content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Kidepo Valley National Park is a covering of an area of 1,442km2, Uganda’s most spectacular wilderness, Kidepo valley national park. Gazetted in 1962, same year Uganda got its independence, it is the most authentic of the African wildernesses in Uganda and probably the least visited parks due to the long-haul journey of travel. Kidepo valley is located in the North-Eastern part of Uganda bordering Sudan and Kenya, in the Karamoja region. It lies at an altitude range between 914 m and 2,750 m above sea level. This consideration, combined with the valley’s open, savanna habitat, makes it the park’s prime game viewing location.
Included/Excluded
Tour Plan
Day 1 : Transfer to Kidepo Valley National Park
Set off for a hours journey to Kidepo National Park and have a game Drive in the afternoon in the Narus Valley and there you will see numerous buffaloes, zebras, elephants plus giraffes, and if lucky lions, cheetahs plus leopards. In addition, there are numerous bird species along the way. This drive is really slow offering you wonderful opportunities take pictures of animals, birds, trees, butterflies and plants. You will dine and slumber at your lodge.
Day 2 : Morning Game Drive
Have breakfast and brace yourself another thrilling game drive in the vast Savannah of Kidepo Valley intercepted by patches of borassus palm and the rising scenic hills. Enjoy the stunning views of the morning sun shining over the hills of Lomej, the Lotukei Mountains to the north close to the Sudan border, the Morungole range to the southern boundary of Kidepo before the rays strike down to the endless valleys of Kidepo and Narus valley.
Return to the lodge for lunch and unwind a bit before embarking on a drive to Kidepo valley close to south Sudan boarder to visit the hot springs and you can encounter Ostriches within the region although their numbers are highly threatened by poaching by south Sudanese. Dinner and overnight at Apoka Safari lodge/Kidepo savannah lodge as above.
Day 3 : Return Trip to Kampala
After breakfast, we shall have a guided nature walk to see birds for 3 hours before we can embark on a return trip back to Kampala. | https://mlimasafaris.com/to_book/3-days-kidepo-valley-national-park/ |
Modern Languages and Cultural Studies offers MA and PhD degree programs in four major areas, or streams: Applied Linguistics, Media and Cultural Studies, Translation Studies, and Transnational and Comparative Literatures. Bringing with them individual experiences in the study of diverse cultures and languages, students develop and explore research questions in a creative, dynamic, and international learning environment that emphasizes both academic and professional training. The programs feature interdisciplinary and transcultural seminars, a student-designed professional development portfolio, and colloquia that support collaboration and accelerated time to degree completion. Uniquely equipped with skills in cultural communication and a commitment to global diversity, our graduates pursue careers in government, business, and academia as passionate educators, innovative researchers, and inspired leaders.
For graduate program inquiries, please email our Graduate Advisor at [email protected]
The Department of Modern Languages and Cultural Studies at the University of Alberta is committed to creating welcoming physical, material, and intellectual spaces by respecting and celebrating differences of gender identity and expression, race, sexual orientation, ability, class, ethnicity, nation, and religion. We honour our location in ᐊᒥᐢᑿᒌᐚᐢᑲᐦᐃᑲᐣ (Amiskwacîwâskahikan) on Treaty 6 territory. | https://www.ualberta.ca/modern-languages-and-cultural-studies/graduate-program-information |
Harrison, Ann and Rigg, Tony ORCID: 0000-0001-6507-253X (2021) The Present and Future of Music Law. Bloomsbury, USA. ISBN 9781501367779
Full text not available from this repository.
Official URL: https://www.bloomsbury.com/uk/present-and-future-o...
Abstract
The music business is a multifaceted, transnational industry that operates within complex and rapidly changing political, economic, cultural and technological contexts. The mode and manner of how music is created, obtained, consumed and exploited is evolving rapidly. It is based on relationships that can be both complimentary and at times confrontational, and around roles that interact, overlap and sometimes merge, reflecting the competing and coinciding interests of creative artists and music industry professionals. It falls to music law and legal practice to provide the underpinning framework to enable these complex relationships to flourish, to provide a means to resolve disputes, and to facilitate commerce in a challenging and dynamic business environment.
The Present and Future of Music Law presents thirteen case studies written by experts in their fields, examining a range of key topics at the points where music law and the post-digital music industry intersect, offering a timely exploration of the current landscape and insights into the future shape of the interface between music business and music law. | http://clok.uclan.ac.uk/38306/ |
‘Coptic’ (t-mnt-rm-n-kēme, ‘Egyptian’, literally ‘the abstract category associated with the people of Egypt’) is the name used for the latest stage of the Egyptian language. Egyptian is part of the Afroasiatic (formerly Hamito-Semitic) language phylum, alongside the Chadic, Semitic, Cushitic, and Berber language families; the Omotic language family is often, but not uncontroversially, also included. Egyptian is considered the sole member of its own language family, with its relationship to the other members of its phylum disputed, as it displays similarities to several other families (Loprieno 1995).
Egyptian is usually divided into two major stages, Earlier Egyptian (consisting of Old and Middle Egyptian) and Later Egyptian (consisting of Late Egyptian, Demotic, and Coptic). Later Egyptian is characterised by its greater analytic tendencies, as opposed to the more synthetic morphology of Earlier Egyptian, although Coptic marks a return to a more synthetic morphology, making Egyptian the best known example of the hypothetical synthesis-analysis-synthesis cycle, or anasynthesis, hypothesised as a universal language phenomenon (Haspelmath 2014).
Coptic is also distinguished from older forms of Egyptian by the high proportion of loanwords from Greek; c.5000 lemmata according to one estimate (Grossman 2014), or perhaps 40% of the total vocabulary (Kasser 1991). The number of Greek loanwords in individual texts may vary wildly, from perhaps 4% or less at the lower range, to as high as 71% in some exceptional texts, with 20% or so being the norm (Kasser 1991). Borrowed words belong to almost all grammatical categories – substantives, adjectives, verbs, adverbs, conjunctions, interjections, prepositions, and discourse particles. Occasionally these words may be integrated into Coptic morphology, for example Greek epistolē (“letter”) pluralised in Coptic as epistolooue, and para (“beside, more than, contrary to”) adapted to the pre-pronominal form pararo- (Grossman 2014). The reason for the extensive borrowing is due no doubt to the presence of Greek as the language of government and administration in Egypt during the Ptolemaic, Roman and early Islamic periods, and, more importantly, its status as the vehicle for important new concepts – in particular those of Christianity, through the Greek ‘Old Testament’ (Septuagint) and New Testament – and secondarily those of Greek philosophy (including Hermeticism), Manichaeism, and so on.
A much smaller number of loanwords from Arabic, perhaps 400 or so lemmata, are present in Coptic texts from the ninth century onwards; the bulk of these are restricted to technical (medical, arithmetical, metrological), alchemical, and magical texts, which may have been influenced by or translated from Arabic originals. A smaller body of legal and administrative terminology from Arabic is found in late documentary texts, as well a few words relating to everyday goods (vessels and cloth), these latter probably referring to particular luxury items (Vycichl 1991; Richter 2006, 2009). Arabic loanwords are almost entirely absent from literary texts, with only one known clear exception, the thirteenth century Martyrdom of John of Phanijoit (Krueger 2015).
Writing System
While older forms of Egyptian are written in the various forms of the native scripts – Hieroglyphic, Hieratic, Demotic and Abnormal Hieratic – Coptic is written in a modified form of the Greek alphabet. Although a few Coptic texts restrict themselves to the 24 letters of the Greek alphabet, most use a number of letters drawn from Demotic, but adapted to resemble Greek letters. Sahidic uses six (shai ϣ; fai ϥ; hori ϩ; djanja ϫ; kjima ϭ; ti ϯ), while additional letters are used in both Bohairic (barred-hori ⳉ) and Akhmimic (khai ϧ); further letters are used in a few texts from the early period of Coptic, the first to fourth centuries CE. In addition, a number of diacritics are found in Coptic, of which the most important are the supralinear stroke ( ̅), probably used to indicate either a schwa preceding the letter or an autosyllabic consonant, and the djinkim (⳿), used in Bohairic and Mesokemic to indicate autosyllabic consonants and vowels. The standard Coptic alphabet therefore has 30 or 31 letters, but since the number of phonemes in the language is smaller than this (22 for Sahidic; Layton 2000) several letters represent monograms (ⲑ = /t/+/h/) or alternants of the same phoneme (ⲕ, ⲅ = /k/).
The pronunciation of Greek letters in Coptic, and to a greater extent the spelling of Greek words in Coptic texts, often diverges from Classical Greek. Some of these changes are due to changes internal to Greek, and in some cases more precisely to the peculiarities of the Greek koinē spoken in Egypt, while others are due to the interaction of the phonological systems of Greek and Egyptian – for example, the presence of contrast between voiced and unvoiced consonants in Greek but the absence of the same phenomenon in Egyptian (Horrocks 1997; Torallas Tovar 2010).
Also of interest here is a single known example of a Coptic text written in Arabic script, containing hymns in honour of the Virgin Mary. The manuscript has not been dated, but is presumably rather late (Galtier 1906).
Chronological and Geographical Extent
Coptic is attested as a written language all down the Nile Valley, from Nubia to the Delta, as well as in the Fayum and Western Oases; it presumably existed as a spoken language within a similar range.
Chronologically, a precise beginning for Coptic is difficult to locate. From a grammatical point of view, many of the constructions characteristic of Coptic are also found in late Demotic texts. If defined by its use of the Greek alphabet, the earliest texts representing Egyptian transliterated into Greek are found in the third century BCE. The clearest beginning for Coptic is to be found in the so-called ‘Old Coptic’ texts, a dozen or so examples of Egyptian written in Greek letters supplemented by a range of Demotic letters, some of which evolved into the later standard Coptic graphemes. These texts display a heterogeneous range of dialectic features, but their content places them within the sphere of traditional Egyptian cults: these texts include mummy labels, glosses to hieratic and demotic texts, and astrological and magical manuscripts, with examples of such texts known from the first to fourth centuries CE. Texts written in the standardised Coptic dialects, generally associated with Christianity, are attested from c.300 CE, with the earliest texts being translations of the Septuagint. An example of a text which is transitional between these two groups – ‘pagan’ Old Coptic and ‘Christian’ standard Coptic – may be found in P. Bodmer VI, an early parchment codex containing part of the Book of Proverbs, but displaying a rich range of characters comparable to the Old Coptic texts. In its earliest history, Coptic existed alongside Neo-Middle Egyptian written in hieroglyphs (last attested in the fourth century), and Demotic (last attested in the fifth century).
While it was never the dominant administrative language of Egypt, Coptic continued as a spoken and written language throughout the Roman and early Byzantine periods. Despite the Arab conquest of Egypt in 642 CE, the sixth to eighth centuries represent a very productive period for literary and documentary texts. Significantly, the ninth century saw Sahidic, previously the predominant literary dialect, displaced by Bohairic, the dialect of the Delta. The latest significant literary texts in Coptic were written in the early fourteenth century CE. The Bohairic dialect remains to this day the liturgical language of the Coptic Orthodox Church, but Coptic is generally considered a ‘dead language’. Its demise as a spoken language is difficult to date, with the most pessimistic estimates putting it as early as c.1100 CE (Zakrzewska 2014), and the most optimistic seeing it surviving in isolated parts of Upper Egypt into the seventeenth century, or even later (Peust 1999); a few modern ethnic Copts consider themselves fluent in the language, and there are ongoing efforts at language revival.
Symbolic value
Ewa Zakrzewska (2014) identifies three major symbolic periods of the Egyptian language in its Coptic phase. Its original importance derived from its status as an alternative literary language to Greek, in particular in the monastic milieu which loomed large in Egypt’s religious landscape. After the Arab conquest it developed a new symbolic value as the language of the Coptic Orthodox liturgy, a “language of the heavens”. From the late sixteenth century onwards, the ‘rediscovery’ of Coptic by European scholars gave it further significance, as the “original language of the pharaohs”, whose study led to the decipherment of the earlier stages of the Egyptian language. More recently, Coptic’s status as the “language of the pharaohs” has become important within Pharaonism, an Egyptian nationalist ideology which locates Egyptian, or more narrowly, Coptic, identity, in the Pharaonic past.
Today, the Coptic language is associated with the miaphysite Coptic Orthodox Church, one of the group of churches which rejected the decision of the Council of Chalcedon (451 CE) that Jesus possessed two natures, one human, the other divine, in favour of the view that the incarnate Jesus had a single nature at once divine and human (Awad & Moawad 1991). But the common idea of a clear dichotomy between Coptic-using Miaphysites and Greek-using Chalcedonians is probably too simplistic, as are the comparable, and equally common, native Egyptian Copts/Greeks, rural/urban, peasant/elite dichotomies. The decisive link between the Coptic language and the Coptic Church seems to date to around the period of the Arab conquest, when Greek disappeared as a spoken language (although the Coptic Church retains some Greek sections in its liturgy up to the present day). Papyrological and literary evidence attests to the existence of rural Greek-using communities in the Egyptian chora, and Egyptian/Coptic-speaking communities in the cities, to say nothing of the probably large number of bilingual individuals, both elite and non-elite. The evidence likewise suggests that the decision to using Greek or Coptic in any particular situation was a more complex one than simply that of immediate ethnic or religious identity or social status (Wipszycka 1992).
Text Corpus for the study of Peace
At present Coptic lacks comprehensive searchable online corpora comparable to those which exist for Greek, Latin, or the older forms of Egyptian. Nonetheless, non-comprehensive lists of attestations of individual words can be found in the major dictionaries, most importantly that of Crum (1939), with its complements by Kasser (1964), for Egyptian-origin words, and that of Förster (2002) for Greek loanwords. Collected editions of the Sahidic and Bohairic New Testaments are available, with concordances, as well as much of the Shenutean corpus. The creation of online corpora is the subject of several ongoing projects: Coptic Scriptorium (http://copticscriptorium.org/) is a collaborative project containing richly annotated literary, patristic and Biblical texts, while Coptic documentary texts are gradually being added to the predominantly Greek Papyrological Navigator (http://papyri.info/), and similar plans are under-way with the presently Middle Egyptian and Demotic-focused Thesaurus Linguae Aegyptiae (http://aaew.bbaw.de/tla/). The most important source of Coptic texts, however, remains the large and ever-growing number of papyrological editions and collections of Coptic texts.
Evolution of the Language and Idiomatic Variation
An important peculiarity of Coptic is the presence of a large number of distinctive dialects. The most important of these are Sahidic (regularly abbreviated as S), Akhmimic (A), and Lycopolitan (L or A2, also known as Sub-Akhmimic), the ‘southern dialects’, and Bohairic (B), Fayumic (F), and Mesokemic (M, also known as Middle Egyptian), the ‘northern dialects’; alongside these major groupings are more than a dozen minor dialects, generally variants or non-standard versions of the major dialects. While it has been suggested that the dialects may simply represent different written standards, variation in vocabulary and morpho-syntax alongside orthography suggest that at least some of the apparent differences represent real dialectal variation. The dialects are generally associated with particular geographical areas within Egypt, with the possible exception of Sahidic, which may represent a vehicular dialect, a somewhat artificial standard language with both northern and southern features used for communication across dialectal boundaries (Funk 1988). The dialectal variation in Coptic probably existed in earlier forms of Egyptian, though it is generally hidden by the writing system; the lambdacism (interchange of l and r) characteristic of the Egyptian of the Fayum, which is apparent in many Demotic texts from that region, represents an exception to this. Nonetheless, comments in earlier literary texts about the difficulties that Egyptians from different parts of the country encountered in speaking to each other are suggestive of the pre-history of the dialects.
Diachronic change in Coptic remains a topic to be studied in depth. Most obviously, there are visible changes in vocabulary, orthography, and pronunciation; grammatical change remains difficult to clearly describe (but see Grossman 2010). In terms of vocabulary, we can note the increased amount of Greek between Old and standard Coptic, the changing treatment of Greek loanwords, and the later adoption of Arabic vocabulary and sometimes phraseology. In terms of orthography we can note the increasingly irregular treatment of Greek words in later texts. In terms of pronunciation, there are suggestions of pronunciation shifts over the period of Coptic as a productive written language, but the clearest change is the pronunciation reform of the Coptic Pope Cyril IV (1854-1861), one of a number of educational reforms undertaken by that patriarch, in which the liturgical pronunciation of Bohairic was altered to conform to the pronunciation of Modern Greek.
Vectors of Cultural Influence and Text Types
A wide, though idiosyncratic, range of texts survive in Coptic. The fact that first Greek, and later Arabic, were the predominant administrative and literary languages in Egypt means that Coptic has relatively few purely political or literary texts, but the Egyptian climate has preserved an almost unparalleled number of documentary texts. Clear markers of the pre-Christian, ‘Pharaonic’ Egyptian culture – references to the traditional deities, priests and kings – are generally absent in Coptic texts, although notable exceptions exist in Old Coptic texts, and some magical material. Continuity with pre-Christian Egyptian traditions often lies in less explicit cultural practices relating to the lives of the individual, family, and agricultural community – traditions surrounding childbirth, menstruation, healing, and the Nile flood, for example, which are attested indirectly in textual evidence. Continuity with the Greek and Roman cultural traditions are expressed not only in the literary and philosophical material which is found in early texts, but to a greater extent in the legal texts which display a mixture of Greek, Roman/Byzantine, and native Egyptian legal traditions.
Despite the association of the Coptic language with the Coptic Orthodox Church, a number of important texts from other religious traditions are also attested among surviving documents. Alongside the productions of the traditional polytheistic religious tradition in Old Coptic, religious literature and documentary texts attest to Manichaean communities at both Medinet Madi and Kellis, and the existence of the non-orthodox Christian traditions usually classified as ‘gnostic’ are represented by the Nag Hammadi library, as well as the Bruce, Askew, Tchacos, and Berlin Codices. While much of this material is Judaeo-Christian in inspiration, a small amount represents Greek philosophy (for example the extract from Plato’s Republic in Nag Hammadi codex VI), including the Graeco-Egyptian Hermetica (for example, a section from the Asclepius, in the same codex). Most, if not all, of this material, was translated from Greek, or Syriac, in the case of the Manichaean texts.
The books of the Bible, also translated from Greek, are among the earliest works attested in Coptic. The entire Old and New Testaments, including several apocryphal books, survive in Sahidic, and projects are currently under-way to produce comprehensive editions of these texts (Richter 2009-; Behlmer et al 2015). A Bohairic Bible, though lacking some Old Testament books, also exists, standardised in the ninth century, and Biblical material exists in all of the major dialects. Alongside the Bible, several translations of Apostolic and Patristic works are known in Coptic, as well as native patristic texts, with the most important early authors being the monastic founders Pachomius, the father of cenobitic monasticism, and Shenoute, the archimandrite of the White Monastery and the Coptic language’s most prolific author. Other religious works include homiletic literature, literary epistles, ecclesiastical histories, martyrologies and hagiographies, and liturgical texts, including liturgical poetry. Coptic also preserves two non-religious literary romances, a fragmentary version of the Alexander Romance, and the Cambyses Romance.
Also noteworthy are a number of important ‘pre-scientific’ texts: medical, alchemical, arithmetical, and philological works; important for comparative lexicographical studies are the scalae, dictionaries of Coptic, Arabic, and sometimes Greek, written between the twelfth and fourteenth centuries. A significant number of magical texts survive, both formularies giving instructions for rituals, and documentary texts attesting to applied practices, alongside oracular requests made at the shrines of saints, and sortition oracles.
The last major category, documentary texts, provides an important glimpse into the lives and concerns of individual women and men outside the elites usually most visible in written sources. These include letters, school texts, and legal texts, this latter including sale, loan and business contracts, wills, receipts, and tax documents. In addition to these texts, usually written on papyrus, parchment, and ostraca, we find funerary inscriptions, usually on stelae, and graffiti.
Bibliography
- Allen, James P. The Ancient Egyptian Language: An Historical Study. Cambridge University Press, 2013.
- Awad, Magdi & Moawad, Samuel, “A response to the article ‘Monophysitism’ by W.H.C. Frend in the Coptic Encyclopedia, vol. 5, pp. 1669-1678” in Claremont Coptic Encyclopedia, 1999 : http://ccdl.libraries.claremont.edu/col/cce
- Behlmer, Heike et al. Digitale Edition des koptisch-sahidischen Alten Testaments, 2015-: www.uni-goettingen.de/en/digitale-edition-des-koptisch-sahidischen-alten-testaments/475974.html
- Choat, Malcolm. "Coptic" in The Oxford Handbook of Roman Egypt, edited by Christina Riggs. Oxford: Oxford University Press, 2012: 581-593.
- Crum, Walter Ewing. A Coptic Dictionary. Oxford, Clarendon Press, 1939.
- Förster, Hans. Wörterbuch der griechischen Wörter in den koptischen dokumentarischen Texten. Berlin: Walter de Gruyter, 2002.
- Funk, Wolf-Peter. "Dialects wanting homes: a numerical approach to the early varieties of Coptic" in Historical Dialectology: Regional and Social, edited by Jacek Fisiak. Berlin: Walter de Gruyter, 1988: 149-92.
- Galtier, Émile. "Coptica–arabica III: Un manuscrit copte en caractères arabes" in Bulletin de l’institut français d’archéologie orientale 5, 1906: 91–111.
- Grossman, Eitan. “Periphrastic perfects in the Coptic dialects: a case study in grammaticalization” in Lingua Aegyptia 17, 2010: 81-118.
- Grossman, Eitan. “Greek Loanwords in Coptic” in Encyclopedia of Ancient Greek Language and Linguistics, edited by Georgios K. Giannakis et al. Leiden: Brill, 2014: 118-120.
- Haspelmath, Martin. “A grammatical overview of Egyptian and Coptic” in Egyptian-Coptic Linguistics in Typological Perspective, edited by Еіtаn Grоѕѕmаn & Martin Нaspelmаth & Tonio Sebastian Rіchtеr. De Gruyter Mouton, 2014: pp.103-144.
- Horrocks, Geoffrey. Greek: A History of the Language and its Speakers. Harlow. 1997: 61-63.
- Kasser, Rodolphe. Compléments au Dictionnaire Copte de Crum. Cairo: Imprimerie de l'Institut Français d'Archéologie Orientale, 1964.
- Kasser, Rodolphe. “Vocabulary, Graeco-Coptic” in The Coptic Encyclopedia, vol.8, edited by Aziz S. Atiya. New York: Macmillan Publishing Company, 1991: 215-222.
- Krueger, Frederic. "Die arabischen Lehnwörter im spätbohairischen Martyrium des Johannes von Phanidjōit" in Göttinger Miszellen 246, 2015: 49-55.
- Layton, Bentley. A Coptic Grammar with Chrestomathy and Glossary. Sahidic Dialect. Wiesbaden: Harrassowitz Verlag, 2000.
- Loprieno, Antonio. Ancient Egyptian. A linguistic introduction : Cambridge : Cambridge University Press, 1995.
- Peust, Carsten. Egyptian Phonology: An Introduction to the Phonology of a Dead Language. Göttingen 1999.
- Richter, Siegfried G. Die koptische Überlieferung des Neuen Testaments/The Coptic tradition of the New Testament, 2009-: https://www.uni-muenster.de/INTF/Projects.html
- Richter, Tonio Sebastian. “Coptic[, Arabic loanwords in]” in Encyclopedia of Arabic Language and Linguistics, vol. I, edited by K. Versteegh. Leiden : Brill, 2006: 595-601.
- Richter, Tonio Sebastian. “Greek, Coptic, and the ‘Language of the Hijra’. Rise and Decline of the Coptic Language in Late Antique and Medieval Egypt” in From Hellenism to Islam: Cultural and Linguistic Change in the Roman Near East, edited by H. Cotton, R. Hoyland, J. Price & D.J. Wasserstein. Cambridge : UP, 2009: 402-446.
- Torallas Tovar, Sofía. “Greek in Egypt” in A Companion to the Ancient Greek Language edited by Egbert J. Bakker. 2010: 253-266.
- Vycichl, W. Dictionnaire étymologique de la langue copte. Peeters, 1983.
- Vycichl, Werner. “Vocabulary, Copto-Arabic” in The Coptic Encyclopedia, vol.8, edited by Aziz S. Atiya. New York: Macmillan Publishing Company, 1991: 215.
- Wipszycka, Ewa. “Le nationalisme a-t-il existé dans l'Egypte byzantine?” in Journal of Juristic Papyrology 22, 1992: 83-128.
- Zakrzewska, Ewa D. “The Coptic Language” in Coptic Civilization: Two Thousand Years of Christianity in Egypt, edited by Gawdat Gabra. Cairo: The American University in Cairo Press, 2014: 79-89. | https://www.islam-medieval.cnrs.fr/MotsDeLaPaix/index.php/en/project-languages/coptic |
Daughter enjoys the same property as her son and enjoys the same inheritance rights.
The daughter also has some of the mother’s wealth.
The 2005 Hindu Succession Act (revised) (No. 39 of 2005) came into effect on September 9, 2005. This amendment removes the sex discrimination provisions of the Hindu Succession Act of 1956 and gives daughters the right to:
The daughter of the partner must be an independent partner at birth in the same way as the son.
The daughter has the same rights as her son in the companion’s property.
The daughter should assume the same responsibilities as her son in the common property above.
The share allocated to the daughter is the same as the share allocated to the son.
Married daughters do not have the right to live in their parents’ homes, nor to their husbands. However, married daughters who become divorced or widowed have the right to dwell.
If a woman is an adult, she has all the rights to the property she gets, gives or wants to give. She is free to dispose of these items through sale, gift or will, as desired.
Wives
Married women have exclusive rights to personal property. Unless she donates some or all of someone. She is the sole owner and manager of the asset, whether acquired, inherited or granted.
The right to get support, support and shelter from your husband, or if your husband belongs to a common family, you can get it from that family.
She can share a common family property between her husband and son, and then share the same stake with others. Likewise, after her husband’s death, she has the right to share her role equally with her children and mother.
Mother
She has the right to receive assistance from unsupported children. She is also a leading heir.
If family property is shared among the sons, the widowed mother has the right to share her share.
Any property she owns can be sold, requested or gifted at her option.
In case of death due to intestinal sequelae, children can be inherited the same regardless of gender.
Muslim Law
Daughter
The proportion of daughters in inheritance equals half of the son, which is consistent with the notion that women are half of men.
However, she always had full control over her property. Legally speaking, depending on her life and death, management, control and disposition are all her fate.
She may receive a gift from an heir, but the gift is a means prescribed by Islamic law, and there is no doubt that it can circumvent a third of men’s laws of inheritance. The inherited stake is very strict.
Daughters have the right to live and maintain their parents’ homes before marriage. In the case of divorce, maintenance is returned to the parent’s family after the period of stay (about 3 months). If you have children who can help her. Costs fell on them.
Wife
In Islamic law, the status of women is lower than that of men, but they do not disappear from men at the time of marriage.
Therefore, she maintains control over the goods and property. She deserves the same support as any other wife, and if so, you can take steps not to discriminate against her.
During the divorce, the Supreme Court ruled that Muslim husbands are responsible for making reasonable and fair arrangements for the future of their divorced wife, which obviously also includes maintenance. Husbands are required to provide reasonable and fair provisions beyond their husband’s length of stay in accordance with the provisions of Article 3 (1Ha) of the Muslim Women’s (Divorce Rights) Act of 1986, while Muslim husbands maintain the estimated compensation liability Remuneration was not entrusted to iddat.
Enjoy ownership in accordance with the terms of the agreement agreed upon at the time of marriage.
If there are children, she will inherit 1/8 from him, and if there are no children, she will inherit a quarter. If you have more than one wife, your share may drop to 1/6. In some cases, if the law says there are no heirs to the inheritance, then the wife can inherit a larger inheritance as desired. Muslims are free to dispose of a third of their property, but are not handed over to the heirs.
Mother
If you are divorced or widowed, you have the right to request maintenance of your child.
Her property is distributed in accordance with the rules of the Muslim law.
She has the right to inherit one-sixth of the property of a deceased child.
Christian law
Daughter
She inherited her inheritance from her father’s or mothers, just like her siblings.
You have the right to live and maintain before marriage, but you cannot live with your parents.
After obtaining a majority, you will enjoy all rights to your personal property. Before that, nature guardians were fathers.
Wife
She has the right to be dishonored by her husband, but the dishonor he failed to provide was itself a reason for divorce.
After her husband dies, she has the right to receive a third of her property, and the rest of the property is evenly distributed among the children.
She must inherit at least 5000 rupees from her husband’s property. Suppose real estate is greater than this amount. If not, she can take over the whole.
Mother
She has no right to keep from children. If your child dies or lives without a spouse, you can inherit a quarter of your property.
Maintenance
Article 125 of the Criminal Procedure Act provides for the maintenance of wives, children, and parents.
If anyone has the ability to ignore or keep
A lifeless wife
His legal or illegal child
His father or mother cannot sustain himself
In this case, the court may order the person to provide maintenance allowance to his wife, child, or parent each month.
Order issued by a first-class magistrate
Sheriffs can also provide monthly allowances for temporary maintenance while pending orders are pending.
Applications for monthly allowances for temporary maintenance fees and program fees must be processed as soon as possible within 60 days from the date of the notification service.
“Wife” includes women who have divorced their husbands or have not divorced and remarried.
Important judicial decisions
Mangatmul V. Punni Devi (1995) (5) Zoom 199 SC
-“Maintenance must include residence regulations. Maintenance is provided for women to live in a familiar way. Therefore, the maintenance concept should include provision of food and clothing, taking into account the basic requirements of the overhead roof. .
SMT. B.P. Achala Anand-Civil Appeal No. 4250 of 2000
In this case, the Supreme Court pointed out that the wife had the right to live in a marriage home under the law. The wife has the right to be raised by the husband. She has the right to stay in a refuge. She also has the right to be forced to live apart from her by refusing to keep her due to her husband’s actions or for other legitimate reasons. The right to live is part of the wife’s right to maintain. . The term “wife” for maintenance purposes includes a divorced wife.
Author: Anubhuti Agrawal, | https://www.lawcolumn.in/property-rights-and-maintenance-of-women-in-india/ |
The Hindu Succession Act, 1956, originally didn't give daughters equal rights to ancestral property. This disparity was removed by an amendment that came into force on September 9, 2005.
The issue came up before the bench of chief justice Mohit Shah, judges MS Sanklecha and MS Sonak after conflicting views on the matter expressed separately by a single judge and a division bench.
A division bench had opined that the amendment applied to daughters born on or after September 9, 2005. As regards daughters born before 9 September 2005, the judges held that they would get rights in the property upon the death of their father-coparcener (head of a joint family) on or after September 9, 2005.
The bench's final word :
"The amended section 6 applies to daughters born prior to June 17, 1956 or thereafter (between June 17, 1956 and September 8, 2005), provided they are alive on September 9, 2005, that is on the date when the amendment act of 2005 came into force," the judges observed in their order, running into 72 pages.
Now in the first case your mother and other sibling cannot claim the share as that was gifted by you grandfather in his life time. However all of the children (i.e 3 sisters including your mother and 1 brother) of your grandfather have equal right on the other house and plot land .
The gift from father to his son is not part of ancestral property as the son does not inherit the property on the death of the grandfather or receive it by partition made by the grandfather during his lifetime. The grandson has no legal right on such property because his grandfather chose to bestow a favour on his father which he could have bestowed on any other person as well.
