does not have a share capital, and it cannot be founded by any number of members, or corporate bodies, legal forms, who are guarantors instead of shareholders. Its structure is similar to the limited companies.
Incorporation of Cyprus General Partnership
A general partnership must be formed by at least two individuals, and at most 20, and must be registered with the Registrar of Partnerships within one month of its formation. This type of partnership is ruled by general partners, who have full liability to the extent of their entire private assets. There is no required capital, nor does a partnership have to file accounts or to be audited.
Incorporation ofCyprus Limited Partnership
The limited partnership functions as a general partnership, being founded by at least two persons, and registered within the Registrar of Partnerships. The main distinction between the two consists of the liability of the partners. In a limited partnership at least one member is fully liable to the company's obligations, becoming the general partner, and at least one limited partner is liable to the extent of his contribution.
Incorporation of Cyprus Sole Proprietorship
The sole proprietorship is a simple and informal structure, rather inexpensive to form. It is run by a single member, who has full liability to the company's debts. The company functions very similar, being subject to the same rules as a general partnership, and must be registered within the Registrar of Partnerships. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is purely informational and educational, discussing the legal and regulatory aspects of company structures in Cyprus. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "758-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.bridgewest.eu/article/company-types-cyprus",
"date": "2013-05-22T07:41:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9620944262,
"token_count": 617,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:76be554e-3a64-4653-aa5c-587e637a91c3> | File and folder management overview
Every Windows folder provides easy access to common file and folder management tasks. When you open any folder on your computer, a list of hyperlinked tasks is displayed next to the folder contents. You can select a file or folder, and then click a task to rename, copy, move, or delete it. You can also send a file in e-mail or publish it to the Web.
In addition to the basic file and folder tasks provided in all Windows folders, there are several folders that provide links to specialized tasks.
My Pictures and My Music folders provide task links that can help you manage your picture and music files.
In the My Computer folder, you can view and select the drives on your computer, the devices with removable storage, and the files stored on your computer. You can use the task links in this folder to view information about your computer, change system settings using Control Panel, and perform other system management tasks.
Use the Recycle Bin tasks to empty the Recycle Bin or restore deleted files and folders to their original locations. The Recycle Bin is displayed on your desktop | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a straightforward and neutral explanation of file and folder management in Windows. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "759-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/tasks_overview.mspx",
"date": "2013-05-22T07:44:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9263231754,
"token_count": 227,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:bf4a9ae8-b2c7-4ee1-9f95-2a9780b36bd3> | Recyclers recover more than 100 million pounds of reusable materials from electronics each year. Recycling electronics helps reduce pollution that would be generated while manufacturing a new product and the need to extract valuable and limited virgin resources. It also reduces the energy used in new product manufacturing. If you combine consumer and non-consumer computer equipment (commercial, industrial and government sectors), industry experts estimate that more than 2 billion will become obsolete over the next five years.
More information can be found on Electronics Recycling at ban.org | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is entirely safe and appropriate for all audiences. It discusses the benefits of recycling electronics and provides factual information without any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "760-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://1800recycling.com/find/recycling-locations/electronics/",
"date": "2013-05-24T15:28:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9155949354,
"token_count": 106,
"score": 3.140625,
"int_score": 3
} |
<urn:uuid:3304caf7-463e-49e2-8d40-9c868f642af9> | Oil rigs, such as the sites between Stanley and New Town, N.D. pictured above, have led to new jobs and a revitalized economy, but have recently been attributed to the state's low teen pregnancy rate. (Will Kincaid/USA TODAY)
According to a new Guttmacher Institute report, the unusually low teen pregnancy rate in North Dakota may be due to the state’s oil boom.
“It’s not by having such great sex ed, contraception access, and abortion providers,” Guttmacher senior researcher Laura Lindberg told Slate writer Amanda Hess.
With only one Planned Parenthood facility in the entire state and 75 percent of the population living in counties with no abortion provider, North Dakota's teen pregnancy measures seem an unlikely cause. With the influx of young men to the state, the numbers are even more puzzling.
As our nation’s most recent oil boom continues to unfold, North Dakota has been at the forefront of shale excavation. Thousands of workers have flocked to the otherwise sparsely populated state, creating boom towns, new roads, and revitalizing the state’s economy, as North Dakota has reaped the benefits of the Bakken shale that sits thousands of feet below.
Yet, even with the third highest men to women ratio in the U.S., teen pregnancy has subsided, possibly due to the low economic inequality and the unusual gender ratio. "Research suggests that women are more likely to delay pregnancy when they perceive future opportunities to climb the social and economic ranks," writes Hess. Rarely is an unemployment rate of 3.2 percent blamed.
Though the low numbers are impressive, North Dakota has had a smaller number of teen pregnancies over the years, with just 666 births to teen mothers in 2008. "There are very low numbers of actual teen births occuring in North Dakota..."[it's] not enough to make it part of the culture."
North Dakota's teen pregnancies may be below the average U.S. state, but as Hess notes, they are still above that of most of Europe. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses economic and social factors related to teen pregnancy rates in North Dakota without any inappropriate language, harmful themes, or unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "761-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://pipeline.post-gazette.com/news/archives/25073-is-fracking-lowering-teen-pregnancy-rates-in-north-dakota",
"date": "2013-05-24T15:48:56",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9537078738,
"token_count": 427,
"score": 2.765625,
"int_score": 3
} |
<urn:uuid:1138b168-1d6d-4311-92a0-a3723e78a6e7> | Countries which are restructuring their economies to offer a wealth of opportunities in trade, technology transfers, and foreign direct investment are called emerging markets. According to the World Bank, the five biggest emerging markets are China, India, Indonesia, Brazil and Russia. Apart from these there are Mexico, Argentina, South Africa, Poland, Turkey, and South Korea. These countries made a critical transition from a developing country to an emerging market. Each of them is important as an individual market and the combined effect of the group as a whole will change the face of global economics and politics.
All about emerging markets
Emerging markets have four major characteristics.
- Their large populations, large resource bases, and large markets. Help make them regional powerhouses, whose own economic successes spur development in their neighboring countries. They can also bring their neighbors down in the event of an economic crisis.
- They have replaced their traditional state interventionist policies with open door policies as the former had failed to produce sustainable economic growth.
- They are the world's fastest growing economies, and it is estimated that by 2020, the five biggest emerging markets' share of world output will double to 16.1 percent from 7.8 percent in 1992. They will also become more significant buyers of goods and services than industrialized countries.
- They are critical participants in the world's major political, economic, and social affairs and are seeking a larger voice in international politics and a bigger slice of the global economic pie.
How they emerged
- The failure of state-led economy and the need for capital investment are the two main causes which brought about the emerging markets. The failure of state-led economic development to produce sustainable growth, and the negative impact it had, pushed those countries to adopt open door policies.
- The earlier practices of the developing countries borrowing either from commercial banks or from foreign governments and multilateral lenders like the IMF and the Word Bank, often resulted in heavy debt overload and led to a severe economic imbalance. In the light of these results, these countries began to rely on equity investment as a means of financing economic growth. * Equity investments are sought from private investors who become their partners in development. This change in financing source was a major contributor to the growth of the emerging markets.
Emerging markets vs. traditional views
- In emerging markets, foreign "investment" is replacing foreign "assistance." Investing in the emerging markets is no longer the same as providing development assistance to poorer nations.
- Trade and capital flows in emerging markets are directed more toward new market opportunities, and less by political consideration.
- The two-way trade and capital flows between emerging markets and industrialized countries reflect the transition from dependency to global interdependency. The Internet, with accelerated information exchange, is integrating emerging markets into the global market at a faster pace.
- The traditional economic and political systems of the emerging economies, however, continue pose problems, mainly in terms of redefining the role of the government in the development process and to reduce the government's undue intervention.
- Another serious problem is that of controlling corruption, which distorts the business environment and impedes the development process.
- Taking up structural reforms with their financial system, legal system, and political system for ensuring a disciplined and stable economy is an even bigger challenge for these economies.
Emerging markets are the key to the future growth of world trade and global financial stability, and they will become critical players in global politics.
- Emerging markets constitute approximately 80% of the global population, representing about 20% of the world's economies
- Emerging markets are considered the fastest growing economies | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses emerging markets and their characteristics in a factual and educational manner. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "762-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.copperwiki.org/index.php?title=Emerging_markets",
"date": "2013-05-24T15:56:54",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9562293887,
"token_count": 733,
"score": 3.078125,
"int_score": 3
} |
<urn:uuid:6c41aad8-8bba-4edf-be33-bb67974a79f3> | The Presidio Trust will apply sustainable design practices and promote energy and water conservation, waste reduction and recycling, and clean technologies.
~ Presidio Trust Management Plan, 2002
The Presidio Trust strives to operate the park efficiently and to use resources wisely. Sustainable practices have been woven into park operations whenever possible, particularly in the areas of compost and regeneration, waste reduction, integrated pest management, and transportation management.
Given its mission to rehabilitate and reuse nearly 800 buildings around the park – more than half of which are historic – the Trust has taken a leadership role in “green building.” Green building practices strive to reduce the environmental impact when a building is constructed or repaired.
While “green building” has typically applied to new construction, the Presidio Trust is demonstrating that green materials and techniques can be used when historic buildings are preserved. In fact, through more than a decade of experience, the Trust is proving that historic preservation and green building practices are natural partners. The repair and reuse of an existing historic structure is an inherently sustainable act; it offers the opportunity to salvage and reuse materials, divert construction debris, and to implement efficient water and energy systems. There is growing evidence that building reuse can offer environmental savings over demolition and new construction.
Green Building Guidelines
In 1999 the Trust developed the Presidio Green Building Guidelines. The guidelines were based on the U.S. Green Building Council’s Leadership in Energy and Environmental Design (LEED) criteria, but they included consideration for the rehabilitation of historic structures. LEED is an internationally recognized system that certifies that a building has been designed with the environment in mind, showing concern for water and energy usage, air quality, and the careful use of resources.
LEED Certified Projects
In 2010 the Presidio Trust adopted LEED as a standard for all major projects. To date there are ten LEED certified projects in the park (including four at the Public Health Service District). Several more projects await certification.
At the Public Health Service District
adaptive reuse of the Presidio’s largest historic structure into 154 Presidio Landmark apartments by Forest City Development (certified LEED Gold)
construction of the Belles Townhomes by Forest City (certified LEED Platinum)
conversion of the former nurses’ dormitory (Building 1808) into contemporary office space by the Presidio Trust (certified LEED Gold)
rehabilitation of the Wyman Avenue homes by the Presidio Trust (contributing to pending LEED ND certification)
Elsewhere in the Presidio
- Building 3 (Bay School of San Francisco- certified LEED Silver)
Building 42 (Inn at the Presidio- certified LEED Gold)
Building 103 (Montgomery Street Barracks- certified LEED Gold)
Building 682 (former cavalry barracks - certified LEED Gold)
Building 920 (University of San Francisco - certified LEED Silver)
Building 926 (House of Air - certified LEED)
Building 934 (Roaring Mouse - certified LEED Silver)
Archaeology Education Center
Building 50 (Officers’ Club)
Building 100 (Futures Without Violence)
Building 101 (Montgomery Street Barracks)
Building 103- TI Project (Montgomery Street Barracks)
Buildings 1201 + 1202 (Fort Scott) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses sustainable design practices, energy conservation, and the rehabilitation of historic buildings. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are focused on environmental and resource management, which are suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "763-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.presidio.gov/about/Pages/green-building-LEED.aspx",
"date": "2013-05-24T15:29:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9076185226,
"token_count": 698,
"score": 2.546875,
"int_score": 3
} |
<urn:uuid:db74c2e5-01db-4895-a272-c3c38c35fcca> | Pronunciation: (bôld), [key]
1. having little or no hair on the scalp: a bald head; a bald person.
2. destitute of some natural growth or covering: a bald mountain.
3. lacking detail; bare; plain; unadorned: a bald prose style.
4. open; undisguised: a bald lie.
5. Zool.having white on the head: the bald eagle.
6. Auto.(of a tire) having the tread completely worn away.
to become bald.
(often cap.) Chiefly South Midland and Southern U.S.a treeless mountaintop or area near the top: often used as part of a proper name.
Random House Unabridged Dictionary, Copyright © 1997, by Random House, Inc., on Infoplease. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a definition from a dictionary and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would be considered unsafe or offensive."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "764-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://dictionary.infoplease.com/bald",
"date": "2013-06-19T14:26:05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8153541088,
"token_count": 178,
"score": 2.71875,
"int_score": 3
} |
<urn:uuid:4ffa1aba-d258-40d6-b276-8c20c52b1670> | LONDON- The successful creation of a new transgenic mouse
carrying a gene for human Alzheimer's disease should offer
researchers an important new research tool in the search for
useful treatments for what is currently an incurable disease.
Many researchers consider the deposition of a starch-like
protein called beta- amyloid in the brains of Alzheimer's
patients to be the key to understanding the disease. Genetic
researchers have identified pathogenic mutations in a gene which
encodes the b-amyloid precursor protein (APP). Alterations in
this gene lead to altered processing of APP and increased
deposition of the potentially pathogenic beta-amyloid deposits.
The researchers took a new approach to a problem that has
challenged science for years, the development of a transgenic
Alzheimer's mouse. The investigators created a construct composed
of the full length human APP complementary DNA with the APP
mutation under the control of a factor called platelet-derived
growth factor (PDGF) promoter. They inserted selected introns
from the APP gene important for the splicing of the gene product
into this construct. In other words, they constructed a
combination of complementary DNA and a genomic construct. The DNA
element helps activate the gene in the parts of the brain
affected by Alzheimer's disease, the hippocampus and the cerebral
cortex. This gene construct was then inserted into mouse embryos
using microinjection techniques.
No neurological changes were seen in the mice in the first
six months of life. However, between six and nine months the
transgenic animals developed many of the characteristics of the
brains of patients with Alzheimer's disease. These included the
deposition of beta-amyloid plaque, neuritic damage and reduction
in synapse density. As the animals aged the amyloid plaque
deposits continued to increase in size, resembling human
pathology. Non transgenic littermates showed none of these
The next step will be to breed large number of the mice and
observe them for signs of cognitive changes associated with
Alzheimer's including memory loss. The researchers will also want
to determine what elements of the construct allowed the
experiment to succeed- the promoter, the use of introns and/or
Alzheimer's research has been limited by the lack of a
reliable animal model. The development of the Alzheimer's mouse
will help researchers understand the pathology of the disease.
First, the creation these transgenic animals may finally answer
the question of whether the amyloid plaques do cause Alzheimer's
disease. Second, the transgenic mice in the current experiment
developed most of the pathologic changes seen in human brains
with the exception of neurofibrillary tangles. This observation
alone may cause a reconsideration of the pathogenesis of the
disease, suggesting that these tangles are a result of a
destructive neurological process rather than a cause.
The new transgenic mouse should also speed the development
of drugs for treating Alzheimer's in humans. Researchers will be
able to screen large numbers of drugs in the animal model before
proceeding to human trials with any promising agents.
Alzheimer's disease is the fourth leading cause of death in
the developed world, after heart disease, cancer, and stroke.
Alzheimer's disease strikes some four million Americans, at a
cost to the nation of $100 billion. The disease is named for
Alois Alzheimer, the German neurologist who first described the
pathology of the disease nearly 100 years ago.
The details of the Alzheimer's mouse research can be found
in Nature, v.373, 2/9/95, Games et al. pp. 523-537 and pp. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a scientific article discussing research on transgenic mice for studying Alzheimer's disease. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "765-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.accessexcellence.org/WN/SUA02/alzheimers_breakthrough.php",
"date": "2013-06-19T14:20:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9024119973,
"token_count": 793,
"score": 3.15625,
"int_score": 3
} |
<urn:uuid:cdc6a8c2-81c4-40d6-a045-61946ea66af4> | Author Richard V. Barbuto Looks at 1812 When America Was on the Ropes
October 9, 2012
Unpopular wars are hardly new to the United States. In 1812 the administration of James Madison led a reluctant nation into an unpopular war against the formidable British Empire.
Author Richard V. Barbuto examines 1812: America on the Ropes on Tuesday, October 23, 2012, at 6:30 p.m. at the Central Library, 14 W. 10th St.
The War of 1812 began with much confidence among U.S. leaders. Thomas Jefferson predicted that the conquest of Canada was "a mere matter of marching." But after six months of fighting, British and Canadian troops and their native allies had thrown back three U.S. invasion attempts and had captured Detroit.
Soon the Royal Navy was prowling American shores, capturing vessels and raiding towns. Britain threatened to seize more American territory, the federal government slipped deeper into debt., and British troops even burned the White House.
Much of the American public blamed the president personally, calling this "Mr. Madison's War." How did America's first foreign war start off so very badly? And how did the United States finally prevail?
Barbuto is deputy director of the Department of Military History at the U.S. Army Command and General Staff College at Ft. Leavenworth.
Admission is free. A 6 p.m. reception precedes the event. Free parking is available in the Library District parking garage at 10th and Baltimore. RSVP online or call 816.701.3407. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context without unsafe content\", \"score\": 0}\n```\n\nThe text provided is a historical overview of the War of 1812 and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "766-0",
"llm_safety_score": 0,
"reason": "historical context without unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.kclibrary.org/press-release/author-richard-v-barbuto-looks-1812-when-america-was-ropes",
"date": "2013-06-19T14:39:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9426724911,
"token_count": 328,
"score": 2.84375,
"int_score": 3
} |
<urn:uuid:fc49ece4-fb02-4ad2-995d-3b8339c88df3> | ITHACA, N.Y. -- A recycling plan devised by Cornell University students, with assistance from community members and waste-management experts, would save restaurant scraps from the garbage can and send them to the compost pile.
The resulting compost could boost community greenhouse-gardens.
"Our survey found many restaurant operators willing to separate food scraps for composting if the collection process is convenient and cost-effective," says Heather Clark, president of Cornell Students for Composting. "We have the technology to heat greenhouses with energy from the composting reaction, and the composted food waste will provide enriched soil for community garden plots in the greenhouses. We know this will work in Ithaca, and it should help any community with commercial food wastes and vacant lots."
Starting last fall, the 15-member student group conducted a mail survey of 120 Ithaca-area restaurants then followed up with telephone calls trying to gauge the businesses' interest in composting food scraps.
"Some said 'absolutely not' and some said 'maybe,'" Clark reports. "But we found seven restaurants willing to try composting, and that's enough for a pilot study."
For the 20-year-old College of Agriculture and Life Sciences junior from Canton, N.Y., who is studying ecology, environmental science and community design, the campaign to save Ithaca's food scraps began last summer. "I was eating in a downtown restaurant," she recalls, "and I saw food scraps going into a special bin, so I asked: 'Are you composting?' and they said, 'No, but we'd like to.'"
Reputedly one of the "greenest" small cities in America, Ithaca is filled with backyard composters, and food scraps from dining halls at Ithaca College and Cornell are composted, as are many leaves, grass clippings and other yard waste. But Ithaca has no comprehensive plan for composting restaurant or grocery store wastes. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses a recycling and composting initiative for food scraps in Ithaca, New York. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful, and the themes are related to environmental sustainability and community improvement, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "768-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://news.bio-medicine.org/biology-news-2/Testing-Restaurant-Compost-For-Greenhouses-13327-1/",
"date": "2013-05-19T18:26:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9575910568,
"token_count": 405,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:b6b7734a-a387-4b07-bbda-bcb26df5ef3b> | Biliary atresia is a serious liver disorder that occurs before or shortly after birth when a baby's bile ducts (the tubes that carry bile from the liver) become blocked. The body needs bile to aid digestion and carry wastes from the liver out of the body. When blocked ducts prevent bile from being excreted, the liver becomes damaged.
The cause of biliary atresia is a mystery. Two forms of biliary atresia are generally recognized, although more may exist.
The most common is the perinatal form which accounts for 65-90 percent of all cases. These children typically appear healthy at birth. As a newborn, these infants pass normal-colored stool and are of average weight. Between 4-8 weeks of age however, jaundice develops.
The less-common embryonic or fetal form occurs in 10-35 percent of biliary atresia cases. These children are jaundiced as newborns and frequently there are associated birth defects such as abnormalities of the heart, major blood vessels, spleen and intestines.
Neither form is thought to be inherited. Many theories about the causes of biliary atresia have been proposed, but none have been proven.
Learn more about the liver, diagnosis of biliary atresia, treatment options and the long-term outlook for children with the condition. A glossary of terms and frequently asked questions about biliary atresia are also available. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a medical description of biliary atresia, which is a serious liver disorder. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful and the themes are educational and informative, making it fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "769-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.chop.edu/service/biliary-atresia-clinical-care-program/about-biliary-atresia/",
"date": "2013-05-19T18:52:34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9569296837,
"token_count": 300,
"score": 3.71875,
"int_score": 4
} |
<urn:uuid:0133bc28-388c-4b7f-a5a7-90a64f5d070f> | |Case Studies on Technical and Vocational Education in Asia and the Pacific - Indonesia (UNEVOC - ACEID, 1996, 44 p.)|
Indonesia has a population of over 180 million people. The population is spread out over about 13,700 islands, which extend about 5,000 kilometres east to west and 2.000 kilometres north to south. Over 60 percent of the population lives in Java, which has a density of 800 people per square kilometre. The remaining population is spread out over the other islands especially in the big island of Sumatera.
The Indonesian Government policy has given emphasis on human resource development and supported a rapid expansion of the formal school system. Net primary education enrolment rates were an estimated 98 percent in 1988/ 1989 and about 100 percent at the end of 1993/1994, so that starting on the sixth five-year development plan (PELITA VI) or the starting of the second long term development plan (PJPT II, 1994/2019) Indonesia can increase the duration of compulsory education from six years to nine years.
The technical and vocational education in Indonesia is provided through junior technical and vocational schools (SMKTP) and senior technical and vocational schools (SMKTA) at secondary level and high school or universities for tertiary level. The junior technical and vocational school is planned to supply the semi-skilled worker, while the senior technical and vocational school will provide middle level manpower or tradesmen for the job market
Diploma programs for higher technician manpower qualification are provided at Polytechnics, high school or university, while degree programs for technologists are produced by high schools or universities.
Technical and vocational education is expected to be primarily job-oriented. Like any other type of education, technical and vocational education must also endeavour to develop a creative mind together with the capacity to apply knowledge and know-how. But technical and vocational education has to primarily consider the demands of the employment market where the acquired knowledge can be profitably used.
Ideally, the number of graduates available for job and employment opportunities should be balanced. Thus, the problems in technical and vocational education are both in quantity and quality. By quantity is meant the balance between the present and the future availability of technical and vocational educated manpower for industrial demands and other relevant technical and vocational manpower purposes, and quality is that the knowledge as well as skill of the graduates satisfy the requirements of the job market and world of work.
The role of the middle level manpower in the developing country is very important especially when the country of Indonesia has chosen industrialisation as the main alternative for economical takeoff. This is a study of the development of technical and vocational education, and will be concentrating on the development of senior technical and vocational education conducted under the Directorate of Technical and Vocational Education (Dit Dikmenjur) of the Director General of Primary and Secondary Education (Ditjen Dikdasmen), whose main role is providing middle level manpower of the country.
Specifically this study investigates the answers to the following:
· How is senior technical and vocational education in Indonesia developing?
· How does the senior technical and vocational education respond to the requirement of quantity due to the increased number of children of school age and the increased requirement for supplying middle level skill manpower?
· What is the strategy for the establishment of effective schooling which can cope with the development of science and technology and the demand of community?
· What is the approach to efficiently utilise the resources for supporting the operation of senior technical and vocational schools?
· How to promote the close linkage between the school system and industry in responding to the requirement of providing qualified graduates, and the changing demands of manpower, industry and the world of work. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a case study on technical and vocational education in Indonesia, which does not contain any unsafe or inappropriate content. It discusses demographic data, government policies, and educational strategies without any harmful or offensive elements."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "770-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.nzdl.org/gsdlmod?e=d-00000-00---off-0ewf--00-0----0-10-0---0---0direct-10---4-------0-1l--11-en-50---20-help---00-0-1-00-0--4----0-0-11-10-0utfZz-8-10&a=d&c=ewf&cl=CL1.1&d=HASH12a1a46374ea8d740e918b.4",
"date": "2013-05-19T19:01:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9408698082,
"token_count": 753,
"score": 2.859375,
"int_score": 3
} |
<urn:uuid:532891df-3c28-4492-8b29-a40a6bb24277> | Leased lines are commonly referred to as dedicated connectivity options. This means that
the connection between the two endpoints is permanent in nature and that 100 percent of the
capacity is available to the end user. Leased lines are owned by the telecommunications carrier
and are often provided in the form of a T-1. These connections are also called point-to-point
links because the capacity of a leased line is dedicated to the corporation. Unfortunately,
because bandwidths cannot be shared, this type of connection is more expensive than Frame
Relay or ATM.
In addition, leased lines are also distance sensitive. Unlike Frame Relay, with leased lines, the
telephone company will charge the end user for both the local loop and the transit network. For
short distances, the differences in costs might be negligible, but for long distances, the costs
increase dramatically. For example, a 200-mile Frame Relay connection might cost $200 a
month, which would be the same as a 2,000-mile Frame Relay connection. The leased line
installation might also cost $200 a month for 200 miles, but most likely, it would cost $3,000
a month for the 2,000-mile link.
The most common leased-line service available in the United States is called a T-1. This provides
the corporation with 1.544Mbps of dedicated bandwidth. Older leased lines were digital
data service (DDS) circuits and yielded up to 56Kbps of bandwidth. These connections were
popular for mainframe connectivity at both the 9.6Kbps and 56Kbps levels.
253 times read
Did you enjoy this article?
(total 0 votes) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses technical aspects of leased lines and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "771-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://ciscoarticles.com/CCNP-CCIE-Complete/Leased-Lines.html",
"date": "2013-05-22T14:17:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9541696906,
"token_count": 353,
"score": 2.765625,
"int_score": 3
} |
<urn:uuid:01c53a04-88a1-48cb-b4ca-7879341b6bbb> | TENS Unit or EMS Units what’s the difference?
TENS stands for (Transcutaneous Electrical Nerve Stimulation). which are predominately used for nerve related pain conditions (acute and chronic conditions). It works by sending stimulating pulses across the surface of the skin and along the nerve strands. The stimulating pulses help prevent pain signals from reaching the brain. They also help stimulate your body to produce higher levels of its own natural painkillers, called "Endorphins".
To read more about Tens Units and how they can effect the cycle of pain please click here.
E.M.S. stands for (Electrical Muscle Stimulation) which are predominately used to prevent, or reduce, muscle atrophy. Atrophy is the weakening and loss of muscle tone, which is usually experienced after surgeries or injuries. EMS has been proven to be an effective means of preventing muscle atrophy. EMS also helps by increasing blood flow to muscles, increasing range of motion, increasing muscle strength, as well as enhancing muscle endurance. EMS has pain management attributes in helping muscle related pain, such as a spastic muscle, sore muscles, or tight muscles.
Informational TENS Video
TENS Top Sellers
TENS 3000 Analog TENS Unit. Includes Lead Wires, Electrodes, Battery and Carrying Case
InTENSity Twin Stim III Digital TENS and EMS Unit in one device. Includes Lead Wires, Electrodes, AC
InTENSity Select Combo Digital TENS,EMS, Interferential and Microcurrent Unit in one device. Include
TENS-6000 Digital TENS Unit with Lead Wires, Electrodes, Battery and Carrying Case
EMS-3000 Analog EMS Unit with Lead Wires, Electrodes, Battery and Carrying Case
TENS 7000 Digital TENS Unit. Includes Lead Wires, Electrodes, Battery and Carrying Case | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text provides educational information about TENS (Transcutaneous Electrical Nerve Stimulation) and EMS (Electrical Muscle Stimulation) units, which are used for pain management and muscle health. There are no unsafe elements, inappropriate language, or harmful themes present in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "772-0",
"llm_safety_score": 0,
"reason": "educational content with no unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://tensunits.com/",
"date": "2013-05-22T14:26:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.912119925,
"token_count": 387,
"score": 3.03125,
"int_score": 3
} |
<urn:uuid:750163a2-2f0f-480b-a3a1-dfcd5a900207> | Fiber is an essential nutrient in your diet. Fiber is in the form of soluble fiber as well as insoluble fiber. The soluble fiber binds with the fatty acids in the stomach and the arteries. This helps to regulate blood sugar and reduces the over all cholesterol. The insoluble fiber removes toxins from your colon and balance intestine acidity.
Research has shown that people who consumed the highest amount of fiber were 22 percent less likely to develop heart and health related risks. Fiber helps in controlling diabetes and heart disease risks because it improves cholesterol levels, blood pressure, inflammation and blood sugar levels. Besides it, fiber also has the property to bind along with the toxins and remove it from the body quickly. Read on to find out how much fiber your need, and best sources of fiber for your body. Read more | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the benefits of fiber in a health context. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "773-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.fitho.in/tag/fiber-health-benefits/",
"date": "2013-05-22T14:39:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9477112293,
"token_count": 162,
"score": 2.84375,
"int_score": 3
} |
<urn:uuid:ae5033fa-7a9a-43aa-b724-cecfd1b50f8d> | Definition from Wiktionary, the free dictionary
- Popularly or widely.
- It is generally known that the Earth is round.
- As a rule; usually.
- I generally have a walk in the afternoon.
- Without reference to specific details.
- Generally speaking...
- (obsolete) collectively; as a whole; without omissions
- I counsel that all Israel be generally gathered unto thee. — 2 Sam. xvii.
popularly or widely
as a rule; usually
without reference to specific details
- The translations below need to be checked and inserted above into the appropriate translation tables, removing any numbers. Numbers do not necessarily match those in definitions. See instructions at Help:How to check translations.
Translations to be checked | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a definition from Wiktionary and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would warrant a higher safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "775-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://en.wiktionary.org/wiki/generally",
"date": "2013-05-24T22:59:05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.7942951322,
"token_count": 160,
"score": 2.65625,
"int_score": 3
} |
<urn:uuid:fc4a282e-9ff8-4149-900d-a61b62e1eda0> | RALEIGH — Many of us are not old enough to remember the days of"Jim Crow" lawsthat allowed racial discrimination in the use of public facilities.
There are some, though, who will never forget those days before theCivil Rights Act of 1964changed everything. A few remember how the victory over segregation was won and how the lessons learned then can help uslive the legacytoday.
Pastor William Finlator and Dr. Slater Newman saw the injustice of racial segregation. Raymond Burnette and John Winters were subject to it.
The men are among the many who joined the Civil Rights movement in the early 60s to tear down barriers to racial equality that they saw every day on the streets of Raleigh.
"I remember seeing those "colored" signs not only in front of toilets, but in front of drinking fountains," Finlator says.
John Winters broke a few barriers himself, and will never take his freedom for granted, though others may.
"They take freedom of access as just having been there and has always been, but that isn't the truth," Winters says.