Thus, the interest which he takes in such property must depend upon the will of the grantor and therefore, when the son has got the property from his father as a gift, his sons or daughter cannot claim part in it calling it ancestral property. He can alienate the gifted property to anyone he likes and in any way he likes. Such a property is treated as self-acquired property, provided there is no expressed intention in the deed of the gift by the grandfather while gifting the property to his son. (C. N. Arunachala Mudaliar vs C. A. Muruganatha Mudaliar)
Sons and daughters have property rights only on the properties that have devolved upon their father and become ancestral property in the father’s hands.
The full bench disagreed with this and stated that the daughters would have equal share in the ancestral property, irrespective of their date of birth.
To resolve your Property disputes and get solutions for property rights for daughters in India you can Whattsapp to our Whatapp service No.9840802218 to get detail answers for your problems from experts.
To consult our Helpline for Women's Property rights call @ 9551716256. | http://propertyadvocates.blogspot.in/2017/05/the-married-daughter-have-equal-right.html |
Distance from Rufus, OR to Tidewater, OR
Driving distance between Rufus, OR and Tidewater, OR is 244.26 miles (or 393.09 kilometers). If you drove an average car (using about 3.6 gallons of gas per mile), the gas would cost you around $, since you would need about gallons of fuel.
Leaving from Rufus, OR you would reach Tidewater, OR in about 4 hours 31 mins if you keep an average speed of miles per hour, assuming you don’t make any breaks or get stuck in traffic. | http://distances.io/distance/rufus-or/tidewater-or |
Here’s your chance to own an original print of Dorothea Lange’s ‘Migrant Mother’
The iconic print is expected to fetch between $50K and $70K at auction next month.
An original print of Dorothea Lange’s famous—and somewhat controversial—Migrant Mother photo from the Great Depression will be auctioned off next/this month by Hindman, a fine art auction house. The 19.125 x 14.75-inch silver gelatin print was made by Lange or under her direct supervision some time in the 1950s.
Florence Owens Thompson, the Migrant Mother
Migrant Mother was shot by Lange in Nipomo, California, in 1936 while on an assignment documenting the plight of impoverished farmers for the Farm Security Administration (FSA).
In a 1960 interview with this publication, Lange explained:
I saw and approached the hungry and desperate mother, as if drawn by a magnet. I do not remember how I explained my presence or my camera to her, but I do remember she asked me no questions. I made five exposures, working closer and closer from the same direction. I did not ask her name or her history. She told me her age, that she was thirty-two. She and her children had been living on frozen vegetables from the field and wild birds the children caught. The pea crop had frozen; there was no work. Yet they could not move on, for she had just sold the tires from the car to buy food. There she sat in that lean-to tent with her children huddled around her, and seemed to know that my pictures might help her, and so she helped me. There was a sort of equality about it.
The image was widely circulated throughout the US after it was shot. The unnamed Migrant Mother was seen as a role model for the poor and dispossessed, and, according to Hindman, established Lange as a “socially-conscious and uncompromising photojournalist.”
It wasn’t until the 1970s that the identity of the subject was widely known. Her name was Florence Owens Thompson, born Florence Leona Christie.
An unwilling subject?
Thompson contested Lange’s depiction of her story—the family says they never sold the car tires—or that they were “stereotypical Dust Bowl refugees”. Although portrayed as white, Thompson was a Cherokee. She and her first husband, who died in 1931, had been living in California for almost a decade when the photograph was taken.
Thompson, apparently, also felt exploited by Lange’s portrait. According to the LA Review of Books, she wrote U.S. Camera Magazine saying:
This photo since has been displayed in the Palace of Fine Arts San Francisco, also two years ago it was called to my attention that it appeared in Look Magazine […and] in U. S. Camera. […] Since I have not been consulted […] I request you recall all the unsold magazines. […] You would do Dorothea Lange a great favor by sending me her address that I may inform her that should the picture appear in any magazine again I and my three daughters shall be forced to protect our rights. Trusting that it will not be necessary to use drastic means to force you to remove the magazine from circulation without due permission to use my picture in your publication I remain.
Respectfully,
Florence Thompson
By that time the photo had entered the public domain so there wasn’t a lot that could be done (and also, unfortunately for Thompson, whatever Lange’s representations, she was on the wrong side of copyright law).
An icon for auction
In spite of the contested and murky story of its creation, Migrant Mother is incontrovertibly one of the most powerful and recognizable American images of the 20th Century. Although an original print from Lange’s workshop, the image has been manipulated. In the earliest 1930s prints, Thompson’s thumb can be seen in the left foreground. In 1939, Lange instructed an assistant to airbrush it out. All later prints have a noticeable blurry smudge instead.
The print being auctioned off by Hindman on May 12th was made at some point in the 1950s. It was owned by Lange’s family until 2009 when it was acquired by a gallery in New York. It is expected to fetch between $50,000 and $70,000. | https://www.popphoto.com/news/dorothea-lange-migrant-mother-print-auction/ |
The infrastructure of democracy as an integral part of the American political landscape facilitates a conflict zone in which the will of the majority assumes priority over the voice of the minority. History has shown that as political and economic systems continue to evolve, increasing allocation of power is enabled so as to empower and preserve those institutions that are entrusted with safeguarding the will and well-being of the electorate. However, it can be argued that extending and permitting the allocation of power creates a multi-tiered structure that serves to isolate those institutions from those who democratically elected them. This multi-layered democratic system thereby paradoxically operates by minority rule; the original winning majority within the democratic process disenfranchised in part by the removal of their role within the decision-making process. The fairness of majority representation has gained universal acceptance, however the state mechanism’s ability to administer it is increasingly seen as the ‘Achilles heel’ of good governance. Perhaps this is best exemplified by the inevitable evolving shift of a representative democracy to that of a system that delegates from a power base endowed with questionable accountability.
Since the beginning of the 21st century, an international think-tank known as Policy Network has directed attention to the growing failure of nation states in providing effective solutions to increasing political and economic threats, and social unrest seen within their adopted democratic models. Many would argue that this scenario is exemplified within the current US brand of democratic governance and that solutions to spiraling self-inflicted crises can only be answered if the US relinquishes its claim as a democratic role model within the global arena, rather to allow a globally-based consensus to deliver a global solution. Historians will inevitably point to the demise of a Superpower brokered global democracy that failed the aspirations of millions of its own citizens and did not deliver according to that espoused in a hard fought Constitution or of a legislated Bill Of Rights. The long term sustainability of a self-appointed democracy cannot be a reality unless the global community participates as equal partners and accorded with equal respect.
Can alternative democracy derived from a globally based consensus including so called 3rd world nation states, mitigate or dissolve serious problematic issues that are eroding the American dream; including the idealism espousing equal opportunity for all Americans? Indeed the renowned novelist J. G. Ballard suggested that the ‘dream’ is over and it now supplies nightmares. Sadly this is not only happening within America’s own borders, but also is increasingly distributed for global consumption; thereby disenfranchising the whole of humanity and attenuating the individual’s right to enjoy the American dream. In addition, mainline media has focused worldwide attention on numerous arguably self-inflicted tragedies and controversies exemplified by events such as the Kennedy assassination, Watergate, 9/11 and more recently by the erosion of privacy and human dignity, facilitated by the phenomena of US dominated global surveillance. These events have impacted the lives of all humanity, not just the American citizen.
So can we place the blame of a malfunctioning democracy squarely at the door of a Superpower that once ignited and inspired the dreams and aspiration of billions, and arguably still does? It would be gravely naïve to even accommodate this possibility. Indeed driving this erosion of equal rights and opportunities has been the willing support and participation by many nations, some supposedly lacking in facilitating a meaningful democracy. China despite its perceived multiple violations of human rights and dignity has developed an economy built in part by the flood of exports to the US coupled with vast lines of cheap credit; thereby essentially complicit to the demise of US styled democracy. Some Middle East nation states in turn have actively partnered the US in the drive to monopolize and manipulate energy resources yet the ideals of democracy do not feature within those political landscapes that at best could be described as a dictatorships. If blame were to be apportioned at all for the ongoing demise of US branded democracy it should be equally distributed to all global participants.
Does this mean that US democracy derived from and set out in the founding documents centuries ago should be scrapped? Here we contend that despite the political, economic and social problems seen today both here and throughout the civilized world, such problems are not the result of just human error and inefficiency, but are derived from a system of governance that is outdated. As the American dream has evolved – so has technology and science. We have seen the explosive development of IT and scientific research in recent decades thereby enabling billions to enjoy access to information and cultural diversity previously out of reach. Yet political structures have largely failed to counter or accommodate these changes; thereby failing to amend their institutional structures accordingly. Such changes should facilitate improvement in well-being for all their people, none more so than what we have here in the US; thereby the inability of such institutional bodies to modernize and meet voters aspirations can be deemed to be out of touch or even outdated.
In order for all American self-interest groups including constitutionalists and libertarians to find solutions that fit their own narrative, consideration should be given to a solution that not only meets the needs of the American people, but for all of humanity. As technology and science has become available to all, so should decisions regarding natural resources, political systems, economic structures and social infrastructure be agreed upon and implemented by all nations. We cannot rely on so called mainstream media to voice and safeguard such a decision-making mechanism as it has also been hijacked by self-interest and minority groups and is selective in the news content it broadcasts. On the other hand, the sudden explosion in the availability of the internet has allowed alternative media to access a platform from which to voice the viewpoints and opinions of an alternative train of thought and independent viewpoints. Sadly, much of this form of media has been swayed by hysteria and emotional thought, perhaps seeking subscribers rather than delivering proven facts and validated data. In addition, this form of media has directed attention primarily at US viewers, however for such alternative media to be truly credible it will need to include content that meets expectations of global viewers; not just news from an American perspective. In turn we have seen significant numbers of the global population choosing rather to disbelieve and dismiss the breakdown of democracy as part of ‘conspiracy theories’ possibly due to the perception that these theories primarily are derived from US networks and organizations.
Alternative media still has a critical role to play in ensuring that the American people are accurately informed rather than swamped by baseless opinions so that the US democratic process can be returned back on to the world stage as a model of fair play and governance. If focus is directed at fact rather than hypothesis, credibility can be accredited to a vital yet fledgling alternative media. If investigative journalism becomes the cornerstone of news gathering, short term sensationalism will be deemed as inappropriate.
It can be argued that both the American citizen and global audience has in part become isolated from reality and accustomed to the ongoing disintegration of democracy, and now more recently, failure to question and terminate by the electoral vote issues such as torture, detention without trial and targeted killings have become a norm. This is not just an American phenomena, it is indeed a failure to investigate and follow up a widespread series of global cataclysms. The question that remains to be answered is how far down this road less traveled do we go before we all wake up. Perhaps if Americans have historically claimed the ownership of the ‘Democratic and Freedom’ franchise, then it should assume the lead role in enacting real change that includes transparency, equality in the distribution of resources, and the right to privacy and human dignity for all humanity. Dr. Martin Luther King Jr. encapsulated the hopes of millions of Americans by referring to real democracy in terms of a shift of thinking; a thing-orientated society to a person-orientated society.
To enable inclusiveness of all people within the American democratic system, a re-think of the democratic infra-structure from the grassroots up is of paramount importance even if only for the Administration, Congress and the Justice system to be viewed as truly legitimate by the majority of Americans. If America wakes up now and avoids the peril of inaction, it can still lead the world by example. Furthermore, when increasing numbers of Americans once again begin to buy their brand of democracy, such a groundswell will promote the well-being of all nations and all peoples. No longer will American democracy have to be sold as bait to unwilling partners, no longer will American mainstream media have to hide below the parapet and no longer will the American population have to make excuses for a malfunctioning society. | https://truthinmedia.com/if-increasing-numbers-of-americans-stop-buying-u-s-branded-democracy-who-on-earth-will/ |
Obama dropped inequality for opportunity for the same reason that Rodgers wanted to criticize him for prioritizing inequality over opportunity: because polls and focus groups say that voters love it when people talk about opportunity. Rodgers laid a trap for the president, but he refused to walk into it. Democrats and Republicans may disagree about just about everything, but they both love equal opportunity. Sidelining it in favor of some other goal is an argument the president just isn’t going to have.
Which is too bad. Because whether focus groups want to hear it or not, the idea of equal opportunities is a toxic blend of the incoherent and undesirable. It makes no sense whatsoever as a social objective.
After all, what would it mean for a society to have equal opportunities?
One form of equal opportunities might be if economic resources were distributed entirely by chance. Everyone’s odds of becoming rich or poor would be equal in the sense that it’s completely random. But a society of randomly distributed unequal outcomes would be perverse. For one thing, it would be terrible for incentives. Why work hard or hone skills if outcomes are going to be randomized anyway? More profoundly, redistributing economic resources away from the undeserving rich and toward the undeserving poor would clearly make the random society better off. A poor person gets more use out of an extra $500 than a rich person would. What’s more, if people knew in advance that economic resources were going to be distributed randomly, they would demand a fairly equal distribution for just this reason (this is one version of philosopher John Rawls’ famous argument for an egalitarian economy).
A more plausible version of equal opportunities is in some sense the opposite. Instead of randomizing outcomes, in which case the winners clearly don’t deserve what they get, here the idea is that winners shouldn’t benefit from unfair advantages. In the real economy, lots of people benefit directly from family connections to help them get a job. This is ubiquitous but also generally viewed as unfair. By the same token, it’s hard to do certain things unless your parents had financial resources when you were a child. A poor kid isn’t going to get to go skiing while growing up, and no matter what her natural level of talent, isn’t going to be an Olympic champion skier as an adult.
So equal opportunities might mean a meritocracy. A society in which the best people succeed. Sort of like what we see in the world of distance running.
Distance running doesn’t require any expensive specialized equipment. To compete at the highest levels, obviously, you need the right shoes. But unlike in skiing there are no barriers to entry. And the upshot of this relentless meritocracy is that the sport is utterly dominated by natives of a handful of East African countries. It turns out that the genetic predispositions for successful long-distance running are much more prevalent in Kenya than in Kansas or Korea.
And as far as that goes, it’s fine. Distance running isn’t that big a deal. But would we want all of society to look like that? After a couple of generations, a true meritocracy would simply be a society in which the adopted children of the elite fare no better on average than anyone else, but their biological children grow up to be elites themselves. Not because of connections or special favors, but because of their inborn talents.
Of course genetics are more complicated than that. Alongside the tendency toward inheritance of parental traits, there’s a lot of randomness. But then we’re simply back to equal opportunities as chance. The concept necessarily veers between opportunity-as-randomness and opportunity-as-hereditary-aristocracy, and neither comes across as particularly appealing.
So whether the focus groups like it or not, an opportunity to climb is no real answer for people at the bottom. A perfectly fair race is, in at least one important way, the same as a rigged race: Both have a first-place finisher and a last-place finisher. The question of what happens to the person at the bottom genuinely matters. Whether you want to phrase that in terms of the gap between the bottom and the top—inequality, as such—or simply look at the absolute condition of the people at the bottom, you can’t escape the conclusion that outcomes matter, and not just in terms of procedural fairness. Today, even poor people are able to take advantage of things like electricity and antibiotics that were rare or nonexistent 100 years ago. That’s the kind of opportunity that matters—the opportunity for everyone to enjoy a better life. But over the past generation, progress has been slow for the nonrich. And over the past 10 years, it’s been essentially absent.
Rodgers wanted to debate whether equality of “opportunity” could make the discussion about inequality irrelevant. The White House denied her the chance, but it’s a debate the country deserves to have. If Obama didn’t give it to us this week, I hope he’ll find the courage to do it some time in the near future. | https://slate.com/business/2014/01/equality-versus-opportunity-opportunity-isnt-a-good-enough-goal.html |
Due to the outbreak of coronavirus (COVID-19), many Buddhist centers are taking precautions to protect against the virus and its spread. Beyond encouraging handwashing, some centers have temporarily closed, moved their operations online, and/or updated their cancellation policies for those feeling unwell. Here you’ll find a sampling of those centers and the changes they’re making. (Updated March 17.)
Barre Center for Buddhist Studies
“Given the seriousness of the virus, and the increased health risk to certain populations, we have concluded that the best way to reduce potential harm is to suspend our residential courses as of Sunday, March 15th through April 23rd. For some of these courses we are going to offer a lower cost, online version through Zoom.” More information here.
Berkeley Zen Center
Berkeley Zen Center (BZC) in Berkeley, California has temporarily suspended their usual activities through Saturday March 14 in response to coronavirus. BZC will re-consider whether this suspension should last longer as the week goes on and will post any updated information on their website.
Boundless Way Zen
A March 15 email newsletter from Boundless Way Zen reads, in part, “At a (virtual) meeting on Saturday (March 14), the Leadership Council decided that our various Practice Groups and our Affiliate in Worcester should choose, at their own discretion, how best to move forward at this time, taking into account local conditions and city and state directives. All of the groups that we have heard from as yet, however, have decided to suspend “live” gatherings (involving the physical presence of members) either indefinitely or for at least the next two weeks. …We are exploring various ways to interact virtually during this period, and we will share what we learn with the leadership teams of our affiliate and practice groups.”
Buddhist Churches of America
From a message by Bishop Kodo Umezu: “Due to the Covid-19 pandemic, many temple and church services and events have been cancelled or postponed until further notice. Though you are not able to physically be at your temples and churches, you can listen to the chanting of Juseige, Sanbutsuge and Junirai on our website.”
Buddhist Temple of Toledo
The Buddhist Temple of Toledo in Toledo, Ohio posted a video to their Facebook page outlining the shifts they will be making in response to coronavirus. They say they will try to “suspend all in-person activities at the temple” and shift to virtual events, “not cancelling anything,” and will reevaluate on April 1. The temple is looking to “find ways to keep the dharma still accessible, vital, and connected.”
Cambridge Insight Meditation Center
Cambridge Insight Meditation Center (CIMC) in Cambridge, Massachusetts has announced that it will be closed for 6 weeks, and has announced an “online beginner’s drop-in.”
SIGN UP FOR LION’S ROAR NEWSLETTERS Get even more Buddhist wisdom delivered straight to your inbox! Sign up for Lion’s Roar free email newsletters. Leave this field empty if you're human:
East Bay Meditation Center
East Bay Meditation Center (EBMC) in Oakland, California currently remains open and is promoting mindful handwashing at their center, saying it is a “a great 20-second practice all of the time.” They ask that those feeling unwell or who think they may have been exposed to flu or cold viruses stay home until they feel better.
“The practice of spiritual refuge and radical inclusivity at East Bay Meditation Center means, above all, the co-creation of safe space and mindfulness in order to keep ourselves and our communities protected from harm,” EBMC wrote in a recent newsletter addressing the coronavirus.
Greater Boston Zen Center
A message from center directors reads, in part, “[w]e have decided to temporarily close GBZC-Cambridge starting today, Wednesday 3/11, for a period of at least two weeks so that we may see how ongoing information unfolds, and re-open when we have necessary and more sustainable disinfectant/sanitizing supplies. …we are looking into virtual options for programming and sitting together remotely. (More information will follow.) ”
Insight Meditation Society
“We have concluded that the best way to reduce potential harm is to temporarily close the Retreat Center until April 14, and the Forest Refuge until April 30…. For the foreseeable future, we are offering a daily meditation on Facebook Live to help connect our community during this challenging period. All are encouraged to join in and support your fellow meditators, some of whom may be suffering with worry, stress, or health concern. Visit IMS’s Facebook page for information.”
Karma Triyana Dharmachakra
The website of the seat of His Holiness the 17th Karmapa has announced that “the Monastery will be completely closed to visitors for the foreseeable future. We will be arranging for video recordings to be made of non-restricted practices. These recordings will be made available for students to use as a “practice along with the KTD lamas” substitute for in-person attendance at daily practices.”
Ling Jiou Mountain Buddhist Society
Ling Jiou Mountain Buddhist Society, a Taiwan-based group of Buddhist monasteries founded by Chan Master Hsin Tao with a location in Flushing, New York, has asked all of their centers around the world to temporarily suspend classes and events. They will be applying health safety measures for any visitors, including wearing masks and sanitizing hands.
Nalanda West
Nalanda West, the Buddhist center founded by Dzogchen Ponlop Rinpoche in Seattle, Washington has made significant changes to their March calendar. There are currently 136 confirmed cases of coronavirus and 19 related deaths in Washington state.
The center’s weekly offerings including their Sunday Meditation and Open Meditation have been moved to online mediums including Zoom and Facebook, with links provided on their website. Their Interconnecting for Good fundraiser has been postponed until April.
New York Buddhist Church
From the NYBC website: “After careful consideration and recognizing that many of our regular attendees and visitors are elderly and may be particularly vulnerable to Covid-19, the New York Buddhist Church will be suspending all Church-sponsored group activities held at the facility including Sunday services until March 31. We will be continuously monitoring developments in order to assess future actions and the timing of re-initiating regular events and activities. We are hopeful that we can continue to serve our sangha (community) by using alternative communication channels.”
Padmasambhava Meditation Center
In-person gatherings are currently canceled. Visit the website for more details.
Plum Village
Plum Village, Thich Nhat Hanh’s practice center in France, has temporarily closed to the public until May 1st. They will be giving refunds to those already registered to visit, and will continue to take registrations for the month of May and beyond. The communal nature of Plum Village, alongside the fact that they attract a large number of international visitors, makes the center “unusually vulnerable to the transmission of this virus.”
“We recognise that, as a spiritual community and a place of refuge, we have a social responsibility to protect the wellbeing, safety, and happiness of our visiting guests and residential community,” they write. We should note, too, that in Plum Village, in partnership with Lion’s Roar, will launch a new virtual summit, In the Footsteps of Thich Nhat Hanh, running from March 25-29. In it, several teachers, all students of the famed Buddhist teacher, will present teachings from their tradition. Registration is free; sign up here.
Portland Insight Meditation Center
The Center for Disease Control and Prevention (CDC) recommends handwashing be done for a minimum of 20 seconds to best prevent yourself and your family from getting sick. The Portland Insight Meditation Center in Portland, Oregon shared the following 20-second handwashing loving-kindness (metta) meditation on their Facebook page:
As you wash your hands, you could practice loving-kindness. “May all beings be safe.
May all beings be content.
May all beings be healthy.
May all being live with ease.” That’s about 20 seconds, right?
Puget Sound Zen Center
Puget Sound Zen Center in Vashon, Washington will hold all services online via Zoom as a precaution against coronavirus.
Sakya Monastery of Tibetan Buddhism
Sakya Monastery in Seattle, Washington has suspended all public events including pujas, meditations, and caring for the monastery from today until the end of March. They are encouraging their members to continue their own regular practice at home. Before the end of March, Sakya Monastery writes, they will re-assess the situation and decide how to proceed in April. “In the meantime we pray that everyone remains healthy and safe.”
San Francisco Zen Center
San Francisco Zen Center (SFZC) in San Francisco, California has suspended public events at City Center until further notice and Green Gulch Farm until March 20. Conferences, classes, and programs will still be offered at Green Gulch Farm will still be offered.
In a statement from from the abbots and leadership of SFZC, they write, “In times like this, our practice intentions include efforts to be well-informed, avoid harmful reactivity, engage in beneficial action, and support each other with love, patience, and diligent effort.”
Spirit Rock Meditation Center
Spirit Rock Meditation Center in Woodacre, California is monitoring COVID-19 situation as it unfolds and currently remains open. The center is promoting handwashing and sanitation, as well as bowing as greeting in lieu of hugging or hand-shaking. They have also temporarily updated their cancellation policies so that those feeling ill or uncertain of their health have the option of receiving a full refund, rebooking for a future program, or donating their fees.
Founding teacher Jack Kornfield wrote a letter to the Spirit Rock community addressing coronavirus concerns, writing “The need for the Dharma is stronger than ever. We can choose to live in our fears, confusion, and worries; or to stay in the essence of our practice, center ourselves, and be the ones on this beautiful boat of the earth that demonstrate patience, compassion, mindfulness, and mutual care.”
Tara Mandala International Buddhist Community
“We have decided to cancel our April onsite and personal retreats as of today…We are working on offering web-based solutions for some retreats. Please check our calendar for updates.”
Tibet House
The NYC-based Tibet House’s website states that “In light of the urgent need for social distancing, we are offering free online streaming programs of events hosted here at Tibet House, including selections of His Holiness the Dalai Lama’s teachings organized with us over the years.” The center is currently closed until April 1.
White River Buddhist Temple and Seattle Buddhist Betsuin
The White River Buddhist Temple in Auburn, Washington and the Seattle Buddhist Betsuin in Seattle, Washington, two Jodo Shinshu centers belonging to Buddhist Churches of America, have cancelled services, temple programs, and activities through the month of March as a preventative measure. Private services with chanting and dharma talks by the ministers will be streamed on Seattle Betsuin’s YouTube page in lieu of their regular Sunday Service.
Upaya Zen Center
Upaya Zen Center in Santa Fe, New Mexico has postponed their pilgrimage to Japan until next year, and has postponed their Chaplaincy events this month, continuing the training online. Though the temple is still open for meditation, future Wednesday night Dharma Talks will be livestreamed to Facebook.
Village Zendo
“The Village Zendo is currently closed in response to the Coronavirus emergency. We are offering online zazen and will be announcing online talks as well as the opportunity to schedule dokusan for formal students at the Village Zendo.” More information can be found here.
Zen Mountain Monastery & Zen Center of New York
From the organization’s Health and Safety page: “All scheduled retreats, sesshin and physical gatherings—such as daily zazen and the Sunday morning program—will be closed until it is safe for us to convene in person once again. In the meantime, we’ll be using the Internet to stay connected. We’ll be watching the situation carefully and sending frequent emails with news and updates. Please refer to this web page for updates announcing specific Livestream events and other relevant information.”
Zen Nova Scotia
Via their website as of March 14: “In response the current health concerns, ZNS will be gathering online, beginning this week. This Tuesday evening, we’ll sit together, chant together, and talk about the dharma—what we always do—but we’ll also be doing doing it in a new way and asking for feedback. (See site for online Zoom meeting link.)
| |
CAU research team develops new composite material made of carbon nanotubes
Extremely lightweight, electrically highly conductive, and more stable than steel: due to their unique properties, carbon nanotubes would be ideal for numerous applications, from ultra-lightweight batteries to high-performance plastics, right through to medical implants. However, to date it has been difficult for science and industry to transfer the extraordinary characteristics at the nano-scale into a functional industrial application. The carbon nanotubes either cannot be combined adequately with other materials, or if they can be combined, they then lose their beneficial properties. Scientists from the Functional Nanomaterials working group at Kiel University (CAU) and the University of Trento have now developed an alternative method, with which the tiny tubes can be combined with other materials, so that they retain their characteristic properties. As such, they “felt” the thread-like tubes into a stable 3D network that is able to withstand extreme forces. The research results have now been published in the renowned journal Nature Communications.
A difficult candidate
Industry and science have been intensively researching the significantly less than one hundred nanometre wide carbon tubes (carbon nanotubes, CNTs), in order to make use of the extraordinary properties of rolled graphene. Yet much still remains just theory. “Although carbon nanotubes are flexible like fibre strands, they are also very sensitive to changes,” explained Professor Rainer Adelung, head of the Functional Nanomaterials working group at the CAU. “With previous attempts to chemically connect them with other materials, their molecular structure also changed. This, however, made their properties deteriorate – mostly drastically.”
In contrast, the approach of the research team from Kiel and Trento is based on a simple wet chemical infiltration process. The CNTs are mixed with water and dripped into an extremely porous ceramic material made of zinc oxide, which absorbs the liquid like a sponge. The dripped thread-like CNTs attach themselves to the ceramic scaffolding, and automatically form a stable layer together, similar to a felt. The ceramic scaffolding is coated with nanotubes, so to speak. This has fascinating effects, both for the scaffolding as well as for the coating of nanotubes.
The 360° video illustrates how CNT networks are created:
Porous ceramics are produced at high temperatures, as shown here by the coalescence of the four-pronged particles, which join together like fine snowflakes that form a closed, but light blanket of snow. The interconnected particles are coated with a network of carbon tubes (represented as a transparent shell) and then etched out.
This multimedia simulation about the scientific work from the group pf Professor Rainer Adelung, “Functional Nanomaterials” at Kiel University, was developed as part of a cooperation project between the Kiel Science Outreach Campus and the Mediadome at the Zentrum für Kultur- und Wissenschaftskommunikation (Centre for Culture and Science Communication, ZKW) of Kiel University of Applied Sciences.
via Eduard Thomas, Kiel University of Applied Sciences.
Following the principle of bamboo buildings
On the one hand, the stability of the ceramic scaffold increases so massively that it can bear 100,000 times its own weight. “With the CNT coating, the ceramic material can hold around 7.5kg, and without it just 50g – as if we had fitted it with a close-fitting pullover made of carbon nanotubes, which provide mechanical support,” summarised first author Fabian Schütt. “The pressure on the material is absorbed by the tensile strength of the CNT felt. Compressive forces are transformed into tensile forces.”
The principle behind this is comparable with bamboo buildings, such as those widespread in Asia. Here, bamboo stems are bound so tightly with a simple rope that the lightweight material can form extremely stable scaffolding, and even entire buildings. “We do the same at the nano-scale with the CNT threads, which wrap themselves around the ceramic material – only much, much smaller,” said Helge Krüger, co-author of the publication.
Using tiny carbon tubes to create high-performance plastics
The materials scientists were able to demonstrate another major advantage of their process. In a second step, they dissolved the ceramic scaffolding by using a chemical etching process. All that remains is a fine 3D network of tubes, each of which consists of a layer of tiny CNT tubes. In this way, the researchers were able to greatly increase the felt surface, and thus create more opportunities for reactions. “We basically pack the surface of an entire beach volleyball field into a one centimetre cube,” explained Schütt. The huge hollow spaces inside the three-dimensional structure can then be filled with a polymer. As such, CNTs can be connected mechanically with plastics, without their molecular structure – and thus their properties – being modified. “We can specifically arrange the CNTs and manufacture an electrically conductive composite material. To do so only requires a fraction of the usual quantity of CNTs, in order to achieve the same conductivity,” said Schütt.
Simple procedure for numerous applications
Applications for use range from battery and filter technology as a filling material for conductive plastics, implants for regenerative medicine, right through to sensors and electronic components at the nano-scale. The good electrical conductivity of the tear-resistant material could in future also be interesting for flexible electronics applications, in functional clothing or in the field of medical technology, for example. “Creating a plastic which, for example, stimulates bone or heart cells to grow is conceivable,” said Adelung. Due to its simplicity, the scientists agree that the process could also be transferred to network structures made of other nanomaterials – which will further expand the range of possible applications.
Learn more: Fine felted nanotubes
The Latest on: Carbon nanotube networks
- Graphene substrate improves conductivity of carbon nanotube network | IDTechEx Research Articleon October 17, 2019 at 12:13 pm
Professor Kauppinen's group at Aalto has years of experience in making carbon nanotubes for TCFs. This new work applies the techniques they have developed to place densely-packed and clean random ...
- Graphene Substrate Improves the Conductivity of Carbon Nanotube Networkon October 13, 2019 at 9:22 pm
Professor Esko Kauppinen's group at Aalto has years of experience in making carbon nanotubes for TCFs. This new work applies the techniques they have developed to place densely-packed and clean random ...