In 1961, Winters was the first African American elected to the Raleigh City Council. He was also among the first two elected to the State Senate.
Winters says progress came thanks in great part to North Carolina's Governor during the early 60s.
"Under Terry Sanford we had a Good Neighbor Council that brought people together in small groups," Winters says. "It was all over this state, especially in the east where there was the least amount of communication."
The Good Neighbor Council encouraged open and peaceful discussion between the races.
Pullen Memorial Baptistwas one of the few predominantly white churches known in the black community as a safe haven.
"Of course, a safe haven meant a place where they can have discussions about the movement without fear of retaliation by the ultra-conservatives," says Waters.
Finlator says he and his flock took up the civil rights cause within the sanctuary, as well as outside on the streets of the Capital City.
"I saw down there among those people who were leading the parade, members of this church," Finlator says. "I said, 'What a shame. The people of this church are down here on the march protesting, and the pastor is sitting back quiet in his study.'"
The men remember the tense atmosphere surrounding the protests but don't remember any actual violence.
"We had a good police chief when I was on the city council, in Chief Tom Davis," Winters remembers. "The students had the protection of the police in Raleigh rather than the opposition of the police in Raleigh."
Dr. Newman agrees. "I'm not sure what his sympathies were but they were for enforcing the law," Newman says.
"I could never figure out how you could do such great things with peace," Burnette says. "You know, loving somebody that was hating you, and you loving them back."
Winters and Burnette escortedDr. Martin Luther King Jr.around Raleigh during King's visits in the early 60s.
"The change continues in my opinion and it continues in the right direction," Newman says.
The legacy lives on in them and millions of others.
"The past is over now," Burnette says. "We are looking for a new future and I can see a brighter day." | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context without unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses historical events related to the Civil Rights movement in Raleigh, North Carolina. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful and the themes are educational and historical in nature, making it fully appropriate for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "777-0",
"llm_safety_score": 0,
"reason": "historical context without unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.wral.com/news/local/story/138401/",
"date": "2013-05-24T23:00:54",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9858722687,
"token_count": 694,
"score": 2.75,
"int_score": 3
} |
<urn:uuid:762ab34b-7189-4a79-80f5-9f3a4d14dea8> | Connections in flowcharts often require some type of label text.
In some types of drawings, it's useful to label the connectors between certain shapes.
For example, in a flowchart diagram, you might want to show a decision shape with connectors labeled Yes and No.
This lesson will show you how to add text to your connectors and how to position that text perfectly.
Click Next to continue reading this lesson on your own. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThis text is entirely appropriate for all audiences and does not contain any unsafe or inappropriate content. It provides educational information on how to label connectors in flowcharts, which is suitable for both children and adults in educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "778-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://office.microsoft.com/en-nz/training/add-text-to-connections-RZ001078979.aspx?section=14",
"date": "2013-06-19T12:28:01",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9231542945,
"token_count": 90,
"score": 2.796875,
"int_score": 3
} |
<urn:uuid:c21c9e34-7dcb-41e6-a750-a30a0c4e234d> | AAHL scientist undertaking diagnostic testing during the 2007 equine influenza outbreak in Australia.
Diagnosis, Surveillance and Response
The Diagnosis, Surveillance and Response Group delivers CSIRO's national responsibilities in the area of emergency terrestrial animal and fish diseases, including diseases of wildlife and zoonotic diseases.
23 October 2009 | Updated 14 October 2011
CSIRO's Australian Animal Health Laboratory (AAHL) plays a vital role in maintaining the health of Australia's livestock, aquaculture species and wildlife and ensuring the competitiveness of Australian agriculture and trade.
AAHL is a national centre of excellence in disease diagnosis, research and policy advice in animal health. It is a major facility of CSIRO Livestock Industries.
The purpose of the Diagnosis Surveillance and Response Group (DSR) is to deliver on AAHL's key national facility responsibilities to the Australian community:
The DSR Group also manages AAHL's World Organisation for Animal Health (OIE) designations as Reference Laboratories for a number of major animal diseases and OIE Collaborating Centres for New and Emerging Diseases and for Laboratory Capacity Building.
Provision of advice
AAHL provides Australian government and industry groups with advice on exotic and emerging disease issues.
This expertise is also used to assist countries in the region to deal with animal disease issues contributing to regional food security and biosecurity.
CSIRO is protecting Australia's billion dollar livestock and aquaculture industries from exotic disease threats including foot and mouth disease.
DSR staff are involved in several animal health development programs overseas, particularly in Southeast Asia.
This support not only reduces the disease risks to the countries themselves but also assists the preparedness of Australian biosecurity through better threat assessment and preparedness.
AAHL regularly participates in significant international and national networks including the Laboratories for Emergency Animal Disease Diagnosis and Response (LEADDR) initiative.
LEADDR aims to develop as a national coordinated network of laboratories to assist each other with large-scale testing during an EAD outbreak in Australia's livestock industry.
DSR staff are also actively involved in the National Animal Health Laboratory Strategy (NAHLS), the National Animal Health Surveillance Strategy (NAHSS), the Sub-committee on Animal Health Laboratory Standards (SCAHLS) and AusVet Plan.
Training and education
More than 400 veterinarians from Australia, New Zealand, Papua New Guinea, Indonesia and Timor-Leste have completed exotic disease training at AAHL. AAHL also has a strong student training program.
The science streams within this Theme include:
Learn more about Dr Peter Daniels: Theme Leader - Diagnosis, Surveillance and Response. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a factual description of the Australian Animal Health Laboratory (AAHL) and its role in animal health and disease surveillance. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "779-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.csiro.au/en/Organisation-Structure/National-Facilities/Australian-Animal-Health-Laboratory/Research-and-Capabilities/Diagnosis-Surveillance-Response.aspx",
"date": "2013-06-19T12:31:46",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.912813127,
"token_count": 540,
"score": 2.640625,
"int_score": 3
} |
<urn:uuid:fd2f6f5e-884a-495c-904f-0c3f71851aa7> | We have been
learning about different kinds of birds. We thought it would be fun to
write cinquain poems using all we have learned about birds.
Cinquain poems have five
Line 1-one word (title)
Line 2-two words (describe the title)
Line 3-three words (describe an action)
Line 4-four words (describe a feeling)
Line 5-one word (refer to the title)
They are fun to write, why don't you try one!
We hope you
enjoy reading our poems!
Shaul's First Grade
Created by Terry
Pocantico Hills School
© 2006 Terry Hongell - Pocantico Hills School | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text is a description of an educational activity involving writing cinquain poems about birds. It contains no unsafe, inappropriate, or harmful content. It is fully appropriate for all audiences, including children."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "780-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.pocanticohills.org/shaul/05/birds.htm",
"date": "2013-06-19T12:48:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8194419742,
"token_count": 152,
"score": 3.03125,
"int_score": 3
} |
<urn:uuid:a9742f90-8b2f-48ec-892e-ab7146c20ff0> | Processing Arithmetic Expressions with the Shunting-Yard Algorithm
(Originally posted on reedbeta.com)
In game development (or programming in general) it’s not uncommon to have a situation where you’d like to let a user enter an arithmetic formula that your code parses and evaluates. For example, in a shader you might like to have an annotation that specifies how a parameter is to be computed in the main application. In various kinds of authoring tools you might like to create a shape, image, or animation based on a mathematical function. Embedding a full-fledged scripting language like Python or Lua is a bit overkill for these kinds of tasks. So how can we handle arithmetic expressions without a large amount of infrastructure?
In textbooks and university computer-science courses, we often hear about a few classic approaches to parsing formulas. One is the so-called reverse Polish notation, where we write formulas in postfix form, with operators following their operands:
2 3 + // means 2 + 3 a b + c d + * // means (a + b) * (c + d) pi 4 / sin // means sin(pi/4)
The nice things about RPN are that (a) parentheses are not needed, nor the concepts of operator precedence and associativity, since the order of operations is fully specified by the notation; and (b) it can be parsed by a simple algorithm: scan the formula left-to-right, when you see an operand push it on a stack, and when you see an operator, pop the required operand(s) off the stack, apply the operator, and push the result back on. When you’re done, the result is the only item left on the stack (assuming well-formed input).
That’s quite easy to add to an application; there’s almost no infrastructure needed. But it has the disadvantage that it requires users to work in this unfamiliar and awkward notation. Of course, users can be trained to work in RPN, and with experience it no longer appears unfamiliar or awkward. But let’s take pity on the poor users and let them work with standard mathematical notation. What options are there?
The standard computer-science cirriculum at this point would start talking about context-free grammars, abstract syntax trees, and syntax-directed parsers. There are two main approaches to building parsers that are used in practice, i.e. for parsing programming languages: top-down (also known as recursive descent or LL) and bottom-up (aka shift-reduce, LR). Unfortunately, neither of these is a good fit for embedding a simple arithmetic language in an application. Top-down parsing isn’t a good fit for arithmetic in general, since each level of operator precedence requires its own nonterminal symbol in the grammar (each of which corresponds to a function call in the parser), and right-associative operators can’t be expressed in the grammar without breaking the LL constraint, necessitating some sort of extragrammatical fixup. Bottom-up parsing works by using a large state machine whose transition rules are usually impractical to work out by hand, requiring a parser generator tool such as Bison to compute. Again, that’s a lot of infrastructure to throw at what is not such a complicated problem.
Fortunately, there is another way: the shunting-yard algorithm. It is due to Edsger Dijkstra, and so named because it supposedly resembles the way trains are assembled and disassembled in a railyard. This algorithm processes infix notation efficiently, supports precedence and associativity well, and can be easily hand-coded.
How It Works
As in RPN, we scan the formula from left to right, processing each operand and operator in order. However, we now have two stacks: one for operands and another for operators. Then, we proceed as follows:
- If we see an operand, push it on the operand stack.
If we see an operator:
- While there’s an operator on top of the operator stack of precedence higher than or equal to that of the operator we’re currently processing, pop it off and apply it. (That is, pop the required operand(s) off the stack, apply the operator to them, and push the result back on the operand stack.)
- Then, push the current operator on the operator stack.
- When we get to the end of the formula, apply any operators remaining on the stack, from the top down. Then the result is the only item left on the operand stack (assuming well-formed input).
Note that “applying” an operator can mean a couple of different things in this context. You could actually execute the operators, in which case the operands would be numerical values of all the terms and subexpressions; you could also build a syntax tree, in which case the operands would be subtrees. The algorithm works the same way in either case.
That’s basically all there is to it, aside from some bells and whistles! As you can see, it has a lot in common with the RPN algorithm, and is just a little more complicated.
I described the algorithm above in its simplest form, but there are several enhancements that can be made to handle more complicated formulas.
Associativity. Above, I said that when processing an operator, any operators of equal precedence at the top of the stack should be popped and applied. This makes those operators left-associative, since the leftmost of the two operators will be applied first. You can implement right-associativity by leaving equal-precedence operators on the stack.
Parentheses. Parens are a bit of a special case. When you see a left paren, push it on the operator stack; no other operators can pop a paren (so it’s as if it has the lowest precedence). Then when you see a right paren, pop-and-apply any operators on the stack until you get back to a left paren, which is popped and discarded.
Unary operators. These generally work just like any binary operators except that they only pop one operand when they’re applied. There is one extra rule that needs to be followed, though: when processing a unary operator, it’s only allowed to pop-and-apply other unary operators—never any binary ones, regardless of precedence. This rule is to ensure that formulas like a ^ -b are handled correctly, where ^ (exponentiation) has a higher precedence than – (negation). (In a ^ -b there’s only one correct parse, but in -a^b you want to apply the ^ first.)
Both prefix and postfix unary operators can be used. The way to tell whether you’re in a position to allow prefix or postfix operators is to look at the previous token; if it’s an operand, you’re looking for binary and postfix unary operators, and if the previous token is an operator (or there’s no previous token) you’re looking for prefix unary operators. Note that a left parent counts as an operator and a right paren as an operand for this purpose. This rule also allows you to tell whether – is a negation (unary) or a subtraction (binary)—it’s a negation if it appears when looking for a prefix unary operator, and a subtraction otherwise.
Function calls. The prefix/postfix rule also allows you to tell when an open paren designates a function call rather than grouping a subexpression (a grouping paren is like a prefix operator while a function-call one is like a postfix operator). When a function-call paren is encountered, the operand at the top of the stack is the function to be called. Push the paren on the operator stack as before, but also set up a list somewhere to hold the function arguments, and maintain a mapping that lets you find that list again from the paren on the stack. (Note that with nested function calls, you could have multiple left parens on the stack.)
Then, when a comma is encountered, pop-and-apply operators back to a left paren; the operand on the top of the stack is then the next argument, and should be popped and added to the argument list. When the right paren is encountered, do the same, then pop and discard the left paren. (Note that the arguments shouldn’t be left on the operand stack, at least not without some sort of sentinel between them; this would allow an ill-formed call like f(a, b, +) to be parsed as f(a + b)).
Array subscripts using square brackets can be handled in the same way as function calls.
After all this, the algorithm has grown a bit, and is a little trickier to get right in all the corner cases—but it’s still pretty simple, and certainly less work than a full-blown syntax-directed parser! In my opinion, it’s a shame that the shunting-yard algorithm isn’t more widely discussed as part of standard texts and computer-science university courses. Even the Dragon Book doesn’t so much as mention it! I never heard of this algorithm until I happened to see a forum post that referenced it, but its simplicity, elegance, and efficiency make it a superior solution for many use-cases of processing arithmetic expressions.
Recently Featured Posts
- Accessing Microsoft Windows 8 Desktop Sensors
- Shader Effects: Glow and Bloom
- Shader Effects: Screen Space Ambient Occlusion
- Shader Effects: Refraction
- Shader Effects: Blend Modes
- Shader Effects: Gamma Correction
- Follow Devmaster.net on Facebook, Twitter, and Google+
- Shader Effects: Depth of Field
- Shader Effects: Shadow Mapping
- Shader Effects: Old Film
Recent Forum Discussions
- HIERARCHICAL TEMPORAL MEMORY CRITICISM
- Shadow techniques
- 3D Alien Buildings for Game Design
- Animating simple player sprite (Platform)
- some thoughts on artificial intelligence
- Yildiz-Online: MMORTS (Alpha)
- advice on the best schools in either bc...
- Giant rubber duck meets sorry end
- MinGW64 and GLES2 emulator?
- Basic path tracing in OpenCL | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe provided text is an educational and technical explanation of the Shunting-Yard algorithm, which is used for parsing arithmetic expressions. It does not contain any unsafe or inappropriate content, and is fully suitable for public use, educational environments, or general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "781-0",
"llm_safety_score": 0,
"reason": "educational content"
},
{
"custom_id": "781-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://devmaster.net/posts/2866/processing-arithmetic-expressions-with-the-shunting-yard-algorithm",
"date": "2013-05-20T02:32:41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8944627643,
"token_count": 2217,
"score": 2.90625,
"int_score": 3
} |
<urn:uuid:df31be96-193e-4593-826d-c5190c3aeada> | A hernia is a condition in which tissue from inside the abdomen bulges out through a weak spot in the muscles of the abdominal wall. A strangulated hernia occurs when the tissue gets trapped very tightly in the hernia and its blood supply is cut off.
Immediate surgery is always needed for a strangulated hernia.
eMedicineHealth Medical Reference from Healthwise
To learn more visit Healthwise.org
© 1995-2012 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated.
Find out what women really need.
Most Popular Topics
Pill Identifier on RxList
- quick, easy,
Find a Local Pharmacy
- including 24 hour, pharmacies | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a medical reference discussing hernias and their complications. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "783-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.emedicinehealth.com/script/main/art.asp?articlekey=134237&ref=128590",
"date": "2013-05-20T02:15:11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9115092158,
"token_count": 160,
"score": 2.734375,
"int_score": 3
} |
<urn:uuid:b69e7093-2760-4c45-95b3-953b2d902661> | Originator:Pennsylvania Fish and Boat Commission
This data set contains point locations of the "Run-of-the-River" dams in Pennslyvania. "Run-of-the-River dam" is a manmade structure which:
is regulated or permitted by the Department of Environmental Protection (DEP) pursuant to the act of November 26,1978 (P.L.1375, No.325), known as the Dam Safety and Encroachments Act;
is built across a river or stream for the purposes of impounding water where the impoundment at normal flow levels is completely within the banks and all flow passes directly over the entire dam structure within the banks, excluding abutments, to a natural channel downstream; and
DEP determines to have hydraulic characteristics such that at certain flows persons entering the area immediately below the dam may be caught in the backwash.
View Full Metadata Document
Download Full XML Metadata Document (Right-click and save...) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a description of a dataset related to \"Run-of-the-River\" dams in Pennsylvania. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to environmental and regulatory information, which are suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "784-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.pasda.psu.edu/uci/MetadataDisplay.aspx?entry=PASDA&file=PFBC_Dams_RunofRiver.xml&dataset=971",
"date": "2013-05-20T02:48:06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9012589455,
"token_count": 201,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:029e6de8-1020-4d5a-a5b5-8d67b7503af1> | Apr 24, 2008
Rising obesity rates and a large percentage of children born with low birthweights are dragging down the overall health of American children in their first decade of life, according to a report tracking the health and well-being of young children in the United States.
While U.S. children overall have seen improvements in their well-being in recent years, American children aged 6 to 11 are four times more likely to be obese than similarly aged children in the 1960s, the report found.
The report, led by researchers at Duke University in North Carolina and the Foundation for Child Development, a private advocacy group, looked at the well-being of children in early childhood, those from birth to age five, and middle childhood, or those aged 6 to 11, from 1994 to 2006.
The researchers found obesity among children in middle childhood is nearly four times more common than in children of the same age in a national survey in 1960s. For children aged 2 to 5, it is three times higher.
“These are dramatic increases in the prevalence of overweight children in American society from one generation to the next,” the researchers wrote. “The importance of this trend for the health and well-being of children is difficult to exaggerate.”
They said overweight children have greater risks of type-2 diabetes, and often have elevated risk factors associated with heart disease, such as high cholesterol and high blood pressure.
They also found that the percentage of babies born with low birthweights rose 12.3 percent from 1994 to 2005, an increase they said was likely tied to delayed childbearing among working mothers and an increased use of fertility drugs.
Low birthweight has been linked in large studies to a higher risk of developmental and learning problems and to lower academic achievement. It also has been linked with higher rates of chronic health conditions.
Other trends were more positive.
The researchers found significant improvements in the mortality rates of children, with the most dramatic improvement for children aged 1 to 4. Death rates among these children fell to 29.4 deaths in 100,000 in 2005, compared with 42.9 deaths per 100,000 in 1994.
For those aged 5 to 9, rates of death fell 27 percent to 14.5 deaths per 100,000 in 2005.
The researchers cite a host of contributing factors, ranging from better health care and nutrition to car safety seats.
The report also noted a dramatic 84 percent drop in the rates of lead poisoning among children aged 0 to 6. Lead poisoning can result in physical, neurological and cognitive problems.
Still, many children remain at risk for moderate levels of lead in their blood should continue to be monitored, they said. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses health statistics and trends related to childhood obesity and low birthweights in the United States. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to public health and well-being, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "785-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://dukeandthedoctor.com/2010/01/obesity-and-low-birthweight-mar-health-of-u-s-kids/",
"date": "2013-05-22T21:53:01",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9732701182,
"token_count": 548,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:93ea8b71-fd83-42e2-88d4-f1e5b83bb330> | Science Fair Project Encyclopedia
Grand Opéra is a style of opera largely characterized by many features on an excessive scale. Heroic and mythological subjects, large casts, vast orchestras, richly detailed sets, sumptuous costumes and spectacular scenic effects are all features of this genre, as well as continuous music (recitative instead of spoken dialogue), a four or five-act structure and the prevalence of ballets. Originating in mid-nineteenth century France, it fell into disfavor within several decades, as the expense of staging these mammoth works and the generally inferior quality of the music caused newer styles to gain in popularity. Nevertheless, grand opéra did not die out, many composers continued to write these works, and the style continued to be influential.
Paris at the turn of the nineteenth century drew in many composers, both French and foreign, and especially those of opera. This cosmopolitan combination of influences helped to form the style of grand opéra. Several Italians working during this period, in particular Luigi Cherubini, demonstrated that the use of recitative was suited for the powerful dramas that were being written. Others wrote works to glorify Napoleon, such as Gaspare Spontini, and these operas were composed on a suitably grand scale for the emperor. Added to the influence of a large Paris Opera House capable of staging a sizeable work and the long tradition of French ballet and stagecraft, the time was ripe for the combination of influences to bear fruit starting in the late 1820's.
The acknowledged superstar of this form is Giacomo Meyerbeer, who reached prominence in the Paris opera scene beginning with Robert le Diable in 1831. He followed this work with his masterpiece, Les Huguenots, in 1836. These and other works were huge box-office successes, and even inspired the young Richard Wagner to try his hand at grand opéra with his early work, Rienzi (1842).
Other important early grand opéras include Auber's La Muette de Portici (1828), Rossini's Guillaume Tell (his final opera; 1829), and Halévy 's La Juive (1835). These operas, while not generally seen as outright failures, were not the most popular examples in their day, even though they are now viewed as being among the most influential and among the higher quality grand opéras. Other notable examples are the popular Faust (1859) by Charles Gounod and Les Troyens by Hector Berlioz (composed from 1856-1858, later revised, and not given a full performance until a century after Berlioz had died, although portions had been staged before).
Eventually, there was a backlash against the excesses of the style, and composers generally favored writing other types of opera, although many of these continued to be of a serious nature and incorporated some elements from grand opéra. Many serious operas written later are also called grand opéra even if they lack some elements of the form. Perhaps the most popular example after the general decline of the style in France is Verdi's Aida, first performed in 1871.
Today only a handful of these works survive, as their sheer length and the expense of staging them can still be prohibitive, even for the largest opera houses.
The contents of this article is licensed from www.wikipedia.org under the GNU Free Documentation License. Click here to see the transparent copy and copyright details | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is an encyclopedia entry about grand opéra, which is a historical and cultural topic. It does not contain any unsafe content, inappropriate language, or themes that would make it unsuitable for public use, educational environments, or general audiences. Therefore, it is fully safe and appropriate."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "786-0",
"llm_safety_score": 0,
"reason": "historical context"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.all-science-fair-projects.com/science_fair_projects_encyclopedia/Grand_opera",
"date": "2013-05-22T21:58:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9624242187,
"token_count": 716,
"score": 3.984375,
"int_score": 4
} |
<urn:uuid:3674dac3-9acd-401f-8bfc-1fdcdbca38e1> | By Thomas Miller
Dr. Alan Hildebrand, an associate professor at the University of Calgary, tracked the fireball that lit up the sky in Lloydminster on Feb. 21.
Hildebrand has been investigating fireballs for nearly 20 years and is co-ordinator of the Canadian Fireball Reporting Centre.
He said what we saw on Feb. 21 was an “exceptional case,” estimating the size of the rock at more than 100 kilograms.
“We would have about 100 meteorites fall in Canada each year,” said Hildebrand. “Even a relatively small fireball could drop one meteorite. That one Tuesday night is big enough that it probably dropped hundreds. Something like it would happen somewhere on the earth, let’s say once a week or so.
“That’s just the way our solar system is made – the number of asteroids we have in the asteroid belt, the rate at which material leaks out into earth-crossing orbits, that determines the frequency of these.”
Hildebrand said the speed of the rock, which was travelling at about 20 kilometres per second in the air, produced the light we saw above Lloydminster.
“You’ve got all that kinetic energy to scrub off,” he explained. “The fireball is a rock decelerating in the atmosphere. Once something is going faster than three or four kilometres per second in the air, it’s going fast enough to make a shockwave and produce light. So all that energy gets scrubbed off with a big light show.”
On an astronomical scale that is used to compare light – called V magnitude – he said the fireball was brighter than -15, which is brighter than a full moon.
“We get these all-sky cameras, so of course I compare the brightness as recorded on those cameras to brightness of other fireballs over the years,” Hildebrand said. “I compare, frankly, the impression that it makes on people. If it’s bright enough, people are more excited about it.
“I look at how much it lights up the sky. Witnesses say, ‘It lit up the ground around me,’ that means it’s getting quite bright. Security cameras show that this one lit up the ground very much so.”
Hildebrand uses the brightness of the rock to determine its size.
Simply enough: The brighter it is, the bigger it is.
And if the meteor is bright enough, that’s where the term fireball comes from.
The fireball appeared over our skies at approximately 8:40 p.m. on Feb. 21.
Because of witness reports in the Battlefords and Rockhaven, Hildebrand thinks the fireball landed somewhere southwest of North Battleford. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is a scientific report about a meteor sighting and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "787-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.lloydminstersource.com/News/tabid/68/entryid/1800/Default.aspx",
"date": "2013-05-22T21:58:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9484853148,
"token_count": 588,
"score": 3.40625,
"int_score": 3
} |
<urn:uuid:e3a01d1d-afbd-4993-98ec-f852d5d7d4a3> | Ink and Paper
For failure analysis of printed media, print head development, and transfer processes, tools that improve printing technologies.
Printing applications involve several processes such as the formulation and distribution of ink, the surface chemistry of the media to be printed and the interaction between the ink and the surface of the media. These needs demand the ability to characterize materials for both chemical and elemental information, either during product development or for failure analysis. Thermo Scientific instrumentation for materials characterization enables R&D scientists and process engineers to find answers to the questions posed by printing technologies. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text discusses the tools and processes involved in printing technologies, including ink formulation, media surface chemistry, and material characterization. There is no unsafe, inappropriate, or harmful content in the text. It is fully appropriate for all audiences, including educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "788-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.thermoscientific.com/ecomm/servlet/applicationscatalog_11152_L11587_95927_-1_1",
"date": "2013-05-22T21:45:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9177624583,
"token_count": 115,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:ffc28788-9815-44c4-b3b5-1e140f039e72> | For Immediate Release
August 16, 2011
State Board of Education reminds families to start school year with good habits
Teacher of the Year encourages schools and families to work as a team
SPRINGFIELD ― The Illinois State Board of Education (ISBE) encourages families to establish and maintain good health and study habits as schools across the state open doors for the start of a new academic year. The onset of the school year provides a good opportunity to review academic content and start the year with a positive attitude and new routines.
“Students need to arrive at school ready to learn and succeed,” said Illinois State Board of Education Chairman Gery J. Chico. “Families can help their children excel by developing habits that ensure enough sleep, a good breakfast and a dedicated study time and space. The onset of the school year is a great time to establish new routines that will better prepare children to thrive in the classroom and for the rest of their lives.”
As students approach the new school year, families might start new bedtime hours for an easier transition during the first week of school. Setting aside a quiet dedicated study space, with good light and appropriate supplies, may help children focus as they do homework.
A review of academic skills before the start of the school year may also help students succeed in the classroom. Some ideas include:
- Dictate the grocery list to a child to practice writing skills.
- Ask a child to write about summer vacation for a family scrapbook.
- Review multiplication and division skills.
- Talk about current events, the causes and possible connections to the school and local community.
- Ask students to write three goals for the school year and then discuss steps that might help them realize their goals.
- Talk to children about their fears or concerns regarding the return to school.
- If a child is transitioning to a new school building or a new district, arrange a visit to the building so they might be familiar with their surroundings and perhaps meet faculty, staff or even other classmates in advance.
- Check homework nightly and find ways to expand on topics through trips to local museums, libraries, parks and zoos.
Illinois 2010 Teacher of the Year Annice Brave, an Alton High School English and journalism teacher and finalist for the National Teacher of the Year competition, joins ISBE in encouraging families to make sure children arrive at school ready for the rigors and joy of learning.
“School doesn't only teach kids how to read, write and do math, but school is a place that prepares students for life,” Brave said. “The most important thing to remember is that learning is fun, but learning is a team effort; involved parents help teachers build better students.”
For additional information about good educational practices and fun learning ideas, visit:
- Discovery Kids, http://kids.discovery.com
- National Gallery of Arts Kids, http://www.nga.gov/kids/kids.htm
- National Geographic Kids, http://kids.nationalgeographic.com/kids
- PBS Kids, http://pbskids.org/
- The White House, http://www.whitehouse.gov/about/white-house-101
- Scholastic, http://www.scholastic.com/kids/stacks/
- Science Buddies, http://www.sciencebuddies.org
- The Center for Gifted, http://www.centerforgifted.org | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "789-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://isbe.net/news/2011/aug16.htm",
"date": "2013-05-25T05:43:38",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9314621091,
"token_count": 724,
"score": 2.703125,
"int_score": 3
} |
<urn:uuid:54d9f9db-dfac-411d-90f7-f443b63aef82> | November 23, 2011
The real five-a-day? UK kids feast on chocolate, energy
drinks and crisps
Our new survey results reveal UK kids are turning
their backs on fruit and veg in favour of snacks loaded with fat,
salt and sugar.
Nearly one in three UK kids (29%) is indulging
by eating sweets, chocolate and crisps three or more times a day.
And almost half of kids surveyed (40%) also admit they
normally drink fizzy or energy drinks during the
In contrast, almost nine in 10 kids surveyed
(88%) were not eating the recommended five portions of fruit and
veg each day. In fact, children were more likely to have
crisps at lunch (34%) than fruit (31%).
With a third (32%) of children in England aged
11-15 now overweight or obese, we've revealed
the worrying survey results as it launches its Food4Thought campaign, aimed at helping to
tackle childhood obesity.
How many UK kids normally drink fizzy or energy drinks every day?
survey of 2,000 11- to 16-year-olds helps give a unique snapshot of
their daily diet. Based on the results, the charity calculates
a child’s typical daily diet
includes one packet
of crisps, one chocolate bar, one bag of chewy jelly sweets, one
fizzy drink and one energy drink.
That means kids are consuming almost 30
teaspoons of sugar (118g), more fat than a
cheeseburger, and over a third of their daily calorie
intake from snacks alone.
Victoria Taylor, our Senior Dietitian, said:
“Five-a-day seems to have a whole new meaning for some young
people. They are consuming an alarming amount of fizzy
drinks, sweets, chocolate and crisps as a regular part of
their daily diet.
“It’s already been suggested that this
generation of children may not live longer than their
parents due to the implications of their lifestyle on
levels of obesity, type 2 diabetes and heart
“We’ve all got to realise that this
generation’s food choices today could have long term
consequences on their future health.”
Healthy vending machines
To launch the Food4Thought campaign,
we're working with 30 schools across the UK to set up
healthy vending machines. The pilot project aims
to encourage school pupils to eat healthier snacks and meals during
the school day.
The pupils will play a key role in deciding
how the vending machines are run with one school winning a
prize at the end of the school year. If
successful, we hope other schools will use their model to set
up their own healthy vending machines in the future. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample does not contain any unsafe or inappropriate content. It discusses dietary habits and health concerns in a factual and educational manner, making it fully appropriate for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "790-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.bhf.org.uk/media/news-from-the-bhf/the-real-five-a-day.aspx",
"date": "2013-05-25T06:05:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.951633811,
"token_count": 596,
"score": 2.734375,
"int_score": 3
} |
<urn:uuid:0fea3e01-d8a2-442e-ac5d-3c494714e338> | Posted by Losa on Thursday, November 8, 2012 at 11:24pm.