- Use carbon nanotubes and graphene for better transparent conductorson October 10, 2019 at 8:30 am
Clean random nanotube carbon nanotubes were driven onto the graphene sheet electrodes to form a dense network using a temperature gradient – a process called thermophoresis. Boosting tunnelling in ...
- Graphene substrate improves the conductivity of carbon nanotube networkon October 9, 2019 at 9:12 am
Professor Kauppinen's group at Aalto has years of experience in making carbon nanotubes for TCFs. This new work applies the techniques they have developed to place densely-packed and clean random ...
- Carbon nanotube fibers restore damaged heartson August 29, 2019 at 4:06 am
Researchers have used carbon nanotube fibers (CNTfs) to induce signals in heart scar tissue. Ventricular arrhythmias are one of the leading causes of sudden death. They are caused by random signals ...
- A chip made with carbon nanotubes, not silicon, marks a computing milestoneon August 28, 2019 at 10:09 am
But carbon nanotube computer chips may ultimately give rise to a new ... carbon nanotubes have proved too finicky to construct complex computing systems. One issue is that, when a network of carbon ...
- Carbon Nanotube DRAMon August 22, 2019 at 5:00 pm
“Carbon nanotube memory—it sounds so sexy that I could just shut ... Nantero has between hundreds and thousands of such nanotubes in every cell “forming a stochastic network of resistive elements.” ...
- Neural networks will help manufacture carbon nanotubes | IDTechEx Research Articleon August 15, 2019 at 2:18 pm
We have suggested using artificial neural networks (ANN) to analyze experimental data and ... can help monitor the properties of the carbon nanotube films produced. "The development of human ...
- Neural-Network-Based Method for Producing Carbon Nanotubeson August 12, 2019 at 5:47 am
Researchers from Laboratory of Nanomaterials, Skoltech, have come up with a neural-network-based technique for tracking the development of carbon nanotube, leading to a new generation of advanced ... | https://www.innovationtoronto.com/2017/11/new-composite-carbon-nanotube-material-makes-a-stable-3d-network/?responsive=true |
The AGCAS Health and Related Professions Task Group have produced an update on recruitment changes to the dentistry profession.
The UK Committee of Postgraduate Dental Deans and Directors (COPDEND) updated students at QMUL and KCL about key ch
02 July 2018
The AGCAS Scotland Professional Practice Group (PPG) is seeking to recruit two new members.
About the task group
The group is active and enthusiastic and is very keen to welcome new members working in any role within a Careers
A number of AGCAS task groups have updated and added new content to their task group areas: these resources are available to all members.
Recent content updates are from the following task groups:
Internationalisation Task Group
29 June 2018
Outgoing AGCAS President Shelagh Green reflects on her first NACE (National Association of Colleges and Employers) conference.
My first experience of a NACE Conference (National Association of Colleges and Employers) was a missing openin
The AGCAS Education Liaison Task Group is responsible for the production of the annual publication What Do Graduates Do?, which is produced by HECSU in partnership with AGCAS and involves members of the task group analysing and translating graduate
20 June 2018
We are pleased to announce the shortlist for the revamped AGCAS Awards for Excellence 2018. The nominations have once again been of an exceptionally high standard so we would like to extend our congratulations to all those that have made the shortl
13 June 2018
The June batch of Job profiles and What can I do with my degree? titles have been updated and are now live on the Prospects website. This month's updated titles are:
Job profiles
Advice worker
Community education officer
Corporate inve
07 June 2018
AGCAS is recruiting writers to create ten new What can I do with my degree? titles. These titles, jointly produced with our partners Graduate Prospects, will be available on the Prospects website.
New titles
The new titles are:
Danc
For more information on what cookies are and how you can manage and remove them click here. | https://www.agcas.org.uk/News |
Peace Intelligence: A Call to Care
People are different. Cultures are different. No two people are the same and no two conflicts are the same. How are peace practitioners to remain relevant and ‘do no harm’ if this is always going to be the case? Most organisations turn to cultural competency training to remain relevant in our ever-increasingly connected world. But is this enough?
In our upcoming webinar, Elaine Pratley, Rotary Peace Fellow and Cultural Intelligence trainer will draw on her insights on ‘cultural intelligence’ to explore how we might cultivate a ‘peace intelligence’ that is responsive enough to each new context.
For Elaine, peace intelligence, like cultural intelligence, ultimately comes from a posture of care that sees the human in others.
Drawing on her joys and cultural faux pas while living and working in Malaysia, Switzerland, China, New Zealand, Australia, Kazakhstan, India and Thailand, this session is a call for peace practitioners to be gracious with others, and also themselves, as we live in a world full of unknowns. | https://www.gppac.net/news/peace-intelligence-call-care |
PERMACULTURE DESIGN CERTIFICATE CURRICULUM
PDC material was originally developed by Bill Mollison, co-founder of permaculture, to teach the principles and foundations of sustainable design. All PDC courses offered throughout the world must follow the same format to assure that the integrity of the certification process is upheld. This is the curriculum of the PDC jointly offered by IMAP and Atitlan Organics.
Permaculture Ethics and Principles of Natural Systems and Design
The course begins by covering the three main Permaculture Principles of Earth Care, People Care, and Sharing the Abundance. We move from there to a detailed analysis of the principles that govern natural systems and holistic design. This section covers design methodologies, needs analysis, zones and sectors, and other basic natural design approaches. Here, we also cover pattern analysis, as well as the observation, mimicking, and pattern adaptation from natural systems and cycles.
Mayan Cosmology and the Influence on Natural Systems
This is a special component that is unique to our course. Led by Rony Lec, IMAP’s Coordinator and Indigenous Mayan Anthropologist, this component will provide an in-depth look at the Mayan calendar and how to use this and other astrological tools to guide your interaction with the landscape. Aside from the calendar, there will be ample opportunities to participate in an authentic Mayan ceremony, connect with Mayan communities and learn traditional techniques of seed saving, food production, and Indigenous worldview.
Understanding Natural Systems and the Establishment of the 3 Major Land Types within a Site
This section takes a look at trees and forests, as well as wetland areas, pasture, and other natural ecosystems in order to understand the importance of each and how they can be integrated together to build resilient landscapes. Permaculture tends to favor perennial plants and self-regulating systems, and being able to integrate the various major land types into a specific site is the surest way to maximize diversity and build regenerative landscapes. Here, we are focusing on on-site diversification within the context of the various zones and sectors.
Earthworks, Swales, Contours, and Deep Site Modification
Earthworks are a major piece of permaculture that often get overlooked. Stripping native vegetation can often cause people to shudder and write this whole process off as not being ecologically sound. In reality, nothing could be further from the truth. Through earthworks such as pond building, texturing the landscape, swales, and terracing, we are actually accelerating and steering the succession and evolution of natural systems. Nature, when left to her own devices, thinks nothing of the human inhabitants. We must guide the evolution of a site to not only provide for the earth and other creatures, but also for ourselves. While earthworks can be initially labor and resource-intensive and seemingly destructive to the current landscape, they are the only way to fully develop a site for efficient energy capture and storage, which in turn, increases abundance and resiliency.
Water Management, Capture, and Efficient Use
Water is the most important resource that is available for us to capture and utilize. We cover a wide range of strategies across a variety of different climatic conditions for the efficient capture, storage, and use of water. Relating back to earthworks and the three major land types, we see how water retention can be improved, which is the foundation of any successful, self-regulating site.
Permaculture Gardening Techniques, Soil Basics, and Fertility Management
Mainly a Zone 1 and 2 strategy, this part of the course will cover intensive vegetable gardening techniques that allow for big production in small spaces with minimal reliance on outside inputs. Various strategies for both wet and dry climates will be covered, as well as the placement of these generally annual gardens within the overall perennial Permaculture site. Here, we will also cover soil fertility and the building of soil within a site. Carbon to Nitrogen Ratios, the use of animals, mulching, and other techniques will be covered and accompanied by hands-on activities.
Sustainable Animal Systems
This part of the course will cover a variety of animal systems and their integration into the total landscape design. These include:
- Chickens, both for meat and eggs
- Ducks, Geese, and other water fowl
- Rabbits
- Bees, including honey production and harvesting
- Goats, and minor talks on sheep, cows, and other grazers
Free-range systems, rotational grazing, wetland integration, grazing within food forests, and other designs will all be covered in detail.
Food Forest Establishment
This is where all the various components come together, focusing on the integration of animals, wetlands, and perennial/annual productions systems.
We will talk about accelerating succession in an evolving landscape and how to maximize impact with minimal effort. Earthworks are covered here again and the whole process of site design, modification, and evolution comes together in this section.
Seed Banks and Plant Propagation
Nursery work and seed saving are major activities that can aid in building the diversity of a site. Learn to master the tools that nature has given us, which allow us to tap into her abundance through the use of propagation material for useful plants.
A lot of hands-on work will be done in this section of the course, including grafting, cloning, and more basic propagation techniques.
Value-Adding, Fermentation, and Handling Abundance
Another component that is heavy on the hands-on participation. Students will have the opportunity to kill and process a chicken (which will be part of their meals for non-vegetarians), as well as milking goats and making cheese/yogurt. There will be a fermentation workshop and lectures on how to preserve the harvest and improve its value over time, without diminishing the nutritive value.
Small-Scale, Sustainable, Land-based Opportunities
Another unique aspect of our course is the focus on making a sustainable and comfortable living based on a Permaculture site. Practitioners of Permaculture have a great opportunity for producing food, fuel, and other products from a sustainably-managed system, which would enable them to provide employment, as well as nutrient dense food to their community.
Aquaculture
We will briefly cover aquaculture and the diversification of landscapes via ponds, wetlands, and water systems. Useful plants, animals, and water retention systems will be looked at and the opportunities for aquaculture will be covered, with relevant examples provided.
Natural Building
Guest Speaker Charlie Rendall will be leading the natural building component of the course. Charlie has been building and designing with natural materials for over 7 years and now runs a design consultancy for natural building projects in Guatemala. His specialty is building with bamboo, but he also has extensive experience in cobb structures, natural stucco, traditional stone buildings, thatch roofing, and many other natural building techniques.
Alternative Technology
Both passive and active technologies will be explored, with many examples and hands-on opportunities. Compost heated showers, passive solar showers, solar electric systems, rocket stoves, and a wide array of other technologies will be covered.
Community-Based Alternatives and Invisible Structures
Building on the small-scale business opportunities for permaculturists, this lecture will examine invisible structures at play in the current prevailing socioeconomic arrangement and cover a variety of ways that we can work to change the status quo. New approaches including time banks, land-based production systems, and local-only distribution of goods will be covered.
Design for Climate Change and Resilience to Natural Disasters
As the climate continues to change before our eyes, we now see that the only normal weather patterns are abnormal ones. More and more natural disasters are occurring worldwide, which is a driving force for the new-found interest in more sustainable approaches to land-use and business. This area will focus on how to design for climate change and natural catastrophe, via the built-in resiliency that can be achieved by permaculture design. Trends in climate change, new threats to living systems, and biological remediation techniques will all be looked at here. | https://imapermaculture.org/pdc-curriculum/ |
After starting his career in the opera pits of Scotland, Chile and Yorkshire, Matthew took up positions with the Royal Philharmonic and Aurora Orchestra almost simultaneously. A love for contemporary music and chamber ensemble playing grew, largely through his work with Aurora, which now makes for an interesting portfolio career alongside teaching at the Royal Academy of Music and working with the brass septet Septura. Having said all that, he would swap it in an instance to play cricket for England.
To read about other Authors, the Management Team and all the Ted’s List staff, visit our Team page here.
Join 54,729 Subscribers Who Receive Free Tips On Learning A Musical Instrument
Ted’s List is the go-to community for advice or reviews on anything related to music & instruments
Copyright © 2021 Arts Digital Limited trading as Ted’s List™®. All rights reserved. Ted's List is a project run by The Emery Foundation - a Micro-Trust of GivingWorks, registered charity number 107877.The idea of Ted's List was setup to raise funds for musicians during the Covid-19 pandemic as part of the Get Musicians Working project.
Our 'Champions' are the musicians we think showcase their instrument to the wider public, and make a substantial difference to the popularity of their instrument family.
Non of the 'Champions' are remitted in any way by Ted's List, and our list is completely impartial. If you have a favourite musician you would like to nominate to be added to our list of 'Champions', then please do contact us. | https://teds-list.com/author/matthew-gee/ |
Types of Commonly Found Respiratory Issues
Lung and respiratory diseases are among the most common health issues across the nations. Some common causative factors include increasing infections, lifestyle changes, smoking, pollution, work environment, etc. It has led to a rapid increase in lung infections and disorders for people. The breathing issues caused by lung diseases disrupt the breathing pattern of the body as it prevents oxygen intake. Some common lung diseases are asthma, chronic bronchitis, and emphysema.
What are the Commonly Found Respiratory Issues?
The lungs are an integral part of a complex body system, which takes in oxygen and releases carbon dioxide every day, which is necessary for survival. When there is some infection in the lungs, it leads to lungs and respiratory disorders. There are numerous reasons for poor condition of lungs, including pollution, genetic problems, allergies, unhealthy lifestyle, smoking, etc.
To understand the condition further, we have listed below some common lungs diseases:
- Asthma
In this health condition, the airways inflame and may cause spasms. It also causes wheezing and short-breath. Some common triggers of Asthma include allergies, infections, or immense pollution.
- Chronic & Acute Bronchitis
Chronic Bronchitis is a type of COPD (Chronic Obstructive Pulmonary Disease), which includes long term or persistent cough. Acute Bronchitis, on the other hand, is the inflammation of the bronchi, the large and medium-sized airways, of the lungs.
- Pneumonia
Pneumonia is a disease of the lungs that causes the inflammation of airspace in the lungs, because of fungus, bacteria or viruses infections. Pneumonia, if left unattended, leads to breathing issues and many other complications.
- Tuberculosis
Tuberculosis (TB) is a disease caused by the infection of Mycobacterium Tuberculosis (MTB) bacteria. It mainly impacts the lungs, but may also affect other body parts.
- ARDS
Acute Respiratory Distress Syndrome is a severe injury in the lungs caused due to critical illness or injuries. People having ARDS need assistance in breathing by a ventilator, for helping the recovery of lungs.
- Emphysema
When the thin links between alveoli get injured, it leads to respiratory problems like limiting airflow and impacting your airways. Smoking is a prominent trigger for the problem.
- Other important conditions observed
Lung cancer- There are many forms and types of lung cancer. It primarily impacts the central part of your lung, near the air sacs.
What are the Preventive Measures?
The preventive actions for various kinds of respiratory disorders include a two-step process, which is primary prevention and secondary prevention.
Primary prevention:
It consists of the prevention you can take before the infection or disorder enters your surroundings. The steps include:
- It would be best if you got some healthy lifestyle changes, like nutritional food, regular workout; avoid smoking or tobacco, other allergens and irritants that may obstruct the airway.
- Asthmatic people need to get sensitisation for the factors that may cause disease.
- In the case of pregnant women and newborn children, you need to provide extra attention to their health, nutrition and environment.
Secondary Prevention:
It is the situation when a person is already suffering from a respiratory disorder and needs care. The points include:
- Avoid incessant smoking
- Get assistance in a rehabilitation centre
- Ensure minimal exposure to harmful gases and particles
- Engage in regular exercise
- Avoid allergens and other non-specific triggers.
Conclusion
Respiratory disorders are among the most common health problems all over the world. The primary causes include smoking, tobacco, infection and genes. But with proper prevention methods, you can considerably reduce the risk.
As per experts, the best method for avoiding respiratory system problems is not smoking, consumption of tobacco or any other drug. Center for Disease Control and Prevent has data that provide tobacco consumption as the leading cause of preventable health issues and deaths. It causes almost 480,000 deaths per year. You may also try maintaining a healthy weight, get proper sleep, stress less, engage in numerous activities and have a balanced diet.
You must consult a doctor and follow proper medication for ensuring quick recovery from the lungs problems. StayHappi is a reliable online pharmacy store for medication and consultation for any breathing problem or lung disorder. They provide reasonable and efficient solutions for complete relief. | https://corporate.stayhappi.com/commonly-found-respiratory-issues/ |
We are a global provider of Game-Based Assessments that deliver meaningful, job-relevant insights about people. We enable employers to differentiate their hiring process, engage prospective talent, make fair and objective selection decisions, and raise brand awareness.
Our Game-Based Assessments
We offer a range of themes and styles in our game-based assessments, from a futuristic office to a more playful space adventure, tailored to suit your ideal candidate experience.
Our bespoke service allows us to incorporate your branding within the game, and develop a unique algorithm to measure the employee traits important to your business. | https://www.arcticshores.com/ |
CROSS-REFERENCE TO PRIOR APPLICATIONS
FIELD OF THE INVENTION
This application claims the benefit of European Patent Application No. 19212635.7, filed on 29 Nov. 2019. This application is hereby incorporated by reference herein.
The invention relates to a Personal Emergency Response System (PERS).
BACKGROUND OF THE INVENTION
A Personal Emergency Response System (PERS) enables an elderly person, handicapped person, or other person at elevated risk of accident or incapacitating medical emergency to summon help.
A PERS can improve the quality of life for elderly living on their own while providing ease of mind to their loved ones. These systems typically make use of a body worn device such as wristband or neck-worn pendant. During an emergency, the subscriber presses an emergency push button (called a personal help button, PHB) on the device, which establishes a two-way call with the service provider's call center. The body worn device also typically comprises a fall detection device which incorporates a pressure sensor, for detecting height changes. Thus, an emergency call may aslo be initiated automatically in the event of a detected fall.
Such systems are typically on a subscriber basis, i.e. the at-risk person subscribes to the PERS service (either on a paid basis, or with the subscription provided by a healthcare provider, governmental agency, or other sponsor).
In a home-based system, by pressing the emergency button of the PHB, a speakerphone console in the residence is activated, by which the subscriber is placed into telephonic (or videophone, or the like) contact with a PERS agent usually via a cellular connection such as LTE. The agent speaks with the subscriber and takes appropriate action such as talking the subscriber through the problem, summoning emergency medical service (EMS), or alerting a neighbor or other authorized person to check on the subscriber. The location of the user is already known to the PERS agent.
There are also mobile systems which make use of the mobile cellular telephone network to enable communication between the subscriber and the PERS agent. The mobile system transmits location coordinates derived from GPS (or WiFi, triangulation, hotspots or similar) to enable the system to locate the user.
This invention relates in particular to the verbal communication between the user and the PERS agent.
A problem with mobile solutions is the need for a full cellular communications channel, with the associated equipment cost and rental cost. In particular, for an emergency system a 24/7 guaranteed channel is required.
It is also difficult to provide suitable communications quality in a small help button format, for example because of the need for a large antenna and/or the need for multiple antennas (e.g. in 4G). The large bandwidth of audio signals, which are needed to enable verbal communication between the user and the PERS agent, also adds cost and complexity, and prevents the use of lower bandwidth and lower cost communication alternatives as well as likely reducing the range of the signal compared to lower bandwidth signals.
SUMMARY OF THE INVENTION
The invention is defined by the claims.
According to examples in accordance with an aspect of the invention, there is provided a personal help button for a personal emergency response system, PERS, comprising:
a button for activating an emergency call;
an audio device for receiving a verbal audio input from a user and delivering verbal audio reply to the user;
a conversation algorithm for converting at least some of the verbal audio input into a low bandwidth format output signal and for converting a received low bandwidth format reply into a verbal audio reply, wherein the conversation algorithm comprises a trained neural network and the low bandwidth format has a bandwidth below 500 bits/second; and
a transmission and reception system for the low bandwidth format, for transmitting the low bandwidth format output signal to a remote PERS helper and receiving the low bandwidth format reply from the remote PERS helper.
By “verbal” is meant an audio signal contains words, and hence it is part of a dialogue between people.
This help button makes use of a low bandwidth communication format, in particular so that the use of cellular telephony is avoided. To enable audio to be transmitted over the low available bandwidth, a trained neural network is used to convert the audio into a compressed format. The training of the neural network is based on historical dialogue between the user and the helper for existing systems (in which audio recordings are available). The neural network thus employs speech recognition to extract words and phrases. The provision of a large dataset of dialogue (e.g. for many years of operation of a full audio system) enables the trained neural network to achieve highly efficient data compression. In particular, the user messages have many common words, themes and phrases. Similarly, the replies from the PERS helper follow guidelines which indicate how to communicate in different situations. For example, the PERS helper may ask yes/no questions and/or use the five whys technique (to determine root cause of problem). Thus, the use of a neural network based on language and vocabulary enables a highly efficient and effective conversion of a emergency call into a low bandwidth format. For example, a reduced event vocabulary may result.
The personal emergency button may further comprise a speech synthesizer for generating the verbal audio reply.
The low bandwidth signal cannot typically be reconstructed as an audio signal. Thus, speech synthesis is used to enable the delivery of a verbal audio signal to the user.
The low bandwidth system for example has bandwidth below 250 bits/second.
The low bandwidth system may comprise narrowband IoT, Lora, Narrowband IoT, Wi-Fi HaLow, LTE Cat M1 or Sigfox technology systems. These provide an end-to-end solution avoiding the need for conventional cellular networks and provide improved range and coverage. Other current or future low bandwidth systems may of course be used.
Another aspect of the invention provides an administrator system for a personal emergency response system, PERS, comprising:
an input for receiving an emergency call from a user;
a transmission and reception system for receiving a low bandwidth format input signal from the PERS user and for transmitting a low bandwidth format reply signal to a PERS user;
a microphone for receiving a verbal audio reply from a PERS helper; and
a conversation algorithm for converting the low bandwidth format input signal into a verbal or textual communication for the helper, and for converting a verbal audio reply from the helper to the low bandwidth format reply signal, wherein the conversation algorithm comprises a trained neural network and the low bandwidth format has a bandwidth below 500 bits/second.
The administrator system also converts between verbal audio data and the low bandwidth format. The final output to the helper does not necessarily need to be reconstructed speech; it may be text based, for example. However, the output provided by the helper is converted to audio for the user, so that at least at the user side, there is the impression of a natural conversation.
The administrator system may however further comprise a speech synthesizer for converting the verbal or textual communication into a verbal audio signal.
The invention also provides a personal emergency response system comprising:
a personal help button as defined above; and
an administrator system as defined above.
Another aspect of the invention provides a communication method for a user of a personal help button of a personal emergency response system, PERS, to communicate with a helper of the PERS administrator, comprising:
activating an emergency call;
receiving verbal audio input from the user;
using a trained neural network conversation algorithm to convert the verbal audio input into a low bandwidth format output signal;
transmitting the low bandwidth output signal to the helper over a channel with a bandwidth below 500 bits/second;
receiving a low bandwidth format reply from the helper; and
using the conversation algorithm to convert the low bandwidth format reply into a verbal audio reply.
This is the method by which the user communicates with the helper at the PERS administrator. The method is preferably implemented by computer program
Another aspect of the invention provides a communication method for a helper of personal emergency response system, PERS, administrator to communicate with a user of the PERS:
receiving an emergency call;
receiving a low bandwidth format input signal from the user over a channel with a bandwidth below 500 bits/second;
using a trained neural network conversation algorithm to convert at least some of the low bandwidth format input signal into a verbal audio signal;
using the conversation algorithm to convert a verbal audio reply into a low bandwidth format reply signal; and
transmitting the low bandwidth format reply signal to the user.
This is the method by which the PERS helper communicates with the PERS user. The method is preferably implemented by computer program
It is noted that the term “reply” is used simply to distinguish between a signal in one direction and the other. It is not intended to imply that the nature of the verbal dialog needs to be question on one side and an answer from the other. It is just intended to signify two pieces of dialog, one after the other.
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiment(s) described hereinafter.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of the invention, and to show more clearly how it may be carried into effect, reference will now be made, by way of example only, to the accompanying drawings, in which:
FIG. 1
shows the way speech is processed in accordance with the invention;
FIG. 2
shows the processing method performed by the personal help button;
FIG. 3
shows the processing method performed by the PERS administrator system;
FIG. 4
shows how the neural network may be trained;
FIG. 5
shows an example of a mobile PERS system;
FIG. 6
shows an example of a mobile PERS system with a gateway communicator;
FIG. 7
shows an example of how a neural network in a PERS system may be trained; and
FIG. 8
shows an example of how a PERS system may be used by a user.
DETAILED DESCRIPTION OF THE EMBODIMENTS
The invention will be described with reference to the Figures.
It should be understood that the detailed description and specific examples, while indicating exemplary embodiments of the apparatus, systems and methods, are intended for purposes of illustration only and are not intended to limit the scope of the invention. These and other features, aspects, and advantages of the apparatus, systems and methods of the present invention will become better understood from the following description, appended claims, and accompanying drawings. It should be understood that the Figures are merely schematic and are not drawn to scale. It should also be understood that the same reference numerals are used throughout the Figures to indicate the same or similar parts.
The invention provides a personal help button and the administrator part of a personal emergency response system, in which verbal audio is converted into a low bandwidth format signal. A conversation algorithm is used which comprises a trained neural network. The low bandwidth format has a bandwidth below 500 bits/second.
The invention is for application to a PERS, but relates specifically to the voice channel established between the user and the PERS agent. Thus, full details of the other parts of the system, such as the detection of the location of the user, the fall detection etc. will not be described. The aim of the invention is to avoid the need for a full cellular communications channel between the user and the PERS agent, once a call has been established (either automatically in the event of a detected fall, or triggered by the user actuating the PHB).
FIG. 1
FIG. 1
1
2
3
shows the way speech is processed in accordance with the invention. shows a user and a PERS agent . They communicate over a low bandwidth channel , by which is meant a channel with a bandwidth of below 500 bits/second, for example below 250 bits/second or even below 100 bits/second.
The low bandwidth is for example insufficient for transmission and reception of high quality audio using known data compression techniques.
1
10
11
12
The user has a personal help button with a button for activating an emergency call. The emergency call may also be activated based on detection by a fall detection unit .
13
14
An audio device is provided for receiving a verbal audio input, VAI, from a user and delivering verbal audio reply, VAR, to the user. The audio device is shown as a microphone and a speaker .
15
A conversation algorithm is provided for converting the verbal audio input into a low bandwidth format output signal, LBFOS, and for converting a received low bandwidth format reply, LBFR, into a verbal audio reply VAR′. The conversation algorithm comprises a trained neural network.
16
20
A transmission and reception system is for processing signals in the low bandwidth format, for transmitting the low bandwidth format output signal, LBFOS to the remote PERS helper and receiving a low bandwidth format reply, LBFR, from the remote PERS helper.
15
To enable audio to be transmitted reliably over the low available bandwidth, a trained neural network is used to convert the audio into a compressed format. The training of the neural network is based on historical dialogue between users and helpers for existing systems (in which audio recordings are available). The neural network thus employs speech recognition to extract words and phrases or is supplied with audio data which has been subjected to conversion by speech recognition. The provision of a large dataset of dialogue (e.g. for many years of operation of previous versions of the system) enables the trained neural network to achieve highly efficient data compression. In particular, the user messages have many common words, themes and phrases. Similarly, the replies from the PERS helper follow guidelines which indicate how to communicate in different situations. Thus, the use of a neural network based on language and vocabulary enables a highly efficient conversion of audio into a low bandwidth format.
18
The low bandwidth format is not suitable for direct compression of the audio signal. Instead, the neural network extracts words, phrases and meanings, and may therefore discard other audio information, such as the particular sound of the speaker's voice. The personal emergency button may thus comprise a speech synthesizer for generating the verbal audio reply, VAR which is output to the user, from the signal VAR′ delivered by the trained neural network.
20
21
The administrator system comprises an input for receiving an emergency call from a user. This may be coded as a data message over the low bandwidth channel, rather than an audio message.
22
1
A transmission and reception system is provided for receiving a low bandwidth format input signal, LBFIS, from the PERS user and for transmitting a low bandwidth format reply signal, LBFRS, to the PERS user .
23
A microphone is provided for receiving a verbal audio reply, VAR, from a PERS helper.
The administrator system uses the same conversation algorithm. It converts the low bandwidth format input signal, LBFIS, into a verbal or textual communication, for the helper, and converts the verbal audio reply, VAR, from the helper to the low bandwidth format reply signal LBFRS.
The administrator system thus also converts between verbal audio data, VAR, and the low bandwidth format. The final output to the helper does not necessarily need to be reconstructed speech; it may be text based, for example.
FIG. 1
24
15
2
25
shows a speech synthesizer for converting from the output of the trained neural network to a verbal audio signal, VAS, for delivery to the PERS helper via a speaker .
FIG. 2
shows the processing method performed by the personal help button.
The method comprises:
30
activating an emergency call in step ;
32
receiving verbal audio input from the user in step ; and
34
in step , using a trained neural network conversation algorithm to convert the verbal audio input into a low bandwidth format output signal.
36
In step , the low bandwidth output signal is transmitted to the helper over the low bandwidth channel.
38
40
In step , a low bandwidth format reply is received from the helper and in step the conversation algorithm is used to convert the low bandwidth format reply into a verbal audio reply.
Thus, the personal help button allows two way communication with the PERS helper.
FIG. 3
shows the processing method performed by the PERS administrator system.
50
In step , an emergency call is received.
52
In step , a low bandwidth format input signal is received from the user over the low bandwidth channel.
54
The trained neural network conversation algorithm is used in step to convert the low bandwidth format input signal into a verbal audio signal.
56
58
The conversation algorithm is then used in step to convert a verbal audio reply into a low bandwidth format reply signal. The low bandwidth format reply signal is transmitted to the user in step .
FIG. 4
shows how the neural network may be trained.
60
62
64
There is a historic dataset which comprises recorded emergency calls “events”) for previous system implementations. These can be processed with speech recognition software to extract words and meanings. These events are processed in step to create an event vocabulary , which is a reduced data notation for representing the events, i.e. verbal communications.
Communication during PERS events for example uses a limited vocabulary, so the communication of any subscriber in any event can be mapped to this limited vocabulary by a trained neural network based on existing large audio recordings of PERS events.
66
15
The event information and event vocabulary is used to train the neural network as represented by block to create the trained neural network , forming the conversation algorithm. A training set is thereby created to train the neural network to respond and communicate using and combining the limited vocabulary set.
10
20
This algorithm is provided as software to be stored in the PHB and to be stored in the system administrator .
FIG. 4
70
72
also shows a testing dataset used for testing the trained neural network. Feedback analysis is provided in step , which is used to further refine the training of the neural network as shown by the dotted arrows.
There are various options for low bandwidth format communication system.
Narrow bandwidth Internet of Things, NB-IoT, is a low power wide area network (LPWAN) technology. NB-IoT has been developed to enable efficient communication, long battery life for mass distributed devices and lower costs for wide geographical footprints or deep within urban infrastructure. The initial cost of the NB-IoT modules is expected to be comparable to GSM/GPRS/LTE. The underlying technology is however much simpler than current GSM/GPRS/LTE standards and its cost is expected to decrease rapidly as demand increases. Some of the possible low bandwidth communications standards are cellular (but not voice enabled) and others are not cellular.
Supported by all major mobile equipment, chipset and module manufacturers, NB-IoT can co-exist with 2G, 3G, and 4G mobile networks. It also benefits from all the security and privacy features of mobile networks, such as support for user identity confidentiality, entity authentication, confidentiality, data integrity, and mobile equipment identification.
LoRa (short for long range) is a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology. LoRa based devices have a module that communicates to a locally central location called a gateway. The network server communicates with the gateway via the internet.
SigFox is a global network operator of wireless networks to connect low-power objects such as electricity meters and smartwatches, which need to be continuously on and emitting small amounts of data. The Sigfox system employs differential binary phase-shift keying (DBPSK) and Gaussian frequency shift keying (GFSK). It is another example of a Low power wide area network (LPWAN).
The invention enables implementation within a PERS of reliable alarming, reliable position information and audio communication to assess emergency and help the subscriber.
The dramatically reduced communication channel bandwidth enables much simpler, lower power and cheaper Internet of Things communication technology and services The low bandwidth communication for long range communication may be combined with short range BlueTooth communication with a mobile phone.
The implementation of the trained neural network will be routine to those skilled in the art.
There are five key elements needed for a successful mobile PERS system: Reliable alarming, Reliable position information, Audio communication, Easy to wear 24/7 and Ease of use (preferable, wear and forget, with no recharging etc.). In this case, the audio communication is done through a low bandwidth communications channel. Since audio generally can not be transmitted through low bandwidth communication channels, a machine learning algorithm may be used to process audio into lower bandwidth data.
Generally, any suitable, machine learning algorithm may be used. A machine-learning algorithm is any self-training algorithm that processes input data in order to produce or predict output data. Here, the input data comprises audio data, which is then subjected to speech recognition and the output data comprises a low bandwidth format representation of the audio data. It may first convert the audio data into a format with a standardized vocabulary before then deriving the low bandwidth output.
A neural network can be trained to codify certain large inputs into smaller outputs. A neural network could be trained to codify a set of pre-determined words and output a 16 bit “code” for each word. There are 65536 possible combinations of a 16 bit code, therefore the neural network could learn up to 65536 words and output a different 16 bit value for each of them. The set of words can be pre-determined by selecting words which are often used during the certain situations. For example in an emergency call certain words such as “help”, “broken” and “fall” are commonly used. The neural network can then be trained to codify each word (e.g. “help”=0000 0000 0000 0011, “fall”=0000 0000 0000 1100). As it may not be feasible for the neural network to learn all of the existing words, it is also possible to train the neural network to output a null character (0000000000000000) when a word which has not learnt is input into the neural network.
The input for the neural network could be an uncompressed audio format (such as .WAV), lossless compression formats (such as .WV) and lossy compression formats (such as .MP3). Typical audio files of around 1 minute are typically 1-10 MB large, depending on whether they are compressed and the compression rate. For the lower range (typically .MP3), this amounts to around 80 Mbits/minute or 1.3 Mbits/second.
Words can for example take between half a second and 2 seconds to be said, depending on the length of the word and the speed at which it is spoken. Therefore, at best, each word spoken during an emergency call, when in digital audio format, can be up to 2.6 Mbits in size. The neural network can be trained with files this large for each of the pre-determined words to recognize the words and output, for example, a 16 bit code. Therefore a 2.6 Mbit file containing the word “broken” can be turned into a 16 bit file, and the speech information can be transferred at as low as 8 bits/second.
The neural network can also be trained to receive the 16 bit code and “de-codify” it. In this case, the neural network turns the 16 bit file into, for example, a 2.6 Mbit .MP3 file containing the word “broken”. The neural network can also be trained to identify whether it is receiving an audio file or whether it is receiving a file containing a code and therefore output either a 16 bit code or an audio file. This is simple as the audio files are usually much larger than the code files. Alternatively, the signal can be processed beforehand and the neural network informed of whether it has to codify an audio signal or whether it has to de-codify a 16 bit code.
10
For example, a user could use the personal help button when they have fallen. The user could believe they have broken their hip and on pressing the button, saying: “Help, I think I have broken my hip”. All of these words are typical of emergency calls, so it can be assumed that the neural network has learnt all of the words above. Since all of the words are short, they may take around half a second each to say, so the whole sentence may be stored in an .MP3 file of about 4.3 Mbits. The neural network then recognizes all of the words and codifies them all into eight 16 bit “codes”.
The sentence may be codified by the neural network as follows as follows, where the inputs are audio data on the left side and the outputs 16 bit “codes” on the right side:
“Help”=0000 0000 0000 0011;
“I”=0000 0000 0000 0001;
“think”=0110 0110 1001 0001;
“I”=0000 0000 0000 0001;
“have”=0010 0100 0001 1001;
“broken”=0000 0000 0000 1111;
“my”=1110 0100 1001 1001;
“hip”=0000 0010 0000 0000;
The words could be grouped as is shown above. For example words for body parts could only have the last 8 bits as always 0; the word “hip” above only has one bit value of 1 on the seventh bit and all of the last 8 bits have bit value 0.
The example above would only need a transfer speed of 32 bits/second instead of 1.3 Mbits/second typically needed for compressed audio file transfers. Thereafter an operator may receive the codified sentence, and using the same neural network, the sentence is de-codified. In this way, the operator can communicate with the user in need of help without the need of a high bandwidth transmission line. The operator may be an automated call center, which identifies the severity of the situation and decides whether to call a human operator, emergency services, police or any other services. Alternatively, the operator could be a human operator.
10
There is also the case when the words spoken by the user may not have been learnt by the neural network. For example, a user could use the personal help button and say: “Help, I have my foot stuck on the fence”. In this case, the word “fence” may not be a typical word in emergency calls and therefore not have been learnt by the neural network. The neural network could output a null character as it does not recognize the word. In this case, the audio data for the specific word could be transferred at a slow transfer rate in order to help a human operator understand the context of the emergency. The unknown word may also be learnt by the neural network such that the next time it will recognize it.
In general, an operator following protocol would ask multiple questions to get a high confidence level of whether there is need for help or not by asking yes/no questions or other suitable interrogation techniques (e.g. five whys technique). Therefore, it is unlikely that unknown words would be used, and if they are used, they may not be necessary to be confident that help is needed.
Indeed, the overall purpose of the dialog is to ascertain whether or not emergency assistance is required with a high degree of confidence.
Alternatively, the word could be omitted from the sentence, for example, for an automated operator. It may also be possible for the neural network to be trained to recognize certain common syllables, such that when it does not recognize a word, it tries to recognize a syllable from the word to help a human operator understand the context of the emergency.
Using the PERS responders procedures, follow-up questions are asked to determine if help is needed. The fence, in the example above, is of secondary importance and could be address in a later phase of the emergency response (e.g. neighbors, ambulance etc.). In the PERS case the most important question to be answered is: Is help needed?/Is it a real emergency?
It may also be possible to use a speech recognition module which can recognize the speech from the user and convert the speech into a machine-readable format, such as ASCII code (standard computer generated text). The text data could then be input into the neural network instead or as well as the audio data to aid the neural network in identifying each word. The neural network may then be either configured to output audio data or text data which is the input into a text to speech module.
Due to the variability in speech from different users and at different situations, it may be difficult for a neural network to learn each word in any situation by any user. Conventional speech to text software is known to struggle to identify certain accents and even certain words it has previously recognized when a user speak faster or slower than usual. It is therefore important to train the neural network with many examples of each word. It may also be possible to train the neural network to recognize certain phrases and sentences, such as typical questions asked by PERS responders
A protocol may be in place which is designed to ask specific questions to determine if help is needed. The first response from the user could have parts that are not understood by the neural network or the system, and therefore have a very low confidence level. After asking, for example, five more questions (e.g. five whys technique) the confidence level of answering the question “Help needed” is likely to rise above a minimum threshold.
FIG. 5
80
10
80
82
84
85
80
84
10
86
15
90
90
92
90
80
90
10
88
shows an example of a mobile PERS system. In one example, if a user is in need of help and activates the personal help button , the user will be put in contact with an operator. The personal help button may also trigger a call automatically based on monitored physiological parameters (e.g. heart beat) represented by symbol . The user may be at first connected by an LTE high bandwidth connection (such as 4G), by WiFi or any wireless high bandwidth connection. The button may also find the location of the user . If there in no coverage for the LTE connection or WiFi , the button then communicates with the operator through a low bandwidth channel . In this case, a neural network may be used to turn speech into a low bandwidth format output signal (LBFOS). The LBFOS is then transmitted to the operator . The operator usually follows a protocol of questions to ask in order to increase the confidence level (e.g. five whys technique). The operator may be a human call center operator or an automated operator bot. In the case of an automated bot, a human call center operator may be included in the call in some cases, for example, when the automated operator bot has a low confidence level or when “help needed” is determined. In any case, if it can not be determined whether the user needs help, the operator may send help as a fail safe measure (e.g. the user can not communicate normally due to an accident, represented by symbol ).
10
86
10
86
90
In another example, the personal help button may include an automated operator bot, such that the user can communicate with the bot without the need of the low bandwidth channel . Once “help needed” is determined, the personal help button then begins communication through the low bandwidth channel to alert a human call center operator or an emergency service.
FIG. 6
100
100
101
90
102
10
90
10
100
103
80
90
100
10
100
90
80
90
86
10
100
104
106
10
100
10
86
shows an example of a mobile PERS system with a gateway communicator . The gateway communicator may have a high bandwidth connector (e.g. WiFi router) and be connected to the operator by a high bandwidth connection (e.g. 4G or land line). The personal help button will alert the operator that help may be needed when activated, wherein the button and the gateway communicator are connected via a connection (e.g. BlueTooth, WiFi etc.). The user may then communicate with the operator through the gateway operator . The personal help button acts as a fail safe measure to ensure that if the gateway communicator can no longer communicate with the operator , the user can still communicate with the operator through a low bandwidth channel with the personal help button . The gateway communicator may be a home device with a microphone and speaker (e.g. a laptop) or a mobile phone. The personal help button may include a gateway communicator within the button such that it is able to connect to an internet connection (e.g. Wi-Fi), and wherein the low bandwidth channel acts as a fail safe in the case the internet connection is interrupted.
FIG. 7
15
112
114
92
116
120
118
15
15
15
a
b
shows an example of how a neural network in a PERS system may be trained. In one example, a neural network is trained with historic audio recordings of dialogue from, for example, historic calls to a help line. The historic calls may be annotated with the meaning of the speech to help the neural network recognize certain words and/or phrases and may further be trained with the event handling protocol . The neural network may also partly comprise speech recognition technology , dialogue technology and/or natural language understanding technology , and may be trained with speech recognition information, dialogue information and/or natural language understanding information. Both the neural network on the user side and the neural network on the call center side may be trained with the mentioned data/information/technology. The neural network may be further trained using validation testing.
FIG. 8
80
130
10
130
80
132
134
90
92
80
136
90
140
80
15
86
90
140
90
142
144
shows an example of how a PERS system may be used by a user. A user may first activate an emergency call through the personal help button (PERS system). The call may go to a call center where the state of the user is tracked by a state tracker . A dialogue system (dialogue protocol) is operated by the operator . The dialog system includes a protocol which may include interrogation techniques, such as the five whys technique, to ensure a high confidence level on the state of the user . Historic data may be used to help the operator determine whether help is needed (e.g. an emergency) . The speech from the user and/or the operator may be processed by a neural network and communicated through a low bandwidth channel if needed (e.g. no LTE coverage). If the operator determines if there is an emergency and/or that help is needed, the operator may call emergency services (private and/or public) and/or they may contact local help (e.g. neighbors).
Suitable machine-learning algorithms for being employed in the present invention will be apparent to the skilled person. Examples of suitable machine-learning algorithms include decision tree algorithms and artificial neural networks. Other machine-learning algorithms such as logistic regression, support vector machines or Naïve Bayesian model are suitable alternatives. Another alternative is using natural language processing (NLP) related algorithms.
The structure of an artificial neural network (or, simply, neural network) is inspired by the human brain. Neural networks are comprised of layers, each layer comprising a plurality of neurons. Each neuron comprises a mathematical operation. In particular, each neuron may comprise a different weighted combination of a single type of transformation (e.g. the same type of transformation, sigmoid etc. but with different weightings). In the process of processing input data, the mathematical operation of each neuron is performed on the input data to produce a numerical output, and the outputs of each layer in the neural network are fed into the next layer sequentially. The final layer provides the output.
Methods of training a machine-learning algorithm are well known. Typically, such methods comprise obtaining a training dataset, comprising training input data entries and corresponding training output data entries. An initialized machine-learning algorithm is applied to each input data entry to generate predicted output data entries. An error between the predicted output data entries and corresponding training output data entries is used to modify the machine-learning algorithm. This process can be repeated until the error converges, and the predicted output data entries are sufficiently similar (e.g. ±1%) to the training output data entries. This is commonly known as a supervised learning technique.
For example, where the machine-learning algorithm is formed from a neural network, (weightings of) the mathematical operation of each neuron may be modified until the error converges. Known methods of modifying a neural network include gradient descent, backpropagation algorithms and so on.
In the main examples above, all of the spoken dialogue by the user of the system is converted into the low bandwidth format for transmission to the administrator system. However, as mentioned above, some of the dialogue may take place in the personal help button itself.
In some examples above, the low bandwidth channel is used only when a high bandwidth channel is not available. However, a low cost system will have no compatibility with conventional high bandwidth cellular audio channels. Thus, the low bandwidth channel is used at all times.
Variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a study of the drawings, the disclosure and the appended claims. In the claims, the word “comprising” does not exclude other elements or steps, and the indefinite article “a” or “an” does not exclude a plurality.
A single processor or other unit may fulfill the functions of several items recited in the claims.
The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
A computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems.
If the term “adapted to” is used in the claims or description, it is noted the term “adapted to” is intended to be equivalent to the term “configured to”.
Any reference signs in the claims should not be construed as limiting the scope. | |
Student engagement in teacher education at the Kigali Institute of Education in Rwanda.
Qualitatively and quantitatively, this thesis investigates student engagement and success in post-secondary teacher education. The research is a case study conducted in Rwanda using the Classroom Survey of Student Engagement (CLASSE), interviews, and document analysis techniques. It aims at comparing two groups of teacher education students in terms of how different factors of student engagement affect their performance. The study provides a sound contribution in understanding how students with a professional background effectively engage and succeed in modules/courses of the teacher education programme that are shared with students without such background. The study claims that student teachers’ beliefs brought to teacher education play a vital role in determining the level of student engagement and performance in both professional and non-professional courses rather than their academic background. Findings indicate that these courses were taught and learnt in inappropriate teaching and learning environments. Despite unfavourable conditions, results also indicate that students with professional preparation prior to the post-secondary teacher education programme have positive beliefs about the career, interact with lecturers and peers more frequently, devote much time and effort on educationally purposeful activities, and participate more frequently in engaging activities than students who have just started teacher training. In addition, the study indicates that these factors of student engagement influence performance. The study also reveals that the former have developed their professional teacher identity which facilitates their social and academic integration and their intrinsic motivation to learning for the career while the latter are struggling learning for the profession in which they are not motivated and interested. Therefore, students with teacher identity perform significantly better than those who are new in teacher training even in non-professional courses in which they have fewer prerequisites. | http://wiredspace.wits.ac.za/handle/10539/13212 |
Colorado State University (CSU)’s long-term commitment in the community of Todos Santos and the region of Baja California Sur, Mexico, is based on understanding community priorities and developing partnerships with community members and regional institutions built on mutual respect, trust, and accountability.
The original participatory Todos Santos Community Assessment process began in the summer of 2015. The below reports outline the methodology, stakeholder groups, and learnings, and act as a compass for action in co-creating educational programs and research projects based on shared goals and mutual commitment, with the community and CSU students.
The Agricultural Report, which serve as foundational reading for students, faculty, and interested community members.
In addition to these documents, researchers from Baja California Sur collected data from primary sources such as government databases (census, CONANP, CONAGUA, and more), university and non profit organization research findings, and interviews with community and industry leaders.
The documents include all citations and acknowledgements, compile the original data from Spanish-language sources, and synthesize the findings into comprehensive reports in English.
This experience allowed me to truly appreciate how important the oceans are to the earth as well as some of the effect that humans currently have on these animals. It was a tragedy to see sea lions with huge wounds due to fishing nets, or to hear about developments that have taken precious nesting grounds for several species of sea turtles. | https://todossantos.colostate.edu/research/ |
Caramelized Banana and Peanut Butter Quesadilla
Dessert during the September Challenge? Heck yeah! Especially if it’s a Caramelized Banana and Peanut Butter “Quesadilla!” I’ve been buying bananas because they’re one of the cheapest produce items available to me, but sometimes I get a little tired of them and I’m not a fan of overly browned bananas… well, not by themselves anyway. Pair them with some brown sugar, butter, cinnamon, and peanut butter and I’m on board!
That’s Not a Quesadilla!
Yeah, yeah, I know, the “quesa” in quesadilla means cheese and there is no cheese in this caramelized banana and peanut butter “quesadilla.” Sometimes recipe names are figurative, especially dessert recipe names. Dessert pizza isn’t really pizza, but the world keeps turning.
Use Your Over Ripe Bananas
If you’re like me and just have one banana that’s past your prime, or not enough to make a batch of banana bread, these caramelized banana quesadillas are a great answer. Just a few minutes and a couple of pantry staples and you’ve got yourself one of the most decadent, ooey-gooey, sweet desserts around! And if you happen to have some vanilla ice cream on hand, make sure to add a scoop on top!
Other Uses For Caramelized Bananas
These sticky sweet caramelized bananas are great for more than just dessert “quesadillas.” You could totally scoop them onto your oatmeal, a bowl of ice cream, add them to some yogurt with granola for a parfait, or scoop them onto some banana pudding.
Print Recipe 4.56 from 9 votes Caramelized Banana and Peanut Butter Quesadilla Need a quick dessert? Use your over ripe bananas in this caramelized banana, peanut butter, and cinnamon "quesadilla." The perfect single portion dessert! Author: Beth - Budget Bytes Prep Time: 5 mins Cook Time: 10 mins Total Time: 15 mins Servings: 1 Ingredients 1 ripe banana ($0.22)
1 small flour tortilla ($0.10)
1 Tbsp peanut butter ($0.06)
1/2 Tbsp butter ($0.07)
1/2 Tbsp brown sugar ($0.02)
1 dash cinnamon ($0.02) Instructions Slice the banana. Melt the butter in a small skillet over medium heat. Once melted, add the sliced banana and brown sugar. Cook the banana in the butter and brown sugar until the slices turn golden brown and slightly sticky. Remove the skillet from the heat.
Spread the peanut butter over half of the quesadilla. Scoop the caramelized banana slices onto the peanut butter. Sprinkle a dash of cinnamon on top. Fold the empty half of the tortilla over the filled side.
Place the quesadilla in a clean dry skillet and cook over medium heat until golden brown and crispy on both sides. Slice the quesadilla into triangles using a large knife or pizza cutter, then serve. See how we calculate recipe costs here. Tried this recipe? Mention @budgetbytes or tag #budgetbytes on Instagram! Nutrition Serving: 1 Serving ・ Calories: 397.5 kcal ・ Carbohydrates: 58.6 g ・ Protein: 7.9 g ・ Fat: 17.1 g ・ Sodium: 360.3 mg ・ Fiber: 6 g Nutritional values are estimates only. See our full nutrition disclosure here. The equipment section above contains affiliate links to products we use and love. As an Amazon Associate I earn from qualifying purchases.
More Uses for Ripe Bananas:
How to Make Banana Peanut Butter Dessert Quesadillas – Step by Step Photos
Start with one ripe banana. Ripe bananas have a higher sugar content, which is really important for the flavor and caramelizing action.
Slice the banana and spread 1 Tbsp peanut butter over half of one small flour tortilla.
Melt 1/2 Tbsp butter in a small skillet over medium heat. Once melted, add the sliced bananas and sprinkle 1/2 Tbsp brown sugar over top. Cook the bananas in the butter and sugar.
Cook until the bananas get a golden brown coating from the caramelized butter and sugar. They should be sticky and gooey. Remove the skillet from the heat.
Scoop the caramelized bananas onto the peanut butter side of the tortilla. Add a dash of cinnamon (my cinnamon came out REALLY fast. Ooops.)
Fold the tortilla closed, then cook in a clean dry skillet over medium heat until the tortilla is golden brown and crispy on both sides. Yes, I used two skillets because the sugar left over in the caramelized skillet would have made the tortilla stick, but it’s SO worth it.
Slice the quesadilla into triangles. You can use a large knife, but I find that a pizza wheel works the best. If you cut from the “open” side in towards the folded edge, you’ll get less oozing.
Yaassssssss. So warm, sweet, and delicious. This Caramelized Banana and Peanut Butter Quesadilla is the perfect little treat.
| |
The Berlin Wall, erected in 1961, was a concrete barrier which completely enclosed the city of West Berlin that thus became an enclave deep inside the German Democratic Republic (GDR). Although there had been severe restrictions on emigration to the West even before the Wall was erected—since there was a separate and much longer Inner German Border (IGB) separating East Germany from the West—a large number of East Germans, estimated around three-and-a-half million, had been able to cross over by just moving into West Berlin and from there to West Germany and other West European countries.
The Wall stopped all such emigration. Attempts made to illegally cross over the Wall or under it, through a tunnel, were dealt with severely and an estimated 200 persons were shot during the period the Wall was in existence, while making the attempt. GDR officially called it the “Anti-Fascist Protection Wall”; the city of West Berlin, not surprisingly, referred to it as the “Wall of Shame”, a term coined by Willy Brandt.
Even though the justification for the Wall was “protection from the fascists (read West Germany and other Western countries in Europe)”, it is interesting to note that as early as in 1956 the Soviet Ambassador to East Germany had observed: “The presence in Berlin of an open and essentially uncontrolled border between the socialist and capitalist worlds unwittingly prompts the population to make a comparison between both parts of the city, which unfortunately does not always turn out in favour of the (German) Democratic Berlin.” This clearly indicates what the Soviet and the East German regime really feared: the comparison between the two parts of the city. It was the vast and ever-growing difference between the lifestyles and the living conditions of the people of the two parts, which motivated so many to attempt migration even at the cost of their lives.
As conditions in the East worsened and the gap between the Eastern part of Berlin and the Western continued to increase the urge of East Germans to flee to the West, when Hungary opened its borders to Austria, thousands crossed over through that country to Austria and thence to West Germany. Later, when the rush increased and thousands more tried to use this route, Hungary changed its policy and prevented them from doing so. However, a similar attempt was made through Czechoslavakia. Meanwhile, within East Germany, protest demonstrations began to take place, urging the government to open the borders. In October 1989, Erich Honecker, who had predicted in January that year that the “Wall” would stand “for hundred years more”, was forced to resign. His successor, Egon Krenz, decided to allow refugees to exit directly through crossing-points between East Germany and West Germany, including West Berlin. The new regulations regarding this were to take effect later but the spokesman of the party, who had not been briefed properly, when asked at a press conference on November 9 when the regulations would come into effect, said: “As far as I know, effective immediately.” West German television gleefully announced: “Ninth November is a historic day. East Germany has announced its borders are open to everyone.” November 9th is thus regarded as the day of the fall of the Berlin Wall.
The fall of the Berlin Wall 20 years ago not only changed the geography of Europe, it marked the beginning of a new chapter in modern history. Its consequences on the politics and economy of Europe were far-reaching and its repercussions are being felt even today. While it marked the end of the Cold War to the great relief of peace loving people all over, it also led to the emergence of a unipolar world that is again posing a threat to the peace of the world.
Even a few months before the event no one would have imagined that the Wall, backed up as it was by the mighty Soviet Union, would crumble so soon and so quickly. The Brezhnev Doctrine (although couched in terms that sounded ideologically correct and spelt out in a speech at the Fifth Congress of the Polish United Workers Party in November 1968 in the following words: “when forces that are hostile to socialism try to turn the development of some socialist country towards capitalism, it becomes not only a problem of the country concerned but a common problem of all socialist countries”) was used to retrospectively justify the Soviet intervention in Czechoslovakia in 1968 and the invasion of Hungary in 1956.
The Doctrine had made it clear that any country within the Warsaw Pact that attempted to opt out would invite Soviet intervention. On the strength of this policy, Soviet intervention might have been expected in Germany in 1989 too. Earlier that year, however, Mikhail Gorbachev by refusing to use military force in Poland when Solidarity defeated the Communists in an election in Poland, had in effect repudiated that policy. To appreciate what led to the fall of the Berlin Wall it is, therefore, necessary to turn to developments in the Soviet Union and the almost U-turn in policies initiated by Mikhail Gorbachev.
¨
With the end of World War II, two opposing blocs emerged, popularly referred to as the capitalist and the socialist blocs. Even before the hot war was completely over, a fierce cold war had developed between the two blocs—one led by the United States of America and the other by the Soviet Union. By the early fifties, the Soviet bloc extended over a vast area from Leipzig in East Germany in the West to Vladivostok in the East. However, even though referred to as the socialist bloc was it really one or was it a euphemism to cover what it really was—the Soviet Empire?
To answer that question one needs to go into how it came into being.
The first step was taken as early as in August 1939 when a 10-year non-aggression pact was signed by Molotov, on the one hand, representing the Soviet Government, and Ribbentrop, on the other, representing the Nazi German Government. Among its provisions were: consultation, arbitration if either party disagreed, neutrality if either went to war against a third power and also the provision not to enter into any group that was “directly or indirectly aimed at the other”. It was after this that Hitler, assured of the safety of his rear, attacked Poland, marking the beginning of World War II.
In addition, there was also a secret protocol to the pact revealed only after Germany’s defeat according to which the states of Northern and Eastern Europe were divided into German and Soviet spheres of influence. In the North, Finland, Estonia and Latvia were assigned to the Soviet sphere; Poland was to be partitioned between the two. Part of Finland was annexed by the Soviet Union followed by the annexation of Estonia, Latvia, Lithuania and Northern Romania.
The existence of the secret protocol was vehemently denied by successive Soviet governments even though a copy from the German records had fallen into the hands of the British Government after the defeat of Germany and had been widely publicised in the Western media. It was only after massive demonstrations, referred to as the Baltic Way demonstrations, in August 1989, when two million people created a human chain on the 50th anniversary of the signing of the pact that the policy of denial changed. Gorbachev appointed a commission headed by Yakovlev to investigate that revealed the provisions of the secret protocols to the Soviet Congress of People’s Deputies. The Congress passed a declaration admitting the existence of the secret protocols and condemning them.
The story of how Czechoslavakia and some of the other countries of the bloc were, by devious methods, made part of the bloc has often been told and needs no repeating. That communist regimes were foisted on them became absolutely plain when the Hungarian revolt of 1956 was crushed with the help of Soviet tanks. In Czechoslavakia too, as many as 600,000 Soviet troops were used in 1968 to crush the government established by Dubcek, who had tried to build socialism with a human face, even though his government had clearly stated that it was not planning to quit the Warsaw Pact.
Even more significant were the events in Poland that really marked the beginning of the end of the Soviet Empire. As early as in 1980, the workers of the Lenin Shipyard in Gdansk, under the leadership of Lech Walesa, formed an independent trade union around which was established Solidarity, a broad social platform, ranging from the independent Left to the Catholic Church. For the realisation of their goals they advocated a policy of non-violent action. In September 1981, Solidarity’s first national Congress elected Lech Walesa as its President and adopted a republican programme for the establishment of a “Self-governing Republic”.
The government attempted to destroy the trade union but despite years of repression had to start negotiations. Following the talks elections were held which resulted in the formation of a Solidarity-led coalition government. Unlike what had taken place in Hungary and Czechoslavakia earlier, there was no Soviet intervention. The inefficacy of the Brezhnev Doctrine had been proved and Gorbachev realised that military action would only flame the fires of revolt in all parts of the Soviet Empire, which were clearly seething with resentment. In fact, the revolt had already started and, as shown earlier, demonstrations in Berlin and Leipzig to bring down the Berlin Wall forced the government to open the borders.
Exactly two hundred years after the fall of the Bastille in 1789, the fall of the Berlin Wall in 1989 ushered in a new revolution. Some perhaps would insist on calling it a counter-revolution but then how would they reconcile that view with the fact that the movement was led by the working class of the Lenin Shipyard in Gdansk, Poland?
The author, an erstwhile Communist leader who was once the Secretary of the undivided CPI’s Calcutta District Committee, quit the party just before its formal split in the aftermath of the 1962 Chinese aggression. | http://mainstreamweekly.net/article1855.html |
and adapt to the changing demands of their individual national political contexts. The analysis continues with a resumé of the current strategies of the PCI, PCE, and PCF in the late 1970s, comparing and contrasting similarities and differences on domestic levels. Lastly, the relations between the Eurocommunist parties and the Soviet Union are examined.
How to Cite:
Gray, L., (1979) “Eurocommunism : a brief political-historical portrait”, Res Publica 21(1), p.79-98. doi: https://doi.org/10.21825/rp.v21i1.19424
Downloads: | https://openjournals.ugent.be/rp/article/id/73691/ |
Dance is often seen as a form of expression without words. In India, dance is a series of historic symbols and traditions which originate from all over the country, telling stories and tales from many different cultures and religions.
In an evening to celebrate and educate yourself on all these different styles, we will be exploring the history behind four classical Indian dances, synonymous with South Asia: Kathak, Bharatanatyam, Kuchipudi and Odissi.
A pre-show talk on appreciating diversity within Indian classical dance will be chaired by Dr Nima Poovaya-Smith, curator, writer and founding Director of Alchemy Anew. This will also be the perfect opportunity to speak to the dancers and choreographers you will see on stage, including renowned artist Mitul Sengupta, a Kathak dancer from India, who has given performances for the Royal Danish Ballet Theatre, the International Dance Festival in Thailand, the Indo American Arts Council and many others worldwide. | http://saa-uk.org/whatson/-04-05-2019 |
Alice Springs is the third largest town in the Northern Territory, Australia. Popularly known as "the Alice" or simply "Alice", Alice Springs is situated roughly in the geographic centre of Australia.
The site is known asMparntwe to its original inhabitants, the Arrernte, who have lived in the Central Australian desert in and around what is now Alice Springs for thousands of years. "Alice" in the English language was named by surveyor William Whitfield Mills after Lady Alice Todd (née Alice Gillam Bell), wife of the telegraph pioneer Sir Charles Todd. Alice Springs has a population of 28,605, which makes up 12.2 percent of the territory's population. Alice Springs is nearly equidistant from Adelaide and Darwin.
The town straddles the usually dry Todd River on the northern side of the MacDonnell Ranges. The surrounding region is known as Central Australia, or the Red Centre, an arid environment consisting of several different deserts. In Alice Springs temperatures can vary dramatically, with an average maximum temperature in summer of 35.6 °C (96.1 °F) and an average minimum temperature in winter of 5.1 °C (41.2 °F). Alice Springs has faced many issues in recent years, largely stemming from an increase in crime and a strong racial divide that has existed for years in the town.
Alice Springs is the heart of Central Australia and is comprised of cavernous gorges, boundless desert landscapes, remote Aboriginal communities and a charming pioneering history. It embodies the hardy outback of the Northern Territory's Red Centre, and is a travel hub for sights and hikes in the region, such as Uluru (formerly known as Ayers Rock), Kata Tjuta (formerly known as the Olgas) and Kings Canyon. Since the start of the tourist boom in the early eighties, the population has substantially grown to about 28,000. Although surface water is a scarce commodity in the region, there's plenty underground! It is a great town and well worth a visit.