135 = 3^3 * 5
200 = 2^3 * 5^2
so, 135/200 = 3^3/(2^3 * 5) = 27/40
math - what is 320/380 (or in fraction term) in lowest terms? and what is 54 ...
Math - I am having trouble understanding how to reduce fractions to its lowest ...
Math - How do I figure out what is greater 67.5% or 135/200 ? Thanks!
math - how can you tell if a fraction is the lowest term?
Phsics - A disk on an air table is acted upon by the following forces 100 N 90 ...
math - 580/145 lowest term
math - write the fraction in lowest term
Math - Subtract and simplify to the lowest term: 7 1/9 - 4 2/3
math - what is 8+10+2/12+4/9 in lowest term if possible
math - what part of an hour is 45 minutes? give in lowest term
For Further Reading | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"mathematical expression\", \"score\": 0}\n```\n\n*Explanation:*\nThe given text is a mathematical expression and does not contain any unsafe or inappropriate content. It involves basic arithmetic operations and fractions, which are suitable for educational environments and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "791-0",
"llm_safety_score": 0,
"reason": "mathematical expression"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.jiskha.com/display.cgi?id=1352435094",
"date": "2013-05-25T06:05:17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.903337121,
"token_count": 234,
"score": 2.84375,
"int_score": 3
} |
<urn:uuid:74b095be-aa32-44e4-b4fd-3bfb6ee8ee17> | Tiny particles embedded in ancient Canadian rocks have provided new clues about what might have triggered Earth's deadliest mass extinction. The ultimate cause, researchers say, might be globe-smothering clouds of toxic ash similar to that spewed by modern-day coal-fired power plants.
The die-off, which occurred worldwide about 250 million years ago at the end of the Permian period, was even more extensive than the one that wiped out the dinosaurs. More than 90% of marine species went extinct, and land-based ecosystems suffered almost as much. Scientists have long debated the reasons. Favorite hypotheses include an asteroid impact, massive volcanic eruptions in Siberia, and toxic oceans. Geochemist Stephen Grasby of the Geological Survey of Canada in Calgary and colleagues report online today in Nature Geoscience a new twist on the volcano notion.
Rocks that now make up the northernmost islands of the Canadian Arctic formed millions of years ago as seafloor sediments off the northwestern coast of a supercontinent called Pangaea. When Grasby and his team analyzed rocks from just before the Permian mass extinction, they noticed unusual microscopic particles. Besides the usual miniscule clumps of organic matter, they also found tiny bubble-filled particles called cenospheres. These frothy little blobs form only when molten coal spews into the atmosphere, the researchers say. Today, the fly ash produced by coal-fired power plants brims with cenospheres, but they are largely trapped by pollution-control equipment before they escape the smokestack. Millions of years ago, they must have been created when massive amounts of molten rock—more than 1 trillion metric tons—erupted through overlying coal deposits in Siberia to form lava deposits known as the Siberian Traps.
Because the late Permian cenospheres are approximately the same size and likely about the same weight as the smallest particles of volcanic ash, they could have easily risen to an altitude of about 20 kilometers in the atmosphere and then been swept around the world by jet stream winds. And like coal ash produced today, the particles would have been loaded with toxic metals such as chromium and arsenic. When the ancient cenospheres eventually dropped into the seas, they would have converted surface waters into a toxic soup, the researchers speculate. Then, they say, after most life died, decomposition would have robbed the water of its dissolved oxygen, smothering many of the survivors.
"The evidence is pretty compelling," says Gregory Retallack, a geologist at the University of Oregon, Eugene. Geophysicist Norman Sleep of Stanford University in Palo Alto, California, agrees. The team's findings "are an extremely major discovery," he says. As the ecological consequences piled up, he notes, the chain of events set in motion by the massive Siberian eruptions "went from something bad for life to a complete disaster." Finding cenospheres in late Permian rocks worldwide would bolster the notion that the tiny particles played a major role in causing the extinction, says Grasby. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe text discusses scientific research related to the causes of a mass extinction event 250 million years ago. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and scientific in nature, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "793-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://news.sciencemag.org/sciencenow/2011/01/toxic-ash-clouds-might-be-culpri.html?ref=ra",
"date": "2013-06-19T19:25:30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9494189024,
"token_count": 628,
"score": 4.40625,
"int_score": 4
} |
<urn:uuid:452f8a57-1ed9-47ea-9f76-dbfffe727fc6> | Log Cabins in America: The Finnish Experience--
By looking at Log Cabins in America: The Finnish Experience, students consider how simple, functional cabins, like those built by the Finns in Idaho, became symbols in American politics and folklore. Those interested in learning more will find that the Internet offers a variety of interesting materials.
Log On and Learn: Discover Presidential Log Cabins
Discover Presidential Log Cabins explores why and how three Presidential Log Cabin sites are being preserved and restored at the following National Parks: Valley Forge National Historical Park in Valley Forge, Pennsylvania; Petersburg National Battlefield in Hopewell, Virginia; and Theodore Roosevelt National Park in Medora, North Dakota. Learn about the four U.S. Presidents who experienced defining moments at these historic sties, and how their actions still affect our nation today.
The Institute of Migration
Migration was founded in 1974 to promote the collection, storage,
and documentation of research material relating to international and
internal migration. Included on the site is a detailed article documenting
everyday life on Finnish American homesteads and statistics
regarding the Finnish population in the United States.
Historic American Buildings Survey/
Historic American Engineering Record (HABS/HAER)
The HABS/HAER collections document achievements in architecture, engineering, and design in the United States through a comprehensive range of building types and engineering technologies. Search the collection for documentation on numerous "log cabins" throughout the United States. Drawings and photographs, as well as historical data are provided.
Library of Congress: American Memory Collection
For a wealth of primary resources on log cabins, search the American Memory Collection. Included in the many resources are homesteader life histories written for the Works Progress Administration, sheet music about log cabins, numerous photographs, homesteader legislation, and much more.
National Archives and Records Administration (NARA)
The Archives has placed on its web site a number of items about Western Expansion, including copies of the original Homestead Act and original maps of western areas that were being settled. To find them, visit the NARA Search Engine and enter "Homestead Act."
For more information regarding the candidates involved in the "log cabin politics" of the 1839 campaign for presidency, visit the White House website. Included are biographies for President Van Buren, President Harrison, and President Lincoln who was also associated with "log cabin virtues." | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content appropriate for all audiences\", \"score\": 0}\n```\n\nThe provided text is entirely educational and historical in nature, focusing on the cultural and political significance of log cabins in America. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "794-0",
"llm_safety_score": 0,
"reason": "educational content appropriate for all audiences"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.cr.nps.gov/nR/twhp/wwwlps/lessons/4logcabins/4lrnmore.htm",
"date": "2013-06-19T19:05:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9210833907,
"token_count": 495,
"score": 3.40625,
"int_score": 3
} |
<urn:uuid:503c9d5a-11d8-43e8-8b91-708e8114a314> | In 1904, some remarkable elephant fossils were unearthed on Cape Malekas on the island of Crete by Dorothea Bate, a famous fossil hunter. Some of these fossils appeared to be from a mammoth, a group of elephants that are distinct from those we now know. Mammoths differ from the other elephants in a number of ways, such as having long and gracefully curved tusks instead of straight tusks and a domed skull instead of a flat head.
But for many years, all dwarf elephant fossils found on Mediterranean islands, including these from Crete, were thought to be descendants of the mainland straight-tusked elephant, Palaeoloxodon antiquus. Indeed, this European elephant was the ancestor of nearly all other extinct dwarf elephants found on a number of Mediterranean islands including Sicily, Malta and Cyprus. But not everyone in the scientific community was convinced that the Bate fossils were from Palaeoloxodon elephants.
Fossil elephant researcher, Victoria Herridge, at the Natural History Museum in London, wanted to learn more about the elephant fossils found on Crete, so she followed the pathway described in the Bate field notebooks and found the original coastal cliff on Crete's Cape Malekas where Bate found her fossils. Some of these fossils were exposed and included "[m]ultiple disarticulated bone and tooth fragments", writes Dr Herridge and her co-author, Adrian M. Lister, in their newly-published paper.
And as Dr Herridge suspected, this treasure trove of fossils contained the remains of a mammoth, Mammuthus creticus -- the smallest mammoth yet identified. But how did Drs Herridge & Lister determine that these fossils were from a mammoth and not an elephant? This tooth was key (figure 1b): as teeth wear down during an animal's life, the surface develops characteristic enamel 'rings'. Mammoth teeth differ from elephant teeth by having three oval rings (see "x" and "y" on figure 1b) instead of the one oval ring seen on elephant teeth:
The structure of the fossil tooth not only shows that it came from a Mammuthus, but it is most similar to earlier mammoth taxa; most likely M. meridionalis or possibly M. rumanus, rather than the more derived M. trogontherii.
M. meridionalis lived in Europe from 2.5 million to 800,000 years ago.
"But we couldn't rule out another species, M. rumanus," explains Dr Herridge. "M. rumanus is the earliest species of mammoth found in Europe (as long ago as 3.5 million years). This means the ancestor of M. creticus could have reached Crete as long ago as 3.5 million years."
Even though the diminutive size of the fossil teeth gave the team a rough idea of the size of the mammoth, the team found a fossil humerus (upper arm) bone that provided concrete evidence as to this mammoth's small size. The bone was completely fused, meaning that growth had stopped, so the team knew this bone came from an adult animal. By measuring this bone (figure 1f) and extrapolating from there, the team found that this particular adult mammoth was just 1.1m tall -- roughly the size of a modern baby African or Asian elephant:
Based on size, they estimated that the adult weighed about 300kg -- half the weight of the previously known smallest dwarf mammoth, M. lamarmorai.
Although they didn't test fossil dates in this research, the team's findings suggest M. creticus may have been on Crete longer than previously thought.
"I hadn't previously considered M. rumanus as a plausible ancestor because it was so old, geologically speaking, and so the evidence here has reminded me it doesn't do well to make assumptions in science!" Dr Herridge explained.
"In fact, this has now got us wondering about how long ago M. creticus arrived on Crete. Perhaps it got there much earlier than people generally think."
In this video, Dr Herridge shows us the fossils that led to her discovery:
Since there is much debate about how old the Cretan fossil material is, Dr Herridge and her colleagues are currently working on answering this question.
Herridge, V., & Lister, A. (2012). Extreme insular dwarfism evolved in a mammoth. Proceedings of the Royal Society B: Biological Sciences doi:10.1098/rspb.2012.0671
.. .. .. .. .. .. .. .. .. .. .. .. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and scientific content\", \"score\": 0}\n```\n\nThe text discusses historical and scientific findings related to elephant fossils and does not contain any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "797-0",
"llm_safety_score": 0,
"reason": "historical and scientific content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.guardian.co.uk/science/grrlscientist/2012/may/10/1",
"date": "2013-05-20T12:00:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9574423432,
"token_count": 958,
"score": 4,
"int_score": 4
} |
<urn:uuid:5dfef277-8327-4a34-91a7-240ca25610a6> | Title II, Part D, Enhancing Education Through Technology (Formula)
EETT Formula program provides funding to assist local education agencies (LEAs) in improving student achievement through the use of technology in elementary and secondary schools. The funding supports ongoing, sustained, intensive, and high-quality professional development to integrate advanced technologies into curricula and instruction.
Local Educational Agencies in California
Required Eligibility Criteria :
LEAs must have an education technology plan approved by the California Department of Education that meets state guidelines and federal requirements. LEAs must receive Title I, Part A funds, which serves as the basis for allocating title II, Part D funds.
Eligible Grade Level (s) :
Date Application Available:
November 30, 2010
September 30, 2012
Enhancing Education Through Technology (EETT)
Funding for school technology from the No Child Left Behind Act of 2001 used in classrooms to improve student academic achievement. Funds are distributed through formula and competitive grants.
The California Department of Education (CDE), Education Technology Office oversees the EETT Competitive and Formula Grant Program under Title ll, Part D, of the No Child Left Behind Act. Funds from this grant are used to assist eligible districts to utilize technology to enhance teaching and promote learning. Funds are distributed on an equal basis to the EETT Competitive and Formula programs.
Author: Jennifer Lewin | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a description of a government program and does not contain any unsafe, inappropriate, or harmful content. It is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "798-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.studica.com/blog/technology-grant-available-in-ca-for-k-12-registered-lea-schools",
"date": "2013-05-20T12:02:08",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8963179588,
"token_count": 287,
"score": 2.9375,
"int_score": 3
} |
<urn:uuid:c0ab2e4c-3639-4b1f-8b87-6bd1991b70c0> | When a honeybee dies it releases a death pheromone, a characteristic odor that signals the survivors to remove it from the hive. This might seem a supreme final act of social responsibility. The corpse is promptly pushed and tugged out of the hive. The death pheromone is oleic acid [a fairly complex molecule, CH3(CH2)7CH=CH(CH2)7COOH, where = stands for a double chemical bond].
What happens if a live bee is dabbed with a drop of oleic acid?
Then, no matter how strapping and vigorous it might be, it is carried “kicking and screaming” out of the hive. Even the Queen bee, if she’s painted with invisible amounts of oleic acid, will be subjected to this indignity.
Do the bees understand the danger of corpses decomposing in the hive? Are they aware of the connection between death and oleic acid? Do they have any idea what death is? Do they think to check the oleic acid signal against other information, such as healty spontaneous movement? The answer to all these questions is, almost certainly, No. In the life of the hive there’s no way that a bee can give off detectable whiff of oleic acid other than by dying. Elaborate contemplative machinery is unnecessary. Their perceptions are adequate for their needs.
Ann Druyan & Carl Sagan, Shadows Of Forgotten Ancestors: Who Are We?, What Thin Partitions | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a scientific explanation about the behavior of honeybees and the chemical signals they use. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and scientific in nature, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "799-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://fyeahchemistry.tumblr.com/post/23867899631/skaterboytae-when-a-honeybee-dies-it-releases-a",
"date": "2013-05-23T04:33:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8994722366,
"token_count": 316,
"score": 2.78125,
"int_score": 3
} |
<urn:uuid:c1f462b8-a162-4202-a3b4-bece0b08cc0f> | British Air Transport Auxiliary
A Brief History of the Air Transport Auxiliary
But d'Erlanger believed that war would create a demand for the service these pilots could provide, such as transporting dispatches, mail, supplies, medical officers, ambulance cases, and the occasional VIP. He contacted the Parliamentary Under Secretary for Air, Harold Balfour, and the Director General of Civil Aviation, Sir Francis Shelmerdine, and proposed the creation of a pool of peacetime civil pilots who could employ their aviation skills in service of their country.
As he was the one with the idea, he was given the job: to contact holders of "A" (private) licenses with at least 250 hours of flying time, and make arrangements to interview and flight-test these candidates with the goal of incorporating them into this newly created organization, which was given the working name "Air Transport Auxiliary."
About a hundred pilots responded to the offer, and they came from all walks of life: doctors, lawyers, stockbrokers, artists, innkeepers, journalists, factory managers, and farmers. War broke out on September 3, 1939, just as the first of these men were arriving at a base in the west of England for vetting.
Thirty were selected out of this group. At this time, it was decided to create two ranks in the ATA: that of Second Officer, for those whose abilities limited them to flying light single-engined aircraft, and that of First Officer, for those with over 500 hours' experience, and who could pilot twin-engined aircraft. The uniform would be dark blue, consisting of trousers, a forage cap, light blue RAF shirt, black tie, and a single-breasted jacket bearing the ATA insignia: a circlet enclosing the letters "ATA," superimposed on a set of wings. Gold bars on the shoulders would indicate rank. (Eventually there would be also Third Officers, Flight Captains, and three ranks of Commanders. Gerard d'Erlanger held the rank of Commodore.) At this stage, the ATA was under the direction of the National Air Communications and the Director-General of Civil Aviation, with British Airways responsible for clerical, personnel, and administrative purposes.
As England geared up to wartime standing, the ATA was given the urgent task of ferrying trainers, fighters, and bombers from storage units to RAF squadrons. Before the war, the RAF had thought it could handle all its own ferrying duties. But it was becoming apparent, even during the "Phony War," that more aircraft would be required to have a viable air force. The resultant workload was beyond the capacity of the RAF ferry pilots. If the war heated up, this situation would become a crisis. In addition, many more RAF pilots would be needed to fly operationally, and off-loading ferrying duties onto civilian aviators would free more Service pilots to Fighter, Bomber, and Coastal Commands.
Since most of the ATA pilots were limited to flying light single-engined training aircraft, it was decided to give them "conversion" courses to the single-engined fighters (primarily Hurricanes and Spitfires) and multi-engine types. This they would do, for the moment, at RAF Central Flying School in Upavon. The ATA would now be operationally under the control of the Air Ministry, in effect, the RAF, but British Airways would still oversee its administrative and clerical functions.
With its ever-increasing demand for ferrying services, the Under Secretary of State for Air proposed that the ATA open its ranks to women. There was a snag, though. The ATA was now operating out of RAF ferry pools, its pilots working alongside RAF transport pilots, and the Air Ministry was opposed to the posting of women pilots to RAF units. Politically and culturally, there was opposition, as well, the arguments falling broadly along two lines:
1. Aviation was an unsuitable profession for a woman.
The view taken by C. G. Grey, editor of "Aeroplane," was typical of the sentiment of the time:
We quite agree . . . that there are millions of women in the country who could do useful jobs in war. But the trouble is that so many of them insisting on wanting to do jobs which they are quite incapable of doing. The menace is the woman who thinks that she ought to be flying in a high-speed bomber when she really has not the intelligence to scrub the floor of a hospital properly, or who wants to nose around as an Air Raid Warden and yet can't cook her husband's dinner. There are men like that so there is no need to charge us with anti-feminism. One of the most difficult types of man with whom one has to deal is that which has a certain amount of ability, too much self-confidence, an overload of conceit, a dislike of taking orders and not enough experience to balance one against the other by his own will. The combination is perhaps more common amongst women than men. And it is one of the commonest causes of crashes, in aeroplanes and other ways.
Many people, men and women, voiced their protests to
these attitudes, and worked vigorously to promote the idea utilizing women
for ferrying duties, but none with so much energy and determination as
Pauline Gower, a commercial pilot with over 2000 hours' experience, and
a commissioner in the Civil Air Guard. In the latter role, she had been
responsible for overseeing the training and licensing of pilots in civilian
flying clubs. Her tireless efforts are too extensive to chronicle here.
Three books provide excellent accounts of her work and accomplishments:
A Harvest of Memories, by Pauline's son, Michael Fahie, The Forgotten
Pilots, by ATA pilot Lettice Curtis, and Spreading My Wings, by ATA pilot
Diana Barnato Walker.
The women would be based at Hatfield, just north of London, and would fly their lanes from the nearby deHavilland factory to training airfields and storage units. As it turned out, these destinations would be located for the most part in northern England and Scotland. As it also turned out, this task would be done in the middle of winter. There were two reasons why the women were given this task:
1. Nobody else wanted it.
On January 1, 1940, the ATA officially accepted the "First Eight" into service: Winifred Crossley, Margaret Cunnison, Margaret Fairweather, Mona Friedlander, Joan Hughes (the youngest, at 21), Gabrielle Patterson, Rosemary Rees, and Mirion Wilberforce. All these women were highly experienced, each having more than 600 hours of flying time, and all were rated flying instructors. Pauline, at 29, was younger than most of the women she commanded. Yet she was a natural leader, and capably shouldered the responsibilities of her office.
Pauline had an iron will and a fierce determination to see women accepted on an equal basis with men. She was a mover and a shaker, but never was pushy or overbearing. She was gracious, tactful, gently persuasive, friendly, warm, and kind. She got things accomplished because people respected and admired her. Among all the ATA pilots that I have talked with, men and women, not one has said a negative thing about her.
This was the first time in history (in England, or anywhere else in the world) that women would be officially employed in ferrying military aircraft, and, despite almost overwhelming hardships of that first winter, they would do a sterling job of it. They knew that the fate of hundreds of women pilots, who desperately longed to be also allowed into ATA's ranks, depended on them. Of their own feelings at being tendered such a heavy responsibility, Pauline joked that, in their case, ATA stood for "Always Terrified Airwomen." Their spotless and efficient record made an impression on those with the power to make things happen, and more women were accepted into the ATA.
As with the men, they came from all walks of like. Some were accomplished athletes: a skiing instructor, an international ice-hockey player, and a ballet dancer. Several were mothers (and there was one grandmother!). They were wealthy socialites and working girls, whose pre-war occupations included stunt-pilot, mathematician, mapmaker, architect, typist, actress, and world famous record-setting endurance pilot (Amy Johnson, who was killed on a ferry trip in January, 1941).
A few weeks after the First Eight were installed at Hatfield, another separate, all-civilian ATA ferry pool was formed at White Waltham, west of London. It would clear aircraft factories in the Midlands and southern England, and eventually become the administrative headquarters and conversion school by the ATA.
While the women were courting hypothermia on their trips north, the male ATA pilots, who by now numbered 157, were kept busy ferrying RAF planes from factories and storage units to operational airfields. They also collected impounded civilian aircraft.
In May, 1940, the German army broke through the French lines and swept across France to the Channel. The British Expeditionary Force and the French First Army were cut off from the rest of France's military forces and forced towards the coast. The men of the ATA were given an urgent task: to fly much needed Fairey Battles to RAF bases in France. This would be the first time ATA pilots would fly to the continent, and it would be an all too brief endeavor. Probably none of them could imagine, at that time, that they would not see France again for another four years.
Even though the pilots were given just a moment's notice to collect their planes and fly straightaway to France, by the time they arrived, the tactical situation had deteriorated catastrophically. One group of pilots was stranded overnight. The next morning, with the German army only 12 hours away, they were pressed into service flying Hurricanes back to England. These planes would be needed in the coming Battle of Britain. The men of the ATA would continue their work throughout the desperate summer, ferrying Hurricanes and Spitfires to Fighter Command squadrons as aerial battles waged in the skies over England.
At this time, the women pilots were not allowed to ferry operational aircraft. Flying fighter planes was considered beyond a woman's physical and psychological capabilities, though some of the non-operational single-engined planes they flew were almost as powerful, and their handling almost as complex, as the Hurricanes and Spitfires they dreamed of flying. In the meantime, Pauline worked tirelessly to get her women recognized as competent to ferry more advanced aircraft, and finally the decision was made to allow women to fly Lysanders, which were light Army Co-op planes designed for short take-offs and landings, and twin-engined non-operational aircraft, such as Oxfords and Dominies. This was a step, a small one, but a significant gain nonetheless. This was followed by another modest victory: For the first time, women would train at the RAF Central Flying School in Upavon.
With the end of the Blitz in May, 1941, the RAF went fully on the offensive - just in time for summer, the peak period for aerial operations. The ferrying demands for fighters and bombers would soon be far beyond the capacity of the male ATA pilots, so the women were at least cleared to fly Class 2 Aircraft, Hurricanes and Spitfires.
Four of the First Eight, Winnie Crossley, Margie Fairweather, Joan Hughes, and Rosemary Rees, took that first leap on July 19, 1941. Each did a short solo flight in a Hurricane, at their home base at Hatfield. Several more women checked out on Hurricanes over the next few weeks.
In September, 1941, eleven women ferry pilots moved to Hamble, then an all-male pool, to clear Spitfires from the Vickers Supermarine factory at Southhampton, on the south coast of England. They would also move Oxfords and Blenheims from other local plants, and ferry naval aircraft to and from the Royal Naval Air Stations in the area. All of the men, except for four, were posted to other pools. The four remaining men stayed for awhile to ferry aircraft that the women were not yet qualified to fly, and to provide orientation to the women, giving technical pointers and introducing them to the maintenance units, factories, RAF squadrons, and naval bases. Margot Gore was appointed pool commander, and the men readily accepted their status under her direction, a rare thing in those days.
In the early days of the ATA, the training on unfamiliar types was largely informal, mainly because the early joiners were highly experienced and versatile, and usually needed only a few pointers when they were assigned a plane they had not flown before. Sometimes pilots did go through standard training courses on more advanced classes of aircraft, such as at the RAF Central Flying School. Often, though, when faced with an unfamiliar type, a pilot would snag someone who had flown that particular aircraft and ask for information and helpful hints, or buttonhole one of the ground crew for particulars.
With the ever-increasing workload and influx of new pilots, who were for the most part less experienced than the pilots who had joined early on, it became necessary to institute a systematic training program for pilots as they progressed to more advanced types of aircraft. There had been several unpleasant incidents in which inexperienced pilots mistook one control for another. For instance, in the Blenheim, it was very easy to confuse he emergency fuel cut-off for the pitch control (they were located very close together, behind the pilot's head). Thus was born the ATA Conversion School, where pilots would be trained to fly various classes of aircraft.
Types of aircrafts were organized into the following categories:
Class 1: Single-engined light aircraft (primarily teachers)
Class 2: Single-engined operational aircraft (mostly fighters, such as Hurricanes, Spitfires, F4U Corsairs, and P-51 Mustangs)
Class 3: Twin-engined light aircraft
Class 4: Twin-engined operational aircraft (mostly medium bombers)
Class 5: Four-engined aircraft (heavy bombers, such as Lancasters, Stirlings, B-17 Fortresses, and B-24 Liberators)
Class 6: Flying boats (PBY Catalinas, Sunderlands)
Classes 2 and 4 also had plus ratings, for more difficult types within that class (Class 2 Plus included P-40 variants, Tempests, Typhoons, and P-39 Airacobras; Class 4 Plus included Hudsons, Mosquitos, rare or older twin-engined types, and twins with tricycle undercarriages, such as A-20 Havocs (which were also B-20 Bostons), P-38 Lightnings, B-26 Maurafers, and B-25 Mitchells.
Pilots were given classroom courses, then flying instruction - first dual, then solo - usually on only one or two representatives of each type. They were then expected to be able to ferry any aircraft in that class.
However, planes in the same class might have wildly varying control configurations and operational setting. So the Ferry Pilots Notes were created: 4x6 cards, bound on two rings, that contained everything a pilot needed to know about flying that particular aircraft - usually all on just one card, front and back. Settings and configurations were clearly indicated, as well as pertinent aircraft speeds: takeoff, climbing, cruising, landing, and (last but not least) stalling speed. Pilots also had access to maker's handling notes, which were generally on 8 to 12 pages and contained more detailed information. (Most pilots reported, however, that there rarely was time to swot up these handling notes before a flight, and the cards did the job just as well.)
Even within a particular type, there might be wide variations. In Mosquitos, the rudder trim controls migrated from the dash to the ceiling in later models. Also, the Mosquito's control column was configured differently in the bomber and fighter versions. The Spitfire went through 24 Marks, its engine rating going from 1030 horsepower to over 2000. Probably the most notorious intra-type modification was the "backwards" throttle in some P-40 Tomahawks originally destined for the French Air Force, well remembered by every ferry pilot who had to deal with it. These planes had been manufactured in the United States, to French specifications, which directed that the throttle be pushed forward to decrease power and pulled back to increase power, opposite to the way British and American planes operated. France capitulated before these aircraft could be delivered, so they were re-routed to England. To the pilots of the ATA, flying these planes was akin to driving a car in which one pressed down on the gas pedal to slow down, and eased off the pedal to speed up!
After their conversion courses, pilots would be "seconded" to a pool in a trainee capacity to gain experience in that particular class, then reassigned, usually to their "home" pool, to handle regular ferrying duties.
The success of the Conversion School, and the versatility of ATA pilots, is demonstrated by Lettice Curtis, who was the first woman to fly four-engined bombers. (Twelve women eventually attained a Class 5 Ranking.) In a single day, she flew Class 1 Aircraft, a Spitfire (Class 2), a Mitchell and a Mosquito (Class 4), and a Stirling (Class 5). Her experience was not unusual: Class 5 pilots were expected, at a moment's notice, to fly anyone of 147 types of aircraft. Class 4 pilots were capable of flying 138 different types. Almost half of the women pilots (82 in all) attained a Class 4 Ranking.
As the ATA grew, it became two unwieldy for British Airways (now BOAC) to effectively administer, and the ferrying responsibilities too complex for the Air Ministry to handle. So during 1940 and 1941 it gradually was turned over to the Ministry of Aircraft Production, the civilian organization created by Winston Churchill in 1940 to streamline and maximize production and distribution of aircraft needed for the war effort. (RAF Fighter Command Chief Sir Hugh Dowding gave credit to the MAP for providing the steady stream of Hurricanes and Spitfires that won the Battle of Britain.)
ATA pools were sited near aircraft factories they were responsible for clearing. As various types of aircraft became obsolete, the pools situated near the factories manufacturing them would be relocated to sites closer to those making newer types. By 1942, there were 14 ferry pools, which were designated by numbers:
No. 1 While Waltham
Eventually, the ATA would have 22 ferry pools. Some pools, like Hamble, Cosford, and Hatfield (which in 1942 moved to Luton) were all-women ferry pools. Most of the others were "mixed," with men and women pilots working side-by-side.
Ferry movements were complicated by the fact that England was under aerial attack throughout most of the war. It was difficult to relocate major factories, or camouflage them. (The Germans knew where they were, anyway.) With aircraft factories under constant attack, it was vital to get planes out of harm's way as soon as they were flyable. So maintenance units, or Mus, were built, where the fine work (installing armament and radios, and making other minor modifications) could be carried out under safer conditions.
Mus were smaller units, and could be easily hidden around the countryside. The use of Mus followed, on a grander scale, the general principle of "dispersal" as practiced at RAF bases: Scattering aircraft around as much as possible and also camouflaging them, so as to minimize losses in the event of aerial attack. This protection came at a cost to ATA resources: A plane needed to be ferried twice in its journey from factory to RAF base, so ATA movements were doubled from the start. If the planes were damaged in combat and could not be repaired at squadron workshops, they were ferried back to the Mus, or in some cases factories, for repair (if the planes were flyable, that is, and often they were barely airworthy, another challenged to ferry pilots).
Regarding the enormous amount of ferrying work carried out by the ATA, Commodore d'Erlanger once remarked to a group of visiting dignitaries: "Every machine you see in the sky has been, or will be, flown at some period of its life by a pilot of the ATA."
Some MUs took over various existing structures for their work: workshops, garages, barns, and sheds. Other MUs were built from scratch, and an ingenious way was found to camouflage them. A site was found near the edge of a forest or within a clump of trees. Construction workers would chop out the foliage in a central area; then tie ropes to the tops of trees at the edge of this newly-made clearing, pull them down away from the perimeter, and anchor them to the ground. That done, the workers would build the workshops and other structures inside the clearing. When this work was finished, then they would cut the ropes holding down the bordering tress, and these trees would snap right up to provide cover for the newly-born MU.