Alice Springs is located 1500 km from the nearest major city, being Darwin to the north or Adelaide to the south. As a result, the people that inhabit the town are often quite ingenious when it comes to making things last!
Also, due to this distance, you may find that some things can cost more than in the cities, such as fruit and veg, and some clothing (if you forgot to pack your singlet or jacket!). Over all, however, the town isn't too expensive when it comes to the necessary requirements and it is much cheaper than smaller outback towns, making it an ideal place to stock up before heading to more remote areas.
Something else to remember is that hotels in Alice Springs are rated slightly different to those in European or American countries - as hotels are rated on their facilities rather than the actual rooms. The reason for that is due to the distance that Alice Springs is from anywhere and the difficulties involved in getting building materials. Mind you, the star ratings reflect the quality of the establishment.
Tourism is a major industry in Alice Springs, with well developed facilities for travelers. Visit the Alice Springs Visitor Centre , located at 60 Gregory Terrace, at the south end of Todd Mall, for Visitor Guides, maps, tour and accommodation bookings, and suggested itineraries. You can even download or view the latest Visitor Guide for Central Australia on their website.
The Arrernte (pronounced Arrenda) Aboriginal people have made their home in the Central Australian desert in and around Alice Springs for more than 50,000 years. The Aboriginal name for Alice Springs is Mparntwe. Three major groups Western, Eastern and Central Arrernte people live in Central Australia, their traditional land including the area of Alice Springs and East/West MacDonnell Ranges. They are also referred to as Aranda, Arrarnta, Arunta, and other similar spellings.
Arrernte country is rich with mountain ranges, waterholes, and gorges; as a result the Arrernte people set aside 'conservation areas' in which various species are protected. According to the Arrernte traditional stories, in the desert surrounding Alice Springs, the landscape was shaped by caterpillars, wild dogs, travelling boys, sisters, euros (Kangaroo-like creatures) and other ancestral figures.
Pronunciation of these Arrernte words can be very difficult. The reason for that is that Arrernte, and indeed every indigenous language of Australia, was not written. When Europeans arrived with their missions to convert people to Christianity, they felt the need to have the language written, and using their own languages put the written form to the language. As a result of the missionaries being mostly German, they used their own language to develop the Arrernte written language.
Don't worry if you can't pronounce it; everyone in town knows the places by their European names.
In 1862, John McDouall Stuart led an expedition into Central Australia and the area where Alice Springs is located. Until the 1930s, however, the town was known as Stuart. The Overland Telegraph Line linking Adelaide to Darwin and Great Britain was completed in 1872. It traced Stuart’s route and opened up the interior for permanent settlement. It wasn’t until alluvial gold was discovered at Arltunga, 100 km east of Alice Springs, in 1887 that any significant settlement occurred.
The telegraph station was sited near what was thought to be a permanent waterhole in the normally dry Todd River and was optimistically named Alice Springs after the wife of the former Postmaster General of South Australia, Sir Charles Todd. The Todd River was named after Sir Charles himself. The original mode of transportation in the outback were camel trains, operated by immigrants from Pathan tribes in the North-West frontier of the then British India and Pakistan who were misnamed ‘Afghan’ Camellers.
Cattle Stations opened up the interior of Australia, with stations the size of small European Countries running mostly Cattle. Camels were (and still are) farmed in Central Australia - and the exporting of Camels to the Middle East is a fast developing industry. This is because the Australian Camels are a purebred of camel, and often free from the diseases which can be prevalent in the Middle Eastern countries.
The 1960s saw the establishment of the Joint Defence Space Research Facility, or as it's locally known, "Pine Gap". The facility was established in the 1970s and is the only area in Australia with Prohibited airspace - so forget about seeing it up close. You may, however, see it on approach or departure from Alice Springs Airport.
Located just South of the Tropic of Capricorn the town of Alice Springs straddles the usually dry Todd River on the northern side of the MacDonnell Ranges. Alice Springs is located in Central Australia, also called the Red Centre, an arid environment consisting of several different deserts.
In Alice Springs, temperatures can vary by up to 28 °C (50 °F) and rainfall can vary quite dramatically from year to year. In summer, the average maximum temperature is in the mid 40s, whereas in winter the average minimum temperature can be 5.5 °C (41.9 °F), with an average of 12.4 nights below freezing every year. The elevation of the town is about 545 metres (1,791 feet), which contributes to the cold nights in winter. The highest temperature on record is 45.2 °C (113.4 °F) on the 3 January 2006, while the record low is −7.5 °C (18.5 °F), recorded on 17 July 1976. This is also the lowest temperature recorded in the Northern Territory.
Alice Springs has a desert climate(BWh). The annual average rainfall is 285.9 millimetres (11.3 in) which would make it a semi-arid climate except that its high evapotranspiration, or its aridity, makes it a desert climate. Annual precipitation is erratic, varying year to year in Alice Springs. In 2001 741 millimetres (29.2 in) fell and in 2002 only 198 millimetres (7.8 in) fell.
Almost in the exact centre of the continent, Alice Springs is some 1200 km from the nearest ocean and 1500 km from the nearest major cities, Darwin and Adelaide. Alice Springs is the midpoint of the Adelaide–Darwin Railway.
To the south are the imposing McDonnell Ranges, with all transport links to the south using "Heavitree Gap" - a distinctive narrow gap in the range where the railway, highway and Todd River run through without any climb required. Heavitree Gap was named by William Mills, a surveyor of the Overland Telegraph line. He named it in honour of his former School in Devon (UK).
The largest employer in Alice Springs is the Northern Territory Government, with 7.5% of employed people working in government administration, 6.6% in school education, and 3.7% in the Alice Springs Hospital. The economy of Alice Springs is somewhat reliant on domestic and international tourism, with 3.8% of its workforce employed providing accommodation.
Alice Springs is home to numerous hotels, from the 4.5-star Lasseters Hotel Casino, to backpacker hostels. There are also caravan parks.
There is an airport in Alice Springs. The airport doesn't have air bridges, so that passengers need to use stairs to get in/out of planes. Currently Qantas has connecting flights to Darwin, Sydney, Melbourne, Brisbane, Adelaide,Cairns and Perth. There is a flying shuttle to Uluru also (but Uluru has an airport too, so if you're just flying in to see the rock, you don't have to stop off at Alice). Hire cars are available at the airport.
The Ghan is a private tourist train covering the vast distance from Adelaide to Darwin stopping in Alice. Expect to pay a premium over the airfare, even for a sitting seat. You can put your car on the train.
Alice Springs is 17 hours drive from Darwin, and 18 hours drive from Adelaide. The Stuart Highway from Adelaide is well-maintained and goes right through Coober Pedy, an underground town famous also for being the opal capital of the world (and therefore well worth stopping off for a visit on the way). It continues through Tennant Creek and Katherine all the way up to Darwin.
If you are driving on the main sealed routes from other Australian Capital cities, you will likely not be driving on remote roads, and provided you do not take side trips, there will likely be passing traffic. Mobile phone reception is limited to a few of the larger townships along the Stuart Highway, so be prepared to go for long distances without coverage.
Read the rental car conditions carefully. Rental cars in Alice Springs may not offer unlimited free kilometres and do not cover you if you take your vehicle on unsealed roads. Rental cars hired outside of the Northern Territory may not be able to be driven into it. Driving after dark outside of the city limits may be prohibited. Rental companies in AC do not offer hand-controls for the handicapped.
Greyhound [www] ply the route to Alice Springs from the north and the south.
Alice Springs Markets, Todd Mall, 08 8952 9299. Fresh food, jewellery, books, clothing, art, hand-made crafts and other neat merchandise. A market that takes place along the Todd Mall in the center of town, with local vendors setting up stalls along the mall. The Todd Mall Markets are held on alternate Sundays.
Heavitree Gap Markets, held on the opposite Sundays to the Todd Mall markets, this has a less formal, car-boot sale atmosphere. Just on the other side of Heavitree Gap from the town, it's about 30 mins walk from the town centre, or 5 or 6 minutes drive.
Saturday Morning Lawn Sales - Friday's Centralian Advocate will have a listing of lawn sales in the back; getting a group together with a car and a map and driving around town at 6:30AM on a Saturday morning equipped with coffee, cash and a big trunk to put your stuff in while watching the sun rise is a real pleasure.
Aboriginal Art World, 89 Todd Mall, +61 8 9852 7788. Alice Springs is Australia's premiere hub for indigenous artists. Aboriginal Art World showcases art from the central Australian area together with the top end, the Kimberley and Cape York. They also offer the possibility to meet the artists in their art workshop in town. This is a great opportunity to get up close and personal with the artists and their dreamings.
Despite its small size, Alice has a good and varied restaurant scene.
There are a fair few options here in Alice Springs for tucker (dinner). McDonald's, KFC, Hungry Jacks (Burger King), and Red Rooster (Australian made KFC) are the main take away chains, but there are also your small family take aways, such as Big Al's, East Side Fish and Chips and Scoff.
Additionally, there are some great Pizza Shops in town, La Casalinga is a great feed. It's on Gregory Terrace, and it's got a really nice old school atmosphere about it. Has not changed for 20 years, and won't in the near future!
The Tea Shrine is on 113 Todd Street - right next to the Greyhound station, and serves a large variety of teas both hot and cold, and some excellent light Asian-style vegetarian meals. The Korean iced tea is really, really good - don't leave without trying it! Open 9 am - 4 pm, Monday - Saturday, closed Sunday.
Town and Country is a pub on the Todd Mall. They serve light meals, and it's usually got quite a nice atmosphere about it.
Bean Tree Cafe, Tuncks Road (in Olive Pink Botanical Garden). 8AM-4PM. Solid cafe set amidst the trees and birds.
Loco Burrito, 76 Todd St. 11AM-7:30AM. The first burrito joint in town, it does a reasonable job from a friendly, hole-in-the-wall outlet. $10-$13.
Oscar's is located near the movie theater, and has an ever-changing fusion cuisine Mediterranean menu and a nice wine list.
Sporties has a long history in Alice; it used to be the little casual place owned by and attached to the only 5-star place in town, Puccini's. But Puccini's closed and transferred some of their menu to Sporties, so as rough and tumble as they look, their food is amazing. "I’ve never had a bad meal at Sporties" is a common saying amongst locals. Very good service - surprisingly quick.
The Thai Room is down an alley off the Todd Mall. It has home-style Thai food, from paw-paw salad to beef salad to the best Tom Yum ever and pad Thai. Excellent food, not too pricey, and if you ask for it spicy they will accommodate you. Open for lunch and dinners most days.
Red Ochre Grill is attached to the Aurora Hotel on the Todd Mall, and serves an ever-changing menu of various local things. Tries to use a lot of indigenous ingredients in their menu, and in 2009-2010 did a revamp of the menu to introduce many new dishes. The ribs come highly recommended.
Overlander's Steakhouse is the classic outback steak restaurant. Excellentbeef, but they do nice chicken and barramundi too; home of the "Drover's Blowout" where you try a little crocodile, kangaroo, emu, camel etc. An Amazing wine cellar with some of the best Australian wines available in the cellar. They do the "Tourist Humiliation Routine" for tours, where you participate in some traditional Australian songs with the Wobble Boards ala Rolf Harris and Home Amongst the Gum Trees.
Hanuman, in the Crowne Plaza Hotel. Indian and Thai and it's yummy but expensive. Nice place, good wine. Service can be spotty. Recently lost head chef.
Hong Kong Restaurant next to Yeperenye Shopping Centre on Hartley Street, is one of the best Asian restaurants in town. Delicious food, relatively inexpensive food, with a large upstairs restaurant and an exstensive take-away menu. Been in Alice Springs for many years.
La Casalinga, across from Mbantua Gallery,near The Diplomat has truly excellent pizza; they have the old-fashioned pizza bar atmosphere, with dark wood paneling and cold beer. Good steak and lasagna, too.
Casa Nostra, across the river via the causeway from the Todd Tavern. Excellent fresh pizza and some lovely pasta. More of a romantic atmosphere, old-style Italian. BYO.
Reptile Centre.Examples of the local reptiles and one NT croc specially imported, on display by the guy the locals call when something with fangs is in the kitchen.
Stargazing. Alice Springs is in the middle of the largest land area without lights on earth, so the view of the Milky Way is unmatched unless you're on a dark boat in the middle of the ocean. Anyone from the city stopping on the road just out of town at night and tipping their head back is likely to fall over from the sheer shock of all those stars. as a result astronomy is popular in town.
Alice Springs Desert Park, Larapinta Drive(10km west of town).7:30AM-6PM. Truly memorable in its examples of local flora and fauna. They give a number of interesting lectures, such as aboriginal use of local plants for food. The nocturnal exhibit is excellent, a very low-light building with offset day and night schedule to induce the nocturnal critters to come out during the day so people can see them. The best time to go to the park is early morning, before it gets hot; you can spend a full day walking the trails, going to the birds of prey exhibition where they fly the local aerial predators overhead, and getting the bushfoods and medicine tour. $25.
Olive Pink Botanical Garden, Tuncks Road (At the north end of Barrett Drive, just across a bridge over the Todd). 8AM-6PM. A desert botanical garden. Doesn't bloom much, but if you happen to get here after a rain, it's a really nice spot. Bring your sunscreen. There's a biography at Dymock's on the life of the lady it's named after, Olive Pink. Free.
Old Timer's Museum - located at the Old Timer's Retirement Village, off the South Stuart Highway leading into town from the airport before you get to the Gap. Really cool history of the outback, with a big collection of amazing stuff from the first white folks to hop a camel for the middle of nowhere. Definitely worth a visit.
The Residency, Parsons St, +61 8 8953 6380. Built in 1927 as the residence of the Government Representative to Central Australia, the house was the centre of government and social activity right up to the early 1970s. Visited by foreign dignitaries, government officials, and even royalty, the Residency operates as a museum house where people immerse themselves in the early administrative history of the town and region. Speak with one of the friendly volunteers who are on hand to answer your questions. Located on the corner of Parsons and Hartley Streets. Entry is by gold-coin donation, and opening hours are 10 am - 2pm Monday to Friday. Its generally closed over the very quiet summer months, December til late March.
National Pioneer Womens Hall of Fame, 2 Stuart Terrace, Old Alice Springs Gaol (Next to the Royal Flying Doctor Service), +61 8 8952 9006.Hundreds of women are recognized for their special contributions to Australia’s heritage. Exhibitions include the 'Ordinary Women, Extraordinary Lives - Women First in Their Field', the Signature Quilt - 'Women at the Heart' and 'Women's Work of yesteryear'. The Old Gaol buildings are open for visitors to look through and gaol stories are told in a complementary booklet. The museum is devoted to the women who picked up stakes, hauled a whole house in a wagon out to the hottest, most dangerous place they could find, plunked themselves down where you couldn't see another house for a thousand miles in any direction and said, "This looks like a nice spot to live." Amazing stories. There is plenty to see and do for all ages with a gift shop, toilets and access for people with disabilities available. entry fees apply.
Alice Springs Telegraph Station Historical Reserve, Stuart Highway (a few km north of town). 8AM-9PM. Where it all began, this is the original telegraph station, with some exhibits about its history. The area around has walking trails through lovely serene desert scenery, including the actual Alice "springs". The reserve is free if you don't want to access the historical buildings.$9.50.
Old Ghan Museum, 1 Norris Bell Drive (off Stuart Highway, south of town before the airport). 9AM-4PM. Next to (or part of, but with a separate entrance fee) the Road Transport Hall of Fame, this is a museum about Australia's wildest train line, The Ghan. Old equipment, photos and videos plus several carriages to explore. $12.
Road Transport Hall of Fame, 1 Norris Bell Drive (off Stuart Highway, south of town before the airport). 9AM-4PM. Huge collection of trucks (with a few buses, cars and motorcycles), some historically-relevant to central Australia. Also a genuine hall of fame with hundreds of bios of notable truckies.$15.
Adelaide House. The first stone building in Alice, located on the Todd Mall and well worth a visit if only for the absolutely amazing early air-conditioning system. Really cool display of old communications technology, like the bike-powered communications radio. Run by a couple old women who serve tea - an excellent place to have a sit-down. Nice and quiet.
Anzac Hill (road access of Stuart Highway/Schwarz Crescent; walking path starts from Wills Terrace). Hill with good views and some history of Alice Springs.
Royal Flying Doctor Service. With School of the Air - a museum and cafe. Famous!
Aviation Museum - a number of older planes, showing the history of aviation in a town which relies on it to survive.
Pyndan Camel Tracks – Take a one-hour or half day journey aboard a "ship of the desert", through the scenic Ilparpa Valley, located in the famous MacDonnell Ranges. Owner and cameleer Marcus has been working with camels since 1982 and his camels are well trained. Pyndan Camel Tracks is the only camel-riding experience based out of Alice Springs, and he also offers a free shuttle service from most hotels and the Alice Springs Visitor Information Centre to help people get to his property.
Outback Ballooning - Take a balloon ride and see the sunrise. Alice Springs has ideal weather for ballooning and the tour operators run almost every day of the year.
Quads & Motorcycles - Some tour groups do quadding through the spinifex, and Harley rides through remote Central Australia - lovely day trips.
Cycle hire - You can hire a bicycle and tour around town the healthy way. Just remember your water!
Golf Course - For the incurable golfer, the golf course is rated one of the best desert golf courses . There are a whole lot of golfers here so I guess it must be good. There's also a clubhouse with drinks & snacks.
Pioneer Park Races, Pioneer Park Racecourse, Stuart Hwy, Connellan, +61 8 8952 4977, e-mail: [email protected]. The local racetrack with pretty much guaranteed lovely weather.
Rugby League - Sport is part of life in Australia - what better way to spend a Saturday afternoon in Winter then at the Rugby League? Matches are held at Anzac Oval from March and finalise in the Grand Final usually held on the first Saturday of September. League was founded in Alice Springs in 1963, and to this day, two of the foundation teams, Wests and United still play, as well as Memo and Vikings. It is a good strong competition and makes for a wonderful day out!
Henbury Meteorites Conservation Reserve, Ernest Giles Road (145km south west of Alice Springs), +61 8 8951 8250. Explore the 12 craters, which were formed when a meteor hit the earth’s surface 4,700 years ago. The Henbury Meteor, weighing several tonnes and accelerating to over 40,000km/h, disintegrated before impact, and the fragments formed the 12 craters. free entry.
Museum of Central Australia, Araluen Cultural Precinct (Corner of Larapinta Drive and Memorial Avenue), +61 8 8951 1120. The exhibitions explore the unique features of the region through time and space, following the evolution of the landscape and the creatures that inhabited it. Featured is a replica of a local paleontological dig, an ancient waterhole with some surprising mega fauna including a giant freshwater crocodile and the largest bird that ever lived, Dromornis stirtoni, dated at eight million years old. Other exhibits include present day Central Australian mammals, reptiles, insects and meteorite fragments. Entry fees apply.
Totem Theatre. Not open to the public unless a play is on - the little local theatre, heritage listed building put up during World War 2 to entertain the troops after they retreated from Darwin because of the Japanese bombing. Small local theatre groups put on productions on a semi-regular basis; ask at Dymocks if there are any tickets. Theatre on a shoestring budget!
Araluen Arts & Cultural Centre. An amazing local art museum, with works by Namatjira and other local artists. Regular traveling art shows, plays, and film festivals. The front desk will know what events are ongoing - there'salways something ongoing.
Camels Australia, Stuart Wells via Alice Springs, +61 8 8956 0925. Say hello to one of their friendly camels, take a short ride around the enclosure or browse through the interesting assortment of souvenirs and local Aboriginal art on display in their shop. Sit back, relax and enjoy the view while enjoying a cold drink and something to eat. free entry.
North of Alice - The area stretching north of Alice Springs is known for its serene beauty and as a setting for gem fossicking, bush walking, bush camping and four-wheel-driving. A few hours north are gem fields with Garnet, Zircon, Tourmaline, Apatite and various kinds of Quartz. Contact the Gem Tree for details. Garnet is the easiest to go for on your first try, as the garnet chips are easy to find on the surface and require no digging or special equipment. You do need a permit though [www].
Alice Show. The annual festival with shopping, fair ground rides, animal displays, fireworks, art and crafts, races and performances.
Henley On Todd. River sand race poking fun at the British tradition of boat racing, usually held in late August each year.
Camel Cup. Camel race day – a fun day out held in early July.
Beanie Festival. Knitting festival including mostly 'beanie' hats knit from every conceivable material in every conceivable pattern, all for sale. Also afternoon teas and art displays and music.
Finke Desert Race. Motorcycles or 4wd buggies racing over the Finke river track.
Alice Masters Games. Sports cup for people of all ages, held every 2nd year. To be held next in October 2012.
Alice Springs, like most of the Northern Territory, has tough liquor laws. It is illegal to drink in Public places (Parks, Streets, etc). The Telegraph Station to the North of the town permits drinking and a lot of families go there for a BBQ and a relax. Regardless of how sorry you may feel, don't purchase alcohol on behalf of people you don't know - if they can't buy it themselves, then there's a reason for that.
Todd Mall is the main street (partly pedestrian only). You will find a couple of options here to get a drink. Starting at the end near Anzac Oval, The Todd Tavern has a bar meant for working blokes and a restaurant with good pub grub. Town & Country and Sporties both have bars and serious addictions to sport of all sorts.
Almost all the hotels have bars.
Almost all the bars that aren't in hotels have live music some time or another - check the Advocate (local newspaper) for the "Gig Guide" to see what's playing where.
The Casino - Lasseters - has a couple bars, including one devoted to *not* gambling called the Juicy Rump. Nice place – tasty food, good beer.
Bojangles. Probably the most popular joint for a beer. Every night people coming or leaving for a tour have some fun here. At the weekend it can get a little bit rowdy. There's a live webcast of the place online, and the local radio station (96.9 Sun fm) broadcasts live from Bo's most nights - and your friends and family from home can go on the internet and buy you a drink voucher!
The Gillen Club - Although it's not in the CBD, it's a very nice club to visit. Good food! Especially fun on a Saturday night during the Football season when the teams based at the club have had a good win!
Because of the large tourism industry and the small population Alice Springs is an easy place for anyone to find work. Many companies will employ travelers, and wages are comparable to, if not higher than, other parts of Australia.
The big thing to be aware of is that long term accommodation is very scarce, and backpackers/travellers are usually at the bottom of the list for long term accommodation. Renting is very expensive, as there is a high demand for housing in the town, and house shares are not common. If you are looking to stay for 6 months or more, you will probably need to rent a house. It's easiest to find rental accommodation in December/ January and June/ July as people tend to leave during these periods.
During the off tourist season (October - March/April) the hostels will do a good deal on long stay accommodation, but during the busy time (April–October) they will charge their normal rates.
Alice Springs suffers from a relatively high crime rate. Socio-economic tensions which stem from Australia's colonial history have led to the development of impoverished Indigenous communities, known as 'camps', in and around the town, and alcohol-fuelled violence remains a significant problem in the community. Exercise extreme caution when walking around after 10pm, as large groups of inebriated Indigenous youths are notorious for causing trouble in the city. Todd Street is nauseatingly well-policed, so problems in the CBD are less of an issue than they were previously.
From time to time you may be asked for money or other items while in Alice Springs. According to Lhere Artepe Aboriginal Corporation, the organisation which represents the Native Title Holders of Alice Springs, this is not acceptable behaviour, and giving handouts only encourages a begging culture when there is no need for it to exist. Don't give money, cigarettes or food to those who ask. There is a chance that you will get yelled at and cursed at for not giving a handout but ignore this and keep walking. They will have forgotten you in 30 seconds anyway. | https://www.travelshelper.com/destinations/australia-and-oceania/australia/alice-springs/ |
HERBICIDES AND PESTICIDES
Management of buildings and grounds will minimize the need for pest control. This includes maintenance of healthy plants, proper watering, fertilizing, pruning, and mowing practices to minimize stress and to reduce susceptibility to insects, disease, and weeds. The use of herbicides/pesticides on library grounds and in library buildings will be minimized by management techniques to reduce the need for herbicides/pesticides, and by adherence to the principles of Integrated Pest Management (IPM). Individuals using library facilities will be protected from unnecessary exposure to herbicides/pesticides. If their use becomes necessary, staff will be notified and notices will be posted. The Ann Arbor District Library will not use pesticides or herbicides which are on the Michigan Restricted Use Products List. Herbicide/pesticide application will occur only under the direction and supervision of the Facilities Manager.
Policy adopted by the Ann Arbor District Library Board December 12, 1995 Revisions adopted June 19, 2006
MAINTENANCE AND OPERATIONS PURPOSE
In the interests of economical management as well as for the purpose of creating an atmosphere conducive to learning and working, protecting the safety of patrons and employees, and developing public confidence and pride, the District Library Board expects a high standard maintenance of buildings, grounds, and equipment to prevail. It assumes that such property will be controlled and maintained in accordance with the established body of Regulations and Operating Procedures.
Policy adopted by the Ann Arbor District Library Board December 12, 1995
SMOKE-FREE POLICY
In accordance with the Michigan Clean Indoor Air Act (Public Act 368 of 1978), and the Washtenaw County Regulation Eliminating Smoking in Public and Private Worksites and Public Spaces, Section 1005, the Ann Arbor District Library Board declares it to be the policy of the Ann Arbor District Library that all buildings, indoor facilities, and vehicles be smoke-free. This policy includes, but is not limited to, all employees and visitors.
Tobacco, tobacco products and/or other burnable products may not be used in the library or on library property. This includes no smoking, chewing, rolling or display of tobacco, other burnable products, electronic cigarettes, personal vaporizers or other electronic delivery systems.
The Ann Arbor District Library is dedicated to providing a healthy, comfortable, and productive environment for staff and visitors and members of the community. Smoking has been proven dangerous to both users and persons exposed to "second-hand smoke," also known as environmental tobacco smoke (ETS).
Copies of this policy shall be distributed to all employees and contractors. Prominent signs displaying the following statement will be posted at all entrances throughout the buildings, and indoor facilities, and in vehicles.
SMOKING IS PROHIBITED IN THIS BUILDING/INDOOR FACILITY/VEHICLE PURSUANT TO THE MICHIGAN CLEAN INDOOR AIR ACT.
Rules and regulations for the enforcement of this policy shall include a procedure for complaints, investigations, and enforcement action to which violators are subject. The district will provide assistance to employees who wish to stop smoking. | https://aadl.org/aboutus/buildings |
While developing high level descriptions of how users might move from "standard" (admittedly trivial) nova-network configurations to neutron, the gaps that would affect developers, deployers and administrators became more "glaring". These are high level points as technical details are covered in various places elsewhere and something short might be of more value at this point.
Usability of L3, Floating IPs and Access to External Networks
Use of floating IPs in nova-network result in the manipulation of firewall rules and the addition of the assigned floating IPs as aliases to the configured "public" interface on the network controller nodes. The consequence of the aliases on the public interface is that these addresses become immediately addressable on the controller node. This more severely affects developers or proof of concept users as the base system requirements with respect to network interfaces and configuration is straightforward. In an all-in-one configuration such as the fairly typical devstack deployment, access to external networks is straightforward and typically immediate. Without a deployment tool, the learning curve to deploying even a simple network configuration with L3 is a tough climb for the uninitiated.
At the moment, neutron's floating IP implementation requires some handiwork with bridging the br-ex interface, some additional iptables forwarding work, or configuration of a provider network. For the non-network oriented, especially those familiar with nova-network, this bit of complexity seems hard to justify. More generally, neutron's usability when doing "simple things' is a non-starter.
Multi-Host
Conversations regarding multi-host can become someone circuitious. The Nova-network multi-host implementation makes compromises to obtain certain goals. What it provides is fault-isolation and de-facto load balancing of DHCP and floating IP related processing. By collocating floating IP related changes and DHCP services on the same host as the relevant server instance, issues such as loss of power, network connectivity or software failure on a multi-host node only affects the instances on that multi-host node. The system related load is also contained to that particular multi-host node. This also makes resource scaling easier to conceive as each addtional node adds processing power without additional load on shared services, at least with respect to virtualization and network services. Despite the compromises, the benefits of multi-host are strongly supported by some users. Failing to provide an alternative with the same benefits would be significant obstacle to deprecating nova-network with neutron as a replacement.
Some of the compromises:
- By default, each multi-host node has an addressable bridge interface with its own dnsmasq instance. This results in a consumption of one IP address from the private network address space per multi-host node. An option was added in the grizzly release to allow sharing of the IP address so this is not an issue. (note: as this is not currently set as the default, I wonder if there are trade-offs when enabling it)
- East/west routing of mutliple networks depends on the existence of a server instance for each network on a multi-host node. If a multi-node only has server instances connected to a single network, east-west routing will not work for that node. For consistenct cross-network routing, you need to resort to floating IPs
- Multi-host is a property of a network definition, not a configuration. This is a pervasive choice and makes the multi-host option rather inflexible. Changing a system to or from multihost requires recreating the network and redeploying the instances.
- The networking services on a multi-host node are only available to server instances on that node.
Being aware of these compromises is valuable in that the decision to provide a neutron based solution that has the same compromises without shortcomings with respect to the nova-network feature set could be a win. It is quite likely that some compromises may be mitigated by the flexibility provided by neutron's architecture. Eventually it should be possible to provide the aforementioned benefits without any of the nova-network compromises. That being said, this would likely come with additional complexity.
Some useful references: | https://wiki.openstack.org/w/index.php?title=NovaNeutronGapHighlights&oldid=48038 |
Could Cyber-Diplomacy Learn From Outer Space?
While the Open Ended Working Group (OEWG) consensus report on ICTs in the context of international security is perhaps a successful compromise, it brought limited novelty in terms of cyber norms. Fifty-five years ago, there was another “space” in need of international regulation as a consequence of technological innovation: outer space, which yielded concrete results in the form of the …
Cybercrime Negotiations: Affairs Beyond States
Effectively fighting cybercrime requires cooperation between different communities and stakeholders. Governments enjoy a monopoly on power when it comes to law enforcement and criminal justice, but they need the involvement of the private sector and civil society organisations to make their policies work. With the launch of a new UN process addressing cybercrime around the corner, states cannot afford to …
Cyber Arms Control and Risk Reduction
Discussions at the UN have revealed that “implementation is currently one of our biggest challenges”. Specifically, states are conscious of the need to translate non-military cyber confidence-building measures (CBMs) into concrete actions that are implementable by all states, thus moving beyond awareness-raising. This is especially the case where CBMs are viewed by bodies such as the EU as a practical …
Hurdles to Protecting Global Critical Infrastructure
The ongoing UN dialogues about responsible behaviour in cyberspace have brought hope that a global solution can be reached to ensure peace in the cyber domain. However, there are already obstacles visible on the road ahead. This is particularly true for the overprotection of ICT infrastructure. With growing cyber insecurity amid the ongoing pandemic, it is more important than ever …
Navigating a Finnish Take on International Law
If you’re talking about international law and cyberspace, it’s hard to find a better person to talk to than Ambassador Marja Lehto, who wrote the recent Finnish position paper on the issue. A renowned international lawyer, Dr Lehto served as the Finnish expert in the tense 2016-2017 UN GGE. In 2016, she was elected to the International Law Commission of the UN (ILC) for the term of 2017-2021 with 175 votes, the highest vote total of the entire election.
Navigating Cyber Diplomacy in the Asia Pacific
The cyber and critical tech team at the Australian Department of Foreign Affairs and Trade has certainly been proactive about advancing their global and regional cyber engagement agenda. No easy feat when navigating intricate geostrategic realities in the Asia Pacific, the complexities of major power rivalries and rising strategic competition amid a global health crisis. | https://directionsblog.eu/tag/united-nations/ |
OnlineFirst olarak 23 Ekim 2019 tarihinde yayınlanmıştır.
Öz
Internet addiction has become one of the most important problems of today’s youth and received considerable attention from scholars. Research demonstrated significant impairments in psychological and social functioning among internet dependents. Given this, the present study aimed to investigate the relationship between fear of missing out (FoMO), internet addiction, and psychological symptoms. Based on research demonstrating that FoMO, the pervasive anxiety associated with the feeling that one is missing out others’ satisfying experiences, increases social media engagement, it was expected that FoMO would relate to internet addiction, which in turn would be linked to poor psychological well-being. The sample consisted of 322 undergraduate students who filled out items measuring FoMO, internet addiction and psychological symptoms. The regression analysis revealed that internet addiction acts as a mediator in the link between FoMO and psychological symptoms. That is, the participants’ greater FoMO is linked to higher levels of psychological symptoms both directly and indirectly through a higher level of internet addiction. Overall, the present study provides an insight into our understanding of the psychological and behavioral aspects of internet addiction, and thus, makes an important contribution to the promotion of mental health. | https://addicta.com.tr/makale/fear-of-missing-out-internet-addiction-and-their-relationship-to-psychological-symptoms/ |
Michael Katze from the University of Washington in Seattle reveals how 'systems biology' methods could successfully tackle viral infections, such as HIV and hepatitis C virus, for which there is still no effective vaccine or treatment.
"Systems biology is like a Rubik's cube – it's a matrix that integrates computational models, experimental systems and high-throughput data in a variety of combinations to solve the puzzle of virus-host interactions. It provides a powerful new approach to virology, drug discovery and vaccine development," explained Katze.
Improved animal models may help us understand how differences in an individual's genetic make-up affect HIV development. "Determining which host genes affect HIV progression has been relatively slow using the current techniques in isolation," remarked Katze. "Some current studies indicate there is a link between genes that affect how virus particles enter the host cell and disease progression," he continued. Identifying the molecules produced from these host genes could provide a method to effectively detect disease, predict how individuals respond to infection and even establish how effective a vaccine is. | https://www.compamed-tradefair.com/cgi-bin/md_compamed/lib/pub/tt.cgi/Personalizing_Medicine_to_Prevent_Pandemics.html?oid=19134&lang=2&ticket=g_u_e_s_t |
all Upskilled online courses.
Find out more.
Student login
Find a course
Your career
SkillsTalk
FAQs
About
SkillsTalk
Your guide to working remotely while the kids are around
By
Jana Angeles
| 20 March 2020
Share
Tweet
Share
With only a couple weeks away from school holidays, many parents are making the decision of keeping their kids at home in the midst of the COVID-19 outbreak for their own health and safety despite
Australian schools remaining open
, concerned that they may carry the virus and spread it amongst their elderly relatives.
Despite the demands that come with parenting, working from home can be a blessing in disguise if you want more flexibility. This means taking charge of your schedule and being strategic in what hours work for you
so you can still manage your parenting duties accordingly
.
If your job has allowed you to
work from home
in the next couple of weeks, you may find it difficult to balance your work schedule while looking after the kids, so you may be looking for the best tips to keep on top of your workload while you work from home in the meantime.
So, how do you effectively work from home while having to look after the kids?
Take advantage of those ‘lull’ periods during the day.
Be flexible when it comes to your schedule.
Get your kids to do fun activities to keep them preoccupied.
Don’t be afraid to ask for help in order to meet a pressing deadline.
1. Take advantage of those ‘lull’ periods during the day.
While your kids may be “switched on” all the time, it’s important to know their routine so you’re able to work and be productive while they’re preoccupied. If you have small kids, you can get ahead with your tasks by waking up early and getting work done. You could also take advantage of when they take their afternoon naps.
If you have slightly older kids, they may be easier to manage as they’ll have access to entertainment such as games, movies and TV. Getting familiar with your kids’ routine
can help you plan in advance so you know what time frames to get work done without any disruption
.
2. Be flexible when it comes to your schedule.
Looking after kids can be tough and with the COVID-19 outbreak,
it’s important to keep watch of their health while you work from home
. You may find that when they’re staying home for longer periods of time, they’ll become restless and bored and ask you to entertain them while you need to meet a pressing deadline for work.
It’s important to be flexible with your schedule and
communicate with your boss
about your changing priorities in regards to your kids
. It’s challenging to balance both parenting and work duties all at once, and sometimes you may need to make up your hours during the night time because you weren’t able to work on anything during the day.
One of the benefits of working from home is that you can change your schedule to best suit your needs and lifestyle, so if you find that working later works best for you, commit to that.
It’s also encouraged to have ongoing communication with your team by setting up meetings that fit your schedule. By
creating a spreadsheet
that
outlines your availability for virtual meetings
with your boss, this can help you plan ahead when you need to collaborate with your colleagues.
FlexJobs career development manager Brie Reynolds
says
,
“You should come together and talk about what’s going to work best for everyone. This might mean more frequent, but casual meetings, or it might mean fewer meetings altogether.”
3. Get your kids to do fun activities to keep them preoccupied.
Getting your kids to partake in activities that help them keep active can be a good way to help you tend to your duties as an employee or
freelancer
at home.
Instead of binge-watching the latest animated children’s series on Netflix, you could encourage your children to play board games or puzzles instead or if they have an extensive collection of LEGO at hand, encourage them to use their hands and
build something that helps run their imagination wild
.
You could also get them to exercise indoors (if it’s safe to do so) by looking up fun, family-friendly exercise videos on YouTube. For example, you can check out this
fun cardio workout
and get the kids involved. It may be a fun way to join them, especially if you need to take a break from work and need to do some physical activity to keep those energy levels up.
4. Don’t be afraid to ask for help in order to meet a pressing deadline.
It can be overwhelming tending to the duties of a parent so getting help is sometimes necessary, especially if you need to meet a tight deadline for a particular project. Having
your partner
share the parenting duties could make all the difference.
Brie Reynolds
mentions
that she likes to
switch shifts with her partner
, getting the kids to eat breakfast and looking after them in the morning. Her husband takes over throughout the day so she can work from home uninterrupted. Following this example, communicating with your partner as well as being flexible to any schedule changes can be helpful, especially if there are
changing priorities associated with work
.
If applicable, you could also ask another relative or trusted friend to babysit for a couple of hours to help you work without any disruption.At a time where people are
socially isolating themselves during the coronavirus outbreak
, it may be difficult to get some support from the grandparents (as elderly people are at high risk if they contract the virus), or loved ones returning from overseas.
So, please keep this in mind when making this decision
.
Embrace the future of flexible working and study online
By knowing what times you’re most productive and being flexible with your schedule,
working from home
can be what you need to
experience a proper work-life balance
as opposed to coming into the office and spending a portion of your day commuting, when you could use that time to get really productive when you’re at home.
With a
growing number of businesses working from home
in the midst of the coronavirus outbreak, it’s important to also be open to opportunities that allow you to grow as a professional without having to change your current schedule dramatically.
Upskilled is an
online course provider
and you have the choice of
studying qualifications
in a number of industries. From business to IT, you can complete a qualification in 12 months and improve your skills and knowledge in your specific industry.
Talk to one of their education consultants and
see what possibilities online studying can do for your career
.
View all
Develop your career
,
Working from Home
articles
Jana Angeles
Jana Angeles is the Social Media and Content Coordinator at Upskilled. She regularly pens insightful articles on SkillsTalk about online education and career development. Outside of work, you can usually find her at her local record store or having brunch at a fancy cafe.
What’s hot
10 high demand jobs to look out for in 2020
Dec 26, 2019
Australia's top 10 highest paying jobs
Jul 31, 2020
Australia's top 10 highest paying jobs you don’t need a degree for
Sep 29, 2020
How to become a counsellor in Australia
Sep 05, 2019
Study tips straight to your inbox!
Related
More like this
Develop your career
4 careers for people who love to organise
January 14, 2021
Develop your career
6 benefits of mentoring in the workplace
December 28, 2020
Develop your career
How to use your current job to build your future career
December 23, 2020
Develop your career
7 side hustle ideas to start in 2021
December 17, 2020
Upskill for the career you love.
Talk to an Upskilled Education Consultant about which course is best suited for you.
Get in touch
1300 009 924
Enquire now
Start your next course with Upskilled. Enter your details in the form below.
Upskilled Course
Student Support
What best describes you:
*
What best describes you?
I'm starting my career
I'm looking to change careers
I'm returning to work
I'm looking for a promotion
I want to expand my skillset
I'm none of the above
First Name:
*
Last Name:
*
Email:
*
Phone:
*
Comments:
Contact Name:
*
Email:
*
Phone:
*
Description: | https://www.upskilled.edu.au/skillstalk/working-remotely-while-the-kids-are-around |
BH8 0JW Postcode Area
Use the postcode street map opposite - and the information below - to discover useful information for the BH8 0JW postcode area in Bournemouth.
We've got loads of statistics for BH8 0JW, including demographic data, local facilities, travel essentials, hotel accommodation, crime rates and much more.
What social class do the population of BH8 0JW belong to? What are the predominant ethnic groups? How deprived is BH8 0JW in Bournemouth, how professionally qualified are the community, and how many hours a week do they work? All this, and more information and demographic statistics about BH8 0JW from the Census 2011.
AVERAGE AGES
- 22%Children
- 78%Adults
22% of people in this postcode area are children. Of the remainder, 12% are aged 76 or more.
GENDER SPLIT
- 43.1%Male
- 56.9%Female
From the last census, 43.1% of people in BH80JW male, and 56.9% female. Women outnumber men in Strouden Park.
MARITAL STATUS
- 32%SINGLE
- 39%MARRIED
The percentage of people who are married in BH8 0JW is 32%. Single and 'other' people is 67%.
ETHNICITY
- 92%WHITE
- 8%NON-WHITE
92% of people class themselves as 'white', compared to a national UK average of 81.9%
UNEMPLOYMENT
- 87.4%WORKING
- 6.6%UNEMPLOYED
6.6% are either unemployed or students in this area. The UK unemployment rate is 4%.
Discover BH8 0JW
People and DemographicsBH8 0JW
Demographics
An in-depth look at the demographic data of the people who live in BH8 0JW, including ethnicity, religious beliefs, age breakdown and social grades.
Crime Rates
Police crime stats - see how safe it is around BH8 0JW, including burglaries, ASBOs, vehicle crime and violent crime. How does this area compare?
Constituency
Find out the voting intentions, poll results, your local MP, 2015 election results and voting turnout for your local constituency.
Local Issues
In conjunction with FixMyStreet, view problems around BH8 0JW reported by local residents, including flytipping, graffiti, faulty street lighting etc.
Sunrise/Sunset
Sunrise (dawn) and sunset (dusk) times for today as well as for the next month for the postcode area BH80JW. Wakey wakey, rise and shine!
Job Vacancies
Looking for job vacancies in the BH8 0JW area? Find out what positions are available in this area, as well as further afield in surrounding areas.
Travel & TransportBH8 0JW
Travel
Travelling to this postcode area? Find the nearest train station, railway, or nearest bus stop to BH8 0JW.
Traffic Reports
Don't let traffic become a pain in the bumper. The latest road traffic incidents & traffic jams around this postcode.
Taxi Firms
Book a taxi and leave the car at home. Here's a list of taxi and mini cab companies operating in the BH8 0JW area.
Car Parks
Locate the nearest car parks near BH8 0JW, so you can leave your car safely while you pop to the shops.
Leisure & Outdoor FacilitiesBH8 0JW
Events
From local gigs to heritage events, and car boot sales to shows at the local theatre, find out what's on around BH8 0JW.
Attractions
Enjoy a great family day out at a local attraction near BH8 0JW, including theme parks, castles, historic castles & more.
Hotels
Comfortable, quality bed & breakfast and hotel accommodation located within a 15 miles of the postcode area BH8 0JW.
Tourist Information
Locate the nearest car parks near BH8 0JW, so you can leave your car safely while you pop to the shops.
Local AmenitiesBH8 0JW
Banks
Find the nearest bank or building society in BH8 0JW. Map locations, email addresses & customer services phone numbers.
Cash Machines
Locations of the nearest cash withdrawal machines (ATMs) in the BH8 0JW postcode area that dispense money.
Schools
The nearest schools in the BH8 0JW area, including their latest Ofsted Results, pupil statistics and test results.
Shopping Centres
Shop until you drop at a retail park or shopping centre near here. There's nothing quite like a bit of retail therapy.
Police Stations
Report a crime or make an enquiry at your local police station or constabulary in your area. Phone 101 in a non-emergency.
Emergency Facilities
A handy list of emergency information in this area, including hospitals, doctors, chemists and emergency services near BH8 0JW.
Post Offices
Whether you want to send a letter, make a Post Office transaction or pop a letter in the local postbox, we've got you covered.
Libraries
A useful list of lending libraries located in and around BH8 0JW. May also lend CDs and DVDs, and other services available.
BH80JW Postcode Breakdown
|BHAREA||8DISTRICT||0SECTOR||JWUNIT|
|Full Postcode||BH8 0JW|
|Latitude/Longitude||,|
|Postal Town||Bournemouth|
|Easting|
|Northing|
|Ward Name|
|MSOA Name|
|LSOA Name|
|County|
|Region|
|Country||England|
|Local Authority|
|Local Authority Code|
|Area Classification||Urban with City and Town|
BH80JW Postal District
BH8 0JW postcode is located in the postal town of Bournemouth. Bournemouth postal area may cover a large geographical region that may correspond to several postal districts, which may include many towns and/or villages. Use the map to determine the geographical location of the postcode BH8 0JW.
|Holdenhurst||0.5 miles E|
|Herne||1.2 miles NE|
|East Parley||1.5 miles NW|
|Parley||2 miles NW|
|Winton||2.1 miles SW|
|Christchurch||2.9 miles E|
|Longham||3.4 miles W|
|Bournemouth||3.4 miles SW|
|Ripley||3.4 miles NE|
|Fern Down||3.8 miles NW|
|Hampreston||4.5 miles NW|
|Bransgore||4.6 miles E|
|Parkstone||5.2 miles W|
|Canford Magna||5.5 miles W|
|Hinton||5.5 miles E|
|London||90 miles E|
|Glasgow||364 miles N|
|Edinburgh||363 miles N|
|Cardiff||79 miles NW|
|Liverpool||190 miles N|
|Southampton||21 miles E|
|Saint Ives||6 miles N|
Local News Hampshire
Hampshire woman organises world hula-hooping championship
The event was organised by Hannah Murphy from Stubbington and entries came from around the world.BBC News
9 classic books with a Hampshire connection
A selection of famous books with a link to HampshireHampshire Life
8 local artists featuring in the online Hampshire Open Studios
This month, Open Studios shines a light on Hampshire’s thriving creative network as local artists unveil their latest work online.Hampshire Life
Government should invest, says Home-Start Winchester
LOCAL family support charity, Home-Start Winchester has said that investment in early years education should be central to the Government's levelling-up' agenda.Hampshire Chronicle
Diego Maradona dead aged 60
It is reported in Argentina that the former Barcelona and Napoli star passed away at home in Tigre after suffering a cardiac arrest.Hampshire Chronicle
Mushroom foraging in the New Forest
When it comes to unearthing fascinating fungi, former chef Richard Sawden is the go-to expertHampshire Life
BLACK HISTORY MONTH: We came as immigrants but made our contribution
Beverley Dowdell, Chairman of Southampton’s Black Heritage Centre, shares her journey from the CarribbeanHampshire Life
Two arrests made following assaults in Fratton (Hampshire Constabulary)
Officers investigating assaults on two men in Fratton have made two arrests. The incident happened just after 8.30pm on Monday 16 November on George Street, leading onto Langford Road.A 46-ye&hellipHampshire Constabulary
From the Postcode Area blog
Death of the High Street?
The BBC reports that despite councils' attempts to kurb them, the UK's high streets have seen a huge growth in fast food outlets. Could this mark the death knell for the Great British high street, and what can we do about it to halt its decline?
Discrimination by Postcode
You really couldn't make it up, could you? Some of the country's most vulnerable people are missing out on their weekly £25 Cold Weather Payment, just because the system that's in operation is discriminating against them because payments are based on postcode, rather than geographic location.
The Redesign is Underway
Well, the current website was absolutely in dire need of a good redesign - from the ground up. So I set out to pull it all apart and get it up and running again to become the most comprehensive guide to every postcode in the UK. And it's been a long, tough job from start to finish - and quite possibly the biggest project I've ever undertaken.
The Impossible Challenge of Affordability
No wonder the younger generation are getting more and more frustrated with money - new research has revealed that even with a 10% deposit, 25-34 year olds are struggling to afford even the CHEAPEST houses on the market. Is there a solution to the 'impossible challenge'? | https://www.postcodearea.co.uk/postaltowns/bournemouth/bh80jw/ |
An evening of classical and contemporary dance, a premiere of the Valentina Kozlova Studio Company. The classical section will feature famous solos, pas de deux, and the revival of a rare Marius Petipa masterpiece. With special appearance from Principal dancers Albert Davydov, NJ Ballet, and Clément Guillaume, of France. Contemporary works will feature solo dancers as well as a special presentation of Overcome, an ensemble piece choreographed by Valentina Kozlova after 9/11. | https://www.symphonyspace.org/events/vp-vkdcny-studio-premiere |
- Publication Date:
- 2019
- Copyright year:
- 2019
- To be published:
- October 2019
- ISBN
- 978-3-11-061903-4
Overview
- detailed portraits of the 14 female Nobel Prize-winning authors
- exemplifying reading of central texts
- in-depth discussion of the specific conditions and characteristics of female writing
Aims and Scope
This volume presents the 14 female winners of the Nobel Prize in Literature, e.g. Lagerlöf, Sachs, Jelinek, Müller, Munro. Contributions offers exemplary readings of chosen works, while outlining the intellectual profile of each author. They also tackle the questions of female writing and canon formation, and interrogate the conditions and contradictions of artistic creativity.
Details
- Approx. 300 pages
- Language:
- German
- Type of Publication:
- Collection
- Keyword(s):
- Nobel Prize; Literary History; Canon Formation; Women Writers
- Readership:
- Academics (Literary Studies) & General Public
- Subjects
- Literary Studies > Literary Studies, general
- Literary Studies > Literary History
- Literary Studies > Topics in Literary Studies > Gender and Literature
MARC recordMARC record for eBook
More ...
Part of:
More by Olk, Claudia:
More by Zepp, Susanne:
Comments (0)
General note: By using the comment function on degruyter.com you agree to our Privacy Statement. A respectful treatment of one another is important to us. Therefore we would like to draw your attention to our House Rules. | https://www.degruyter.com/view/product/510007?rskey=gDtaMA&result=3 |
Measuring cybersecurity risk and preparedness for financial institutions.
FFIEC Cybersecurity Assessment Tool
The FFIEC Cybersecurity Assessment Tool (CAT) is a method used to measure a financial institution’s cybersecurity risk and preparedness over time. While the primary guidance is for national banks, community banks, and credit unions of all sizes, it can also be helpful for non-depository institutions.
The CAT is composed of controls across various maturity levels and approximately 30% of those controls relate to the National Institute of Standards and Technology’s (NIST) cybersecurity framework.
After obtaining the assessment, users select the most appropriate risk level across hundreds of controls under the inherent risk profile. Cybersecurity maturity is determined based on the selected declarative statements for each assessment factor. As a result, the CAT provides users with measurable and repeatable processes by combining responses from part one and two in the assessment.
This includes controls to determine whether your institution’s processes support cybersecurity preparedness within five domains:
Auditors increasingly request institutions to complete the assessment to demonstrate compliance, making CAT widely used across financial services. It’s best practice to conduct the assessment annually to help institutions with cybersecurity strategy and business growth, and to keep them up to date on controls.
Completing the CAT is not a simple task. It may pose as a burden for IT and risk professionals so when working with cybersecurity partners, it is crucial the partner selected can do the following:
Over two decades ago, SEI built a cybersecurity program to protect its own assets. As a highly regulated financial institution, audits are an ongoing process and an investment in cybersecurity is a priority. We realized financial services firms deserve a highly secured program to protect themselves and their clients from threat actors.
The cybersecurity program and protection we provide to our clients is the same level of protection we use for ourselves, ultimately, allowing our clients to inherit our maturity and experience.
|Example of how a firm inherits SEI’s maturity|
|Domain||Assessment Factor||Component||Maturity Level||Mapping Number||Declarative Statement|
|2:Threat Intelligence & Collaboration||1: Threat Intelligence||1: Threat Intelligence & Information||Innovative||D2.TI.Ti.Inn.2||The institution is investing in the development of new threat intelligence and collaboration mechanisms (e.g., technologies, business processes) that will transform how information is gathered and shared.|
|2:Threat Intelligence & Collaboration||2: Monitoring & Analyzing||1: Monitoring and Analyzing||Innovative||D2.MA.Ma.Inn.1||The institution uses multiple sources of intelligence, correlated log analysis, alerts, internal traffic flows, and geopolitical events to predict potential future attacks and attack trends.|
|2:Threat Intelligence & Collaboration||2: Monitoring & Analyzing||1: Monitoring and Analyzing||Innovative||D2.Ma.Ma.Inn.2||Highest risk scenarios are used to predict threats against specific business targets.|
|3: Cybersecurity Controls||2: Detective Controls||3: Event Detection||Innovative||D3.Dc.Ev.Inn.1||The institution is leading efforts to develop event detection systems that will correlate in real time when events are about to occur.|
Helping to identify the intersection of people, process, tools and budget for optimal risk control. | https://www.seic.com/cyber-protection/sphere-blog/ffiec-cybersecurity-assessment-tool |
On 5 February, ICIMOD organized an editor’s roundtable as part of the Regional Journalists’ workshop being organized at its headquarters under the Himalayan Climate Change Adaptation Programme (HICAP). At this two-hour session, 20 journalists from China, India, Nepal, and Pakistan interacted with editors from major English and vernacular media outlets in Nepal. Chaired by Dr David Molden, Director General of ICIMOD, the session was moderated by Vidhu Kayastha, a communication expert and one of four workshop facilitators.
At the roundtable, editors presented their observations of how important climate change issues in the mountains were presented in their publications and news outlets and discussed issues of climate change journalism with participants. Issues discussed included the compartmentalization of climate change stories, and the need to better show linkages between climate change issues and mainstream stories as well as the challenges and need to translate technical data and scientific jargon to increase understanding of climate change among the general public.
Editors and participating journalists also discussed the need for proper scientific backing to develop compelling and accurate stories on the impacts and drivers of climate change, for which Anouhita Majumdar, Associate Editor at Himal Southasian, noted institutions like ICIMOD could support through targeted information for journalists. Other points included the role of social media and how climate change stories are presented in vernacular publications. Representatives from ICIMOD shared that as a research institute, ICIMOD’s primary goal is to dissect hard science and make it accessible to partners, policy makers, media, and the general public. Nand Kishore Agrawal, Coordinator of HICAP, noted that this regional workshop paved the way for a collaborative effort with the media fraternity in communicating the impacts of climate variability to a broader audience. | http://www.icimod.org/?q=9610 |
A new Council has been set up to work at getting Institutions of a Public Character (IPCs) to be more transparent and better governed.
2 Generous donations in 2002 saw over $380 million raised for the IPCs. Donors to these IPCs enjoy double tax deductions.
3 To support the growth of charitable giving, it is important that IPCs have in place good governance and best practices, and are transparent in fund raising as well as in managing the charity dollar.
4 The Council on Governance of IPCs, which was launched today, will work with the Ministry of Community Development and Sports (MCDS) and the Ministry of Finance (MOF) to improve the regulatory framework for IPCs.
5 It will look into minimum standards of governance as well as promote good governance for IPCs.
6 There are some 900 IPCs in Singapore, covering diverse community interests, including social welfare, arts and heritage, sports and environmental protection.
Terms of reference
7 The Council's Terms of Reference are as follows:
(i) To set up and promote minimum standards of governance for IPCs
(ii) To identify strategies and promote best practices in transparency, accountability and governance among IPCs
(iii) To identify obstacles that may hinder donations to IPCs, and strategies to overcome them
(iv) To grow a culture of informed giving among donors
Good governance and donor education
8 The Council is encouraged to note that donors today do seek accountability for the funds raised by the charities they support. The establishment of a Code of Best Practices for IPCs will better enable the donating public to enlarge the charity pie in Singapore.
9 "A high level of accountability and transparency will give confidence to donors," said Ms Lim Soo Hoon, Chairman of the Council.
10 "While the Council will look into standards of governance of IPCs, ultimately it falls on the donor to assess and decide which are the worthy charitable causes they wish to support", Ms Lim added. The Council will work with the National Volunteer and Philanthropy Centre, whose Chairman is also on the Council, to promote informed giving and encourage donor education by the IPCs.
11 The Council will seek public feedback as well as learn from countries such as the United States and the United Kingdom which have a stronger culture of giving. The Council will also learn from the social service sector which already has a code of governance in place.
Encouraging Donations to IPCs
12 Today, Government agencies are already working together to facilitate donations. For example, donors to IPCs do not need to retain their tax deduction receipts as the donations are already automatically captured in their tax returns, thanks to the Inland Revenue Authority of Singapore (IRAS).
13 Another example of an inter-agency initiative, which involved the Ministry of Finance, and supported by MCDS, IRAS and NCSS. is the posting of pertinent information on-line. IPCs and members of the public were consulted on the proposal to require IPCs to post their key financial and non-financial information on-line. Today, such information is available at IRAS' website. With more transparency on the use of charitable funds, the government hopes that donors will be more forthcoming with their donations to IPCs.
14 There are other possible areas of improvement. Today, organisations which would like to conduct fundraising events in public areas, for instance, have to apply for permits from several agencies. This is an area which the Council could provide its recommendations on how application processes could be streamlined for the convenience of IPCs.
Council composition
15 The Chairman and members of the Council, appointed by the Minister for Finance, have vast experience in the local charity scene, whether as a donor, a philanthropist or a representative of a non-profit organisation. The Council is chaired by Ms Lim Soo Hoon, Permanent Secretary of the Ministry of Community Development and Sports. The members of the Council are as follows:
|
|
Name
|
|
Organisation
|
|
1.
|
|
Mr Willie Cheng
|
|
Chairman, National Volunteer & Philanthropy Centre
|
|
2.
|
|
Mr Gerard Ee
|
|
President, National Council of Social Service
|
|
3.
|
|
Ms Maureen Fung
|
|
Group Director, Asian Women Welfare Association
|
|
4.
|
|
Mr Edmund Koh
|
|
Council Member, Singapore Sports Council
|
|
5.
|
|
Ms Susan Loh
|
|
Director(Audience & Market Development)
|
|
6.
|
|
Mr Ng Boon Yew
|
|
Group CFO, Singapore Technologies
|
|
7.
|
|
Mr Ridzwan Dzafir
|
|
Chairman, Malay Heritage Foundation Board
|
|
8.
|
|
Mr Howard Shaw
|
|
Executive Director, Singapore Environment Council
|
|
9.
|
|
Mr Tan Soo Nan
|
|
CEO, Singapore Pools
|
|
10. | https://www.mof.gov.sg/news-publications/press-releases/What-happens-to-your-charity-dollar |
Teams can feel beaten down for any number of reasons. Perhaps they’re coming out of a particularly busy season, or maybe a leadership shake-up has given rise to feelings of instability and anxiety
But for many teams, the sudden move to remote and hybrid work over the past year has resulted in a kind of unfamiliar fatigue that many leaders and employees have never encountered before. Between balancing work and home responsibilities and coping with the heightened tension across society in general, people at all levels are experiencing fatigue.
Despite this fatigue, more than half of employees who can work from home want to continue working remotely after the pandemic. Remote and hybrid work models are here to stay, which means that leaders and employees need to adapt and overcome the fatigue that can result from those models.
Here are five ways to help your hybrid work team overcome remote work fatigue:
1. Acknowledge the Fatigue
Don’t ignore it or sweep it under the rug. Use your position as a leader to acknowledge the fatigue and encourage everyone to talk about it. Pretending it doesn’t exist will only cause your team to become more fatigued. Rather, bring the fatigue to the fore, and encourage your team to open up and empathize with one another.
2. Cultivate Relationships
It can be tough to cultivate personal relationships even in an office setting; hybrid and remote work models make it even tougher. Make an effort to connect with your team, and encourage them to connect with each other. Regard each other as humans, not just workers.
As soon as possible, your connection should periodically take place in person. With ongoing public health concerns and widely dispersed teams, getting together in person is not always feasible. However, as much as possible, try to find ways for your team to connect face-to-face. Whether it’s periodic in-office meetings or an after-hours gathering, the in-person connection can foster team camaraderie and reduce virtual fatigue.
3. Build a Sense of Resilience
Start with yourself. Identify practices you can do in your own life that give you a sense of renewal and energy. Perhaps you start your day with meditation or exercise, or perhaps you need a good hour of quiet reading time in the evening before bed. Make those practices into habits to create a sense of personal resilience, and encourage your team to do the same. As the team builds personal resilience, the team will start to feel less fatigued.
Physical activity is especially important for people working remotely. Encourage your team members to get up and walk around during the day. Even ten minutes of walking, three times per day, can promote physical health and reduce fatigue.
4. Give Permission to Turn Off or Manage Technology
Two of the biggest challenges remote workers face are digital distractions (e-mails, texts, instant messages, etc.) and virtual overload (online meetings and other virtual touchpoints). The technology tools that make remote work possible are the biggest factors contributing to remote work fatigue!
While connecting with remote employees is vital to the health of the organization, encourage your remote employees to find ways to manage the technology that help them work more productively. Do they need to put themselves in airplane mode for a while to concentrate on important tasks? Do they need to set aside specific time for checking e-mail or responding to messages? Allow your team to manage technology tools in ways that work for them.
5. Set an Example of "Turning Off" Every Day
Related to managing technology is the fatigue that comes from feeling “always on.” Many remote workers feel like they can’t turn off. They look to after-hours periods to finish work that digital distractions prevented earlier in the day, or they feel like they have to respond to messages that come in when they are connecting with family or at the gym.