The airstrips of these MUs were in adjacent fields or bits of open land. They were usually rough, and very short. ATA pilots had to do three-point landings in order to get their planes down with a minimum amount of runway.
In the early years of the ATA, ferry pilots invariably had to get back to their bases using ground transport, which usually meant a slow, tiring journey by train. Often they would ferry planes over great distances, making the return trip excruciatingly long. (A rail system in a war zone is a model of inefficiency and discomfort.) With the desperate shortage of pilots, the time wasted in traveling by rail meant a critical drain in ferrying resources. So two solutions were found.
The first was the taxi program. The ATA acquired several planes to transport ferry pilots to the factories or maintenance units to pick up their planes, then collect them at their destinations. Some of these taxi aircraft were small, single-engined transports which could hold a few pilots, such as Puss Moths, Stinsons, Airspeed Couriers, and American Fairchilds. These were not satisfactory for the most part, for often several pilots at a time would need transport to the same factory. The Avro Anson, a twin-engined aircraft, proved perfect for taxiing duties. The Anson was designed as a bomber, but by the time the war was in full swing it was apparent that it was too underpowered for an operational role. Fortunately, "Annie" found a new life with the ATA: It could officially hold 7 or 8 pilots (and many times 10 or 12 squeezed in).
The second innovation was the institution of a relay system for ferrying planes. For longer ferrying journeys, instead of one pilot delivering a plane to its final destination, he or she would drop it off at the next ferry pool along the way. A pilot from that pool would ferry it along to the next pool, and so on until the plane reached the end of its journey.
ATA pilots faced serious risks in performance of their ferrying duties. They were not trained to be instrument rated, so bad weather was a constant danger. Although they had to abide by very detailed bad weather flying restrictions, the changeable English weather made for rather dicey decision-making. Sometimes a few degrees' drop in temperature could turn clear skies into a cloud-filled nightmare. Barrage balloons and friendly fire from anti-aircraft batteries were also a hazard. Pilots were not allowed to mark their maps with the location of defensive positions, lest their maps fall into enemy hands.
In the early years of the war, the RAF did not have complete air superiority over England, and attacks by German planes were a continuous threat. Some of the Ansons were fitted with guns (which only fired backwards), but the vast majority of times pilots flew unprotected. The planes ferried by ATA pilots were more often than not devoid of armament; if they had guns or cannon, they were unloaded anyway.
In February, 1943, a taxi Anson filled with 12 ATA pilots and flown by Jim Mollison, Amy Johnson's husband, was attacked by a Messerschmidt 110. Jim made a dash into a cloud and lost the unfriendly pursuer, then put down at White Waltham.
ATA pilots flew without radio, and often with no more sophisticated equipment other than a compass and gyro.
Besides pilots, every ATA ferry pool had a ground staff, consisting of administrative officers in command, meteorological information, operations, maps, and signals. There were also secretaries, typists, drivers, and custodial and canteen staff. Finally there were ground engineers and mechanics, who performed superbly in keeping the aircraft the ATA pilots ferried in flying condition. The ATA developed its own handling notes for maintaining and repairing aircraft; these instructions were considered to be so clear and comprehensive that they were adopted by the RAF for its own riggers and fitters. Women served as mechanics, and in every other capacity as ground staff.
There were, in addition to pilots, other flying personnel in the ATA. The organization had its own Flight Engineers, among them four women, one of whom was killed in service.
The ATA also utilized Air Training Corps Cadets, boys from 16 to 18 years of age. They were initially brought in to help out in cleaning airplanes, as there was a severe shortage of hanger staff. As a reward, they were given the occasional flight. Once airborne, they would often be given the task of winding undercarriages. Many planes at this time had manually operated landing gear, and the work in raising and lowering them was much appreciated by ATA aircrews. The Cadets were issued RAF-blue uniforms with appropriate insignia, which made them the envy of their peers.
They did such sterling work that they were offered permanent jobs with the ATA. Some worked in the post department, sorting mail and acting as runners for urgent messages. They delivered aircraft spare parts and other equipment, traveling by car or by plane. Some worked as dispatch riders and were given motorcycles for their duties. They also acted as escorts and orderlies to visiting dignitaries, among whom were the King and Queen and Eleanor Roosevelt.
As the ferrying demands grew, the ATA actively recruited pilots to handle the workload, and limitations that might bar a pilot from service in peacetime were no barrier when every capable aviator was sorely needed. Most of the men who flew were in their thirties, forties and fifties. Many physically challenged pilots also found employment with the ATA. There were a few men who were color-blind, and one who suffered from narcolepsy, who but for the unfortunate tendency to nod off at the most inappropriate times was quite a good pilot. (On his ferrying trips he would take along an "assistant" to shake him awake if he happened to fall asleep at the controls.) There were several one-armed pilots, and a one-armed, one-eyed pilot, Stuart Keith-Jopp, who was one of the first 30 men to join the ATA at its inception. He was also over 50 years old, a veteran of World War I, and an extraordinarily skilled and capable pilot who flew with the ATA until the war's end.
Many foreign pilots also found employment in the ATA. In this aspect, the ATA was known as the "Flying Legion of the Air," as pilots from 30 other countries served in the organization. There were pilots from almost every occupied nation in Europe, most of whom escaped just ahead of invading Nazis. Soon after her country was occupied by Germany, Anna Leska of Poland managed to snatch a Polish Air Force plane at an airfield guarded by German soldiers, and fly it to Rumania. She made her way to France, and then to England, where she joined the ATA and rose to the rank of First Officer.
The 30 countries that contributed pilots to the ATA were: Argentina, Armenia, Australia, Austria, Belgium, Bermuda, Canada, Ceylon, Chile, China, Cuba, Czechoslovakia, Denmark, Ethiopia, Ireland, Estonia, France, Holland, India, Malaya, Mauritius, New Zealand, Norway, Poland, Russia (one Russian pilot was seconded from the RAF), South Africa, Spain, Switzerland, Thailand, and the United States.
The Americans formed the largest foreign contingent in the ATA. One hundred and fifty-four American men served, many of them joining before America entered the war. Since the ATA was a civilian organization, these men did not violate the American Neutrality Laws by joining it, even though they ferried military aircraft. (Americans who joined the RAF were considered to be breaking the law, and risked criminal penalties such as prison terms and loss of citizenship.) One American woman joined the ATA before the US entered the war, and in 1942 Jacqueline Cochran, the record-setting American aviator, recruited 25 more. Almost all of these women made the journey to England by ship, when the U-Boat threat was at its height. Crossing the Atlantic during that time was an act of courage in itself.
With America's entry into the war and the aerial battles over Germany at a fever-pitch, the demands for aircraft ferrying increased dramatically. After scrounging every available female, foreign, handicapped and over-aged pilot, the ATA still faced a serious personnel shortfall. Jacqueline Cochran had been asked to provide 200 American women for ATA duty. This she would not do, for Jackie had a dream of her own: to start up a women's ferrying program in the US. For that she would need a sizable pool of experienced pilots, and 200 was too tall an order. Twenty-five would have to do. (Jackie would realize her dream: Her organization, the Women's Airforce Service Pilots, would employ over a thousand American women in ferrying aircraft within the continental US.)
If the ATA could not find pilots, it would create them, and thus the ab initio program was born. Most of these notives came from the Women's Auxiliary Air Force (WAAFs), from non-flying RAF personnel, and from the ATA's ground staff. They did their initial training at Barton-in-the-Clay, in Bedfordshire, then moved to Thame in Oxfordshire for their Class 2 Conversion Course. (The Class 2 training had been shifted to Luton in 1942, then to Thame in the summer of 1943 because White Waltham had become so congested with training classes and ferrying movements. White Waltham continued as a training center for twin- and four-engined aircraft.)
Also during the summer of 1943, the women ATA pilots, who had previously earned 20 percent less than male pilots, were at last given equal pay. By now they were ferrying all classes of aircraft, with the exception of Class 6 flying boats. The women faced the same dangers as the men, the same long, grueling hours of flying, the same discomforts. Pauline Gower and some of the men on the Senior Staff of the ATA took their case to the MAP, to the Treasury, to Parliament, and finally won. Pauline's son, Michael, has done an extensive amount of research on the subject, and as far as he can tell, the ATA was the first major organization or corporation to treat men and women equally as a matter of policy.
After the Normandy Invasion, the ATA was given the task of helping to ferry aircraft to the continent. At first, ATA pilots delivered aircraft to Ground Support Units (GSUs) at White Waltham and Aston Down, from where they were off-loaded onto the RAF and delivered to France by RAF ferry pilots. In September, two male ferry pilots, Hugh Bergal and Maurice Harle, a Frenchman, delivered two Spitfires to an RAF airstrip near Dieppe. Thereafter, male pilots of the ATA made regular deliveries to the continent.
With the return to the continent, and the Allied front line moving constantly eastward, supply considerations became a critical issue. The ATA's original purpose had been the transporting of supplies and personnel, but the demands of war soon made the task of ferrying aircraft its almost sole priority. After four years the ATA returned to its initial role as a transport service, and the Ansons filled the bill perfectly. ATA Ansons carried ammunition, small arms, mortar bombs, petrol, radios, spare parts, food, newspapers, and medical supplies. They also ferried passengers: military personnel, civilian VIPs, medical teams, wounded servicemen, ENSA entertainers. On the return trips, freed Allied POWs and war orphans were transported to England.
For the first time, Ansons were fitted with radio, and the ATA was given the call-sign Ferdinand. Shortly thereafter, in the proud tradition of aircraft nose art, the overseas Ansons were emblazoned with the Walt Disney character Ferdinand the Bull.
The women at this time were not officially allowed to ferry to the continent, though in late September of 1944 Diana Barnato Walker managed to fly a Spitfire to Brussels, following her husband, a Wing Commander in the RAF, in another Spitfire. At the time she was on a short leave from the ATA. Her husband Derek got permission from the Headquarters of the Second Tactical Air Force of the RAF to allow her to travel to Brussels. (In the autumn of 1943, RAF Fighter Command was split into the Second Tactical Air Force, which was to assist on offensive operations over the continent, and the Air Defense of Great Britain, which was charged with defending the skies over England.)
Shortly after Diana's trip, ATA women pilots were officially cleared to fly to the continent. In the final days of the war, some made it to Berlin. Also during this time, a few women were given the opportunity to ferry Meteor jets.
But the women of the ATA knew their days as professional aviators were numbered. With the war winding down, their services would no longer be needed. And with the huge surplus of pilots created by the war effort, their opportunities would be limited. Once again, women pilots would be viewed as "taking jobs away from men."
A few women managed to carve out professional and commercial roles. In 1963, Diana Barnato Walker became the first British woman to break the sound barrier, in a Lightning jet fighter. Monique Agazarian started her own air charter service. But most of the women found the employment doors closed.
They refused to be grounded. They would fly whenever they could, wherever they could, for as long as they could. Ann Welch traveled around the world, taking part in glider competitions. Roberta Leveaux also flew gliders, then turned to Ultralights, and in her seventies spent hours soaring above the Arizona desert. Some women, like my mother in law, taught their children to fly.
Tragically, the one person who did so much to promote the cause of women pilots did not live long enough to indulge her passion for flying. Pauline Gower died in 1947, shortly after giving birth to twin boys.
The ATA began as a way to give unemployed and idle pilots a chance to do their "bit" in the event of war. It became a huge organization, whose work was vital to the war effort.
ATA pilots delivered over 300,000 aircraft, of 51 different types. The ATA's total pilot complement comprised 1,152 men and 166 women. Other aircrew included 151 flight engineers, 19 radio officers, and 27 ATC Cadets. One hundred and twenty-nine men and 20 women were killed in service. Thirty-six pilots, among them two women, received Certificates of Commendation from the British government. Four women pilots, Pauline Gower, Margot Gore, Joan Hughes, and Rosemary Rees, were awarded MBEs (Members of the British Empire).
As this century draws to a close, most of the former ATA pilots are now in their late seventies and eighties. Many have grandchildren who are the same age that they themselves were when they flew over a war-torn England. Many are no longer here. Each year the ATA Association Newsletter chronicles the thinning of the organization's ranks.
At this time, the American contingent of the ATA Association is headed by Philip Rogers, a "youngster" of 73. He was one of the cadets, those eager teenagers who happily washed planes and cranked undercarriages in exchange for a few hours of "airtime" a week. He became a pilot in the RAF, then went on to become a flying instructor with the Oxford University Auxiliary Air Squadron. Another former cadet, Eric Viles, leads the British contingent of the ATA Association.
For all the pilots, from those who joined the ATA as seasoned aviators with hundreds of hours of flying time, to the "infants" of the ab initio program, and for the flight engineers and cadets who also took to the skies, the ATA's motto would become a lifelong aspiration: Aetheris Avidi - Eager for the Air.
Go to the Top of the Page
Copyright © 2001 US Trade Inc. All rights reserved | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context without unsafe content\", \"score\": 0}\n```\n\nThe provided text is a historical account of the Air Transport Auxiliary during World War II. It does not contain any unsafe, inappropriate, or offensive content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses the historical efforts of women pilots during World War II and their significant contributions to ferrying military aircraft. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. The text is entirely suitable for public use, educational environments, and general audiences.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text discusses the historical context of women pilots during World War II and their contributions to the war effort. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text provides a detailed historical account of aircraft classification and ferrying during World War II. It does not contain any unsafe, inappropriate, or offensive content. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text discusses the historical context of the Air Transport Auxiliary (ATA) during World War II, detailing the relocation of aircraft ferry pools and maintenance units. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provides a historical account of the risks faced by ATA pilots during World War II. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to historical events without any offensive or disturbing elements.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a historical account of the Air Transport Auxiliary (ATA) during World War II. It discusses the contributions of pilots from various countries and the operations of the ATA. The content is factual and does not contain any unsafe, inappropriate, or offensive elements. Therefore, it is fully appropriate for all audiences, including children and sensitive environments.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text provided is a historical account of the Air Transport Auxiliary (ATA) during World War II and does not contain any unsafe or inappropriate content. It discusses the roles of pilots, including women, in delivering aircraft and their contributions to the war effort. The language is respectful and the themes are appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "800-0",
"llm_safety_score": 0,
"reason": "historical context without unsafe content"
},
{
"custom_id": "800-1",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "800-2",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "800-3",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "800-4",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "800-5",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "800-6",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "800-7",
"llm_safety_score": 0,
"reason": "historical context"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.airtransportaux.com/history.html",
"date": "2013-05-23T04:48:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9830852151,
"token_count": 7828,
"score": 3.1875,
"int_score": 3
} |
<urn:uuid:f7f54672-60b4-46e8-a7dc-23ea5a981f09> | Lindane Locks and Toxic Blocks
Tags: lindane, toxic chemicals, toy testing
Formaldehyde in our clothes? Cadmium in our kids’ jewelry? Flame retardants in our furniture? Our children are being exposed to toxic chemicals everywhere. Toys, garden hoses, car interiors – it seems like everything we use is threatening children’s environmental health.
Even doctors can be putting our children at risk of toxic chemical exposure! Lindane, a pharmaceutical pesticide used sometimes to treat head lice and scabies, is a toxic chemical that can cause neurologic effects such as seizure, headache, and dizziness. It is banned in 52 countries and in California. It is no longer used in agriculture or in the military, but it can still be used on our children, even though many safer alternatives exist! Lindane has also made its way into our Great Lakes and fish.
Senate Bill 867, introduced by Senator Rick Jones in fall 2011, would allow that lindane only be used in Michigan as a last-ditch effort by physicians in their offices. This would mean less toxic exposure to our children, and less lindane in our Great Lakes. The bill is currently being reviewed by the Committee on Health Policy. Give your state senator a call or an email to ask them to support the bill!
But while this bill is waiting in the Senate, we can try to minimize the toxic chemicals our children are exposed to everyday.
Join the Michigan League of Conservation Voters and the Michigan Network for Children’s Environmental Health at a fun and educational event focused on how families can keep kids healthy from exposure to toxic chemicals found in many toys and children’s products.
What: Our Toxic Stuff Event
When: Sunday, June 3, 2012 2 - 3:30 pm
Where: Little Sprout Children’s Boutique
3009 Oakland Drive, Kalamazoo, MI 49008
At the event we’ll learn what type of chemicals are in our everyday products, how they can affect our health, ways to reduce exposure, and how we can advocate for more protective policies. We’ll have a device that detects lead and other heavy metals in all sorts of household products, and you are encouraged to bring toys or products to test from your home.
RSVP to Annika Doner at: [email protected]
or call Michigan LCV Education Fund at 734-222-9650 . | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informational content about toxic chemicals\", \"score\": 0}\n```\n\nThe text is primarily focused on educating the public about toxic chemicals and promoting a health event. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "801-0",
"llm_safety_score": 0,
"reason": "educational and informational content about toxic chemicals"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.michiganlcv.org/connect-us/blog/2012-05-21/lindane-locks-and-toxic-blocks",
"date": "2013-05-23T04:40:48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9455025792,
"token_count": 503,
"score": 2.71875,
"int_score": 3
} |
<urn:uuid:449ac9b9-482d-4760-9aa3-d78af4323c7f> | Experiencing a silent world, like that of those who are hearing impaired, whom we encounter throughout our lives, including children in public schools and even family members, is frustrating, full of altered expression and special accommodations. It would seem quite helpful to get acquainted with what this kind of disability entails, for their sake. If you are a teacher, you might want to make sure students are truly listening, and if they are unable to because of such a reason as any kind of hearing inability, you might feel a need to help guide them and their family to the appropriate resources.
Distinguishing sound is a natural ability for most of us. We take it for granted, while many suffer the lack or complete non-presence of it. Loss of hearing does not only slowly enter into people's lives at an older age; sadly some children are born without the ability to hear, due to developmental complications. Some loose it partially or fully later in life.
36 million Americans suffer from some degree of hearing loss, as the Hearing Loss Association of America informs. Studies report that one in six of these individuals were found to have signs. Furthermore, in the workplace, "as the hearing loss increases, so does the reduction in compensation," the HLAA notes. Hearing is so essential, yet so fragile.
First "consider the physical definition: Sound is a stimulus with the capability of producing an audible sensation. Any object with the properties of inertia and elasticity may be set into vibration and hence may produce a sound," an Introduction to The Fundamentals of Hearing, a second edition by Yost and Nielson informs. Sounds alert us for what is coming, like an alarm to signal the start of the day.
Many online articles mention how teenagers are at high risk of hearing loss due to listening to music too loudly, with newer technology allowing to blast the sound of their favorite artists to higher decibels. Music entertains this sense. Its high or low pitch may indicate the degree of someone's voice, while they try to communicate with another person. There are many functions to hearing we do not acknowledge most of the time, but technology is changing the obstacles that hearing impaired people face in gatherings with those without it.
The onset and progression of hearing loss may vary and extend at slow rates so being unaware of common sounds around anywhere is tricky, so here are some clues to spot the symptoms for adults:
• Denial always comes first, as people notice they hear but do not "understand": if an individual points out that people they come in contact with are mumbling more and more, they might be showing a sign of the early onset, which family and friends may notice before the actual person displaying them notices.
• If someone finds that soft everyday sounds, like a short "beep" coming out of a machine no longer makes noise while pushing a button, they might find that they have hearing loss.
• If someone needs the volume turned up too high on devices such as the television, or if they cannot make out what someone else is saying in a noisy environment, they might have hearing loss.
• Military exposure may have been a trigger in those individuals who served in combat.
Some symptoms to look out for in children are:
• If they seem like they are not paying attention, they might be hard of hearing, however children do tend to only pay attention on their own terms.
• If speech is developed late, or their speech seems different, they might have hearing loss.
• Poor self esteem, being bullied, or poor performance overall in school may also indicate it as feeling different, and not fully understanding everything may make them shy away from reaching out for help to school staff or their family.
It is harder to hear higher-pitched sounds than deeper ones. Furthermore, hearing screenings in classrooms should seem mandatory everywhere, but they are unfortunately not mandated in all states. The sooner someone gets help, the sooner they may enjoy being social and stop giving out the wrong impression. Now there are hearing aids available, sign language for the deaf community to better communicate, and closed captioning to aid their everyday activities in having an equal
American Sign Language (ASL) is a special kind of language, as it is seen and not written. The Deaf Community takes advantage of its use everywhere. Moving both hands is essential, and making facial expressions is a must. Interestingly, like in other languages, accents are part of ASL, as a system of interpersonal communication.
Sixteenth century Europe brought about the first sign language into an applicable form, from which ASL stems from. It is the fourth most widely used language in the U.S. and the interest keeps peeking to this day.
Inflammation, infection, and even serious disease may cause the loss in hearing. Genetics and complications during pregnancy may also play part. As a result of hearing loss one of the least appealing side effects is personality change.
Hearing loss is an invisible condition which effects are barely noticed by many who do not suffer from it, so giving the topic the slightest attention is necessary, as people who suffer from it may not easily be informed on all that it may entail.
Technology with all its new user friendly applications is changing the lives of the hearing impaired in more ways now than ever. The internet is spreading fast news of advancement in the field. While we may not take the time to realize how important sound is to us, you have just kindly given it your attention, as now you realize that some cannot enjoy it perhaps as much as you are able to.
360 Education Solutions is your advocate in the search for quality online teaching degree programs. As an advocate group founded specifically for educators, we provide you with the support and information needed to help you achieve your teaching certification and educational aspirations. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text is entirely educational and informative, discussing the challenges faced by individuals with hearing impairments and providing useful information about hearing loss, its symptoms, and available resources. There is no unsafe content, inappropriate language, or themes that would warrant a higher safety score.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses hearing loss, the importance of sound, and provides information about educational resources. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "802-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
},
{
"custom_id": "802-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://artbureau.blogspot.com/2012/10/silent-obstacles-of-hearing-impaired.html",
"date": "2013-05-25T12:40:22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9676331282,
"token_count": 1178,
"score": 3.484375,
"int_score": 3
} |
<urn:uuid:ac107b21-b27b-43f5-93fd-488d76ec001d> | Owned by the Office of Naval Research and operated by Scripps Institution of Oceanography at UC San Diego, FLIP is a uniquely stable research platform for scientific missions.
The One and Only FLIP Turns 50 in 2012!
The only one of its kind in the world, Scripps Institution of Oceanography at UC San Diego's FLoating Instrument Platform (FLIP) is a 355-foot-long manned spar buoy designed to serve as a stable platform for oceanographic research. Resembling a long baseball bat, FLIP is classified as a "research platform" since it has no propulsion power. Rather, FLIP is towed to its operating area in the horizontal position and, through ballast changes, is "flipped" in about 30 minutes to the vertical position to become uniquely stable. FLIP, owned by the U.S. Navy, is designed to accommodate riders in both horizontal and vertical positions, leading to a unique and sometimes bizarre layout with doors mounted on the floor, portholes in the ceiling, tables bolted sideways to walls, and stairs seemingly leading to nowhere.
Delivering its remarkable research capabilities for half a century, FLIP has supported science in a variety of locations across a spectrum of research projects, including acoustics, marine mammal research, geophysics, meteorology, physical oceanography, and laser propagation experiments.
Carrying a research team of up to 11 and a crew of five, FLIP can sustain research operations for up to 30 days without resupply and can operate either drifting or moored.
To learn more about FLIP, visit the Marine Physcial Laboratory FLIP website. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, detailing the history, design, and capabilities of the FLIP research platform. It contains no unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "803-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://sio.ucsd.edu/flip/",
"date": "2013-05-25T12:55:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9249539375,
"token_count": 337,
"score": 2.75,
"int_score": 3
} |
<urn:uuid:191fdd98-9c6c-4a47-be5e-c93d8a865e55> | Ethanol - Gas of the Future
High gas prices always provide consumers with something to complain
about. When payments at the pump continue to be more
burdensome, due to the country's reliance on foreign
oil, more and more research is directed to the
production of ethanol as a replacement.
Ethanol is classified as a form of renewable energy
and part of a larger category of alternative energies
know as biofuels. By producing and using larger
amounts of these biofuels, including ethanol, we can not
only reduce the cost of gasoline used for
trans- portation, but also create a healthier environment,
since ethanol does not emit the same harmful chemicals
into the air as fossil
Currently, there are over 80 ethanol plants in the United States, with
construction being done on many more. These plants are
now in high demand, as ethanol is being considered as an
alternative for gasoline.
The process used to create ethanol from biomass is not
complicated, and may save consumers major money at the
Renewable Energy -
Saving our Earth
Building a Green Home
Solar Cells - How
Biofuel as an
Ethanol - Gas of the
Generators - How
The Greenhouse Effect
The Future of
◙ Geothermal Energy
As this technique
is researched further and perfected, ethanol could
become a standard in the transportation industry.
First, large amounts of biomass are needed to start the process of
ethanol production. Sugars and starches are used
for this process, and some of the most popular
ingredients include corn, waste paper, trees and
grasses, industrial waste, and plant fiber.
In some other countries, material such as sugar cane is also used.
Anything that can be fermented and is made of sugars and
starches is a viable material to use for the biomass
needed to create ethanol.
Next, yeast and bacteria are used to ferment the biomass product.
This is one of the oldest techniques known to man, as it
was used in ancient days (and still is today) for
creating wine. In wine, the result is an alcoholic drink
product. In biomass, the yeast and bacteria produce
ethanol, which is also a form of alcohol in very high
Further processing of the ethanol produced by this technology results in
a product that can be used as an alternative to
As technology continues to progress, ethanol can be more easily made even
from low-value plant materials such as sawdust
and cornstalks. This could provide the United
States, as well as other countries in the world, with a
very inexpensive form of energy.
Ethanol is the gas of the future, and hopefully as the world sees
its benefits, it will be produced in larger quantities
to help keep the environment clean. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses ethanol and renewable energy sources in a factual and educational manner. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "805-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.richardpresents.com/alternative-energy/ethanol.html",
"date": "2013-05-25T12:35:18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9333999157,
"token_count": 597,
"score": 3.34375,
"int_score": 3
} |
<urn:uuid:37aed25c-e2a9-4983-a9e9-fe977554016f> | September 1, 2010
Because the end of segregated schools did not mean an end to unequal treatment for blacks in education, the ACLU endorsed affirmative action: the use of employment and admissions strategies to remedy years of discrimination.
The first major legal challenge to affirmative action in the Supreme Court came in the 1976 case, Bakke v. Regents of California, in which a white man sued over his unsuccessful application to medical school, claiming 'reverse discrimination' because he was more qualified than some black applicants. The Justices upheld affirmative action, ruling that while 'racial and ethnic distinctions of any sort are inherently suspect,' a university could take race into account under appropriate circumstances.
The issue returned to the Supreme Court several decades later in a set of cases challenging the affirmative action admissions practices of the University of Michigan's law school and undergraduate programs, respectively. The two cases were filed in 1997 by white plaintiffs who alleged that the university's consideration of race in admissions violated their constitutional right to equal protection of the laws. The ACLU, the NAACP, the Mexican American Legal Defense and Education Fund and its allies, intervened in the undergraduate case on behalf of African-American and Latino applicants. Similar local groups intervened in the law school case. In 2003, the Supreme Court held that the Constitution supported 'the law school's narrowly tailored use of race in admissions decisions to further a compelling interest in obtaining the educational benefits that flow from a diverse student body.'
The ruling affirmed the importance of affirmative action in education, but affirmative action policies have continued to garner much criticism, and several states have banned the use of affirmative action in educational and other spheres. The ACLU actively supports the continued use of affirmative action policies to secure racially diverse student bodies and counteract the effects of past and present discrimination. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the history and legal challenges surrounding affirmative action in education. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and historical in nature, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "807-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.aclu.org/print/racial-justice/aclu-history-beyond-brown-v-board-education-continuing-battle-equal-educational",
"date": "2013-06-20T02:16:02",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9543476105,
"token_count": 352,
"score": 3.859375,
"int_score": 4
} |
<urn:uuid:ea7f1a7f-e2c5-4b5d-9770-b03ec317b231> | |February 16, 2010 |
Stevens Hydrogel Research Highlighted on ABC News
ABC News Channel 7 in Denver recently posted an article discussing the risk of infection during orthopedic implant surgeries to patients who undergo hip, knee and shoulder replacement, as well as the research being done at Stevens Institute of Technology to prevent it.
According to the author, nearly 1 million people per year undergo these surgeries, and in about “1 to 2 percent of cases, an implant gets infected.” The most common cause of infection in these cases stems from the growth and proliferation of Staphylococcus epidermidis bacteria, found in the skin and mucous membranes.
Stevens is on the forefront of innovation in this area, and research has led to the creation of ‘hydrogels’ that reduce the adherence of bacteria and the growth of biofilm on the skin surface, leading to a dramatic reduction in the risk and occurrence of infection.
Dr. Matthew Libera is the focus of a Stevens Ice Blog article that goes into detail on exactly this subject. In fact, he has orchestrated an entire research environment that has been built to study the many different aspects of biomaterials-associated infection. His primary focus comes in the use of hydrogels for differential cell adhesion, which he refers to as “one of the holy grails of modern biomaterials science.” Dr. Libera goes on to say, "It's now pretty easy to make a surface to which all different kinds of cells adhere. It's also pretty easy now to make a surface that repels pretty much all cells. The challenge is to make a surface that the good cells stick to but the bad cells avoid."
With a current market valued at more than $16 billion and a projected value exceeding $23 billion by 2010, this is an extremely hot topic, and the faculty at Stevens are leading development towards vastly improved methods of treatment and prevention.
For more information on Dr. Libera’s work, please visit our Ice Blog. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses scientific research and medical topics related to preventing infections during orthopedic surgeries. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "808-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.stevens.edu/research/single_news.php?news_events_id=3124",
"date": "2013-06-20T02:10:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9546878338,
"token_count": 420,
"score": 2.890625,
"int_score": 3
} |
<urn:uuid:7a93bd9e-4bd1-4f73-a989-736dab7b444d> | Dr. Ken Gilleo
“The Coming of Copper UBM,” excepted from Dr. Ken Gilleo’s book on flip chip and related technologies, summarizes the choices and tradeoffs in flip chip substrate materials
Several developments in the past few years have solved the numerous problems associated with using copper metal in place of aluminum as the IC interconnect metal. Copper is about three times more conductive than aluminum, and allows higher frequencies to be used with smaller line widths. Many fabricators are converting to copper not just for speed, but also for cost reduction. Thinner conductors allow closer spacing and smaller chips. The switch to copper allows many times more dies per wafer, and this is where the savings come from.
Since copper is much more compatible with bump metals than aluminum, the transition to copper is expected to boost flip chip technology, possibly by eliminating the UBM step. It remains to be seen what the final finish will be for copper ICs. The industry will continue to use wire bonding as the main interconnect method, so the final pad must be compatible with gold wire bonding.
IBM has indicated that its copper chips will have aluminum as the final pad layer to accommodate wire bonding, and this may become standard practice. However, aluminum can be removed easily, without affecting the copper underneath. Aluminum is an amphoteric metal that can be dissolved in both acid and base. Dilute caustic (sodium hydroxide) quickly removes aluminum. Many other reagents also can be used.
Thus, even if new copper chips come with an aluminum finish, a simple aqueous washing step will unveil the desired copper layer. In fact, the aluminum over copper would serve to protect the copper from oxidation. Gold over nickel could also be used on copper pads similar to PWB common finishes. This too would be a very good surface for most bumps.
Conductive adhesives would receive a real boost in the switch to copper because none are compatible with aluminum. Some of the conductive adhesives form reasonably stable junctions with bare copper, especially those using an oxide-penetrating mechanism. Even for those adhesives which are not suitable for bare copper, simple UBM methods could be used. Silver and other finishes can be applied to copper by electroless, maskless plating.
The advent of copper-based chip interconnection metallurgy undoubtedly will simplify FC fabrication in the near future. It will probably be possible to directly bond the copper pads with conductive adhesives. This simple processing ability would have a great impact on cost and infrastructure issues by eliminating UBM and maybe the bumping step. Assemblers could run the entire FC preconditioning and bonding process.
FOR MORE INFORMATION
This material was excerpted from “Chapter 7. FLIP CHIP TECHNOLOGY” by Dr. Ken Gilleo
in AREA ARRAY PACKAGING HANDBOOK — MANUFACTURING AND ASSEMBLY
K. Gilleo, Editor Copyright 2002, The McGraw-Hill Companies, Inc, New York, NY | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a technical excerpt discussing the use of copper in semiconductor technology. It does not contain any unsafe, inappropriate, or offensive content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "809-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://flipchips.com/tutorial/other/the-coming-of-copper-ubm/",
"date": "2013-05-20T22:13:24",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9253432751,
"token_count": 639,
"score": 2.90625,
"int_score": 3
} |
<urn:uuid:c5242c4f-e619-4f92-ad06-1b2f74c4fa48> | Visual Computing: Redefining the Interactive Experience
Imagine exploring Paris through a digital window in your living room, using a camera to capture a 3D blueprint of your house to plan your next remodel, or trying on clothing in a virtual dressing room that shows how fabrics flow with your every move. These are a few potential applications of visual computing, a fast-growing field of technology that combines photorealism, HD video and audio, interactivity and computational modeling to enable real-time, lifelike immersive experiences.
The demand for visual computing is accelerating in parallel with increasing computational power that enables the processing of complex visual data, the proliferation of mobile devices and the demand for improved user experiences. In the future, people will use their computing platforms to interact with the world in richer ways, letting them enjoy realistic simulated experiences that blur the line between the physical and virtual worlds.
Investing in the Future
The Science and Technology Center for Visual Computing, launched in early 2011, is focused on the development of innovations in lifelike computer graphics, natural user interfaces and realistic virtual humans that will in the future make people’s technology experiences more immersive. The goal is to drive visual computing applications that not only look, act and feel real, but also accelerate the pace at which these innovations reach consumers.
The project is a collaboration between experts from eight top U.S. universities: Cornell, Harvard, Princeton, Stanford, UC Berkeley, UC Davis, UC Irvine and the University of Washington. Stanford is the hub of the virtual center, which drives projects that will explore fundamental research problems and potential applications in this emerging space.
While much of the research of the Center will focus on the development of systems and application software to enable visual computing, the results will be used to guide the development of future hardware platforms. The work of the Center is divided into four overlapping research themes: scalable real-time simulation, perception of people and places, content creation, and graphics and systems.
The simulation of physical phenomena is central to visual computing -- from light transport and appearance to the dynamics of fluids and solids, the movement of virtual characters and increasingly the sounds these systems make. Such multisensory simulations are notoriously expensive to compute, making it difficult to realize real-time simulations and develop simulation applications for mobile computing.
This theme will address physics-based simulation and multisensory rendering in an integrated and connected manner: light, motion and sound. Research will focus on the unique challenges that simulated virtual characters pose. In addition, this theme will explore the computational challenges of scalable simulation as it relates to multi-physics and multisensory software integration, parallel and distributed computing, interactive and hard real-time computation, model complexity (e.g., planetary-scale simulation), the spectrum of computing platforms (from mobile to the cloud), and ever-present memory and bandwidth concerns.
Perception of People and Places
The proliferation of digital cameras, coupled with explosive progress in computer vision, has led to major breakthroughs in sensing technologies. These technologies will impact our everyday lives -- in cameras, maps and search capabilities -- with many more uses on the way.
Advances are due mainly to the recent development of extremely accurate and robust low-level computer vision algorithms for feature detection, matching and 3D measurement. The next wave of breakthroughs will be defined by the ability to infer high-level functional and semantic information about people and environments from images and video. Beyond determining if a person is present, next-generation systems will reliably perceive who it is and what that person is doing, down to the level of actions and activities.
Such capabilities are already beginning to transform gaming experiences through 3D camera-based motion detection and control, but this is just the beginning. Next-generation 3D vision systems will go beyond raw depth measurement to perceiving the functional and semantic content of the scene. While current 3D-modeling methods represent the scene as an unorganized mass of points or triangles, next-generation systems will recognize what is in the scene -- doors, chairs, stairs, sidewalks, windows, tables and other components. Beyond scene visualization, these new capabilities will enable applications -- such as home remodeling pre-visualization and the building of searchable, functional 3D city models from online imagery and light detection and ranging (LIDAR) data -- that will enhance online virtual worlds.
Creating visual content is difficult. Consider any visual medium: photographs, video, 3D models and so on. The software tools for creating such media usually include sophisticated interfaces that provide precise and flexible control over the content. Yet, they are dauntingly difficult to learn to use effectively.
Although cameras now allow anyone to easily capture photos and video, tools for manipulating such media and creating other forms of visual content remain accessible only to experts. Two recent trends offer the promise of enabling a significantly wider set of everyday users -- of all skill levels -- to produce visual content: collaboration via the Internet and new sensing hardware for input.
Graphics and Systems Research
To create the future architectures needed to support advances such as those outlined in the above three themes, researchers at the Center for Visual Computing will explore next-generation architectures and tools that address the following four crucial technology trends:
- Personal computing is increasingly moving away from traditional desktop computers and toward mobile devices, ranging from laptops to tablets to pocket-size computers, phones and other battery-powered devices. This is creating a need to design systems that focus on mobility with an emphasis on power-aware design, miniaturization and efficient computing given a minimal cost, power and volume budget.
- Just as computing is moving away from traditional PCs and onto mobile devices, it’s also moving into the cloud, which can deliver superior reliability, cost savings and scalability compared to the desktop.
- GPU design is evolving from an emphasis on pure fixed-function designs to a much more programmable design philosophy, which promises to provide algorithm flexibility and programmer productivity, as well as improve overall system efficiency.
- Finally, at all levels of computing, from mobile to desktop to the cloud, the gap is growing between the capabilities of the hardware and the delivered performance of the software. As hardware becomes more complex, more parallel and more heterogeneous, there is a growing need to solve the programmability problem by building software that allows programmers and users to make the most of the hardware.
Creating the Future
It’s difficult to imagine all the potential visual computing experiences that will be possible in 10 years, but by bringing together the top minds in the field -- in Europe and now across the United States -- The Science and Technology Center for Visual Computing has made a substantial commitment to advancing the future of visual computing, for the benefit of researchers and consumers alike. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text discusses the advancements and applications of visual computing technology without any unsafe or inappropriate content. It is suitable for public use, educational environments, and general audiences.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is purely academic and discusses research trends in visual computing without any unsafe or inappropriate content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "810-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "810-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.awn.com/blogs/10till6/visual-computing-redefining-interactive-experience",
"date": "2013-05-20T22:08:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9104264975,
"token_count": 1374,
"score": 2.875,
"int_score": 3
} |
<urn:uuid:3c3cf895-0019-42e5-bb0e-40e81374b735> | Google Scholar Basics
What is Google Scholar?
Google Scholar is a product from Google that indexes a subset of scholarly literature in all fields. Coverage appears to be strongest in science
and technology, and for scholarship that is available online. Google Scholar indexes the full text of scholarly literature in a wide range of research areas and includes pointers to books, articles in peer-reviewed journals, preprints, and technical reports.
Are all of the sources in Google Scholar scholarly?
No. Google Scholar indexes many scholarly sources, but also includes sites that are not scholarly. Use the same criteria for evaluating sources
from Google Scholar as you would from Google.
How can I use Google Scholar to access free fulltext?
Use the searchbox above or search through FindIt! on the library homepage to access Google Scholar
. Google Scholar indexes publisher websites, which often offer to sell access to journal articles. Do not pay for articles.
The Penn Library subscribes to many thousands of e-journals through various sources. Access Google Scholar through the Penn Library and look for the PennText link within hits to see the fulltext when we have it, or to use Interlibrary Loan to request copies of articles we don't have. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely educational and informative, discussing the basics of Google Scholar and how to use it effectively. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "811-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.library.upenn.edu/research/schooglebasics.html",
"date": "2013-05-20T22:24:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9130695462,
"token_count": 247,
"score": 2.765625,
"int_score": 3
} |
<urn:uuid:ef43995c-163d-45a9-a486-dd95b13e1e0f> | ACCOUNTING TERMS - ACCOUNTING DICTIONARY - ACCOUNTING GLOSSARY
From the web's #1 provider of financial analysis / ratio analysis
FISCALIST is an economist who prefers that the government affect the economy by raising and lowering taxation and/or government spending.
Learn new Accounting Terms
PUSH-DOWN ACCOUNTING, in acquisitions, is an exception to the general rule that the acquiree's carrying values are unaffected by the purchase may arise when substantially all of the acquiree's shares are purchased by the acquirer. In that case, the acquirer may direct the acquiree to revalue its assets in accordance with the fair values attributed to those assets by the acquirer. This practice is known as push-down accounting, because the fair values are 'pushed down' to the acquiree's books. The net effect is the same as if the acquirer had formed a new subsidiary, which then purchased all of the assets and liabilities of the acquiree. There are two advantages to push-down accounting: a. The first is that the financial position and results of operations of the acquiree will be reported on the same economic basis in both the consolidated statements and its own separate entity statements. Without push-down accounting, for example, it would be possible for the subsidiary to report a profit on its own and yet contribute an operating loss to the parent's consolidated results, if the consolidation adjustments are sufficient to tip the balance between profit and loss; and, b. The second advantage is that the process of consolidation will be greatly simplified for the parent. Since the carrying values will be the same as the acquisition fair values, there will be no need for many of the consolidation adjustments that otherwise will be required every time consolidated statements are prepared.
EBITDA means Earnings Before Interest, Taxes, Depreciation and Amortization, but after all product / service, sales and overhead (SG&A) costs are accounted for. Sometimes referred to as Operational Cash Flow. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is an educational and informative piece about accounting terms and concepts. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "812-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.ventureline.com/accounting-glossary/F/fiscalist-definition/",
"date": "2013-05-20T21:58:30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9524059892,
"token_count": 409,
"score": 3.1875,
"int_score": 3
} |
<urn:uuid:c0a3752a-9de3-4cbd-89ec-9737604616ea> | The debate over whether language nudges the way we actually see the world is being resolved, and what has been the prevailing dogma - that basic parts of perception are too low-level, too hard-wired, too constrained by the constants of physics and physiology to be affected by language - is breaking down. Lera Boroditsky at Standford comments on this.
I used to think that languages and cultures shape the ways we think. I suspected they shaped they ways we reason and interpret information. But I didn't think languages could shape the nuts and bolts of perception, the way we actually see the world. That part of cognition seemed too low-level, too hard-wired, too constrained by the constants of physics and physiology to be affected by language.
Then studies started coming out claiming to find cross-linguistic differences in color memory. For example, it was shown that if your language makes a distinction between blue and green (as in English), then you're less likely to confuse a blue color chip for a green one in memory. In a study like this you would see a color chip, it would then be taken away, and then after a delay you would have to decide whether another color chip was identical to the one you saw or not.
Of course, showing that language plays a role in memory is different than showing that it plays a role in perception. Things often get confused in memory and it's not surprising that people may rely on information available in language as a second resort. But it doesn't mean that speakers of different languages actually see the colors differently as they are looking at them. I thought that if you made a task where people could see all the colors as they were making their decisions, then there wouldn't be any cross-linguistic differences.
I was so sure of the fact that language couldn't shape perception that I went ahead and designed a set of experiments to demonstrate this. In my lab we jokingly referred to this line of work as "Operation Perceptual Freedom." Our mission: to free perception from the corrupting influences of language.
We did one experiment after another, and each time to my surprise and annoyance, we found consistent cross-linguistic differences. They were there even when people could see all the colors at the same time when making their decisions. They were there even when people had to make objective perceptual judgments. They were there when no language was involved or necessary in the task at all. They were there when people had to reply very quickly. We just kept seeing them over and over again, and the only way to get the cross-linguistic differences to go away was to disrupt the language system. If we stopped people from being able to fluently access their language, then the cross-linguistic differences in perception went away.
I set out to show that language didn't affect perception, but I found exactly the opposite. It turns out that languages meddle in very low-level aspects of perception, and without our knowledge or consent shape the very nuts and bolts of how we see the world. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe text discusses the influence of language on perception and cognition, referencing academic studies and theories. It does not contain any unsafe, inappropriate, or harmful content. The language used is respectful and the themes are related to scientific research and academic debate, making it fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "813-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://mindblog.dericbownds.net/2008/02/languages-shape-nuts-and-bolts-of-our.html",
"date": "2013-05-23T11:27:30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9835957885,
"token_count": 626,
"score": 2.796875,
"int_score": 3
} |
<urn:uuid:3a530549-74ab-4e83-8263-ddcda519290c> | Dry as a dead dingo's donger
Fear over water security is increasingly dominating Australian elections
IF HE wins re-election on September 9th, Peter Beattie, Queensland's premier, has promised to hold a referendum on whether to turn sewage effluent into drinking water. As campaign pledges go, this is hardly appetising. Yet it illustrates the increasing prominence of water, or the lack of it, in Australian politics. So does the timing of the poll, which Mr Beattie was careful to call shortly before summer brings yet more water restrictions to Queensland's densely populated south-east.
The world's driest inhabited continent, Australia is facing water shortages unprecedented in the two centuries since Europeans settled it. There is a long-running drought in the country's east, the main farming belt. Sydney, the biggest city, whose main supply reservoir is just 40% full, and Canberra, the capital, are both on indefinite water restrictions. The Murray River and Darling River (known as the Murray Darling Basin, or MDB), which supply more than two-thirds of Australia's farming irrigation, are flowing at their lowest levels in a century.
The rivers run through three states whose separate laws on how much water farmers can extract from them have hampered conservation efforts. Seeking to overcome this, in 2004 the federal and state governments set up a national water market, allowing farmers to trade water across state borders, and governments to buy water. The hope is that the market will see water reallocated to regions that use it most efficiently, and that meanwhile degradation of the MDB will be reversed. It will take about a decade to see if this is the case.
In Queensland, with one of the faster-growing populations in Australia, Mr Beattie proposes also to build two new dams to serve Brisbane, the capital, and to pipe water 1,200km (750 miles) from the north of the state. Yet many have criticised these proposed schemes for being too costly and damaging to the environment. The proposal to recycle Queenslanders' sewage may also be frowned on. On July 29th voters in Toowoomba, a town in Queensland whose water is running out, voted against it.
According to recent polling, Mr Beattie is likely to win the forthcoming election at any rate. He is popular, and the opposition is not. But Australian politicians will soon have to find better ways to soothe public fears over the water crisis. “People are frightened of running out of water,” says Peter Cullen, an agricultural scientist who lobbied for the market, “and they expect governments to provide it.” | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe text discusses water security and political issues in Australia without containing any unsafe, inappropriate, or harmful content. It does not include any profanity, derogatory language, illegal activities, or explicit themes that would warrant a higher safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "814-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.economist.com/node/7855606?zid=313&ah=fe2aac0b11adef572d67aed9273b6e55",
"date": "2013-05-23T11:34:41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9692489505,
"token_count": 537,
"score": 2.796875,
"int_score": 3
} |
<urn:uuid:c40548cf-862f-4161-909e-310746036c6b> | |(PHOTO CREDIT UR)|
High-resolution image available
(please include photo credit)
|Click here to view animation|
Computer designers at the University of Rochester are going ballistic.
"Everyone has been trying to make better transistors by modifying current designs, but what we really need is the next paradigm," says Quentin Diduck, a graduate student at the University who thought up the radical new design. "We've gone from the relay, to the tube, to semiconductor physics. Now we're taking the next step on the evolutionary track."
That next step goes by the imposing name of "Ballistic Deflection Transistor," and it's as far from traditional transistors as tubes. Instead of running electrons through a transistor as if they were a current of water, the ballistic design bounces individual electrons off deflectors as if playing a game of atomic billiards.
Though today's transistor design has many years of viability left, the amount of heat these transistors generate and the electrical "leaks" in their ultra-thin barriers have already begun to limit their speed. Research groups around the world are investigating strange new designs to generate ways of computing at speeds unthinkable with today's chips. Some of these groups are working on similar single-electron transistors, but these designs still compute by starting and stopping the flow of electrons just like conventional designs. But the Ballistic Deflection Transistor adds a new twist by bouncing the electrons into their chosen trajectories—using inertia to redirect for "free," instead of wrestling the electrons into place with brute energy.
|Researchers Martin Margala, Yonathan Shapir, Paul Ampadu, and Marc Feldman are teaming together to develop the Ballistic Deflection Transistor technology. (PHOTO CREDIT UR)|
High-resolution photos available
(please include photo credit)
Such a chip would use very little power, create very little heat, be highly resistant to "noise" inherent in electronic systems, and should be easy to manufacture with current technologies. All that would make it incredibly fast. The National Science Foundation is so impressed with the idea that it just granted the University of Rochester team $1.1 million to develop a prototype.
"We've assembled a unique team to take on this chip," says Marc Feldman, professor of computer engineering at the University. "In addition to myself and Quentin, we have a theoretical physicist, a circuit designer, and an expert in computer architecture. We're not just designing a new transistor, but a new archetype as well, and as far as I know, this is the first time an architect has been involved in the actual design of the transistor on which the entire architecture is built."
The team has already had some luck in fabricating a prototype. The ballistic transistor is a nano-scale structure, and so all but impossible to engineer just a few years ago. Its very design means that this "large" prototype is already nearly as small as the best conventional transistor designs coming out of Silicon Valley today. Feldman and Diduck are confident that the design will readily scale to much smaller dimensions.
There's one hurdle the team isn't quite as confident about: "We're talking about a chip speed measured in terahertz, a thousand times faster than today's desktop transistors" Diduck says. "We have to figure out how to test it because there's no such thing as a terahertz oscilloscope!"
The Science Behind the Ballistics
The Ballistic Deflection Transistor (BDT) should produce far less heat and run far faster than standard transistors because it does not start and stop the flow of its electrons the way conventional designs do. It resembles a roadway intersection, except in the middle of the intersection sits a triangular block. From the "south" an electron is fired, as it approaches the crossroads, it passes through an electrical field that pushes the electron slightly east or west. When the electron reaches the middle of the intersection, it bounces off one side of the triangle block and is deflected straight along either the east or west roads. In this way, if the electron current travels along the east road, it may be counted as a zero, and as a one if it travels down the west road.
A traditional transistor registers a "one" as a collection of electrons on a capacitor, and a "zero" when those electrons are removed. Moving electrons on and off the capacitor is akin to filling and emptying a bucket of water. The drawback to this method is that it takes time to fill and empty that bucket. That refill time limits the speed of the transistor—the transistors in today's laptops run at perhaps two gigahertz, meaning two billion refills every second. A second drawback is that these transistors produce immense amounts of heat when that energy is emptied.
The BDT design should also be able to resist much of the electrical noise present in all electronic devices because the noise would only be present in the electrical "steering" field, and calculations show the variations of the noise would cancel themselves out as the electron passes through.
The BDT is "ballistic" because it is made from a sheet of semiconductor material called a "2D electron gas," which allows the electrons to travel without hitting impurities, which would impede the transistor's performance.
The BDT prototype was fabricated at the Cornell Nanofabrication Facility with the support provided by the Office of Naval Research.
The $1.1 million is an NSF Nanotechnology Integrated Research Team grant, which is only awarded to promising research. The team is comprised of Marc Feldman, professor of electrical and computer engineering, Martin Margala and Paul Ampadu, assistant professors of electrical and computer engineering, and Yonathan Shapir, professor of physics and astronomy. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses scientific research and technological advancements in computer engineering without any unsafe or inappropriate content.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the design and fabrication of a BDT (Ballistic Device Transistor) and its properties. It contains no unsafe, inappropriate, or harmful content. The language is technical and educational, making it fully appropriate for all audiences, including children and sensitive environments. There are no references to illegal activities, violence, or any other concerning themes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "815-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "815-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.rochester.edu/news/show.php?id=2585",
"date": "2013-05-23T11:28:28",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9527360201,
"token_count": 1180,
"score": 3.015625,
"int_score": 3
} |
<urn:uuid:3b460d5e-d4b6-4ec1-a21d-882bd15f503c> | Essential CVS/Appendixes/Clients and Operating Systems
While some people like using the command line during development, others prefer graphical interfaces. Graphical user interfaces (GUIs) also use colors and shapes to make output clearer or make the sandbox easier to work with.
Graphical CVS interfaces are available for Windows, Macintosh, and Unix or Linux systems, and there are also two Java graphical interfaces that run on any operating system with a Java Runtime Environment. These GUIs were written by third-party developers and do not come with CVS.
Third-party developers have also written tools to interface between CVS and several of the common integrated development environments (IDEs). These interfaces are most useful to programmers and are available for Microsoft Developer Studio, MetroWerks CodeWarrior, NetBeans, GNU Emacs, and anything that uses the SCC-API (Common Source Code Control Application Programming Interface). IDEs that support the SCC-API include Macromedia ColdFusion, Sybase PowerBuilder, and Microsoft Visual Studio.
CVS is designed for the Unix and Linux operating systems, and it relies on the features of those operating systems. It can behave in unexpected ways when used from a different operating system. The most obvious problem is that Windows operating systems use a different character for line endings than Unix-based systems do. CVS corrects for that particular problem, but other problems are explained in this appendix.
If your development team is not familiar with CVS, you may want to ensure that everyone is using the same CVS client. This helps minimize support problems; if someone has a problem, his fellow developers are familiar with the tools he's using and can offer helpful advice.
The clients described in this section look and operate the same across several different environments. The first three represent a set of clients that are designed for all three major operating systems—Unix/Linux, Macintosh, and Windows—and work from the same base code. The other two GUI clients are Java clients that work on any operating system twith a Java Runtime Environment.
gCVS, WinCVS, and MacCVS
Three GUI clients—gCVS, MacCVS, and WinCVS—represent a set of clients available from the same development team that work identically across Unix/Linux, Macintosh, and Windows operating systems. The clients are detailed and implement most of the functions available from the CVS command line. Using these clients, you can create a new repository, tag files, create watches, and report on the differences between files. These clients are available from http://www.wincvs.org and http://cvsgui.sourceforge.net/.
gCVS is for Linux and Unix, WinCVS is for Windows, and MacCVS is for Macintosh. Because their interfaces are so similar, these are good clients for groups that develop software across different operating systems.
These clients are laid out with three main windows, as shown in Figure A-1 (gCVS) and Figure A-2 (WinCVS). The leftmost window contains a directory tree, the base directory of which is configurable. The upper-right window shows the contents of the current directory, and the lower-right window shows the output of the CVS commands that you execute using the GUI.
Using these GUI clients, you execute CVS commands by choosing a menu option and then filling out some fields in a dialog. The output of most commands is displayed in the lower-right window. This can be irritating if the output from a given command is particularly large or complex to read. Fortunately, you can resize the output window to accomodate large and complex output. If you need to use options that are not available in the menus and dialogs, you can run command-line commands in these clients using the Command Line option in the Admin menu.
Figure A-3 shows the Cvs Files menu in MacCVS, with the output window in the background.
In Chapter 2, I recommended gCVS, WinCVS, and MacCVS as CVS clients for a development team because they are popular and have a common interface. Installation is similar for all CVS clients on the same operating system, so I've chosen these three to give an example for each operating system.
gCVS is a Linux and Unix client available from http://www.wincvs.org/ and http://cvsgui.sourceforge.net/. You can install it from source, or you can use a package manager. To use a package manager, follow the procedures givin in Chapter 2.
To install CVS from source, read the detailed instructions in Chapter 2. The procedure for installing gCVS is similar to the procedure for installing CVS, though some of the commands differ slightly.
- Decompress and expand the.tar.gz file using tar - zxf filename.
- Read the INSTALL file in the top directory of the source tree. If the instructions in the INSTALL file differ from the instructions here, use the instructions in the INSTALL file.
- Check whether the gtk development libraries are available. gCVS needs to link to these libraries when it compiles. They are available from http://www.gtk.org/.
- Change directories into the top directory of the source tree.
- Run ./make-configure --prefix=directory, where directory is the location you want to install gCVS.
- Run make.
- Change user to root,'then run make install.
- Add the installation directory to the path for your gCVS users.
- Run gCVS with the gcvscommand.
Whether you install gCVS as a package or from source, you may also need to install or configure SSH or Kerberos. If you intend to use SSH and have not used it before, you need to generate keys. If you are currently using SSH, you should already have keys. As an SSH client is often installed by default in Unix and Linux systems, you may only need to configure it.
WinCVS requires Python. If you intend to connect with SSH, it requires you to install SSH as well. These instructions assume that you will run WinCVS with SSH. Older versions of WinCVS used Cygwin instead of Python.
- Install Python 2.1 or later from http://www.python.org/.
- Install an SSH client such as Putty. Putty is available at http://www.chiark.greenend.org.uk/~sgtatham/putty/.
- Use the key-generation program for your SSH client. Store both private and public keys in files. If the key generator gives you a public key to cut and paste, use Notepad or another text editor to store the key in a file. Generate an ssh1 or ssh2 key, depending on your server's SSH protocol.
- Put a copy of the public key on the server, in your ~/.ssh/authorizedkeys file or whichever file your server's SSH program expects public keys to be in.
- If your SSH client runs a key agent, use it. Putty runs Pageant, which has an icon in the system tray. Add your private key to the key agent; to do this in Pageant, right-click on the icon and select View Keys, then Add Key.
- Download WinCVS from http://www.wincvs.org/.
- Extract WinCVS using the extractor provided; it's distributed in a self-extracting archive.
- Run setup.exe.
- Run WinCVS.
- Set ssh as the connection method. Use the following procedure:
- Select Preferences from the Admin menu.
- Open the General tab. Set the authentication option to ssh.
- Open the Settings button, and fill in the path to your SSH client. For Putty, the executable is plink.exe. Also set any options necessary for your SSH client. If you are using Putty, set the -ssh option.
MacCVS is distributed as an archive and needs to be opened with StuffIt, which is available for both OS X and pre-OS X systems. Most Macintosh systems have StuffIt installed; if yours doesn't, you can get Stuffit Expander (the free version) from http://www.stuffit.com/downloads.html. Once you've downloaded the compressed archive, just double-click it to open and install the program. That's it! You're done with the installation. To run MacCVS, open the MacCVS icon from the directory in which you installed it.
MacCVS and clients written for Macintosh systems older than OS X do not support SSH through the usual access method, where the repository path is :ext:hostname:/path and the CVS_RSH environment variable is used. To work around this, install an SSH client that supports port tunneling and use an SSH tunnel to connect to the CVS repository securely. Choose an alternate access method such as pserver or kserver and configure MacCVS to connect to the localhost on the port at the local end of the tunnel.
If you have OS X and want SSH support, try using an OS X-specific client, or use a Unix or Linux client. At the time of this writing, the MacCVS OS X client is in beta testing and has built-in SSH support.
jCVS is a Java-based CVS client (available from http://www.jcvs.org/) that is useful for development teams that need to work over a variety of operating systems. The tabs in the main window (shown in Figure A-4) control project administration, and the menus in the project window control the commands for the files.
The project window displays the files' hierarchy and the status of each file currently in the sandbox. Output from log, diff, and other commands is shown in a separate window.
SmartCVS is a Java-based client that runs on any operating system with a Java Runtime Environment. SmartCVS is available from http://www.smartcvs.com/.
There are two versions of SmartCVS: a free version and a professional version. Both implement the basic CVS commands and a few extra features, such as automatic detection of binary files. The professional version supports the annotate command and has more extensive support for tags than the basic version.
The main window has three parts: the folder hierarchy to the left, the files in the current sandbox in the right window, and CVS command output in the bottom window. SmartCVS provides side-by-side, color-coded displays of the differences between revisions, and a log display that includes graphical representation of branches.
Figure A-5 shows the SmartCVS main window in the background and the graphical log display in the foreground. The log display shows a branched file.
There are three clients available specifically for the Macintosh operating system: MacCVS (described earlier in Section A.1), MacCVSClient, and MacCVS Pro.
If you are running Mac OS 9 or earlier, you need to be aware of two issues:
- The Macintosh CVS clients for OS 9 and earlier don't have built-in SSH support. You can use SSH by following the tunnel workaround in Section A.1.1.3.
- CVS clients in Mac OS 9 and earlier may have line-ending issues, as described in Section A.4.
OS X does not have either of these problems, as it has a built-in SSH client and both OS X and CVS use Unix-style line endings.
If you are running OS X, in addition to using the Macintosh-specific clients mentioned in this chapter, you can use the CVS command-line client, as well as the Unix and Linux graphical clients.
The Concurrent Versions Librarian (CVL) client is designed specifically for Mac OS X. It is available from http://sente.epfl.ch/software/cvl/.
MacCVSClient is available for OS X and earlier versions from http://www.heilancoo.net/MacCVSClient/.
The main display of MacCVSClient is a modules window, which provides a hierarchical list of files that includes status information. Output from commands such as diff or log is stored and can be retrieved from this window later in the session, as well as immediately after you run a command. If you switch to another application, then return, MacCVSClient attempts to refresh the cached states and modification times of any open folders.
MacCVSClient supports the pserver and ext (rsh-only) repository-access methods. You can configure the repository path in the Preferences dialog from the Edit menu, shown in Figure A-6. Conflicts and the results of the diff command are color-coded to improve readability.
MacCVS Pro is a graphical client for the Macintosh, available from http://www.maccvs.org/. It has versions for OS X, OS 9, and earlier.
MacCVS Pro supports the Kerberos, pserver, and ext (rsh-only) access methods. The main display is a session window, which contains a hierarchical list of available folders and files. Files are shown with status information. Output from commands such as log and diff is displayed in a separate window. diff output is color-coded.
MacCVS Pro is fully multithreaded, enabling you to run several commands simultaneously. Commands that take time, such as update and commit, have a progress bar. A find lurkers command is a useful tool for locating files that have been left uncommitted.
Figure A-7 shows the MacCVS Pro Preferences dialog in the foreground and the main display window in the background.