Communicate to your team that they are expected to “turn off” every day, and set the example yourself. Sign out, log off, and enjoy life outside of work—and communicate that you want your team to do the same.
conclusion
Remote and hybrid work models offer some significant advantages for employees and companies, but not at the expense of mental health or long-term productivity. Helping your team reduce fatigue now will set you up for long-term employee retention and business success. | https://blog.stewartleadership.com/5-ways-to-rejuvenate-your-remote-team |
M.L. Roy and K.S. Kadian
Mixed farming systems are central to the livelihood and nutritional security of small, marginal and landless farmers in India and other developing countries of the tropics. Intense knowledge in this area is prerequisite for majority of Indian farmers to sustain themselves in the changing environment. In the present study, an attempt was taken to develop and standardize a knowledge test on mixed farming for farmers. Knowledge in mixed farming was operationalized as the totality of understood information possessed by the farmers about concept of mixed farming; mixed farming vis-Ã -vis different farming practices which included crop cultivation, animal husbandry and other miscellaneous practices in the form of duck-cum-fish culture and paddy-cum-fish culture; mixed farming vis-Ã -vis Low External Input Agriculture (LEIA); organic farming; Integrated Nutrient Management (INM); Integrated Pest Management (IPM) and sustainable agriculture; and mixed farming vis-Ã -vis farm management decisions. The knowledge items were collected based on mixed farming systems prevalent in the state of West Bengal. The steps viz. selection of items; item analysis and pre-testing; calculation of difficulty and discrimination index; final selection of items; and testing of reliability and validity; were followed to develop and standardize the test. The final knowledge test contained 55 items which were retained out of 99 items. The test was found to be highly stable and reliable which was indicated by highly significant value of reliability co-efficient. It can help the extension personnel to explore the strong and weak areas of knowledge of farmers about mixed farming. | https://seea.org.in/view/content?id=eyJpdiI6InA2eUVjWEE5S3prK3M3bTRCRHJ6NHc9PSIsInZhbHVlIjoiVXlVSnhIQ3FEc0EzdkI2OXo2ekh5dz09IiwibWFjIjoiYmIzMzNlYTcxZTQzYzJjYjRlMDdlZmU3MTExYzAyY2FjNDI0NTM5Y2M3NzA1ZjlkMjBiZDExZGU4MDk5NThkYiJ9 |
Each hydrometer is calibrated in a triple accredited ISO/IEC 17025:2005, A2LA accredited laboratory against equipment whose calibration is traceable to NIST. Individually packaged with a multi-language Statement of Accuracy indicating accuracy traceable to NIST.
|
Specifications
Product Category
Density and Specific Gravity Instruments
Specific Gravity Range
0.6000 to 0.6700 #
More Information
|Supplier's Site|
Similar Products
Radwell International
Eagle Eye Power Solutions, LLC
Anton Paar
VEGA Americas, Inc. | https://datasheets.globalspec.com/ds/565/ColeParmer/520BBD7C-54B7-4756-8129-80C0D2EF3100 |
Dosages of cold-water immersion post exercise on functional and clinical responses: a randomized controlled trial.
Cold-water immersion (CWI) is one of the recovery techniques commonly used by athletes for post-exercise recovery. Nevertheless, the effects of CWI using different temperatures and the dose-response relationship of this technique have not yet been investigated. The aims of this study were to compare the effects of two strategies of CWI, using different water temperatures with passive recovery post exercise in the management of some markers of muscle damage, and to observe whether any of the techniques used caused deleterious effects on performance. Sixty healthy male participants performed an eccentric protocol to induce muscle damage and were then randomized to one of three groups (CWI1: 15 min at 9 °C; CWI2: 15 min at 14 °C; CG: control group). Levels of creatine kinase, muscle soreness, pain threshold, perception of recovery, and maximal voluntary isometric contraction were monitored up to 96 h post exercise. A large effect for time for all outcomes was observed [P < 0.001; CK (ES = 0.516), muscle soreness (ES = 0.368); pain threshold (ES = 0.184); perception of recovery (ES = 0.565); MVIC (ES = 0.273)]. CWI groups presented an earlier recovery for muscle soreness with lower ratings immediately post recovery. For delayed effects, the application of CWI2 (15 min at 14 °C) presented earlier recovery compared with CWI1 and control condition for maximal voluntary isometric contraction (P < 0.05). There were no significant group and interaction (Group × Time) effects. CWI groups acted more efficiently for muscle soreness and performance considering the time of recovery was observed. No evidence was found to suggest dose-response relationship and deleterious effects.
| |
Rx drug information, pharmaceutical research, clinical trials, news, and more
MSIR (morphine sulfate) is an opioid analgesic.
MSIR Oral Solution Concentrate and MSIR Tablets are indicated for the relief of moderate to severe pain.
Painless Aortic Dissection in the Emergency Department Source: Medscape Critical Care Headlines [2017.09.15]Real-life AAD may not resemble the textbook description, so always consider AAD in sick patients even in the absence of chest pain, says Dr Mattu. Medscape Emergency Medicine
A 55-Year-Old Woman With Shortness of Breath and Chest Pain Source: Medscape Medical Students Headlines [2017.09.15]A 55-year-old woman is admitted due to shortness of breath and pain on both sides of her chest with deep breathing, which has worsened over the past 5 days. Can you make the diagnosis? Osmosis
FDA Panel Mulls New Data for Pain Patch in Kids Source: Medscape NeurologyHeadlines [2017.09.15]An FDA advisory committee weighed results of new study of Butrans transdermal opioid in pediatric patients and whether label changes should be made. Medscape Medical News
First Comprehensive Guidelines for Chronic Pain in HIV Source: Medscape HIV/AIDS Headlines [2017.09.14]The IDSA issued the first comprehensive guidelines for treating chronic pain in HIV, recommending screening for all people living with HIV and multidisciplinary treatment focused on nondrug therapy. Medscape Medical News
Combatting Pain After Orthopedic/Trauma Surgery Source: Medscape Anesthesiology Headlines [2017.09.13]This study compared the efficacy and side effect rates of two commonly used analgesic regimens following orthopedic or trauma surgery. BMC Anesthesiology
Influence of Morphine on Pharmacokinetics and Pharmacodynamics of Ticagrelor in
Patients with Acute Myocardial Infarction (IMPRESSION): study protocol for a
randomized controlled trial. BACKGROUND: Ticagrelor is an oral platelet P2Y12 receptor antagonist which is
recommended for patients suffering from myocardial infarction, both with and
without persistent ST segment elevation... DISCUSSION: This study is expected to provide essential evidence-based data on
the impact of morphine on the absorption of ticagrelor in patients with
myocardial infarction as well as to shed some light on the suspected connection
between morphine use and antiplatelet activity of ticagrelor in the same group of
patients.
Efficacy and safety of sublingual fentanyl orally disintegrating tablet at doses
determined from oral morphine rescue doses in the treatment of breakthrough
cancer pain. evaluate the efficacy and safety of sublingual fentanyl tablet... CONCLUSIONS: Patients treated with strong opioid analgesics at fixed intervals
Evaluation of a single-dose, extended-release epidural morphine formulation for
pain control after lumbar spine surgery. DepoDur, an extended-release epidural morphine, has been used effectively for
postoperative pain control following many orthopaedic and general surgery
procedures and has provided prolonged analgesia when compared with Duramorph. The
goal of this article was to compare the safety and analgesic efficacy of DepoDur
versus Duramorph after lumbar spine surgery...
Morphine decreases clopidogrel concentrations and effects: a randomized,
double-blind, placebo-controlled trial. effects on platelets... CONCLUSIONS: Morphine delays clopidogrel absorption, decreases plasma levels of
Transversus abdominis plane block versus perioperative intravenous lidocaine
versus patient-controlled intravenous morphine for postoperative pain control
after laparoscopic colorectal surgery: study protocol for a prospective,
randomized, double-blind controlled clinical trial. BACKGROUND: Despite the laparoscopic approach becoming the standard in colorectal
surgery, postoperative pain management for minimally invasive surgery is still
mainly based on strategies that have been established for open surgical
procedures... DISCUSSION: Recognizing the importance of a multimodal approach for perioperative
pain management, we aim to investigate whether a transversus abdominis plane
block delivers superior pain control in comparison to perioperative intravenous
lidocaine and patient-controlled intravenous analgesia with morphine alone.
Patients-Controlled Epidural Analgesia After Gastric Bypass for Morbid Obesity Using Morphine-Levobupivacaine Regimens [Completed]
Adequate postoperative analgesia can facilitate recovery following gastric bypass surgery
for morbid obesity. The efficacy and safety of intravenous patient - controlled analgesia
has been studied, but up to date no data are available concerning the use of thoracic
epidural patient-controlled analgesia regarding the use of levobupivacaine combined with
morphine in morbidly obese patients. The investigators' aim in this prospective,
randomized, double-blinded study was to compare the analgesic effectiveness, the dose
requirements and side effects of thoracic epidural patient controlled analgesia 0. 1% and
0. 2% levobupivacaine combined with a continuous epidural administration of morphine, with or
without a loading dose, after open gastric bypass for morbid obesity.
The Median Effective Dose (ED50) of Paracetamol and Morphine : A Study of Interaction Study [Completed]
The aim of our study is to define the median effective analgesic doses (ED50) of
paracetamol, morphine, and their combination and determination the nature of their
interaction administered IV for postoperative pain after moderate painful surgery using
up-and-down and isobolographic methods.
A Comparison of Morphine and Morphine Plus Dexmedetomidine in Chronic Cancer Pain [Recruiting]
The purpose of this study is to determine whether dexmedetomidine added to morphine is
effective in the treatment of chronic cancer pain.
Ketamine Associated With Morphine PCA After Total Hip Arthroplasty [Completed]
Ketamine (an analgesic drug often associated with morphine in the treatment of Opioid
Induced Hyperalgesia) is often mixed in Morphine PCA syringe. We make the hypothesis that
ketamine administrated separately via a continuous infusion, could induced a better
analgesic effect.
We will perform a randomised double blind study to determine the best infusion mode of
intravenous ketamine, associated with morphine in PCA syringe or alone in continuous
infusion.
Continuous Pre-uterine Wound Infiltration Versus Intrathecal Morphine for Postoperative Analgesia After Cesarean Section [Recruiting]
The cesarean section is considered as a painful surgery during the post operative period.
Mothers may need to move immediately after the surgery to take care of their babies. This
may increase the risk of major pain and chronic pain. Thus, excellent postoperative
analgesia is required so that mothers do not experience pain in caring for their baby.
Currently, several techniques have been developed to manage postoperative pain related to
c-section scar such as intrathecal morphine during spinal anesthesia or continuous
pre-peritoneal wound infiltration. The comparison between anesthetic techniques has never
been performed and it is still not know if the combination of intrathecal morphine plus
continuous pre-peritoneal wound infiltration provide a synergistic or additional effect on
pain relief. | http://www.druglib.com/druginfo/msir/ |
Objectives: To explore beliefs of Chinese American, immigrant women related to breast cancer and mammography. Design: Qualitative description with semistructured focus groups. Setting: Metropolitan Portland, Oregon. Participants: Thirty eight foreign-born Chinese women, age 40 and older, in five focus groups. Methods: Focus group discussions in Chinese were audiotaped, transcribed, and translated into English. Using a process of directed content analysis, group transcripts were coded for themes based on the discussion guide. Results: Three main themes emerged from the analysis: knowledge and beliefs; support, communication, and educational needs; and access to care. Subthemes included beliefs such as barriers and facilitators to screening and perceptions about personal breast cancer risk. Several women were profoundly affected by the negative breast cancer-related experiences of relatives and friends. Some common myths remain about causes and treatment of breast cancer. Conclusions: Although Chinese American immigrant women share beliefs with other minority women in the United States, some culturally related barriers such as alienation due to cultural reasons for not sharing diagnosis with anyone and beliefs about the efficacy of Eastern versus Western medicine may affect adherence to screening and treatment. Facilitators included being told to get the test and getting screened for the sake of the family, whereas erroneous information about the cause of breast cancer such as diet and stress remained. Primary care providers such as advanced practice nurses should take into account culturally driven motivations and barriers to mammography adherence among Chinese American immigrant women. Provider/client interactions should involve more discussion about women's breast cancer risks and screening harms and benefits. Such awareness could open a dialogue around breast cancer that is culturally sensitive and nonthreatening to the patient. Information may need to be tailored to women individually or targeted to subethnic groups rather than using generic messages for all Asian immigrant women. | https://ohsu.pure.elsevier.com/en/publications/findings-from-focus-groups-indicating-what-chinese-american-immig-2 |
After a two-year consultation process, the CMA Board of Directors approved a new Code of Ethics and Professionalism in December 2018.
The updated Code is the result of extensive research and consultation with physicians and stakeholders. In total, more than 6,000 comments helped inform the revision, gathered through interviews, surveys, online discussions and in-person events, including the CMA’s annual General Council meetings in August 2017 and 2018.
The Code is one of the oldest documents produced by the CMA and is foundational to the profession. Since its creation in 1868, it’s provided guidance to Canada’s physicians on their obligations to patients and society. It has been periodically revised throughout its history to reflect changes in the medical profession, society and technology.
Some highlights of the new Code:
- Inclusion of professionalism in the title
The name of the Code has been updated to highlight the growing emphasis on medical professionalism and to make a distinction between the core values of the profession and its evolving responsibilities.
- Reintroducing and emphasizing virtues
Virtues centre on the character of a physician; reintroducing them into the Code reaffirms the that they’ve long defined what it means to be an ethical physician. They also complement the fundamental principles outlined in the Code.
- Articulating fundamental commitments
The new Code makes a distinction between professional responsibilities – which physicians are expected to enact, and which can evolve over time − and fundamental commitments, which define the profession, and which physicians should aspire to uphold.
- Emphasizing the patient-physician relationship
The new Code reinforces the importance of the patient-physician relationship. It also addresses the changing nature of both this relationship and medical decision-making.
- Emphasizing new commitments to oneself
The new Code introduces commitments to physician health and wellness, in response to growing evidence linking poor physician health and the impact on patient care.
To read the full CMA Code of Ethics and Professionalism, please click here. | https://www.cma.ca/extensive-consultation-leads-new-cma-code-ethics-and-professionalism |
CBSE’s Proficiency Test dates changed again
Nagpur News: The Central Board of Secondary Education (CBSE) has second time changed the dates of Proficiency Test due to Lok Sabha elections. The CBSE had first changed the dates of Proficiency Test following regional festivities clashing with the dates. The exam dates of April 23 and 24 have been changed for Class X.
The CBSE has changed dates two exams out of five exams. Accordingly, Science Exam, which was earlier scheduled to be held on April 23, will now be held on April 26. Similarly, Social Science Exam, which was earlier scheduled to be held on April 28. Earlier, the Proficiency Test was scheduled to be held from April 14 to 18. But the schedule was changed and it was supposed to be held from April 21 to 25. Now, the exam will be conducted from April 21 to 28. The timing of papers will be from 10.30 am to 1 pm.
CTET RESULTS ON MARCH 21:
The CBSE has made available the OMR answer-sheets of Central Teachers’ Eligibility Test (CTET) online. According to information, the results of CTET are likely to be declared on March 21.
The Class X students generally face difficulties in selection of subjects for further studies. Hence CBSE started Proficiency Test. The Test facilitates Class X students the selection of subjects in their future studies. Whichever subjects the students opt out for further studies, they have to appear for Proficiency Test to assess their capabilities and merit in the subjects.
100-MARK QUESTIONS:
The Proficiency Test assesses students’ reading, writing as well as oral capabilities. The period of exam will be of two and a half hour having optional questions. The question papers will carry 100 marks. The CBSE will distribute certificates to the students that will contain details of their percentile ranks. Questions would be based on Class IX and Class X. In Hindi, the students will be asked questions related to their vocabulary, reading and writing abilities. The Science Test will assess the students’ abilities in experimenting the knowledge in day-to-day life. In Mathematics, students’ capabilities would be assessed. The main aim of Proficiency Test is that the students should utilize the knowledge in their livelihood and the studies should not be only for passing the exams.
Following is the schedule of Proficiency Test: | https://www.nagpurtoday.in/cbses-proficiency-test-dates-changed-again/03192145 |
Due Diligence of Company
Due diligence of a company is usually performed before the business sale, private equity investment, bank loan funding, etc., In the due diligence process, the financial, legal and compliance aspects of the company are usually reviewed and documented. In this article, we review the process for due diligence of a company (Private Limited Company or Limited Company) and provide a checklist for those performing due diligence on a company in India.
A business due diligence is usually performed prior to the purchase of a company or investment in a company by the acquirer or investor (“Buyer”). It is the responsibility of the seller of the business or shares (“Seller”) to provide the documents and information necessary for performing a due diligence on the company to the buyer. A due diligence helps the buyer take an informed investment decision and mitigate risks associated with a business purchase transaction. Both parties usually enter into a non-disclosure agreement prior to starting a business due diligence as sensitive financial, operational, legal and regulatory information would be divulged to the buyer during the due diligence process.
File your MSME 1 Return with the help of Team TAXAJ
It Usually takes 5 to 7 working days.
- Preparation of Due Diligence Report.
- Companies want to get their due diligence done before the business sale, private equity investment, bank loan funding, etc.,
- Company planning to invest or fund a company.
- Purchase the plan
- Share the documents/details as requested by us.
- Prepare the report as required and share it with you.
- Memorandum of Association
- Articles of Association
- Certificate of Incorporation
- Shareholding Pattern
- Financial Statements
- Income Tax Returns
- Bank Statements
- Tax Registration Certificates
- Tax Payment Receipts
- Statutory Registers
- Property Documents
- Intellectual Property Registration or Application Documents
- Utility Bills
- Employee Records
- Operational Records
Understanding Due Diligence
Due diligence became common practice (and a common term) in the United States with the passage of the Securities Act of 1933. With that law, securities dealers and brokers became responsible for fully disclosing material information about the instruments they were selling. Failing to disclose this information to potential investors made dealers and brokers liable for criminal prosecution.
The writers of the act recognized that requiring full disclosure left dealers and brokers vulnerable to unfair prosecution for failing to disclose a material fact they did not possess or could not have known at the time of sale. Thus, the act included a legal defense: as long as the dealers and brokers exercised "due diligence" when investigating the companies whose equities they were selling, and fully disclosed the results, they could not be held liable for information that was not discovered during the investigation.
Documents required during Company Due Diligence
Usually, the following information and documents pertaining to a private limited company or limited company are required for performing due diligence:
- Memorandum of Association
- Articles of Association
- Certificate of Incorporation
- Shareholding Pattern
- Financial Statements
- Income Tax Returns
- Bank Statements
- Tax Registration Certificates
- Tax Payment Receipts
- Statutory Registers
- Property Documents
- Intellectual Property Registration or Application Documents
- Utility Bills
- Employee Records
- Operational Records
Review of MCA Documents
Most of the due diligence of a company starts with the Ministry of Corporate Affairs. On the Ministry of Corporate Affairs website, the master data about a company is made publicly available. Further, with the payment of a small fee, all documents filed with the Registrar of Companies is made available to anyone. This information from the MCA website is usually verified first. The documents and information gathered in this step include:
- Company Information
- Date of Incorporation
- Authorised Capital
- Paid-up Capital
- Date of Last Annual General Meeting
- Date of Last Balance Sheet
- Status of the Company
- Director Information
- Directors of the Company
- Date of Appointment of Directors
- Charges Registered
- Details of Secured Lenders of the Company
- Quantum of Secured Loans
- Documents
- Certificate of Incorporation
- Memorandum of Association
- Articles of Association
In addition to the above, the financial information of the company and other filings with the MCA pertaining to various aspects of the company can be downloaded and reviewed. The review of MCA documents of the company would provide a good overview of the company to the person performing the due diligence.
Review of Articles of Association
It is very important to review the articles of association of a company during the due diligence process to ascertain the different classes of equity shares and their voting rights. The articles of association of a company can restrict the transfer of shares of a company. Thus, the articles of association should be studied carefully to ascertain the procedure for transfer of shares.
Review of Statutory Registers of Company
Under Companies Act, 2013, a private limited company is required to maintain various statutory registers pertaining to share allotment, share transfer, board meetings, the board of directors, etc., Therefore, the statutory registers of a company must be reviewed to obtain and validate information pertaining to directorship and shareholding.
Review of Book of Accounts and Financial Statements
- Verification of bank statements
- Verification and valuation of all assets and liabilities
- Verification of cash flow information
- Verification of all financial statements against transactional information
Review of Taxation Aspects
Taxation aspects of a company must be thoroughly checked during the due diligence process to ensure that there are no unforeseen tax liabilities created on the company in a future date. The following aspects relating to the taxation aspect of a company must be checked:
- Income tax return filed
- Income tax paid
- Calculation of income tax liability by the company
- ESI / PF Returns Filed
- ESI / PF Payments
- ESI / PF Payment Calculation
- Service Tax / VAT Returns Filed
- Service Tax / VAT Payments
- Basis for Service Tax / VAT Payment Calculation
- TDS Returns
- TDS Payments
- TDS Calculations
Review of Legal Aspects
A comprehensive legal audit of the company must be performed by a legal practitioner to ascertain if there are any pending legal actions, suits by or against the company and liability in each. Further, the following aspects must be checked during the legal due diligence:
- Legal due diligence for all real estate properties of the company.
- No objection from Secured Creditor for transfer of the company.
- Verification of court documents and court filings, if any.
Review of Operational Aspects
It is important to obtain a thorough understanding of the business model, business operations and operational information during the due diligence process. The review of operational aspects must be extensive including site visits and employee interviews. Following are aspects that must be covered and documented in the operational aspects review:
- Business Model
- Number of Customers
- Number of Employees
- Production Information
- Vendor Information
- Machinery Information
- Utilities
In addition to the above, based on the business and business model, other operational aspects may be important. Those aspects must be thoroughly checked and documented during the due diligence process.
Types of Due Diligence
Due diligence is performed by equity research analysts, fund managers, broker-dealers, individual investors, and companies that are considering acquiring other companies. Due diligence by individual investors is voluntary. However, broker-dealers are legally obligated to conduct due diligence on a security before selling it.
How to Perform Due Diligence for Stocks
Below are 10 steps for individual investors undertaking due diligence. Most are related to stocks, but, in many cases, they can be applied to bonds, real estate, and many other investments.
After those 10 steps, we offer some tips when considering an investment in a startup company.
All of the information you need is readily available in the company's quarterly and annual reports and in the company profiles on financial news and discount brokerage sites.
Step 1: Analyse the Capitalisation of the Company
A company’s market capitalisation, or total value, indicates how volatile the stock price is, how broad its ownership is, and the potential size of the company's target markets. Large-cap and mega-cap companies tend to have stable revenue streams and a large, diverse investor base, which tends to lead to less volatility. Mid-cap and small-cap companies typically have greater fluctuations in their stock prices and earnings than large corporations.
Step 2: Revenue, Profit, and Margin Trends
The company's income statement will list its revenue or its net income or profit. That's the bottom line. It's important to monitor trends over time in a company's revenue, operating expenses, profit margins, and return on equity. The company's profit margin is calculated by dividing its net income by its revenue. It's best to analyse profit margin over several quarters or years and compare those results to companies within the same industry to gain some perspective.
Step 3: Competitors and Industries
Now that you have a feel for how big the company is and how much it earns, it's time to size up the industry in which it operates and its competition. Every company is defined in part by its competition. Due diligence involves comparing the profit margins of a company with two or three of its competitors.
For example, questions to ask are: Is the company a leader in its industry or its specific target markets? Is the company's industry growing?
Performing due diligence on several companies in the same industry can give an investor significant insight into how the industry is performing and which companies have the leading edge in that industry.
Step 4: Valuation Multiples
Many ratios and financial metrics are used to evaluate companies, but three of the most useful are the price-to-earnings (P/E) ratio, the price/earnings to growth (PEGs) ratio, and price-to-sales (P/S) ratio. These ratios are already calculated for you on websites such as Yahoo! Finance.
As you research ratios for a company, compare several of its competitors. You might find yourself becoming more interested in a competitor.
- The P/E ratio gives you a general sense of how much expectation is built into the company's stock price. It's a good idea to examine this ratio over a few years to make sure that the current quarter isn't an aberration.
- The price-to-book (P/B) ratio, the enterprise multiple, and the price-to-sales (or revenue) ratio measure the valuation of the company in relation to its debt, annual revenues, and balance sheet. Peer comparison is important here because the healthy ranges differ from industry to industry.
- The PEG ratio suggests expectations among investors for the company's future earnings growth and how it compares to the current earnings multiple. Stocks with PEG ratios close to one are considered fairly valued under normal market conditions.
Step 5: Management and Share Ownership
Is the company still run by its founders, or has the board shuffled in a lot of new faces? Younger companies tend to be founder-led. Research the bios of management to find out their level of expertise and experience. Bio information can be found on the company's website.
P/E ratio
The P/E ratio gives a sense of the expectations that investors have for the stock's near-term performance.
Whether founders and executives hold a high proportion of shares and whether they have been selling shares recently is a significant factor in due diligence. High ownership by top managers is a plus, and low ownership is a red flag. Shareholders tend to be best served when those running the company have a vested interest in stock performance.
Step 6: Balance Sheet
The company's consolidated balance sheet will show its assets and liabilities as well as how much cash is available.
Check the company's level of debt and how it compares to others in the industry. Debt is not necessarily a bad thing, depending on the company's business model and industry. But make sure those debts are highly rated by the rating agencies.
Some companies and whole industries, like oil and gas, are very capital intensive while others require few fixed assets and capital investment. Determine the debt-to-equity ratio to see how much positive equity the company has. Typically, the more cash a company generates, the better an investment it's likely to be because the company can meet its debts and still grow.
If the figures for total assets, total liabilities, and stockholders' equity change substantially from one year to the next, try to figure out why. Reading the footnotes that accompany the financial statements and the management's discussion in the quarterly or annual reports can shed light on what's really happening in a company. The firm could be preparing for a new product launch, accumulating retained earnings, or in a state of financial decline.
Step 7: Stock Price History
Investors should research both the short-term and long-term price movements of the stock and whether the stock has been volatile or steady. Compare the profits generated historically and determine how it correlates with the price movement.
Keep in mind that past performance does not guarantee future price movements. If you're a retiree looking for dividends, for example, you might not want a volatile stock price. Stocks that are continuously volatile tend to have short-term shareholders, which can add extra risk for certain investors.
Step 8: Stock Dilution Possibilities
Investors should know how many shares outstanding the company has and how that number relates to the competition. Is the company planning on issuing more shares? If so, the stock price might take a hit.
Step 9: Expectations
Investors should find out what the consensus of Wall Street analysts is for earnings growth, revenue, and profit estimates for the next two to three years. Investors should also look for discussions of long-term trends affecting the industry and company-specific news about partnerships, joint ventures, intellectual property, and new products or services.
Step 10: Examine Long and Short-Term Risks
Be sure to understand both the industry-wide risks and company-specific risks. Are there outstanding legal or regulatory matters? Is there unsteady management?
Investors should play devil's advocate at all times, picturing worst-case scenarios and their potential outcomes on the stock. If a new product fails or a competitor brings a new and better product forward, how would this affect the company? How would a jump in interest rates affect the company?
Once you've completed the steps outlined above, you'll have a better sense of the company's performance and how it stacks up to the competition. You will be better informed to make a sound decision.
Special Considerations
In the mergers and acquisitions (M&A) world, there is a delineation between "hard" and "soft" forms of due diligence.
"Hard" due diligence is concerned with the numbers. "Soft" due diligence is concerned with the people within the company and in its customer base.
In traditional M&A activity, the acquiring firm deploys risk analysts who perform due diligence by studying costs, benefits, structures, assets, and liabilities. That's known colloquially as hard due diligence.
Increasingly, however, M&A deals are also subject to the study of a company's culture, management, and other human elements. That's known as soft due diligence.
Hard due diligence, which is driven by mathematics and legalities, is susceptible to rosy interpretations by eager salespeople. Soft due diligence acts as a counterbalance when the numbers are being manipulated or overemphasized.
There are many drivers of business success that numbers cannot fully capture, such as employee relationships, corporate culture, and leadership. When M&A deals fail, as more than 50% of them do, it is often because the human element is ignored.
The contemporary business analysis calls this element human capital. The corporate world started taking notice of its significance in the mid-2000s. In 2007, the Harvard Business Review dedicated part of its April issue to what it called "human capital due diligence," warning that companies ignore it at their peril
Performing Hard Due Diligence
In an M&A deal, hard due diligence is the battlefield of lawyers, accountants, and negotiators. Typically, hard due diligence focuses on earnings before interest, taxes, depreciation and amortization (EBITDA), the aging of receivables, and payables, cash flow, and capital expenditures.
In sectors such as technology or manufacturing, additional focus is placed on intellectual property and physical capital.
Other examples of hard due diligence activities include:
- Reviewing and auditing financial statements
- Scrutinizing projections for future performance
- Analyzing the consumer market
- Seeking operating redundancies that can be eliminated
- Reviewing potential or ongoing litigation
- Reviewing antitrust considerations
- Evaluating subcontractor and other third-party relationships
Performing Soft Due Diligence
Conducting soft due diligence is not an exact science. It should focus on how well a targeted workforce will mesh with the acquiring corporation's culture.
Hard and soft due diligence intertwine when it comes to compensation and incentive programs. These programs are not only based on real numbers, making them easy to incorporate into post-acquisition planning, but they can also be discussed with employees and used to gauge cultural impact.
Soft due diligence is concerned with employee motivation, and compensation packages are specifically constructed to boost those motivations. It is not a panacea or a cure-all, but soft due diligence can help the acquiring firm predict whether a compensation program can be implemented to improve the success of a deal.
Soft due diligence can also concern itself with the target company's customers. Even if the target employees accept the cultural and operational shifts from the takeover, the target customers and clients may well resent a change in service, products, or procedures. This is why many M&A analyses now include customer reviews, supplier reviews, and test market data. | https://www.taxaj.com/due-diligence-of-company |
Mass extinction theory attributes the extinction of living organism to collision of extraterrestrial objects such as asteroids with the Earth.
The collision results into drastic climatic change due to suspended clouds of dusts that affects radiation from the sun. Drastic and intermittent occurrence of meteors and asteroid resulted to a gradual loss of living organisms during the course of the Earth’s history. The most credible example giving plausible explanation regarding mass extinction is the dinosaur extinction, which occurred approximately 65 million years ago. Rogers claims that, “…basic experiments have been done, and it seems clear that the iridium came from an extraterrestrial source within the solar system” (25). However, debate concerning dinosaur extinction still rages.
The massive impact of extraterrestrial objects did not cause mass extinction of dinosaurs. The extinction of dinosaur may not have occurred due to drastic impact of meteors and asteroids since the probability of extraterrestrial objects to occur in future is quite negligible. “Astronomers theorized that the Oort cloud of comets could cross the path of our solar system every 26 million years, and would possibly rain comets on our planet for a few million years” (Waldner 19). This prediction has not happened and it seems it will never happen.
Dinosaur basis of mass extinction theory do not give plausible explanation for extraterrestrial bodies since they occurred only once during the period of dinosaurs and there is no possibility of future occurrence. If there was subsequent occurrence of extraterrestrial bodies and concomitant loss of living organism, then this theory would be valid, but since the occurrence is indefinite, extraterrestrial bodies did not cause extinction of dinosaurs. Selective extinction is another line of evidence that disapproves the dominant theory of dinosaur extinction. If the great impact of extraterrestrial bodies’ collision with Earth resulted into drastic climatic change, then under what mechanism did selective extinction occur? There is no credible explanation of the mechanisms surrounding extinction and survival of organisms. The theory concentrates on extinction without giving plausible explanation of the survival mechanism of the other organisms. Moreover, extinction studies focus on dinosaur extinction alone and extrapolated findings, and may be, other organism did not undergo mass extinction as claimed. Joblonski argues that, “lack of understanding of the physiology of dinosaurs makes the issue more complex; if they were endothermic, why did they not survive like birds and mammals? If they were ectothermic, why did small dinosaurs not survive like small reptiles? (205). Hence, the mechanism of survival or extinction remains insufficient in explaining the nature of mass extinction.