Unix and Linux Clients
CVS is native to the Unix and Linux operating systems; consequently, there are no line-ending or capitalization issues. The standard, command-line client is intended for use with Unix and Linux, but there is also a wide variety of graphical CVS clients available for Unix and Linux systems.
Cervisia is available from http://cervisia.sourceforge.net/. It requires the QT and KDE libraries, but it runs on Gnome and other graphical environments if the QT and KDE libraries are available.
Cervisia provides a configurable list of frequently used CVS repositories, and configurable key bindings for common commands. Cervisia supports the commit, import, and updatecommands, as well as the tagging and watching sets of commands. One particularly useful setting is the option to run cvs edit automatically, to notify other developers when you intend to edit a file.
Cervisia has two main sections in its display screen, shown in Figure A-8. The upper section lists files and directories, and the lower section displays the output of the CVS commands that Cervisia executes for you. Right-click on a file in the upper section to open a menu with options to open the file in an editor, commit a changed file, add a file, remove a file, or run a diff over two revisions of a file.
The Resolve menu option, which you can access by right-clicking the mouse, supports automatic conflict resolution. When you invoke automatic conflict resolution, Cervisia displays both files, as well as the merged version of the two files. Cervisia then allows you to choose from several methods for handling any conflicts as a result of the merge.
LinCVS is available from http://www.lincvs.org/. It requires the QT toolkit, but it runs in most graphic environments.
The LinCVS web site displays in German by default, but it provides an English translation if you click on the British flag.
LinCVS is also available for Windows.
Start using LinCVS by selecting the "Add to workbench" option under the Projects menu and choosing a top-level directory above at least one of your sandboxes. LinCVS searches the directory and determines which files are controlled by CVS. It then adds those files to the workbench, which is a directory tree in the left window. The workbench is updated automatically on a periodic basis with a configurable timeout. You can add multiple directories to your workbench.
Figure A-9 shows the LinCVS display. The upper-right window contains the files in the active directory; double-clicking on a file opens it in an editor. The lower-right window displays CVS command output, though output for some of the commands is also displayed in a dialog.
Pharmacy is available from http://pharmacy.sourceforge.net/. It requires the Gnome libraries, but runs in almost any graphic environment.
The upper-left window is a directory tree that supports multiple repositories. The upper-right window displays files. The lower window is a console that also provides other tools. The console is a full command-line system, and it also displays command output. Figure A-10 shows the Pharmacy windows.
tkCVS is available from http://tkcvs.sourceforge.net/. It requires the Tcl/Tk libraries and works in most graphic environments.
tkCVS provides most CVS commands. It opens in your home directory and displays files and directories in the main window, with the last modification date to the right if a file or directory is not part of a sandbox. When the current working directory is a sandbox, the date, status, revision, and editors are displayed to the right of the filenames. Sandbox directories have a red "CVS" label on their folders.
Double-clicking on a filename opens an editor, as does selecting the file and clicking the Edit button. Double-clicking on a directory moves you into that directory. Double-clicking the ".."directory takes you back to the parent directory.
Commands are available from buttons at the bottom of the window or menus in the menu bar at the top. Some commands display a dialog and have further options within the dialog. The menus can be torn off and placed in convenient areas of your desktop. The results of a diff command are displayed side-by-side in a dialog window. diff, annotate, and log dialogs are searchable, and the color-coded annotation screen is helpful. Figure A-11 shows the tkCVS main windows.
There are two graphical CVS clients available specifically for Windows. One is WinCVS, which is described in Section A.1 of this chapter. The other is TortoiseCVS, which modifies the way Windows Explorer presents files.
Following are some issues you might encounter when using CVS from Windows. These issues apply equally to WinCVS and TortoiseCVS.
- Line endings differ between Windows and Unix
- CVS automatically attempts to convert the line endings of text files to Unix format. This is helpful in text files, but it causes problems in binary files that are committed accidentally as text files. When a binary file is corrupted because CVS tried to "fix" the line endings, often you can recover with the following procedure:
- Back up the current sandbox copy of the file.
- Update the file with cvs update to bring the repository version into the sandbox and reconvert the line endings.
- Check the file to ensure that it is no longer corrupt. If it is still corrupt, roll back to the most recent uncorrupted version (hopefully, the backup).
- Use cvs admin -kb filename to convert the default keyword-expansion mode of the file to binary.
- Recommit the file to the repository with cvs commit -f.
- SSH may attempt to convert line endings
- Because CVS performs its own line-ending conversion, you cannot use an SSH client that converts line endings as the client for CVS.
- Filename capitalization matters under Unix
- In Unix operating systems, file capitalization matters. NoSuchFile and nosuchfile are completely different files. If your repository contains two files whose names differ only in case and you are running an operating system that ignores case, the second file to download may overwrite the first when you check out or update a sandbox.
- Directory separators are different under Unix and Windows
- CVS uses the forward-slash character (/) as the directory separator. In most cases, internal CVS files use a forward slash wherever Windows uses the backslash character'(\). This should not cause problems, but it may cause confusion.
- Universal time
- CVS stores times in UTC (Coordinated Universal Time). This may also cause confusion, but it should not cause any problems if the time on the client is configured correctly.
- File permissions problems
- If you are running the repository on a networked filesystem accessed through a Samba server, you may have permissions problems if you are using CVS from a Windows system with the local access method. These problems can usually be fixed by enabling WRITE=YES in the Samba configuration.
TortoiseCVS is a simple CVS client for Windows that allows you to manage CVS files from within Windows Explorer (not Internet Explorer). The standard right-click menu for files is expanded to include the CVS commands that apply to a given file. TortoiseCVS is available from http://www.tortoisecvs.org/.
For files, the menu is changed only in an active sandbox. The right-click menu for folders that are not sandboxes is changed to include a Checkout option and a CVS submenu. You can import a new project with the Make New Module option in the submenu.
TortoiseCVS also works within the standard Windows File → Open dialog.
Figure A-12 shows the menu items that TortoiseCVS adds when you right-click on a folder representing a sandbox directory, in this case the man folder.
Developers rarely use CVS in isolation. The tools described in this section coordinate CVS with other programs. Some integrate CVS into IDEs; others are used in separate windows but ensure CVS can manage an IDE's files properly.
abCVS is a plugin for CodeWarrior that allows you to use CVS without leaving the CodeWarrior IDE. It requires CodeWarrior and a command-line CVS implementation such as CVSNT (explained in Appendix B). The developers of abCVS also recommend that you have a CVS client such as WinCVS.
abCVS implements the update, commit, add, remove, edit, log, status, and diff commands. Most commands can run on a single file, or they can run recursively down a directory tree. abCVS is still in an early stage of development.
abCVS is available from http://www.iaanus.com/abCVS/.
Anjuta is an IDE for the Linux and Unix operating systems that relies on the Gnome libraries. It supports more than a dozen languages (including C/C++, Java, Python, Perl, and ADA) and provides an integrated debugging facility, syntax highlighting, context-sensitive help, and support for autoconf and automake.
Anjuta provides simple, clean access to CVS commands on files in CVS sandboxes, including an intuitive interface to cvs diff. Anjuta is available from http://anjuta.org/.
BBEdit is an HTML and text editor for the Macintosh. Version 7 for OS X includes an integrated CVS client that supports multiple repositories. BBEdit is available from http://www.barebones.com/products/bbedit.html.
CVSIn is an add-in for Microsoft Developer Studio that integrates Microsoft Developer Studio and WinCVS. It permits most simple CVS commands to operate directly from Microsoft Developer Studio and relies on WinCVS for more complex CVS commands and commands that operate on directories rather than individual files.
Once CVSIn is installed, new toolbar options are available in Microsoft Developer Studio. Most of these options operate on the selected file: update, commit, diff, log, status, edit, watch, tag, and branch. There is also an option to launch WinCVS. Output from commands is displayed in a screen at the bottom of the window.
CVSIn is available from http://www.geocities.com/kaczoroj/CvsIn/.
CWCVS is a plugin for CodeWarrior that allows you to use MacCVS without leaving the CodeWarrior IDE. It is available for the Macintosh and requires CodeWarrior Gold 11 or later, MacCVS, and a CVS repository.
CWCVS is implemented in CodeWarrior as an additional menu and provides most of the CVS functions, though you need to use MacCVS for checkout and some of the administrative or advanced functions. CWCVS provides dialogs for the commands that take parameters, and it displays command output in separate windows.
CWCVS is available from http://www.electricfish.com/products/CWCVS/.
Eclipse is an open source development environment that runs on Windows, Linux, and Unix systems and is designed to support Java developers. It is extensible, and the developers encourage plugin support for other systems and languages. A CVS client is built in, and can be found in the Window and Projects menus.
Eclipse is available from http://dev.eclipse.org/.
Jalindi Igloo works with any SCC-API-compliant environment and is being tested with the programs listed at http://www.jalindi.com/igloo/Compatibility/compatibility.html. Examples of SCC-API-compliant environments include: Microsoft Visual Studio, Macromedia ColdFusion, and IBM VisualAge for Java.
Igloo provides the usual set of CVS commands and an optional auto-commit mode that automatically commits added or deleted files to the repository and automatically updates files when they are edited in the IDE.
Jalindi Igloo is available from http://www.jalindi.com/igloo/.
NetBeans is an IDE that includes a built-in CVS client, as well as clients for other version control systems. CVS integration is implemented as a module, and there are two modules available. In both modules, the CVS sandbox is represented within the IDE as a filesystem and the CVS commands are available through a right-click menu. NetBeans also provides a command line to use for more complex CVS tasks.
The NetBeans system (platform and IDE) is open source. NetBeans is available from http://www.netbeans.org/.
PCL-CVS integrates CVS with Emacs. It relies on VC, the Emacs version control interface, to allow you to use the basic CVS commands within Emacs. PCL-CVS expands VC to allow CVS to work with directories as well as individual files. It also provides an overall view of the project.
PCL-CVS is available via http://www.cvshome.org/dev/addonpclcvs.html.
VC is the Emacs version control interface, and it provides a consistent user interface regardless of which version control system is actually recording changes. VC provides only the basic functions of CVS. To use advanced CVS functions with Emacs you need to use PCL-CVS, or you can combine use of VC with use of the command- line CVS client.
VC is part of the Emacs editor. The relevant part of the Emacs manual is at http://www.gnu.org/manual/emacs/html_node/emacs_127.html#SEC127. You need to configure VC to use CVS; the instructions for doing so are in the "Customizing VC" section of the Emacs manual.
Vim is a popular editor for Unix and Linux. The graphical version of Vim offers a script that adds a CVS menu. The script is available at http://www.vim.org/script.php?script_id=58.
Zeus SCC-CVS uses the SCC-API to connect the Zeus development environment to CVS. It should also work with any editor or development environment that uses the SCC-API.
With Zeus SCC-CVS, all CVS commands are accessed under the Workspace menu, but only a limited number of commands are available within the editor. By default, Zeus SCC-CVS automatically updates the sandbox, retrieving the most current revision from the repository when Zeus is opened.
Zeus SCC-CVS is available at http://www.zeusedit.com/archives/scccvs.html. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a technical description of CVS (Concurrent Versions System) and its graphical user interfaces. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a series of instructions for installing and configuring various CVS clients (gCVS, WinCVS, MacCVS, jCVS, and SmartCVS). It does not contain any unsafe, inappropriate, or harmful content. The language is technical and instructional, and the themes are related to software installation and configuration, which are appropriate for educational and public use.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on describing different versions and clients of CVS (Concurrent Versions System) and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a technical description of various CVS (Concurrent Versions System) clients and their functionalities. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text is a technical description of various CVS (Concurrent Versions System) clients and tools used for version control in software development. It does not contain any unsafe, inappropriate, or harmful content. The text is entirely suitable for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text is a technical description of various tools and software (NetBeans, PCL-CVS, VC, Vim, Zeus SCC-CVS) and their integration with CVS. There is no unsafe, inappropriate, or harmful content in the text. The language used is respectful and the themes discussed are related to software development and version control systems. Therefore, the text is fully appropriate for all audiences and does not require any safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "816-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "816-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "816-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "816-3",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "816-4",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "816-5",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://commons.oreilly.com/wiki/index.php?title=Essential_CVS/Appendixes/Clients_and_Operating_Systems&oldid=5742",
"date": "2013-05-25T20:10:12",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8863401413,
"token_count": 6017,
"score": 2.609375,
"int_score": 3
} |
<urn:uuid:dca9913d-ee10-4ce4-b36b-a952ff2c03cf> | Cyclophosphamide is a chemotherapy medicine used to treat certain types of cancer and leukaemia. It is also given to children before and after transplants and to treat some inflammatory conditions.
How is cyclophosphamide given?
It is given as an injection or an infusion into a vein (intravenously or IV) through a cannula, central venous access device, implantable port or PICC line. It may be given by mouth in tablet or liquid form. Oral cyclophosphamide is best taken in the morning at the same time every day with plenty of water as directed by your doctor, nurse or pharmacist.
What are the side effects of cyclophosphamide?
Nausea and vomiting
Anti-sickness medicines can be given to reduce or prevent these symptoms. Please tell your doctor or nurse if your child’s sickness is not controlled or persists.
Your child may lose some or all of his or her hair or it may become thinner. This is temporary and the hair will grow back once the treatment is finished.
Bone marrow suppression
There will be a temporary reduction in how well your child’s bone marrow works. This means he or she may become anaemic, bruise or bleed more easily than usual, and have a higher risk of infection. Your child’s blood counts will be checked regularly to see how the bone marrow is working. Please tell your doctor if your child seems unusually tired, has bruising or bleeding, or any signs of infection, especially a high temperature.
Your child may experience a strange taste in their mouth while receiving cyclophosphamide. This is temporary. They may prefer different flavoured foods.
Depending on the combination of medicines and the dose that your child is given, his or her fertility may be affected. If you feel you would like more information, please discuss this with your doctor.
Irritation of the bladder wall
Cyclophosphamide can cause irritation of the bladder wall. This may lead to a condition called haemorrhagic cystitis which causes blood to appear in the urine. Your child will be given a medicine called mesna and intravenous fluids to reduce or stop this irritation. Mesna is used to protect the bladder wall from harmful effects of cyclophosphamide. It works by binding to and detoxifying the metabolites (or products) of cyclophosphamide that can be harmful. He or she will also be encouraged to drink lots of fluids. Your child’s urine may be tested for blood while they are receiving cyclophosphamide.
Hot flushes and dizziness
Cyclophosphamide can sometimes cause your child to feel hot and dizzy. This is most likely to happen when cyclophosphamide is given as a slow intravenous injection in a vein.
If your child is given cyclophosphamide for a long time, there is a very small risk of him or her developing a second cancer after many years. If you feel you need more information, discuss this with your doctor.
Changes in nails
Your child’s nails may become darker. Your child’s nail growth will return to normal in the future.
Changes in heart function
In some cases when high doses of cyclophosphamide are administered, the drug may alter the muscle of your child’s heart and how well it works. Before having high dose cyclophosphamide, your child will have a test called an echocardiogram (Echo). This test will also be used to monitor the heart during the course of treatment and at long-term follow-up clinic.
Cyclophosphamide and interactions with other medicines
Some medicines can react with cyclophosphamide, altering how well it works. Always check with your doctor or pharmacist before giving your child any other medicine, including medicines on prescription from your family doctor (GP), medicines bought from a pharmacy (chemist) or any herbal or complementary medicines.
Important information about cyclophosphamide
- Keep all medicines and tablets in a safe place where children cannot reach them.
- Store in a cool, dry place away from direct sunlight or heat.
- You should handle these medicines with care. Avoid touching the tablets wherever possible. If you are pregnant or think you could be pregnant, please discuss handling instructions with your doctor, nurse or pharmacist.
- They should be taken as directed by your doctor, nurse or pharmacist.
- If your child vomits after taking the dose, inform the doctor or nurse as your child may need to take another dose. Do not give them another dose without informing the doctor or nurse.
- If you forget to give your child their dose, do not give them a double dose. Inform your doctor or nurse and keep to your child’s regular schedule.
- Sometimes it is necessary to halve tablets to get the correct dose. A tablet cutter may be used for this, but you should keep it only for cutting chemotherapy drugs.
- If your child cannot swallow tablets, the Pharmacy department can order a liquid preparation for you.
Last reviewed by Great Ormond Street Hospital: May 2010
Ref: 2010F0624 © GOSH Trust May 2010
Compiled by the Pharmacy Department in collaboration with the Child and Family Information Group.
Please read this information in conjunction with any patient information leaflet provided by the manufacturer. However, please note that this information explains about the use of medicines in children and young people so may differ from the manufacturer’s information.
Each person reacts differently to medicines so your child will not necessarily suffer every side effect mentioned. This information does not constitute health or medical advice and will not necessarily reflect treatment at other hospitals. If you have any questions, please ask your doctor. No liability can be taken as a result of using this information. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and medical content\", \"score\": 0}\n```\n\nThe text provided is purely educational and medical in nature, detailing the use, administration, and side effects of cyclophosphamide, a chemotherapy medication. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a disclaimer and information from a reputable medical institution (Great Ormond Street Hospital). It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to medical information, which is appropriate for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "817-0",
"llm_safety_score": 0,
"reason": "educational and medical content"
},
{
"custom_id": "817-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.gosh.nhs.uk/medical-conditions/medicines-information/cyclophosphamide/?vAction=customCSS&CSS=Beta",
"date": "2013-05-25T19:55:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9276422858,
"token_count": 1199,
"score": 3.03125,
"int_score": 3
} |
<urn:uuid:c648eeca-4404-4a81-8456-7568cfbee053> | Find topics in left sidebar.
Vocabulary words are the building blocks of communication. As you progress, you will want to expand your vocabulary in areas that are of interest to you. But, beware!
Don't waste your time.
Too many beginning courses bombard you with long lists of Spanish vocabulary words to memorize. For most people, this is counter-productive because you won't even be using many of these words—and so you will eventually just forget them anyway.
Less is more!
With Camino del éxito we purposely keep the number of vocabulary words to a minimum. The words that are used are repeated over and over throughout the course, so you really learn them well, and they are words that you will find yourself using every day.
Once you have learned the basics, will want to expand your Spanish vocabulary in areas that are of interest to you. Maybe you work in health care—you'll be interested in medical and anatomical terms. If you're into sports, then you will find a whole different set of words to be the most useful.
Free or Premium
This vocabulary section is organized by topic, and each topic has a "free" version and a "premium" version. They both have the same exercises and learning activities. The difference is that the premium version has more words – twice as many!
Twelve months premium access is included with our complete conversation course.
Make your own flashcards!
Truth be told, the simple 3X5 flashcard that you make yourself is your most powerful tool for learning new Spanish vocabulary. The reason is simple: you can always carry a few flashcards with you, and so you can turn what would otherwise be wasted time (standing in line, stuck in traffic, etc.) into productive study time. Even if all you have is 2 minutes, that's enough time to review a few flashcards. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is entirely educational and does not contain any unsafe, inappropriate, or harmful content. It discusses vocabulary learning and provides advice on effective study methods without any offensive language or themes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "818-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.studyspanish.com/vocab/index.htm",
"date": "2013-05-25T19:43:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9641631246,
"token_count": 386,
"score": 2.609375,
"int_score": 3
} |
<urn:uuid:bd3f3ca2-3f67-41ba-b80b-998644104e89> | Last days when I worked with Silverlight and made some example. I destroyed myself my Internet Explorer. It suddenly does not work anymore. When I click on the icon on task bar, IE starts and hangs. After 30 seconds, an error comes to say that IE does not work anymore and turn itself off.
I tried to restore the settings in Internet Option because I though that I made something with it. But it still does not work. It makes really angry because of this silly error. So I decide to install Internet Explorer 8. I think everything will work again. But that is what I think. The truth is more cruel: it does not run. And yesterday with the last hope I installed the final version of IE 8. And my IE still can not run.
So I made a decision to play around with the IE Options. It must be the problem. When playing around with IE Options, I opened IE under “Run as administrator” (I am using Vista 32 bit). And it runs. Wonderful. But I realized that when I start IE normally. It still hangs and crashes. Which option in IE causes a conflict with priviledge? Why does IE can “Run as administrator”. After playing in Security Tab for a while, I finally found out that the Protected Mode is ON. When I turn it off, IE will run happily.
This is information about Protected Mode from Microsoft
Protected Mode is an important step forward in security for Internet Explorer (IE); it helps protect users from attack by running an IE process with greatly restricted privileges on Windows Vista. While Protected Mode does not protect against all forms of attack, it significantly reduces the ability of an attack to write, alter, or destroy data on the user’s machine or to install malicious code.
It is an interesting mode. But it does not work now at my computer. Anyway I mostly use Firefox. It is ok when I do not have this mode in my IE. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses technical issues with Internet Explorer and does not contain any unsafe, inappropriate, or harmful content. It is suitable for a general audience and does not require any restrictions or filtering."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "819-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://hintdesk.com/internet-explorer-can-only-run-as-administrator/",
"date": "2013-06-20T08:44:55",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9456962943,
"token_count": 405,
"score": 2.546875,
"int_score": 3
} |
<urn:uuid:bae48174-3c48-4884-a4de-0e2945f22dc0> | - Better Roads - http://www.betterroads.com -
Posted By admin On June 3, 2011 @ 4:57 pm In In the Magazine,Road Science | No Comments
Diamond Grinding vs. Micromilling
By Tom Kuennen, Contributing Editor
Diamond grinding of Portland cement concrete pavements and micromilling of bituminous asphalt pavements are superficially similar in concept, but that’s just about the only thing they have in common.
Diamond grinding of aging Portland cement concrete (PCC) pavements renews the pavement’s skid-resistance, and provides a smoother-riding pavement. And the resulting smoother profile reduces dynamic loading on the pavement, thus extending its service life.
On the other hand, micromilling, or fine-tooth milling – using conventional cold mills with fine-tooth drums and hardened teeth – can remove imperfections from an asphalt surface and prepare it for a super-smooth thin asphalt overlay in a manner superior to conventional cold milling. In some cases, it can even be used instead of grooving or grinding pavements.
Following several years of research, promotion has begun for a new permutation of the diamond grinding process, the Next Generation Concrete Surface (NGCS). As promoted by the International Grooving and Grinding Association (IGGA), the NGCS is said to suppress noise from concrete pavements while enhancing friction and smoothness. The NGCS is being promoted following three years of research at the Minnesota Road Research Project (MnROAD), the world’s largest and most comprehensive outdoor pavement laboratory.
Early in 2011, new NGCS test sections were constructed at the Virginia Tech Transportation Institute’s Smart Road test facility near Blacksburg, Va. In January, three test strips situated on two test areas were constructed, including a conventionally-diamond-ground section, and an area that was conventional followed by longitudinal grooving of each half of the lane using two different groove spacings, of 0.5 and 0.75 inches respectively.
Each of the two test areas were ground one-lane wide and 528 feet long, and will allow the institute to study the impact of grinding and grooving on profiler measurements and on friction test results. In addition, the sections allow the future evaluation of splash and spray, as the Virginia Tech facility has this capability as well.
Diamond Grinding PCC Pavements
Diamond grinding is a concrete pavement preservation technique that corrects a variety of surface imperfections on concrete pavements, and should be used in conjunction with other pavement preservation techniques, reports IGGA.
It involves the removal of a thin layer of the cured concrete surface using a dedicated, self-propelled machine with closely-spaced diamond-coated circular saw blades. Diamond grinding restores rideability by removing surface irregularities. The immediate effect of diamond grinding is a significant improvement in the smoothness of a pavement, and a significant increase in surface macrotexture with improvement in skid resistance, noise reduction and safety.
The value of diamond grinding is borne out by a California Department of Transportation (Caltrans) study, conducted to quantify the expected longevity of a diamond-ground PCC pavement, and its overall effectiveness under various weather conditions and construction practices. In the study, Caltrans reported that diamond grinding “is a viable and cost-effective rehabilitation measure when properly applied. Diamond grinding not only extends the service life of a concrete pavement, but it also reduces tire-pavement interface noise and improves texture and skid resistance. Because the pavement is much smoother after grinding, highway user costs are also reduced through improved fuel efficiency and lower vehicle maintenance costs.”
Diamond grinding provides a smooth surface that can reduce dynamic loading and increase pavement longevity, IGGA reports. Increased pavement life will be obtained by reducing the roughness, IGGA maintains, and can be demonstrated using the American Association of State Highway & Transportation Officials (AASHTO) 1993 Pavement Design Equation. In that equation, serviceability is analogous to smoothness, which means that increased serviceability (a smoother pavement) will result in more equivalent single-axle loads carried by the pavement, the association says.
Diamond-ground surfaces have been found to reduce accident rates, IGGA reports. The Wisconsin DOT, working with Marquette University, found that the overall accident rate for diamond-ground surfaces was only 60 percent of the rate for nonground surfaces. The diamond-ground pavements provided significantly-reduced accident rates up to six years after grinding.
While creating a smoother pavement, diamond grinding does not affect the fatigue life of a pavement and does not raise the pavement surface elevation. Grinding also does not affect the hydraulic capacities of curbs and gutters on municipal streets, unlike bituminous overlays that fill curb and gutter, and reduce their drainage capabilities, IGGA says. Diamond grinding can be applied only where improvement is needed, and can be performed during off-peak hours.
Micromilling Asphalt Pavements
Unlike diamond grinding, micromilling pavements do not require a dedicated machine, as they can be applied by a conventional asphalt cold mill fitted with a fine-tooth drum.
This is particularly important when placing so-called thin HMA overlays, microsurfacing or other spray surface treatments. There, micromilling is preferred to a conventional drum because the latter provides a “peaks-and-valleys” pattern that will be relatively high and deep. If an agency is not placing a lift that’s thicker than 1 to 1-1/4 inches, the rough surface can reflect through to the paved surface. But with 5/16-inch bit spacing (or less) – the definition of a fine-toothed drum – an owner or contractor can minimize the potential reflection of the peaks and valleys through the thin lift surface.
Georgia DOT’s micromill spec – Section 432: Mill Asphaltic Concrete Pavement (Micro-Mill) – describes micromilling of existing asphalt concrete pavement to remove wheel ruts and other surface irregularities, and restore proper grade and/or transverse slope of pavement as indicated in the plans or as instructed by the engineer.
“The planed surface shall provide a texture suitable for use as a temporary riding surface or an immediate overlay with OGFC [open-graded friction course] or PEM [porous European mix] with no further treatment or overlays,” Georgia DOT says in its spec, and limits use of the micromilled pavement as a temporary riding surface to a maximum of seven days.
• equipped with a cutting mandrel [drum] with carbide-tipped cutting teeth designed for micromilling bituminous pavement to close tolerances;
• equipped with grade and slope controls operating from a stringline or ski and based on mechanical or sonic operation;
• capable of removing pavement to an accuracy of 1/16 inch (1.6 mm);
• furnished with a lighting system for night work, as necessary; and
• provided with conveyors capable of side, rear, or front loading to transfer the milled material from the roadway to a truck.
Prior to commencement of the work, Georgia DOT requires a 1,000-foot test section with uniformly-textured surface and cross section as approved by the engineer.
Next Generation Concrete Surface
While concrete diamond grinding has been limited to smoothing rough concrete surfaces, the Next Generation Concrete Surface offers a new application for enhancement of PCC pavement smoothness, friction and, especially, noise created at the tire-pavement interface. That’s important, because noise is more and more considered an emission into the environment that must be controlled.
The NGCS is a diamond saw-cut surface, designed to provide a consistent profile absent of positive or upward texture, resulting in a uniform land profile design with a predominantly negative texture. NGCS is a hybrid texture that resembles a combination of diamond grinding and longitudinal grooving.
The texture is most easily constructed in a two-pass operation using diamond-tipped saw blades mounted on conventional diamond grinding and grooving equipment. Testing has shown that these textures can be used for both new construction and rehabilitation of existing surfaces.
The construction method has two separate operations, reports the Washington State DOT in its April 2011 report, Evaluation of Long-Term Pavement Performance and Noise Characteristics of the Next Generation Concrete Surface. The first operation creates a flush ground surface and eliminates the joint or crack faults while providing lateral drainage by maintaining a constant cross slope between grinding extremities in each lane.
The second operation provides the longitudinal grooves, Washington DOT reports. The longitudinal grooves are 0.125 inches wide and 0.125 to 0.375 inches deep. The longitudinal grooves are spaced approximately 0.5 inches center to center. The grooves are constructed parallel to the centerline.
Another variation of diamond grooving and grinding is “patch-and-grind.” Cook County, Ill., in the heart of the Chicago metro area, reports great success serving its road users by using the patch-and-grind method of concrete pavement restoration.
Patch-and-grind involves full- or partial-depth concrete pavement patching and joint repair, followed by diamond grinding of the entire pavement. The patching addresses structural issues such as cracked panels and spalled joints, while the diamond grinding addresses the functional deficiencies.
Patching without diamond grinding can result in poor rideability and is not an attractive alternative when considering the most effective use of the taxpayer’s money, IGGA reports. But the patch-and-grind repair method has proven to be a lower-cost construction alternative when compared to a full reconstruction, the association says. Motorists also realize the benefit of the shorter construction duration.
The Cook County Highway Department has used diamond grinding on a growing number of projects and the technique has migrated into adjoining Lake County, Ill. Full reconstruction of these pavements would have cost the taxpayers three times more than the patch-and-grind technique, IGGA says. A full reconstruction costs approximately $45 to $50 per square yard, while a patch and grind costs approximately $15 a square yard.
“When a typical full reconstruction of a lane-mile costs $1 million, the use of patching and grinding makes sense because it can be done at a fraction of the cost, provides long-lasting repairs and creates far less inconvenience to the motoring public,” says John Beissel, P.E., assistant superintendent, Cook County Highway Department.
Micromilling Fixes Cross Slopes
Micromilling with cold mills isn’t limited to preparing asphalt pavements for thin asphalt overlays. South Carolina is taking a leadership position on micromilling to correct cross slopes, and it shows in the increase of fine milling jobs undertaken by one contractor, Pavement Products and Services (PPS), Piedmont, S.C.
“South Carolina has a lot of ‘flat’ roads,” says Douglas E. Limbaugh, the company’s project manager. “The cross slopes are out of balance. So, we will surface-plane or micromill an inch or two off the road, to get the aged asphalt off, and once that’s done, variable surface-plane or cross-slope correct the main lines or roadways.”
By doing the planing in two stages, the company eliminates the drop-offs that would result in doing the work in one pass. “Motorists don’t have to drive with more than a 1-inch drop, and in the meantime they get a better surface to drive on,” Limbaugh says.
In 2010, PPS was cold-milling day and night with fine-tooth drums. For example, in March 2010, during the day, the company was micromilling the I-185 expressway just southwest of downtown Greenville, S.C., and at night, was using some of the same equipment to micromill I-85 west of the city.
“Using our fine-tooth drums, we are removing an inch from I-185, then coming back the same day and fine-milling a second inch,” Limbaugh says. “We then will go to isolated areas and cross-slope correct there.” That project represented two 50,000-square-yard lifts, 100,000 total.
The I-85 work – three lanes both north and south – that night was part of a total 1.4 million square yards of 1-inch micromilling, and 295,000 square yards of variable surface planing for cross-slope correction. “We will be using two full-lane cold mills with 12.5-foot drums, and a half-lane micromill.”
The South Carolina DOT uses the terms “surface planing” but the same term applies to “fine milling” and “micromilling,” Limbaugh says. “The spacing on the cutter drum must be 0.2 inches, which translates to 5 mm spacing,” he said. “It means from chevron to chevron, or tooth mark to tooth mark, you have to have 5 mm or less.
“The state also requires tolerances of 1/8 inch from high to low on the tooth marks, so you can’t just put a thousand-tooth drum out there and run 80 feet per minute,” Limbaugh says. “You have to go at a steady pace, because that will leave as smooth a surface as you can. In ride quality, it’s comparable to a porous friction course.” On top of that, for cross-slope correction, the state imposes a rideability spec.
As standard bids are cut to the bone, these contractors strive to earn smoothness bonuses, which PPS makes easier by its fine milling. “We are setting them up not to fail, but to win, by giving them a superior surface,” Limbaugh says.
Fine-Mill Grooving Substitute?
Micromilling with a fine-tooth drum also can be used on driving surfaces just to restore friction and smoothness.
For example, fine milling or texturing may be appropriate for a county that does not have a lot of money to mill out and pave its roads completely, and they may just want to shape up the roads and remove some rutting and areas where asphalt is shoved in intersections. “A fine milling drum can be put in a cold mill and used to repair that driving surface,” says Jeff Wiley, senior vice president with equipment manufacturer Wirtgen America. “The county will have bought some time while being able to open a road to traffic immediately.”
With a narrower drum on a smaller cold mill, fine milling is also useful for removal of road markings, or for prepping pavements for road-marking application.
But in limited instances – at least when a pavement is prepped for an overlay – micromilling with a fine-tooth drum can replace diamond grinding of existing pavement. For example, not too long ago, micromilling was used instead of the specified diamond grinding of the driving surface of the President George Bush Turnpike north of Dallas.
There, the President George Bush Turnpike is a major east-west route in the northern half of the Dallas Metroplex, and is a 30.5-mile, six-lane, limited-access toll highway that passes through or along the cities of Garland, Richardson, Plano, Dallas, Carrollton, Farmers Branch and Irving.
The turnpike owner – the North Texas Tollway Authority – planned to overlay a section of the expressway with NovaChip proprietary open-graded friction course. But such thin lifts – with maximum 3/8-inch stone – require extremely well-prepared and even surfaces for placement. Any irregularity in the existing pavement will reflect through the thin surfacing immediately.
Conventional surface prep for worn pavements previously involved diamond grinding the pavement to precise tolerances. But cold milling subcontractor TexOp Construction, Roanoke, Tex., in conjunction with its general contractor APAC, proposed to cold-mill using a 2-meter (6.56-foot) fine-tooth drum to prepare and level the aged asphalt pavement surface prior to the thin surfacing.
The project already had been designed with diamond grinding in the contract, so a change order was the means to get the cold mill on the project instead of a diamond grinder. On this particular job, fine-texturing with a cold mill saved the authority a significant sum over diamond grinding. Also, the diamond grinders were asking for a minimum 60 days, and the contractor was on track to finish the same area in 10 to 14 days.
“There was a very high cost to the diamond grinding,” says Danny Simpson, vice president and managing partner, TexOp Construction. “Also, the time it would take to do the diamond grinding was excessively long. We proposed to do the job in a much shorter period of time at a lower cost, but with the same benefit as the diamond grinding, 20 days versus 60 days, giving them exactly the same ride in a third of the time.”
First, both the turnpike authority and the Texas DOT requested a test section. “We did a test project for Texas DOT using the fine-texture drum,” Simpson says. “People came out, took a look and liked what they saw, including the smoothness of the ride and the pattern of the drum. They were skeptical until they saw the process work.”
Article printed from Better Roads: http://www.betterroads.com
URL to article: http://www.betterroads.com/roadscience-7/
Copyright © 2009 Better Roads. All rights reserved. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a technical article discussing diamond grinding and micromilling techniques in road construction. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a technical discussion about micromilling asphalt pavements and concrete surface treatments. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses the cost and benefits of different road repair methods, including full reconstruction and patch and grind techniques. It also provides information on micromilling and its applications in road maintenance. The content is entirely educational and does not contain any unsafe or inappropriate elements.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the use of micromilling techniques in road construction, specifically mentioning the President George Bush Turnpike in Dallas, Texas. The content is entirely focused on describing a technical process and does not contain any unsafe, inappropriate, or harmful elements. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "820-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "820-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "820-2",
"llm_safety_score": 0,
"reason": "educational content"
},
{
"custom_id": "820-3",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.betterroads.com/roadscience-7/print/",
"date": "2013-06-20T09:16:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9263141155,
"token_count": 3729,
"score": 2.640625,
"int_score": 3
} |
<urn:uuid:22acc8c9-1b21-4e18-a593-a22cd5db46b2> | |The atmosphere that protects us from gamma rays prevents us from directly observing them from the ground.|
A gamma ray is a photon more energetic than an X-ray (more than about 50 keV). Gamma rays are created from nuclear reactions or particle accelerations. Gamma rays are the most energetic photons of the electromagnetic spectrum.
The GLAST Burst Monitor (GBM) is the instrument on Fermi that is specifically designed to detect gamma-ray bursts.
Gravity is the attractive force of an object with mass on another object. The gravitational force between two objects depends on their masses and the distance between them. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content detected\", \"score\": 0}\n```\n\nThe provided text is purely scientific and educational, discussing the properties of gamma rays and gravity. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "821-0",
"llm_safety_score": 0,
"reason": "No unsafe content detected"
}
]
} | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.nasa.gov/mission_pages/GLAST/science/index.html",
"date": "2013-06-20T09:17:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00008-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9163363576,
"token_count": 126,
"score": 3.984375,
"int_score": 4
} |
<urn:uuid:f541170b-985b-4d77-9bd1-b6a1877ba743> | Day/Time: Saturday and Sunday
Location: To be determinedCitizen scientists are everyday people who conduct volunteer scientific research without formal credentials. Notable citizen scientists in history include Benjamin Franklin and Thomas Jefferson, who advanced our understanding of electricity and agricultural technology.
Citizen Science projects range in size from national or worldwide studies in collaboration with thousands of people to individuals collecting their own data locally. Often, the data is collected and combined from many volunteers, as in the annual Christmas Bird count, which has collected bird population data for over 100 years.
Citizen scientests collect and report data using specific protocols, and that data is often used by professional scientistsin their studies. These data collections are also available to the public; for example, Surfrider Foundation's "Blue Water Task Force" publishes the results of water quality testing on their web site for all to use.
Some citizen scientists work on their own, monitoring and reporting on everything from bird nests to weather conditions to variable stars. Others, like Golden Gate Raptor Observatory, work in organized groups to collect and publish data.
Related site: http://citizensci.com/
Several groups will have tables in the citizen science area. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the concept of citizen science and its historical and contemporary applications. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "822-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://archive.makezine.com/pub/ev/274",
"date": "2013-12-04T16:46:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163035819/warc/CC-MAIN-20131204131715-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9350994229,
"token_count": 241,
"score": 3.203125,
"int_score": 3
} |
<urn:uuid:d6169916-f0f0-4432-8fcc-3ee46c9728e9> | What’s the germiest room in your house? Most people mistakenly think it’s the bathroom, according to a new study from NSF International, an independent public health and safety organization. But when researchers conducted a swab analysis of 30 everyday household items in 22 different homes—measuring the levels of yeast, mold, coliform bacteria (which includes Salmonella and E. coli) and Staph bacteria—they found that the kitchen took top billing.
Here are the top 10 biggest individual offenders—starting with the worst item—plus tips on how to clean up your act.
The sponge you use to clean your dishes and countertops may actually be the dirtiest thing in your home, says Rob Donofrio, PhD, director of microbiology at NSF. That’s because sponges pick up bacteria while you clean and are often not sanitized before their next use. Seventy-five percent of the tested sponges had coliform prevalent, a bacteria that indicates fecal matter, according to the NSF International study. To disinfect a sponge, soak it in water and then heat it in the microwave for one to two minutes or carefully pour boiling water over it. Rinse with cool water before using it again.
Sinks are germy due to lingering sponges and improper cleaning methods, says Donofrio. Filling the sink with soapy water every time you do dishes isn’t enough to keep it clean, either. Wash your sink separately, and be sure to follow the instructions on your cleaning supplies. If the bottle says to let the soap sit for a minute before rinsing, do it.
There are two reasons why this common bathroom item is grimy: They’re usually kept close to the toilet—which sprays fecal matter when flushed—and many people forget to wash them, says Donofrio. He recommends sticking holders in the dishwasher with the rest of your dishes.
Pet bowls were the only objects found to be carrying E. coli. Just like sponges, bits of food can get stuck on them, and they’re often neglected when it comes to washing. If you keep pet bowls in your kitchen, you’re also at risk of introducing more coliform to your kitchen and eating areas. “Treat them like your own bowls,” says Donofrio, and wash them regularly.
These are tricky. Some coffe makers come with a self-clean feature, but what do you do if they don’t? You need to take the pieces apart and clean each of them. If you don’t clean the water reservoir, you’re digesting germy coffee, says Donofrio.
When it comes to cleaning duties, this commonly used feature often gets neglected. Remember, you touch it after you use the toilet, says Donofrio, so it’s important to thoroughly wash it—bacterias such as coliform can cause staph infections and other dangerous viruses.
The belief that your dog’s mouth is cleaner than yours isn’t necessarily true, says Donofrio. So remember to clean their toys. If it’s rubber, use a disinfectant or put it in the dishwasher. If it’s cloth, throw it in the washing machine.
If you haven’t noticed, the kitchen is the germiest of all household places. Knobs—most often dirtied by our hands—are just another object forgotten in our cleaning routines. Besides regularly wiping these down, keep your hands clean when cooking, especially when handling raw meat.
The abrasions on cutting boards trap moisture and food particles, making these boards an ideal breeding grounds for organisms. In the NSF study, 18 percent of homes had coliform on their cutting boards. Clean yours thoroughly after each use with hot water and disinfectant. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses the germiest rooms and items in a house based on a study, providing tips on how to clean them. There is no unsafe, inappropriate, or harmful content in the text. The language is respectful and the themes are related to household hygiene and health, which are appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "824-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.more.com/germs-cleaning-house",
"date": "2013-12-04T16:49:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163035819/warc/CC-MAIN-20131204131715-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9360113144,
"token_count": 804,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:523ab71e-3378-481e-83ce-be2558dedc6d> | This article incorporates, in modified form, material from Illustrated Guide to Home Chemistry Experiments: All Lab, No Lecture.
When an acid reacts with a base, it forms a salt and water. For example, reacting hydrochloric acid with sodium hydroxide produces the salt sodium chloride (common table salt) and water. Reacting nitric acid with potassium hydroxide produces potassium nitrate and water. Reacting acetic acid with aqueous ammonia produces ammonium acetate and water. And so on. Such reactions are referred to as neutralizing the acid with the base (or vice versa).
Unfortunately, the word neutralize is a common source of confusion among beginning chemists, many of whom assume that reacting equivalent amounts of an acid and base should yield a solution that contains only the “neutral” salt that is neither acidic nor basic, and therefore has a pH of 7.0. That’s not how it works.
The pH of a neutralized solution depends on the particular acid and base that are reacted. Reacting equivalents of a strong acid with a strong base in fact does produce a salt solution that has a pH at or near 7.0, as does reacting a weak acid with a weak base. But if the strengths of the acid and base are very different — as for example occurs if you react a strong acid with a weak base or vice versa — the pH of the neutralized solution will not be 7.0. The greater the difference in the strengths of the acid and base, the greater the difference in the pH of the neutralized solution from 7.0.
For example, if you neutralize hydrochloric acid (a very strong acid) with aqueous ammonia (a relatively weak base), the resulting solution of ammonium chloride will have a pH less than 7.0. Conversely, if you neutralize acetic acid (a relatively weak acid) with sodium hydroxide (a very strong base), the resulting neutralized solution of sodium acetate will have a pH greater than 7.0.
In this lab, we’ll determine the pH of aqueous solutions of various salts.
Required Equipment and Supplies
- goggles, gloves, and protective clothing
- beaker, 150 mL
- pH meter or pH test paper
- ammonium acetate, 0.1 M (100 mL)
- ammonium chloride, 0.1 M (100 mL)
- sodium acetate, 0.1 M (100 mL)
- sodium chloride, 0.1 M (100 mL)
All of the specialty lab equipment and chemicals needed for this and other
lab sessions are available individually from Maker Shed or other laboratory
supplies vendors. Maker Shed also offers customized laboratory kits at special
prices, including the Basic Laboratory Equipment Kit, the Laboratory Hardware Kit, the Volumetric Glassware Kit, the Core Chemicals Kit, and the
Supplemental Chemicals Kit.
Although none of the salts used in this lab are particularly hazardous, it’s good practice to wear splash goggles, gloves, and protective clothing at all times. If you make up the salt solutions from acid and base solutions as described in the Substitutions and Modifications section, use the normal precautions for working with acids and bases.
- If you have not already done so, put on your splash goggles, gloves, and protective clothing.
- Using what you know about strong and weak acids and bases, predict the approximate pH values for the solutions of the four chemicals and enter your predicted values in Table 11-2 by circling one of the pH numbers. If you are uncertain, circle a range of numbers.
- Pour about 100 mL of 0.1 M ammonium acetate into the beaker.
- Read and follow the directions for your pH meter with respect to calibrating it, rinsing the electrode between measurements and so on. Use the pH meter to measure the pH of the ammonium acetate solution, and record the observed value on Line A of Table 11-2. (If you do not have a pH meter, you can use pH test paper, which is sufficiently accurate for the purpose of this lab session.)
- Repeat steps 3 and 4 for the solutions of ammonium chloride, sodium acetate, and sodium chloride.
|Solute||Predicted pH||Observed pH|
|A. ammonium acetate||0 1 2 3 4 5 6 7 8 9 10 11 12 13 14||___.___pH|
|B. ammonium chloride||0 1 2 3 4 5 6 7 8 9 10 11 12 13 14||
|C. sodium acetate||0 1 2 3 4 5 6 7 8 9 10 11 12 13 14||
|D. sodium chloride||0 1 2 3 4 5 6 7 8 9 10 11 12 13 14||
All of the solutions used in this laboratory can be flushed down the drain with plenty of water.
Q1: What general conclusions can you draw from the pH values you observed for the four solutions?
Q2: If you mixed equal amounts of a 0.1 M ammonium chloride solution and a 0.1 M sodium acetate solution, would you expect the pH of the resulting solution to be strongly acidic, weakly acidic, about neutral, weakly basic, or strongly basic? Why? | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is an educational and informative passage about acid-base reactions and pH measurements. It does not contain any unsafe, inappropriate, or harmful content. The text is suitable for educational environments and general audiences.",
"{\"reason\": \"safe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a chemistry laboratory question and does not contain any unsafe or inappropriate content. It discusses pH values, mixing solutions, and basic chemistry concepts. The language is respectful and the themes are educational and suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "825-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "825-1",
"llm_safety_score": 0,
"reason": "safe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://makezine.com/laboratory-112-determine-the-ph-of/?like=1&_wpnonce=67418a1937",
"date": "2013-12-06T11:34:43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051476/warc/CC-MAIN-20131204131731-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8869816661,
"token_count": 1100,
"score": 4.3125,
"int_score": 4
} |
<urn:uuid:f7ca4ec5-211d-4b6b-934d-057d5ad018a0> | Junker was a paramilitary Nazi rank that was used by the Schutzstaffel (SS) between the years of 1933 and 1945. The rank was a special position held by those aspiring for officer commissions in the armed wing of the SS, first known as the SS-Verfügungstruppe and later as the Waffen-SS.
The SS rank of Junker was an appointed position with an SS member required to enlist in the SS for at least six months to a year before consideration could be given for officer training. SS-Junker was also strictly a rank of the Verfügungstruppe and Waffen-SS and was not used by the Allgemeine-SS, or "General" SS.
This officer candidate system was to ensure that future SS officers had prior enlisted experiance and that there were no “direct appointments” in the Waffen-SS officer corps as was often the case in other SS branches such as the Gestapo and Sicherheitsdienst. Ample evidence exists, however, that certain SS members with “connections” could obtain an appointment as an SS-Junker without ever having served in the enlisted ranks or with only a few weeks of basic enlisted training before transferring to a Junkerschule.
Upon reaching the rank of SS-Standartenoberjunker, the SS-Officer Candidate would be permitted to display the silver chin strap of an SS officer and would be assigned to a field SS unit for final evaluation and field examination. Upon passing this final exam, the Standartenoberjunker would be promoted to the rank of SS-Untersturmführer usually in an elaborate ceremony.
The entire process for an SS-Junker to become an SS officer usually took between 18 to 24 months to complete. The SS had planned, once World War II had ended, to establish SS academies which would be four year institutions much like the present day United States service academies. As World War II progressed, however, the manpower needs of the Waffen-SS grew to such a level that SS officer candidates would undergo no more than 6 months training by 1945 and, in some cases, were directly commissioned in the field without ever having attended a Junkerschule.
Junker as a military rank ceased to exist in 1945 with the downfall of Nazi Germany and the end of the Second World War. The word Junker, however, continues to exist in Germany and has a variety of meanings.
Source: Wikipedia; Pictures courtesy of: U.S. National Archives. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context without explicit harmful content\", \"score\": 0}\n```\n\nThe provided text is a historical description of the SS rank of Junker during the Nazi era. While the context is related to a period of significant historical and ethical controversy, the text does not contain any explicit harmful content, hate speech, or inappropriate language. It is purely informational and educational in nature, making it suitable for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "826-0",
"llm_safety_score": 0,
"reason": "historical context without explicit harmful content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.jewishvirtuallibrary.org/jsource/Holocaust/junker.html",
"date": "2013-12-06T11:29:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051476/warc/CC-MAIN-20131204131731-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9771900177,
"token_count": 532,
"score": 3.3125,
"int_score": 3
} |
<urn:uuid:41625cbd-b2fc-48bd-9e80-32bb443c5bf1> | The role of maths in weather and climate prediction
9 August 2013
In their new book, 'Invisible in the Storm: The Role of Mathematics in Understanding Weather', mathematicians Ian Roulstone (University of Surrey) and John Norbury (University of Oxford) explore how mathematics and meteorology come together to improve weather and climate prediction. Here they share their insight into maths, numerical weather prediction and climate models.
In 1904, the Norwegian physicist Vilhelm Bjerknes published a short paper entitled Weather Forecasting as a Problem in Mechanics and Physics, which heralded the beginning of a new era in meteorology and weather prediction. Bjerknes described a vision in which the laws of physics, and the equations that encapsulate them, were to become the cornerstone of a rational approach to forecasting. His ideas became the foundation of modern weather and climate prediction.
We had to wait nearly half a century before modern electronic computing made Bjerknes' vision a realistic prospect, and Vilhelm lived just long enough to see the beginnings of numerical weather prediction. But how would Bjerknes react if he could see a modern forecasting office? The breathtaking pace in the development of computers, satellites and associated technology such as weather radar, enable us to monitor weather around the world 24/7.
Since the 1950s these developments have improved the accuracy of weather forecasts. It would have been impossible for Bjerknes to anticipate such progress, and he would be astonished at what is now at the disposal of forecasters. But he might well ask if we get caught out by the occasional storm that wasn't predicted - and Bjerknes would almost certainly anticipate an affirmative answer.
So why do forecasters, over a century after Bjerknes' landmark paper, still find some situations particularly problematic? Today, as a matter of routine, we calculate subtle changes in the basic variables - wind speed and direction, temperature, pressure, density and humidity - at millions of data points in our atmosphere, using seven basic equations at each data point. This amounts to solving tens of millions of equations. Yet we can solve these equations in minutes, because we have computers capable of over one thousand billion calculations per second (a measure we call a petaflop), and databases hold information in multiple petabytes.
However, lurking in the fundamental equations is mathematics that makes forecasting so difficult, and makes weather so interesting. And Bjerknes understood the maths.
Behind the physics of the atmosphere is a phenomenon that challenges even the most powerful supercomputer simulations we use in forecasting today, and it will continue to challenge us in the future. It is called nonlinearity. This means that 'cause and effect' relationships between the basic variables become ferociously complex. We are familiar with the notion of chaos - that small changes in one variable can have a huge impact on other variables, as epitomised by Edward Lorenz in his famous allegory we know as the butterfly effect. Chaos in the weather is a consequence of the nonlinearity in the equations.
But while there's a devil in the mathematical detail, maths also offers us ways of dealing with these problems so that we can make useful predictions, and continue to improve our forecasts, even in the presence of chaos. By combining the basic variables we can understand what orchestrates the myriad of local interactions to produce coherent, swirling, cyclones, with warm and cold fronts.
For example, by combining equations describing heat and moisture with equations governing the wind and pressure, we can form a new variable called potential vorticity, or 'PV'. Vorticity is a measure of swirling motion. PV actually helps us to identify key mechanisms that are responsible for the development, the intensity, and the motion of weather systems - including superstorms such as Hurricane Sandy - because it encapsulates over-arching physical principles that control the otherwise complicated 'cause and effect' relationships. These principles enable us to decide what is predictable amid the detailed interactions.
Much of the current research within the Met Office and universities is devoted to improving the numerical methods that lie at the heart of the gargantuan computer models. As more detail is incorporated into the simulations, so it becomes even more important to represent the over-arching principles that govern large-scale weather patterns even more accurately. Amazingly, the mathematics describing PV was developed initially by Vilhelm Bjerknes over a hundred years ago.
As we note in our new book, Invisible in the Storm, "There are many detailed interactions and there are degrees of unpredictability. But there are also many stabilizing mechanisms and, most importantly, for understanding and prediction, there is the maths to quantify the rules." | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "828-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.metoffice.gov.uk/barometer/in-brief/2013-07/the-role-of-maths-in-weather-and-climate-prediction",
"date": "2013-12-08T09:44:44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163059081/warc/CC-MAIN-20131204131739-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9398171902,
"token_count": 942,
"score": 3.546875,
"int_score": 4
} |
<urn:uuid:9c965bea-060f-47a4-a623-197e899a9eb0> | In St. Petersburg they have almost the deepest subway in the world, according to wikipedia: “The deepest metro system in the world was built in St. Petersburg, Russia. In this city, built in the marshland, stable soil starts more than 50 metres (160 ft) deep. Above that level the soil mostly consists of water-bearing finely dispersed sand. Because of this, only three stations out of nearly 60 are built near the ground level and three more above the ground. Some stations and tunnels lie as deep as 100–120 metres (330–390 ft) below the surface. However, the location of the world’s deepest station is not as clear”, however one of the St. Petersburgs stations is the world’s deepest one.
What a cool machinery they use when make dig for new stations: | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the depth of the subway system in St. Petersburg and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any offensive language, adult themes, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "829-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://englishrussia.com/2010/02/09/building-a-metro/",
"date": "2013-12-09T19:28:56",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163996785/warc/CC-MAIN-20131204133316-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9645966887,
"token_count": 178,
"score": 2.515625,
"int_score": 3
} |
<urn:uuid:b57dc9b8-3d83-4846-8820-e0526e8c5338> | Lead responses to humanitarian emergencies, including the current needs of Syrian refugees. In the long term, catalyze reform by enabling issue-based partnerships.
Lebanon is home to profound political, ethnic and religious complexities that result in a complicated internal conflict between sect, confession, tribe and family. Key indicators such as life expectancy, literacy, school enrollment and per-capita income lag behind more developed countries.
Most recently, it has become home to the largest number of refugees fleeing the extended conflict in neighboring Syria, further straining a stressed infrastructure. Because there are no camps for Syrians here, refugee families are scattered in makeshift shelters and abandoned buildings, with little access to services and community support.
- Emergency response: Distributing clothes, blankets and household supplies to Syrian refugee families staying in temporary shelters and host communities
- Children & Youth: Leading programs for children that support healing and cooperation among refugee and host kids; organizing activities that foster leadership, decision-making and other life skills for young adults
- Conflict & Governance: Helping local organizations resolve conflicts and promote cooperation between refugees and host communities;
- Water: Improving access to clean drinking water in tent settlements and collective shelters; educating families about proper hygiene and expanding sanitation facilities in rural areas
All stories about Lebanon
Jordan, Lebanon, Syria: Raising awareness to prevent polio among Syrian refugee children November 7, 2013
A polio outbreak in Syria raises concerns about disease in crowded refugee conditions. We're supporting UNCEF's vaccination campaign and addressing sanitation needs.
Jordan, Lebanon, Syria: In the News: NPR's All Things Considered visits Syrian refugees with Mercy Corps' child protection expert October 22, 2013
Alexandra Chen spoke with NPR about the importance of treating symptoms of trauma in children displaced by the conflict.
Iraq, Jordan, Lebanon, Syria: Quick facts: What you need to know about the Syrian refugee crisis October 17, 2013
Syria's civil war is poised to become the worst humanitarian disaster of our time. See the staggering statistics and learn the facts behind the figures.
Jordan, Lebanon, Syria: Syrian humanitarian crisis demands new perspective on emergency response October 10, 2013
Mercy Corps CEO Neal Keny-Guyer outlines key steps we should take to help Syrians caught in the civil war.
Jordan, Lebanon, Syria: Neal Keny-Guyer on Syria humanitarian crisis at the National Press Club October 8, 2013
Watch the video and read the remarks from Mercy Corps' CEO.
Lebanon, Syria: A journal by young Syrian refugees September 12, 2013
In our photojournalism workshops, 300 Syrian youth embarked on a project to document their lives. See their photos, drawings, letters and poems.
Lebanon, Syria: Fadi's story: A camera offers new perspective September 12, 2013
We're using photography to help young Syrian refugees like Fadi find purpose and integrate into their new communities. Read his story and see his photos.
Lebanon, Syria: Meet our field staff: Ghassan September 10, 2013
As part of the Mercy Corps team responding to the Syrian refugee crisis in Lebanon, Ghassan's gentle poise and easy smile make him the ideal mentor for the children he helps.
Lebanon, Syria: Life across the border: Supporting Syrian refugees in Lebanon September 5, 2013
Lebanon is hosting the largest number of Syrian refugees. Yet, the country — the smallest to border Syria — does not have enough services to support them all.
Jordan, Lebanon, Syria: In the news: Two million Syrian refugees September 3, 2013
A UN announcement today marks another tragic milestone in the ongoing Syria crisis. On CNN, we discuss the burden on host countries and what the international community must do to help. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "830-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.mercycorps.org/lebanon?source=79700&gclid=CJHQgse0hbMCFYpP3godWi4AJg",
"date": "2013-12-09T19:31:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163996785/warc/CC-MAIN-20131204133316-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9302518368,
"token_count": 766,
"score": 2.578125,
"int_score": 3
} |
<urn:uuid:8374bb3a-8346-4a88-a4e3-d769bef2baa2> | Before You Begin Your Research
Before you begin your research, you might want to check the following points for basics:
- JapanKnowledge: What is the general understanding of the topic of your research? JapanKnowledge provides access to basic Japanese reference sources including encyclopedias and dictionaries (e.g., 日本大百科全書, 日本国語大辞典, 國史大辭典, Encyclopedia of Japan, etc.) as well as 東洋文庫 and 新編日本古典文学全集 series.
- Risāchi nabi リサーチ・ナビ: Are there useful research guides for specific topics or specific types of materials? The National Diet Library of Japan provides many research guides covering a wide range of subjects and special materials.
- Kaken: What research has been done in Japan? Kaken database provides information on research projects funded by the Ministry of Education, Culture, Sports, Science, and Technology and Japan Society for the Promotion of Science since 1965 and their research results.
- Directory of Japanese Studies in the United States and Canada: This website displays the information collected from the Survey of Japan Specialists and Japanese Studies Institutions in North America in 2011-2012 sponsored by the Japan Foundation.The survey was conducted through the University of Hawaii under the direction of Professor Patricia Steinhoff of the University of Hawaii and Professor Julian Dierkes of the University of British Columbia.
- J-Global: Who does the research in the academia and what research resources are available in Japan on your topic? J-Global maintained by the Japan Science and Technology Agency provides information on research institutes, researchers, research projects, etc.
- Academic Society Home Village: What academic societies exist in a specific field? The National Institute of Informatics compiles links to homepages of academic societies in Japan.
Citation Management Tools
Citation management tools help you manage your research, collect and cite sources, organize and store your PDFs, and create bibliographies in a variety of citation styles. Each one has its strengths and weaknesses, but all are easier than doing it by hand!
- Zotero: A free plug-in for the Firefox browser: keeps copies of what you find on the web, permits tagging, notation, full text searching of your library of resources, works with Word, and has a free web backup service. Zotero is also available as a stand-alone application that syncs with Chrome and Safari, or as a bookmarklet for mobile browsers.
- RefWorks - web-based and free for UC Berkeley users. It allows you to create your own database by importing references and using them for footnotes and bibliographies, then works with Word to help you format references and a bibliography for your paper. Use theRefWorks New User Form to sign up.
- EndNote: Desktop software for managing your references and formatting bibliographies. You can purchase EndNote from the Cal Student Store.
Tip: After creating a bibliography with a citation management tool, it's always good to double check the formatting; sometimes the software doesn't get it quite right. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely focused on providing guidance and resources for academic research. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "831-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://lib.berkeley.edu/alacarte/course-guide/713-JAPAN159",
"date": "2013-12-11T09:45:29",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034245/warc/CC-MAIN-20131204133354-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8780196309,
"token_count": 683,
"score": 2.828125,
"int_score": 3
} |
<urn:uuid:75972f21-588e-488e-bbed-cb8574ca03cb> | Searching “science and the Bible” on the internet reveals a great diversity in how people think the two relate. According to Wikipedia,
Skeptics argue that the various biblical statements are at odds with scientific knowledge, particularly with regard to its claims regarding the origin of the cosmos, astronomy, and biological evolution. The “Conflict thesis” is the argument that religion and science are at constant warfare with one another. This is exemplified by such examples as the persecution of Galileo Galilei, the public debate between T. H. Huxley and Bishop Samuel Wilberforce, the John Scopes trial, and the current controversy between the teaching of evolution and creationism.
It seems that an inordinate amount of the media coverage of Christianity’s relationship with science reflects this popular—but erroneous—view. Yet historians of science reject the conflict thesis in favor of a more diverse and harmonious relationship between science and Christianity. Read more about it in this previous TNRTB. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the relationship between science and the Bible, referencing historical and contemporary debates. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are suitable for a general audience."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "832-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.reasons.org/articles/a-tnrtb-best-of-believing-science-and-the-bible-at-the-same-time",
"date": "2013-12-12T19:11:25",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164677368/warc/CC-MAIN-20131204134437-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9408690929,
"token_count": 203,
"score": 2.671875,
"int_score": 3
} |
<urn:uuid:01e1c735-0895-4b22-836e-36d49762be7f> | Analyse the effect of the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA), a wage-for-employment policy of the Indian Government, on infant malnutrition and delineate the pathways through which MGNREGA affects infant malnutrition. Hypothesis: MGNREGA could reduce infant malnutrition through positive effects on household food security and infant feeding.
Mixed methods using cross-sectional study and focus group discussions conducted in Dungarpur district, Rajasthan, India. Participants: Infants aged 1 to <12 months and their mothers/caregivers. Final sample 528 households with 1056 participants, response rate 89.6%. Selected households were divided into MGNREGA-households and non-MGNREGA-households based on participation in MGNREGA between August-2010 and September-2011. Outcomes: Infant malnutrition measured using anthropometric indicators - underweight, stunting, and wasting (WHO criteria).
We included 528 households with 1,056 participants. Out of 528, 281 households took part in MGNREGA between August’10, and September’11. Prevalence of wasting was 39%, stunting 24%, and underweight 50%. Households participating in MGNREGA were less likely to have wasted infants (OR 0·57, 95% CI 0·37–0·89, p = 0·014) and less likely to have underweight infants (OR 0·48, 95% CI 0·30–0·76, p = 0·002) than non-participating households. Stunting did not differ significantly between groups. We did 11 focus group discussions with 62 mothers. Although MGNREGA reduced starvation, it did not provide the desired benefits because of lower than standard wages and delayed payments. Results from path analysis did not support existence of an effect through household food security and infant feeding, but suggested a pathway of effect through low birth-weight.
Participation in MGNREGA was associated with reduced infant malnutrition possibly mediated indirectly via improved birth-weight rather than by improved infant feeding. Addressing factors such as lack of mothers’ knowledge and inappropriate feeding practices, over and above the social and economic policies, is key in efforts to reduce infant malnutrition. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a detailed analysis of a research study on the impact of the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) on infant malnutrition. The text does not contain any unsafe, inappropriate, or harmful content. It is purely academic and focuses on the socio-economic and health outcomes of a government policy. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "833-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://pubmedcentralcanada.ca/pmcc/solr/reg?pageSize=25&term=jtitle_s%3A(%22Alcohol+Alcohol%22)&sortby=score+desc&filterAuthor=author%3A(%22De+Stavola%2C+Bianca%22)",
"date": "2013-12-19T07:02:11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345762220/warc/CC-MAIN-20131218054922-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9614770412,
"token_count": 471,
"score": 2.6875,
"int_score": 3
} |
<urn:uuid:5469bc63-81af-4e1d-8464-70d5893fbb10> | Seven-armed Starfish, Luidia ciliaris
The seven-armed starfish (Luidia ciliaris) is a species that can be found in the eastern waters of the Mediterranean Sea and the Atlantic Ocean. Its range extends from the Faroe Islands and Norway to the Azores and Cape Verde in the south. It is typically found on soft seabeds, although it may reside on rocks, at depths of up to 1,312 feet.
The seven-armed starfish is named for its seven arms, which extend from its disc-like body. It can reach an average body length of 1.3 feet from one arm to another. The body and arms are typically orange-brown in color, with whitish fringe occurring along the edges of each arm. Its skin is covered with many pillar-like spines known as paxillae. This species has no protective plates along the top side of its body, but its underside holds pedicellariae and a number of tube feet, which help it move around, although these feet do not create suction. Its reproductive organs are located along two arms, while its mouth can be found in the center of its body. This species has no anus, pyloric stomach, or intestines.
The breeding season for the seven-armed starfish occurs in the early summer months. Females first release millions of eggs into the water column, which encourages males to release their sperm shortly after. Fertilization occurs within four days, after which the zygotes turn into larvae that intermix with the plankton in the water column. After three to four months, the larvae are large enough to float to the sea floor, at which time seven arms can be seen developing. This species undergoes metamorphosis when it falls to the sea floor, a trait that is unique to the species.
The diet of the seven-armed starfish consists mainly of other species of echinoderms, although it will scavenge for food occasionally instead of eating live animals. Main prey items in the Irish Sea include Ophiura albida, a sea urchin known as Psammechinus miliaris, brittle stars, and Ophiothrix fragilis. Although it was found to consume Ophiocomina nigra in considerable quantities, this species was not a main prey item because it is more capable of escape than other species.
The seven-armed starfish is able to “walk” by lifting itself off the seabed and launching itself forward. It will do this when catching prey and will then consume its food by extending the plates around its mouth. The plates extend so far, that it can consume species that are larger than its mouth. After digesting what it can, this species will spit out the remains of its food.
Image Caption: Luidia ciliaris in Sala Maremagnum of Aquarium Finisterrae (House of the Fishes), in Corunna, Galicia, Spain. Credit: Cwmhiraeth/Wikipedia (CC BY-SA 3.0) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed description of the seven-armed starfish (Luidia ciliaris), which is entirely educational and informative. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "834-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.redorbit.com/education/reference_library/science_1/echinoderms/1112834481/seven-armed-starfish-luidia-ciliaris/",
"date": "2013-12-19T06:41:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345762220/warc/CC-MAIN-20131218054922-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9546313286,
"token_count": 636,
"score": 3.734375,
"int_score": 4
} |
<urn:uuid:8f12bef7-61e2-480b-b2c9-f007ffa2a7cb> | The personal computer changed the analog signal to a more transmittable set of 1s and 0s and changed our lives for the better. We no longer wait for a drum to slowly whine as the 8×10 print went through the laser scanner.
It looks like technology from the 1940s was about the same, here a group of technicians from the NEA-Acme wire service transmit photos from a food conference in 1943. The equipment was delicate and expensive and the first newspaper I worked at was too cheap to have one on-site. When we had big news the prints were taken to a nearby city to transmit. This photo ran at the bottom of page 7 under a pair of photos that the U.S. Navy had given NEA. On photo showed that repair work from the devastating attack at Pearl Harbor was still ongoing.
- Save a life with a knife, New Southern Pacific station, World War II week by week
- Headlines shout World War II week by week
- School enrollment explosion – World War II week by week
- Klau Mine, Erwin Rommel – World War II week by week
- Dance regulations wanted in San Luis Obispo, World War II week by week | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses historical events and technological advancements in a neutral and informative manner. It does not contain any unsafe, inappropriate, or harmful content. The references to World War II and historical photographs are educational and do not pose any safety concerns."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "835-0",
"llm_safety_score": 0,
"reason": "historical context"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://sloblogs.thetribunenews.com/slovault/2013/06/sending-telephotos-world-war-ii-week-by-week/",
"date": "2013-12-05T01:34:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037952/warc/CC-MAIN-20131204131717-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9794716239,
"token_count": 247,
"score": 2.5625,
"int_score": 3
} |
<urn:uuid:f34eb138-55fa-467a-941b-bf538cc2a32c> | Print version ISSN 0101-3262
TUMA, Magda Madalena; CAINELLI, Marlene Rosa and OLIVEIRA, Sandra Regina Ferreira de. Dislocations in time and History learning in the first years of elementary school. Cad. CEDES [online]. 2010, vol.30, n.82, pp. 355-367. ISSN 0101-3262. http://dx.doi.org/10.1590/S0101-32622010000300006.
This work analyzes the knowledge progression of first grades students towards the complexity of historical thought with an emphasis on dislocations in time. Classroom situations and children's production made us understand their constituted and or/under construction representations of dislocation in time, which, in turn, help us understand the child's historical thinking process within the context of the History taught in school.
Keywords : Time slight knowledge; History education; Teaching-learning. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is an academic article discussing educational methods and learning processes in elementary school. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are focused on educational and historical learning, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "836-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.scielo.br/scielo.php?script=sci_abstract&pid=S0101-32622010000300006&lng=en&nrm=iso&tlng=en",
"date": "2013-12-05T01:27:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037952/warc/CC-MAIN-20131204131717-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8297188878,
"token_count": 205,
"score": 2.5625,
"int_score": 3
} |
<urn:uuid:a90e6946-760a-48aa-a9d6-d1563ba759ad> | Western history shapes its future
On Dec. 21, 1977, high gas prices and an emphasis on conservation led Congress to create the Department of Energy, including Western Area Power Administration—a new agency to sell and deliver hydropower across 15 central and western states.
Our nation still has some of these same concerns, as well as new energy industry issues that are cropping up every day. This makes Western's mission of delivering clean, renewable energy all the more crucial to meeting today's energy demands.
Learn more about Western's history and the history of the utility industry:
- Utility industry develops: "Shining light on the utility industry's development"
- 25 years: "Serving the West: Western's First 25 years as a Power Marketing Agency"
- 30 years: "Looking back and looking ahead"
- 35 years: "A time of exponential change" | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text discusses historical and current aspects of the Department of Energy and Western Area Power Administration without any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "837-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://ww2.wapa.gov/sites/western/about/history/pages/default.aspx",
"date": "2013-12-06T15:27:18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051992/warc/CC-MAIN-20131204131731-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9294168949,
"token_count": 179,
"score": 2.890625,
"int_score": 3
} |
<urn:uuid:39c234ad-cdc8-4fa9-9af7-91e0f5bd309d> | A Bid to Save Honduran Hummingbird
By From the Tierramérica Editor's Desk*
A legislative bill to declare the northwestern area of Aguán Valley in Honduras a protected area is feeding hopes for the survival of the brilliantly colored emerald hummingbird, a species unique to this Central American nation.
TEGUCIGALPA - The Honduran emerald, or Amazilia luciae, is a hummingbird native to this country and is the most endangered bird of Central America, but a new bill is to be presented in August in the Honduran Congress that could turn out to be this tiny flyer's passport to the future.
The Honduran emerald measures just 10 cm long, and in the past few years has been faced with its greatest threat: government plans to build a highway that would cross through a section of its unique habitat.
The legislative initiative for declaring the northwest portion of the Aguán Valley -- home to this minute bird -- a protected area bodes well for the future of the country's only tropical dry forest, Elda Maldonado, biodiversity director at the Secretariat of Natural Resources and Environment (SERNA), told Tierramérica.
Like the brilliant green emerald hummingbird, this ecosystem is also on the verge of disappearing. The tropical dry forest is a rarity throughout the Central American region, found only in western Guatemala's Motagua Valley and in the Aguán.
Interest in saving the hummingbird increases with the intention to preserve the forest, says Fausto Mejía, who works in the SERNA office for the Mesoamerican Biological Corridor, a natural habitat restoration plan that involves the seven Central American countries and Mexico.
Of the more than 50,000 hectares of the plains of Aguán Valley, 30,000 were tropical dry forest in 1938. By 1977 the coverage of this unique forest had fallen to 16,000 hectares, and in 2000, there were just 8,495 hectares, according to the latest available research.
But of that area, only 3,900 hectares can be considered well preserved enough to sustain significant populations of the Honduran emerald, points out Mejía.
The proposed law, drafted by a committee including delegates from SERNA, the Secretariat of Public Works, Transport and Housing (SOPTRAVI) and the Honduran Forest Development Corporation, aims to halt deforestation, a practice that has turned the forest into patchwork, says biodiversity expert Maldonado.
The management plan for what would be the smallest protected area in Honduras at just over 1,000 hectares, establishes that over the years it would once again form a continuous forest mass, she adds.
When it was discovered in 1867, it was common to spot emerald hummingbirds throughout the country's western and Atlantic areas. Today it is categorized as the most endangered species in Central America, according to the "Red List" of the World Conservation Union (IUCN).
The preservation of the forest and the protection of the hummingbird are the chief interests of the environmentalists and citizen groups that are opposed to the government's plans to build a stretch of highway through the bird's limited habitat.
Experts predict that the hummingbird species would survive just two years once the 57-km highway is opened through the middle of the valley, which also is home to intensive farming and livestock activity.
SOPTRAVI processed the highway project in 1998, requesting some 12 million dollars from the World Bank to finance construction.
The World Bank set a loan requirement. Honduras would have to pass a law that would include a management plan for the area that is home to the hummingbird and establish a protected area, Maldonado explained.
The construction of the highway would initially have adverse effects on the forest itself. But the noise, dust and exhaust produced by the heavy machinery would alter the behavior of the hummingbird, pushing it away from its food sources and away from its traditional resting and grooming sites.
The highway project has not been abandoned, "but was only suspended until the law is approved," said Maldonado, who is nevertheless optimistic about the effects the bill will have on the preserving the emerald hummingbird population.
Another important effort, she says, is to properly inform the residents of the valley about the benefits of protecting the bird and its ecosystem. Most local inhabitants support the construction of the highway.
"When they say that the project shouldn't be halted for the sake of a bird, the residents show the lack of adequate information," said the expert.
Honduras holds seven percent of the world's biodiversity and its environment is home to 701 bird species. However, 59 of them live in threatened habitats and five are in danger of extinction. The country loses 80,000 hectares of forest each year.
* With contributions from Thelma Mejía (Honduras). | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is entirely focused on environmental conservation and does not contain any unsafe, inappropriate, or harmful content. It discusses the efforts to protect the Honduran emerald hummingbird and its habitat, which is suitable for all audiences.",
"{\"reason\": \"contains personal attribution\", \"score\": 0}\n```\n\n**Explanation:**\nThe text sample provided, \"* With contributions from Thelma Mejía (Honduras),\" does not contain any unsafe or inappropriate content. It is a neutral statement acknowledging contributions from an individual and does not include any harmful language, themes, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "838-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "838-1",
"llm_safety_score": 0,
"reason": "contains personal attribution"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.tierramerica.net/2003/0616/iacentos2.shtml",
"date": "2013-12-06T15:30:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051992/warc/CC-MAIN-20131204131731-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9430080652,
"token_count": 989,
"score": 3.1875,
"int_score": 3
} |
<urn:uuid:e89be1f4-e17f-4c55-84ab-19c67d8e08c0> | from The American Heritage® Dictionary of the English Language, 4th Edition
- An island of eastern Greece in the Aegean Sea off the western coast of Turkey. First inhabited in the Bronze Age, it was later colonized by Ionian Greeks and became an important commercial and maritime power in the sixth century B.C. Controlled in turn by Persia, Athens, Sparta, Rome, Byzantium, and the Ottoman Empire, the island became part of modern-day Greece in 1913.
from Wiktionary, Creative Commons Attribution/Share-Alike License
- proper n. A island belonging to the Sporades and a city on it, in the Aegean.
- proper n. A modern Greek prefecture in the eastern part of the Aegean that includes the island along with the islands of Icaria and Fourni.
From Ancient Greek Σάμος (Samos). (Wiktionary) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and geographical information\", \"score\": 0}\n```\n\nThe text provided is purely historical and geographical information from reputable sources (The American Heritage® Dictionary of the English Language and Wiktionary). It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "839-0",
"llm_safety_score": 0,
"reason": "historical and geographical information"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://wordnik.com/words/Samos",
"date": "2013-12-08T14:28:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065880/warc/CC-MAIN-20131204131745-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9202907085,
"token_count": 195,
"score": 3.53125,
"int_score": 4
} |
<urn:uuid:80ac61c7-e874-443a-a9c5-45b9db8b195e> | BEIJING (Reuters) - China's next manned space mission will launch sometime between June and August, carrying three astronauts to an experimental space module, state media said on Thursday, the latest part of an ambitious plan to build a space station.
The Shenzhou 10 and its crew will launch from a remote site in the Gobi desert and then link up with the Tiangong (Heavenly Palace) 1 module, the official Xinhua news agency reported.
Chinese astronauts carried out a manned docking with the module for the first time last June.
Rendezvous and docking exercises between the two vessels are an important hurdle in China's efforts to acquire the technological and logistical skills to run a full space lab that can house astronauts for long periods.
China is still far from catching up with the established space superpowers, the United States and Russia. The Tiangong 1 is a trial module, not the building block of a space station.
But this summer's mission will be the latest show of China's growing prowess in space and comes while budget restraints and shifting priorities have held back U.S. manned space launches.
It will be China's fifth manned space mission since 2003 when astronaut Yang Liwei became the country's first person in orbit.
China also plans an unmanned moon landing and deployment of a moon rover. Scientists have raised the possibility of sending a man to the moon, but not before 2020.
(Reporting by Ben Blanchard; Editing by Michael Perry) | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is a news report from Reuters about China's space mission. It contains no unsafe, inappropriate, or harmful content. The language is neutral and factual, and the themes are related to space exploration, which is suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "840-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://wnmtradio.com/news/articles/2013/feb/28/chinas-next-manned-space-mission-to-launch-this-summer/",
"date": "2013-12-09T23:42:25",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164001281/warc/CC-MAIN-20131204133321-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9145926833,
"token_count": 302,
"score": 2.5625,
"int_score": 3
} |
<urn:uuid:322fd332-559f-40b1-8038-998d3b34aca7> | Essential Tolkien CD: Essential Tolkien CD
J.R.R. Tolkien, in this extraordinary, historically important recording, leads listeners with prose, poems, and songs into the fantastic world of The Hobbit and The Fellowship of the Ring.
This audio is based on a tape that Tolkien made for his friends in August 1952. He had been working on The Lord of the Rings for more than fourteen years by then and had almost given up hope of ever seeing it in print. But making this recording reassured him of his talent and prompted him to send his manuscripts to a former pupil who had become a publisher. The result was one of the most popular and influential series of novels of the 20th century!
This recording includes the poem "The Mirror of Galadriel," originally meant for inclusion in Book Two of The Fellowship of the Ring.
About the Author
John Ronald Reuel Tolkien (1892-1973) was a major scholar of the English language, specializing in Old and Middle English. Twice Professor of Anglo-Saxon (Old English) at the University of Oxford, he also wrote a number of stories, including most famously The Hobbit (1937) and The Lord of the Rings (1954-1955), which are set in a pre-historic era in an invented version of the world which he called by the Middle English name of Middle-earth.
- Browse Our Shelves
- Chapbook Cafe
- Publishing Services | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is a description of a recording of J.R.R. Tolkien reading his works, including poems and songs from \"The Hobbit\" and \"The Fellowship of the Ring.\" There is no unsafe content, inappropriate language, or references to illegal activities. The text is entirely suitable for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "841-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.schulerbooks.com/book/9780061376498",
"date": "2013-12-09T23:29:52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164001281/warc/CC-MAIN-20131204133321-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9756432772,
"token_count": 292,
"score": 2.53125,
"int_score": 3
} |
<urn:uuid:e723db59-46d6-4272-902b-07d416b86a89> | One of my hopes for the cultural renewal is the revival of a Christian form of geometric patterned art. With this in mind I have done my best to study past work, and try to discern the principles that underlie its creation. I wrote about resources that help in this respect in a previous article, here.
If tasked with the design of an ornate sanctuary floor now, for example, how might one go about it? One approach, which was used by the Cosmati craftsmen of the middle ages was to have a large design for to fill the whole shape and then to infill with a variety of different geometric patterns. The Cosmatesque style is named after the Cosmati family which, over several generations, developed this distinctive style of work. If they were covering a large area, such as a whole church floor, they worked on three scales. For the grand form they tended to compartmentalize into rectilinear shapes. Then the sub-form would be a geometric design consisting of faceted polygons or interconnected circles. The final stage would be an infill of with very small repeated regular geometric shapes such as squares, triangles of hexagons (which are the three forms that can put together without creating gaps).
Cathedral of Sessa Aurunca, 13th century
One of the sub-forms is called the ‘quincunx’. This the generic name for the arrangement of five equivalent shapes that has four arranged symmetrically around the fifth which is centrally place (it is also a game-winning word in Scrabble so it’ll pay to remember this, if for no other reason). The five dots on dice, for example, are in a quincunx shape. I understand the name comes from the Latin for five-twelfths, a coin of this fraction value of the currency had this name and often had this arrangement of dots on it.
In the context of geometric patterned art, it is the shape of four smaller circles spinning of larger secondary one was not limited to the Cosmati craftsmen. It is seen in both Eastern and Western Churches and across many centuries. I am going to setting my class at Thomas More College the task of designing and drawing a sanctuary floor based upon this design later this term.
In some respects the quincunx can be thought of as the geometrical equivalent of the traditional image of Christ in Majesty. Around the central image of the enthroned Christ we see four figures representing the four evangelists carrying the Word to the four corners of the world. One of the reasons that the Church settled on four gospels was to emphasis this symbolism (see St Irenaeus writing in the 2nd century AD in Against Heresies). The quincunx also symbolizes Creation, as the number four represents the cosmos. The symbolism is of, again the four corners of the world – Christ spoke of the ‘four winds’; and the four ‘elements’ of the ancients from which all matter is comprised. These elements are fire, water, earth and air. In modern science the work element has come to mean something more specific than this. However, this does not invalidate this symbolism, to my mind, for they still symbolise very well, I feel the phases or states by which modern science categorises matter – solid, liquid, gas and energy (or alternatively plasma).
In his book on the Westminster pavement, which is the one example of Cosmati work in England, Richard Foster suggests that the inscriptions indicate that rather that signifying Creation, the quincunx signifies the final end. That is, rather than emanating from God, all is returning to God.
A modern floor in the Hermitage of St Anthony and St Cuthbert, Shropshire, England
An 8th century German manuscript showing Christ in Majesty
A 13th century French ivory carving, in the Musee de Cluny
A sub-form of interconnected circles other than a quincunx, at S Maria in Trastever, Rome
Inlay in the Palatine Chapel, Palermo, Sicily, 11th century. | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and cultural context\", \"score\": 0}\n```\n\nThe text discusses the historical and cultural significance of geometric patterns and art in Christian contexts, including references to religious symbolism and historical artworks. There is no unsafe content, inappropriate language, or themes that would warrant a higher score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "842-0",
"llm_safety_score": 0,
"reason": "historical and cultural context"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://thewayofbeauty.org/2011/03/the-quincunx-a-geometric-representation-of-christ-in-majesty/",
"date": "2013-12-11T13:32:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164036943/warc/CC-MAIN-20131204133356-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9592764378,
"token_count": 859,
"score": 2.953125,
"int_score": 3
} |
<urn:uuid:51d276d9-e6bf-4a53-a161-8d4e7e8aa712> | SEX CHANGE IN FISH FOUND COMMON
Published: December 4, 1984
WHEN a school of reef fish loses its single male, the largest female begins acting like a male within a few hours and will produce sperm within 10 days. Some other species repeatedly switch back and forth between the production of eggs and of sperm during a single mating. Among deep sea fish that only rarely encounter potential mates, reproduction is often possible only if one changes sex.
Such opportunistic sex changes in fish, once thought to be a rare oddity, are proving far more common than supposed. Conversions from female to male are now known to occur in species belonging to at least 14 families, while conversions from male to female are known in eight families.
Nevertheless, the process by which fish change sex remains a mystery to scientists. ''No one has ever come up with an answer'' as to how they do it, Dr. Klaus D. Kallman of the New York Aquarium, a fish geneticist, said recently.
Nevertheless, according to Dr. N. Robin Liley of the University of British Columbia, the sex of a fish or of a reptile is known to be more susceptible to change than that of a mammal or bird. As examples, the sex of a maturing reptile may be determined by environmental temperature, while a school of trout can be made entirely male simply by adding a certain hormone to the water.
Dr. Kallman said a fish's original sex seems to be genetically determined by inherited chromosomes. All of the species that change their sex, he said, have evolved from those whose sex was fixed for life. It is therefore a capability that evolved, presumably because it made for greater reproductive success.
These new discoveries regarding sex changes in fish have been summarized by Dr. Robert R. Warner of the University of California at Santa Barbara in recent issues of American Scientist and the journal Evolution. Dr. Warner and Dr. Eric A. Fischer of the University of Washington, assisted by local Kuna Indians, have been studying reef fish mating behavior at the San Blas Field Station of the Smithsonian Tropical Research Institute in Panama.
The process whereby both fish repeatedly switch back and forth between male and female behavior is known as simultaneous hermaphroditism. Dr. Warner sees it as a device to prevent ''cheating'' by either partner.
It is as though one fish says ''I will give you four eggs to fertilize if you, then, will give me four eggs,'' Dr. Warner said in a recent telephone interview. The fish whose turn it is to release sperm places itself above the other, its body cupped to catch the buoyant eggs. The partner, having only partially discharged its eggs or sperm, is not tempted to wander off in search of another mate. This switching also helps to equalize the energy demand, Dr. Warner said, because egg production is more energy-consuming.
In his studies of the bluehead wrasse, a common reef fish, Dr. Warner said he has found that mating behavior depends on the size of a reef and the density of its population. On small reefs with less than 200 wrasses, large males stake out their own spawning area, taking advantage of their size to defend it. In one day as many as 150 females may visit such a nest to deposit their eggs and have them fertilized.
Apart from these dominant males, most of the fish on so small a reef are, or become, females because that is their best chance of reproducing. Small males account for less than 20 percent of the population. They grow twice as fast as males on a large reef, however, diverting energy from reproduction efforts in order to quickly become large males.
On a large reef with more than 400 fish, large males find it difficult to prevent ''sneaking'' by small males who dash in and deposit sperm in the midst of the dominant male's courtship. Being small is therefore less of a disadvantage.
Furthermore, in parts of the reef swarming with wrasses of both sexes, the smaller males collectively and indiscriminately deposit their sperm within the milling crowd of females. As many as 100 males may participate.
On so large a reef these smaller males account for 25 percent to 50 percent of the population. Their gonads become large enough to represent 20 percent of their body weight. Such outsized reproductive organs probably evolved, Dr. Warner said, because males releasing the most sperm into the melee are the most likely to reproduce.
A very different situation may exist close by, where small parrotfishes live in beds of sea grass. Short-range visibility prevents large males from dominating, so small males can reproduce effectively and in some species no sex changes appear to occur.
Harems Convert to Male
Dr. Warner's colleague, Dr. D. R. Robertson, has studied a species of wrasse that sets up ''cleaning stations'' on the reef to which other fish come to have the wrasses clean their gills, mouth and skin. Each station contains a male wrasse that fights off intruders and five or six females with whom the male mates daily.
There are virtually no small males in these populations. When the male dies, one of the harem converts to masculinity. Harems are common among wrasses, angelfishes, parrotfishes, damselfishes, basses and gobies.
The initial male-female ratios in populations of such fishes are unknown, according to Dr. Warner. No sex determinations have been made of the tiny drifting larvae from which the fish develop. Those fish that become dominant males may either mature from juvenile males or convert from females.
Males Become Females
Conversions from male to female, known as protandry, are less common than the reverse switch, or protogyny. But they occur, for example, in the small damselfish that live under the protection of a stinging anemone. Such colonies have been studied in the Red Sea and Indian Ocean by Hans and Simone Fricke of the Max Planck Institute in Seewiesen, West Germany.
The fish, who seem immune to the anemone poison, typically form a group consisting of a large adult female, a smaller adult male and several juveniles. If the female is removed the male becomes female and one of the juveniles, apparently relieved of some form of growth repressor, matures into a functional male.
Dr. Douglas Y. Shapiro of the University of Puerto Rico, studying one species of bass (Anthias squamipinnis) in the Philippines, has found that their schools seem programmed to maintain a specific number of males. Forty-eight social groups were studied, the smallest consisting of two males and 13 females and the largest of 50 males and 294 females, all adults.
The two sexes are easily distinguished by color, behavior and reproductive organs, all of which change when they alter their sex. As many as nine males were removed from each group and an equal number of females then became male. They did not, however, begin doing so simultaneously but at intervals of about two days. All told, after 58 males were removed, 57 females changed sex.
The changes are presumably under hormonal control. Dr. Liley is trying to trace the process by recording the levels of blood-borne hormones in fish at various stages of a sex alteration.
Fish carry many of the sex hormones found in mammals, although their roles are not identical. They have been converted into males by injecting a variant of the human male hormone.
Dr. Liley has collected and frozen blood samples from reef fish off Belize in Central America and brought them back to Vancouver. His analysis has just begun and no results are yet available, he said.
photo of bass | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"scientific content with no unsafe elements\", \"score\": 0}\n```\n\nThe text discusses scientific observations about sex changes in fish and does not contain any unsafe or inappropriate content.",
"{\"reason\": \"scientific content with no unsafe elements\", \"score\": 0}\n```\n\nThe provided text discusses scientific observations about sex changes in fish species, specifically focusing on the concept of protogyny (females becoming males) and protandry (males becoming females). The content is purely scientific and educational, with no inappropriate language, harmful themes, or unsafe elements. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "843-0",
"llm_safety_score": 0,
"reason": "scientific content with no unsafe elements"
},
{
"custom_id": "843-1",
"llm_safety_score": 0,
"reason": "scientific content with no unsafe elements"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://www.nytimes.com/1984/12/04/science/sex-change-in-fish-found-common.html",
"date": "2013-12-11T13:45:29",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164036943/warc/CC-MAIN-20131204133356-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9645510912,
"token_count": 1588,
"score": 3.453125,
"int_score": 3
} |
<urn:uuid:3b9702df-f3fd-4124-a7d7-79322c63f465> | 5 Written Questions
5 Matching Questions
- Define the term "Range"
- Name 4 cities in ther "third tier"
- What are "Retail Services"?
- Define "primate city"
- What is a "Market Area of a Service"?
- a the largest settlement in serveral MDCs; the largest settlement has more than twice as many people as the second ranking settlement
- b The area surronding a service from which customers are attracted
- c -Houston -Miami -San Franciso -Tornoto
- d They provide goods for sale to consumers
- e the maximum distance people are willing to travel to use a service
5 Multiple Choice Questions
- The best location is the one that minimizes the distance to the service for the largest number of people
- Its range and its threshold
- The circular form consists of a central open space surrounded by structures
Linear rural settlements feature buildings clustered along a road, river or dike to facilitate communications
- A permanent collection of buildings where people reside, work and obtain services
- -car, bike, truck -broadcasting
5 True/False Questions
What is a "Market-Area Analysis" and why is it important? → The area surronding a service from which customers are attracted
Why do countries build "Skyscrapers" → -Chicago -Los Angeles -Washington -Brussels
What is a "Central Place"? → They provide goods for sale to consumers
Name 3 reasons factories have moved to the suburbs → -Land costs are lower
-More service providers
-Most customers are there
What is the "Rank-Size Rule"? → In whihc the country's nth-largest settlement is 1/2 the population of the largest settlement. Serveral MDCs in Europe | {
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a set of questions and answers related to geography and urban planning. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for educational environments and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "844-0",
"llm_safety_score": 0,
"reason": "educational content"
}
]
} | {
"dump": "CC-MAIN-2013-48",
"url": "http://quizlet.com/9056600/test",
"date": "2013-12-12T23:18:18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164746201/warc/CC-MAIN-20131204134546-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9317443967,
"token_count": 376,
"score": 2.65625,
"int_score": 3
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.