In the determination and dating of the occurrence of extraterrestrial bodies, iridium deposits on the rock surface gives substantial evidence. Iridium originates from the solar system and their sedimentation on the rock surfaces signifies the occurrence of the extraterrestrial bodies. However, “a new study has challenged the theory by claiming that those supposed clues are nothing more than fossilized balls of fungus, charcoal, and fecal pellets” (Rogers 34). The evidence shows that even organic matter that occur naturally on Earth when subjected to cycles of fire can produce iridium, which is a fossil complex. Therefore, fossils records have proved that fungal sediments are ubiquitous and their presence over a long period of history under intermittent fire out brakes transformed them into cretaceous fossils.
Therefore, based on the evidence gathered in this research paper, the extinction of dinosaurs did not result from a massive impact event.
Joblonski, David. “Mass Extinctions and Macroevolution.
” Paleobiology 31.2 (2005): 192–210. Print. Rogers, Phila.
“Berkeley Scientists Report First Evidence that Dinosaur Extinction Caused by Meteorite Impact.” Science Archive Journal 3.2 (1979): 23-39.
Print. Waldner, David. “Inferences and Explanations at the K/T Boundary…and Beyond.
” Theory and Evidence 6.4 (2003): 1- 38. Print.
Hi!
I'm Simon! | https://graceplaceofwillmar.org/hazard-from-space/ |
In a newly published collection, editor Daniel Morat and his contributors approach historical analysis in an uncommon way — by using their sense of hearing. The authors examine the way modern history sounds in Sounds of Modern History: Auditory Cultures in 19th- and 20th-Century Europe. Following, the editor gives a brief introduction and shares an excerpt from his chapter. The excerpt is accompanied by a recording from 1914 Germany.
_______________________________
When Europe went to war in the summer of 1914, scenes of vociferous war enthusiasm have been reported from many European cities. Historiographic research of the last twenty years has shown that these scenes were not representative of the general mood in the warring nations. Still, they have long dominated our perception of the outbreak of World War I.
Why have the images of the war-excited crowds been so influential in the memory and historiography of the war? Because these crowds not only produced images, but also sounds that already at the time drowned out the voices of those opposed to the war.
This is the argument of my own chapter in “Sounds of Modern History. Auditory Cultures in 19th– and 20th-Century Europe,” which examines the role of collective singing and cheering in the streets of Berlin in July and August 1914. By so doing, the chapter hopes to contribute to a better understanding of the mechanisms of political mobilization and of historical perception. It is one example of how studying sounds in history can add to our comprehension of supposedly well-known historical phenomena. The other twelve chapters present other examples, from 19th-century literature and science to 20th-century media and war experience.
The mobilization in the summer of 1914 has only been captured in written reports and photographs, but a year later, a studio recording has recreated the mobilization sonically. In the following excerpt from my chapter on “Acoustic Mobilization and Collective Affects at the Beginning of World War I,” I briefly discuss this recording. You can also listen to an excerpt of the recording (courtesy of the Deutsche Grammophongesellschaft).
Click to listen: Mobilmachung 1914
“The special affective quality of acoustic mobilization was also exploited for propaganda and commercial purposes. In 1915, for example, the Deutsche Grammophongesellschaft produced a number of Hörbilder (sound scenes), as they are called, which it marketed as ‘patriotic zonophone recordings’ (vaterländische Zonophonaufnahmen—the zonophone was a device that competed with the gramophone). These Hörbilder involved scenes that were reenacted acoustically in the studio and can be considered the predecessors of the later radio plays. Alongside scenes such as ‘The Storming of Liège’ (‘Die Erstürmung von Lüttich’) and ‘Welcoming U 21’ (‘Begrüßung der U 21’—the submarine U 21 sank the British cruiser HMS Pathfinder on 5 September 1914), these patriotic recordings also included one with the title ‘The Mobilization of 1 August 1914’ (‘Die Mobilmachung am 1. August 1914’). In it, we hear first the address of a mayor to a departing regiment at the railway station. His address gives way to shouts of ‘hurrah’ and the collective singing of the ‘Wacht am Rhein,’ accompanied by a military band. Further shouts of ‘hurrah’ and the response of the regimental commander follow, then cheers to the Kaiser and ‘Heil dir im Siegerkranz,’ and finally a tangle of voices, the sounds of the train as it leaves, fanfares, and a final song, ‘Muss i denn, muss i denn zum Städtele hinaus.’
“As it is a reenactment after the event, the value of this recording as a source is problematic. It does not, of course, provide an authentic reproduction of the mood of August 1914. But we can see in it something resembling a retrospectively constructed prototype for the patriotic demonstrations and ceremonies for departing troops in August 1914, one that contains all the elements with which we are familiar from the newspaper reports: speeches, shouts and cheers, and patriotic songs. The interpretation proposed here is not necessarily concerned with how real the patriotic emotions of the singing and cheering actors in this recording were, or with how ‘authentic’ the scene they portrayed can claim to be; what it does provide, though, is a document of the significance of acoustic mobilization in August 1914, which, it was assumed, would still be able to arouse patriotic feelings in later listeners to the zonophone.”
________________________________
Daniel Morat is a Research Fellow and Lecturer in the History Department of the Free University Berlin. He currently holds a Dilthey Fellowship from the Fritz Thyssen Foundation, and since 2012 has directed the international research network “Auditory Knowledge in Transition: An Epistemic History of Listening in Modernity.” His publications include Von der Tat zur Gelassenheit. Konservatives Denken bei Martin Heidegger, Ernst Jünger und Friedrich Georg Jünger 1920-1960 (Göttingen 2007). | https://berghahnbooks.com/blog/hearing-history |
NatCen’s Methodology & Innovation Hub is a collective of highly skilled experts in social research methodology and practice, led by Gerry Nicolaas.
The Hub provides independent advice on the design, conduct and analysis of social research.
Leading the UK in the collection of bio-measures in household surveys
Synthesising different forms of evidence to create accessible policy insights
Bringing deliberative research online to engage the public on key policy issues
17 Sept 2021
The GenPopWeb2 network is hosting the final event in its series on COVID-19 and transitioning to online data collection in social surveys. The free virtual event, at 15:00 on 17 September, will comprise four presentations from experts who will showcase current evidence, experiences and approaches.
10 June 2021
Research Director Curtis Jessop has a new paper on linking Twitter and survey data, examining the amount of social media data available to link to surveys. The paper is based on research funded by the UK Economic and Social Research Council, involving colleagues at the Universities of Cardiff, Essex and Mannheim (Germany).
19 Feb 2021
GenPopWeb2 is an ESRC-funded network of UK-based academic and non-academic partners to share knowledge and collaborate in the area of online data collection in social surveys. The network is led by Olga Maslovskaya (University of Southampton), Lisa Calderwood (UCL), Laura Wilson (ONS) and Gerry Nicolaas (NatCen).
15 Jan 2021
NEW BLOG: Natasha Phillips, researcher in the Methodology & Innovation Hub and questionnaire design expert, discusses how video interviewing has proved to be an excellent option for testing questionnaires during the pandemic, and one that can be utilised alongside more conventional modes now and in the future.
13 Jan 2021
The latest edition of the SRA journal Social Research Practice includes an article looking at How should we present ‘don’t know’ options in self-completion surveys? Lessons from three experiments (pdf), co-authored by Bernard Steen.
12 Jan 2021
Our Director of NatCen Learning, Debbie Collins, has written a quick start guide for the NCRM on planning to teach social research methods online - guiding principles. Find out more about the online courses that NatCen Learning can offer.
28 Dec 2020
In an article for the SRA Research Matters magazine, Kirsty Cole from NatCen and Erica Wong from UCL describe the results of a small-scale feasibility study testing the use of computer-assisted video interviewing on the Age 50 Survey of the 1970 British Cohort Study (BCS70).
21 August 2020
NEW BLOG: Martin Wood, NatCen's Director of Longitudinal Surveys, discusses how the UK’s longitudinal social research studies have stepped forward to offer a means of understanding the Covid-19 outbreak’s impact on work, family life, wellbeing and health-related behaviour.
7 July 2020
Ceri Davies speaks to Impact Magazine about bringing deliberative research online, for an article on the rise of citizens’ assemblies and the future of deliberation.
14 April 2020
NEW BLOG: How do we best adapt social survey questionnaires for the era of online data collection? As @GerryNicolaas explains, success lies in going back to the basics. This article first appeared in @TheSRAOrg’s Research Matters magazine
28 February 2020
New ESRC-funded @GenPopWeb2 network, involving NatCen with researchers from University College London, University of Southampton and the Office for National Statistics aims to develop knowledge and practice in relation to transitioning face-to-face surveys to online data collection.
10 December 2019
Ceri Davies and Anna Marcinklewicz run a workshop on Digital deliberations: creating a tool for thoughtful democracy? at the Social Research Association Annual Conference
18 July 2019
Anne Connolly presents paper at European Survey Research Association conference, July 2019 Overweight & obesity within households: An exploration using objective physical measurements and subjective self-assessments from the Health Survey for England
21 June 2019
Head of Methods, Gerry Nicolaas, delivers keynote address to the 2019 Future of Online Data Collection in Social Surveys international conference Online data collection for social surveys: back to basics.
Our reports on research funded by the Economic and Social Research Council are available for download as pdfs:
Joanna D’Ardenne, Martin Wood and Bruno Pacchiotti: Considering alternative fieldwork designs for a biennial face-to-face longitudinal survey
Gerry Nicolaas, Emma Corteen and Byron Davies: The use of incentives to recruit and retain hard-to-get populations in longitudinal studies
Curtis Jessop, Dave Hussey, Klaudia Lubian and Martin Wood: Using a targeted design and R-indicators to enhance sample quality in a web-CATI longitudinal study
Next webinar:
Measuring disasters - The role of self-report surveys, geospatial linkage and citizen science approaches with Ben Edwards, Senior Fellow at the Australian National University Centre for Social Research and Methods,.on 28 October
Latest recording:
What was done to adapt the General Social Survey in 2020? with René Bautista, Principal Research Scientist, National Opinion Research Center, University of Chicago, and director of the General Social Survey.on 13 October
#Methodsem shares findings from the latest methodological research projects and discusses current issues in survey methodology. The seminar series is a joint initiative between NatCen, the European Social Survey ERIC and City University (London).
Recordings of past seminars are available here and on YouTube.
Through NatCen Learning, we run short courses for the Social Research Association, National Centre for Research Methods, and for a range of organisations wanting bespoke training.
We also work with UK Q-Step centres, providing work placements for their students. | https://www.natcen.ac.uk/methodology-and-innovation-hub/ |
CHICAGO (AP) A federal judge in California has ruled that three Illinois men can proceed with their class-action lawsuit challenging Facebook’s facial recognition software used to identify people in uploaded photos.
Adam Pezen, Carlo Licata and Nimesh Patel, all of the Chicago area, separately sued the social media giant last year, the Chicago Tribune reported (http://trib.in/1USAw5s ). The cases were combined and transferred last summer to the Northern District of California court.
The men allege that Facebook was illegally collecting biometric data from people “tagged” in photos posted by other users and that its use of facial recognition software violates Illinois’ Biometric Information Privacy Act.
In 2008, Illinois enacted the Biometric Information Privacy Act to regulate how individuals, companies and organizations can collect and use biometric data, which determine a person’s identity based on unique biological or physical characteristics. According to the law, no private entity can gather and keep a person’s biometric information without prior notification to and written permission from that person.
The trio argues that they never gave permission to Facebook to collect their biometric information when someone “tagged” them in a photo, which allows the software to memorize their facial features and prompt users to identify them in other images.
Judge James Donato ruled May 5 that the men made a valid complaint and can continue to trial. He denied Facebook’s motions to dismiss the case.
Facebook declined to comment on the lawsuit but said users are able to disable the “tag suggestions” feature on their profiles at any time.
A conference for the case will be held next month. | https://www.redbluffdailynews.com/2016/05/11/california-judge-allows-illinois-facebook-lawsuit-to-proceed/ |
Purpose & Overall Duties:
- Assists Occupational Therapist in administering occupational therapy program in Long Term Care facility for physically, developmentally, mentally retarded, or emotionally handicapped patients.
- Assists in reporting of patient’s daily living skills and capacities to determine extent of abilities and limitations
- Assists in planning and implementing educational, vocational, and recreational programs and activities established by registered Occupational Therapist designed to restore, reinforce, and enhance task performances, diminish or correct pathology, and to promote and maintain health and self-sufficiency
Patient Care
- Carries out Occupational Therapist’s established plan of care for individuals or group treatment as appropriate.
- May teach basic living skills
- Designs and adapts equipment and working-living environment
- Fabricates splints and other assistive devices
- Assists in instructing patient and family in home programs as well as care and use of adaptive equipment
Documentation/ Logistics/ Patient Satisfaction
- Completes all Medicare and company required documentation per guidelines and in a timely manner.
- Is competent in use of a computer program for clinical documentation.
- Prepares work materials, assists in maintenance of equipment, and orders supplies
- May be responsible for maintaining observed information in client records and preparing reports
- Responsible for achieving patient satisfaction, reporting and maintaining appropriate quality indicator measures for the department/ facility and complying with productivity standards set by Essential Rehab Solutions.
Supervisory time with OT/ Collaboration with Team Members
- Reports information and observations to supervisor
- Responsible for collaboration with other team members regarding each patient’s current status / POC as needed.
Personal Development
- Must comply with Medicare guidelines & State requirement for licensure
- Attend continuing education courses approved by the state and in your appropriate field with frequency according to state regulations.
- Personal development in assuring evidence based practice in the LTC setting.
General Skills Required:
- Establishing and Maintaining Interpersonal Relationships- Developing constructive and cooperative working relationships with others, and maintaining them over time.
- Training and Teaching Others –Identifying the educational needs of others, developing formal educational or training programs or classes, and teaching or instructing others.
- Making Decisions and Solving Problems – Analyzing information and evaluating results to choose the best solution and solve problems.
- Communicating with Supervisors, Peers, or Subordinates – Providing information to supervisors, co-workers, and subordinates by telephone, in written form, email, or in person effectively.
- Time management- Managing one’s own time and the time of others.
- Social Perceptiveness- Being aware of others’ reactions and understanding why they react as they do.
- Active Listening- Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
- Performing General Physical Activities- Performing physical activities that require considerable use of your arms and legs and moving your whole body, such as climbing, lifting, balancing, walking, stooping, and handling of materials.
Minimum Experience, Education, and Licensure:
- Associates Degree in Occupational Therapy
- 1 year Preferred Experience
- Maintain current licensure
Physical Demands:
- Lifting from ground level, waist level, and/or overhead;
- Standing, sitting, walking, pushing, pulling, bending, kneeling , crouching/squatting and driving
- Must be able to lift at least 100 lbs.; Using proper body mechanics
Work Environment: | https://www.essentialrs.com/careers/occupational-therapist-assistant/ |
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
The present application relates generally to an improved data processing apparatus and method and more specifically to mechanisms for detecting and rectifying annotation collisions in a question and answer system.
With the increased usage of computing networks, such as the Internet, humans are currently inundated and overwhelmed with the amount of information available to them from various structured and unstructured sources. However, information gaps abound as users try to piece together what they can find that they believe to be relevant during searches for information on various subjects. To assist with such searches, recent research has been directed to generating Question and Answer (QA) systems which may take an input question, analyze it, and return results indicative of the most probable answer to the input question. QA systems provide automated mechanisms for searching through large sets of sources of content, e.g., electronic documents, and analyze them with regard to an input question to determine an answer to the question and a confidence measure as to how accurate an answer is for answering the input question.
One such QA system is the Watson™ system available from International Business Machines (IBM) Corporation of Armonk, N.Y. The Watson™ system is an application of advanced natural language processing, information retrieval, knowledge representation and reasoning, and machine learning technologies to the field of open domain question answering. The Watson™ system is built on IBM's DeepQA™ technology used for hypothesis generation, massive evidence gathering, analysis, and scoring. DeepQA™ takes an input question, analyzes it, decomposes the question into constituent parts, generates one or more hypothesis based on the decomposed question and results of a primary search of answer sources, performs hypothesis and evidence scoring based on a retrieval of evidence from evidence sources, performs synthesis of the one or more hypothesis, and based on trained models, performs a final merging and ranking to output an answer to the input question along with a confidence measure.
Various United States Patent Application Publications describe various types of question and answer systems. U.S. Patent Application Publication No. 2011/0125734 discloses a mechanism for generating question and answer pairs based on a corpus of data. The system starts with a set of questions and then analyzes the set of content to extract answer to those questions. U.S. Patent Application Publication No. 2011/0066587 discloses a mechanism for converting a report of analyzed information into a collection of questions and determining whether answers for the collection of questions are answered or refuted from the information set. The results data are incorporated into an updated information model.
In one illustrative embodiment, a method, in a data processing system comprising a processor and a memory, for resolving annotation conflicts in a portion of content. The method comprises receiving, in the data processing system, a portion of content for annotating and performing, by the data processing system, annotation operations on the portion of content using a plurality of annotators. Each annotator in the plurality of annotators generates a set of annotations for the portion of content, thereby generating a plurality of sets of annotations for the portion of content. The method further comprises analyzing, by the data processing system, the plurality of sets of annotations for the portion of content to identify a conflict between a first annotation and a second annotation in the plurality of sets of annotations. Moreover, the method comprises resolving, by the data processing system, the conflict between the first annotation and the second annotation to generate a resultant set of annotations for the portion of content. In addition, the method comprises storing, by the data processing system, the resultant set of annotations in an annotations data structure associated with the portion of content.
In other illustrative embodiments, a computer program product comprising a computer useable or readable medium having a computer readable program is provided. The computer readable program, when executed on a computing device, causes the computing device to perform various ones of, and combinations of, the operations outlined above with regard to the method illustrative embodiment.
In yet another illustrative embodiment, a system/apparatus is provided. The system/apparatus may comprise one or more processors and a memory coupled to the one or more processors. The memory may comprise instructions which, when executed by the one or more processors, cause the one or more processors to perform various ones of, and combinations of, the operations outlined above with regard to the method illustrative embodiment.
These and other features and advantages of the present invention will be described in, or will become apparent to those of ordinary skill in the art in view of, the following detailed description of the example embodiments of the present invention.
In a question answer and answer (QA) system, such as the Watson™ QA system previously mentioned above, numerous annotators are used to analyze the input questions and the corpus of documents and other data used as a basis for generating answers to the input questions. An annotator is a program that takes a portion of input text, extracts structured information from it, and generates annotations, or metadata, that are attached by the annotator to the source/original text data. The term “annotation” refers to the process followed by the annotator and the resulting metadata that provides elements of structure that can be referenced or acted upon by other programs, annotators, or the like, that read and understand the annotated text data. Annotators may comprise logic configured in many different ways and for many different purposes. In general, annotators may look for particular words, combinations of words, perform context analysis for words, and the like, to identify the types of words in a portion of text, their purpose within the portion of text, e.g., parts of speech, types of information sought or being provided, and the like. Annotators may be generic, e.g., identifying nouns, names of persons, places, dates, etc., or specific to a particular purpose (e.g., identifying medical terms) or domain (e.g., identifying questions/content directed to pancreatic cancer diagnosis and treatment).
QA systems may be generic in nature or customized for a particular domain or subset of domains. A “domain” in the context of QA systems and the present description is a concept area, e.g., sports, financial industry, medical industry, legal concepts, etc. Domains may be defined at various granularities such that one domain may be a subset of a larger domain. For example, one domain may be “medical”, a sub-domain may be “cancer”, a sub-sub-domain may be “diagnosis and treatment,” and yet another sub-sub-sub-domain may be “pancreatic cancer.” QA systems may be configured to handle questions and provide answers of a particular domain or set of domains and sub-domains, possibly using a corpus of information that is specifically for that particular domain/sub-domains, e.g., medical records, journals, publications, etc. In such a case the QA system is trained specifically for the particular domains/sub-domains that it is intended to handle, including providing the QA system with annotators that are configured and trained for the particular domains/sub-domains.
Alternatively, a QA system may be more generic in nature such that it is configured to handle questions that may be directed to any domain or a large group of related and unrelated domains. In such a case, the QA system may have many different annotators that are configured to perform annotation operations either generically or with regard to a variety of different domains/sub-domains that may not be related to one another. As such, one annotator may annotate a question or portion of content in one way based on its particular configuration and training while another annotator may annotate the same question or portion of content in a different manner based on its different configuration and training. This provides an opportunity for annotations of the same question or portion of content to conflict with one another. That is, since multiple annotators are all running on the same source text, being it an input question or portion of content, the different annotators may annotate the same terms in the source text as being different elements, and these differences may conflict with one another, i.e. there may be annotation collisions.
Such annotation collisions may lead to degradation in the performance of the QA system. That is, such annotation collisions may cause the confidence scoring associated with the answers generated by the QA system to be skewed. For example, if a question directed to a medical issue is submitted and a term in the question is recognized by a medical annotator as requesting a symptom of an illness, but an annotator directed to a different industry, or a general annotator, recognizes the same term to be directed to a type of financial condition, then the second annotator may negatively impact the way in which the question is interpreted by the QA system and the types of candidate answers returned by the QA system. This will be expanded upon further hereafter with the description of the mechanisms of the illustrative embodiments.
The illustrative embodiments provide mechanisms for identifying conflicts between annotations and either automatically selecting an appropriate annotation for a specifying domain or presenting conflict information to a user for user feedback and input as to how to rectify the detected collision. The illustrative embodiments detect and determine the domain of an input question and then filter out annotations that have collisions and conflicts based on the determined domain using a computer learning model, stored historical use of an annotation, and term metadata. In one illustrative embodiment, term parts of speech information, annotation metadata, and the like, are used to identify a conflict level and then, based on the context and the sentence structure, a formula may be used to determine which annotations should be removed using thresholds and the like. These annotations may then be removed from consideration by scorer mechanisms, merger mechanisms, and the like, of a QA system to thereby improve their performance. That is, the illustrative embodiments essentially implement a domain-sensitive noise filter for a general purpose QA system pipeline. Furthermore, within the operation of the illustrative embodiments, annotators provide more meaning to their annotations since they can be correlated with a specific domain making them more distinct when used in a QA system pipeline.
In order to implement the annotation conflict identification and resolution mechanisms of the illustrative embodiments, the illustrative embodiments implement a domain determination engine that determines the domain to which an input question is directed based on the operation of annotators on the input question. That is, the input question is parsed and provided to a plurality of annotators which each operate on the input question according to their own individual logic and configurations to generate annotations for the terms in the input question. These annotators may be generic annotators looking for particular types of terms, e.g., nouns, verbs, places, dates, times, or the like, patterns of terms, etc. These annotators may further be programmed and configured for specific domains, such as health care terms, disease diagnosis terms, financial terms, legal terms, or patterns of terms within a particular domain, for example. Thus, each term in the input question may have separate sets of annotations for the various annotators that generate annotations for that particular term. Or, looking at it another way, a separate set of annotations for the input question is generated by each of the annotators that operate on the input question.
Based on the annotations generated by the various annotators for the various terms in the question, and the confidence scores associated with the annotations that are generated, the domain determination engine determines what the domain of the input question is. Alternatively, when the input question is received, a user may be prompted to identify the domain of the question and this selection of the domain may be used as a basis for performing annotation conflict resolution. In still a further illustrative embodiment, if the operation of the illustrative embodiments is being applied to a portion of content from a corpus of documents, for example, then metadata associated with the source of the portion of the content may be used to identify the domain for the portion of content. Of course, any combination of these may also be used as well to identify the domain of the particular portion of text being analyzed by the mechanisms of the illustrative embodiments.
The sets of annotations generated by the various annotators operating on the input question, or portion of content if the mechanisms are applied to other content other than an input question are checked to see if any of the annotations for a particular term conflict with one another. If a conflict is present, then a reverse lookup of the term in a language model for the particular identified domain of the input question/portion of content is performed, and/or a lookup of a matching term usage in a domain specific corpora is made. If a match of the term, and its associated annotation, is found in the domain specific language model or domain specific corpora is found, and the matching usage of the term meets certain predetermined criteria, then the annotation is considered relevant and is maintained while other conflicting annotations are eliminated and is not used by later down-stream portions of the QA system pipeline. In this way, domain specific filtering of annotations is performed in a QA system pipeline so as to improve the overall performance of the QA system.
The above aspects and advantages of the illustrative embodiments of the present invention will be described in greater detail hereafter with reference to the accompanying figures. It should be appreciated that the figures are only intended to be illustrative of exemplary embodiments of the present invention. The present invention may encompass aspects, embodiments, and modifications to the depicted exemplary embodiments not explicitly shown in the figures but would be readily apparent to those of ordinary skill in the art in view of the present description of the illustrative embodiments.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method, or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in any one or more computer readable medium(s) having computer usable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be a system, apparatus, or device of an electronic, magnetic, optical, electromagnetic, or semiconductor nature, any suitable combination of the foregoing, or equivalents thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical device having a storage capability, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber based device, a portable compact disc read-only memory (CDROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain or store a program for use by, or in connection with, an instruction execution system, apparatus, or device.
In some illustrative embodiments, the computer readable medium is a non-transitory computer readable medium. A non-transitory computer readable medium is any medium that is not a disembodied signal or propagation wave, i.e. pure signal or propagation wave per se. A non-transitory computer readable medium may utilize signals and propagation waves, but is not the signal or propagation wave itself. Thus, for example, various forms of memory devices, and other types of systems, devices, or apparatus, that utilize signals in any way, such as, for example, to maintain their state, may be considered to be non-transitory computer readable media within the scope of the present description.
A computer readable signal medium, on the other hand, may include a propagated data signal with computer readable program code embodied therein, for example, in a baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Similarly, a computer readable storage medium is any computer readable medium that is not a computer readable signal medium.
Computer code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, radio frequency (RF), etc., or any suitable combination thereof.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java™, Smalltalk™, C++, or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to the illustrative embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions that implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus, or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
FIGS. 1-5
Thus, the illustrative embodiments may be utilized in many different types of data processing environments. are directed to describing an example Question/Answer, Question and Answer, or Question Answering (QA) system, methodology, and computer program product with which the mechanisms of the illustrative embodiments may be implemented. As will be discussed in greater detail hereafter, the illustrative embodiments may be integrated in, and may augment and extend the functionality of, these QA mechanisms with regard to clustering questions based on identified attributes of the questions for purposes of training the QA system and/or identifying a confidence that a subsequently submitted question is likely to be answered correctly based on how well the question matches a previously defined question cluster generated during training.
FIGS. 1-5
FIGS. 1-5
Thus, it is important to first have an understanding of how question and answer creation in a QA system may be implemented before describing how the mechanisms of the illustrative embodiments are integrated in and augment such QA systems. It should be appreciated that the QA mechanisms described in are only examples and are not intended to state or imply any limitation with regard to the type of QA mechanisms with which the illustrative embodiments may be implemented. Many modifications to the example QA system shown in may be implemented in various embodiments of the present invention without departing from the spirit and scope of the present invention.
QA mechanisms operate by accessing information from a corpus of data or information (also referred to as a corpus of content), analyzing it, and then generating answer results based on the analysis of this data. Accessing information from a corpus of data typically includes: a database query that answers questions about what is in a collection of structured records, and a search that delivers a collection of document links in response to a query against a collection of unstructured data (text, markup language, etc.). Conventional question answering systems are capable of generating answers based on the corpus of data and the input question, verifying answers to a collection of questions for the corpus of data, correcting errors in digital text using a corpus of data, and selecting answers to questions from a pool of potential answers, i.e. candidate answers.
Content creators, such as article authors, electronic document creators, web page authors, document database creators, and the like, may determine use cases for products, solutions, and services described in such content before writing their content. Consequently, the content creators may know what questions the content is intended to answer in a particular topic addressed by the content. Categorizing the questions, such as in terms of roles, type of information, tasks, or the like, associated with the question, in each document of a corpus of data may allow the QA system to more quickly and efficiently identify documents containing content related to a specific query. The content may also answer other questions that the content creator did not contemplate that may be useful to content users. The questions and answers may be verified by the content creator to be contained in the content for a given document. These capabilities contribute to improved accuracy, system performance, machine learning, and confidence of the QA system.
FIG. 1
100
102
100
104
102
102
104
100
102
100
depicts a schematic diagram of one illustrative embodiment of a question/answer creation (QA) system in a computer network . One example of a question/answer generation which may be used in conjunction with the principles described herein is described in U.S. Patent Application Publication No. 2011/0125734, which is herein incorporated by reference in its entirety. The QA system may include a computing device (comprising one or more processors and one or more memories, and potentially any other computing device elements generally known in the art including buses, storage devices, communication interfaces, and the like) connected to the computer network . The network may include multiple computing devices in communication with each other and with other devices or components via one or more wired and/or wireless data communication links, where each communication link may comprise one or more of wires, routers, switches, transmitters, receivers, or the like. The QA system and network may enable question/answer (QA) generation functionality for one or more content users. Other embodiments of the QA system may be used with components, systems, sub-systems, and/or devices other than those that are depicted herein.
100
100
102
106
108
100
102
104
102
104
102
100
The QA system may be configured to receive inputs from various sources. For example, the QA system may receive input from the network , a corpus of electronic documents or other data, a content creator , content users, and other possible sources of input. In one embodiment, some or all of the inputs to the QA system may be routed through the network . The various computing devices on the network may include access points for content creators and content users. Some of the computing devices may include devices for a database storing the corpus of data. The network may include local network connections and remote connections in various embodiments, such that the QA system may operate in environments of any size, including local and global, e.g., the Internet.
106
100
106
100
100
102
100
100
100
In one embodiment, the content creator creates content in a document for use as part of a corpus of data with the QA system . The document may include any file, text, article, or source of data for use in the QA system . Content users may access the QA system via a network connection or an Internet connection to the network , and may input questions to the QA system that may be answered by the content in the corpus of data. In one embodiment, the questions may be formed using natural language. The QA system may interpret the question and provide a response to the content user containing one or more answers to the question. In some embodiments, the QA system may provide a response to users in a ranked list of answers.
100
In some illustrative embodiments, the QA system may be the Watson™ QA system available from International Business Machines Corporation of Armonk, N.Y., which is augmented with the mechanisms of the illustrative embodiments described hereafter. The Watson™ QA system may receive an input question which it then parses to extract the major features of the question, that in turn are then used to formulate queries that are applied to the corpus of data. Based on the application of the queries to the corpus of data, a set of hypotheses, or candidate answers to the input question, are generated by looking across the corpus of data for portions of the corpus of data that have some potential for containing a valuable response to the input question.
The Watson™ QA system then performs deep analysis on the language of the input question and the language used in each of the portions of the corpus of data found during the application of the queries using a variety of reasoning algorithms. There may be hundreds or even thousands of reasoning algorithms applied, each of which performs different analysis, e.g., comparisons, and generates a score. For example, some reasoning algorithms may look at the matching of terms and synonyms within the language of the input question and the found portions of the corpus of data. Other reasoning algorithms may look at temporal or spatial features in the language, while others may evaluate the source of the portion of the corpus of data and evaluate its veracity.
The scores obtained from the various reasoning algorithms indicate the extent to which the potential response is inferred by the input question based on the specific area of focus of that reasoning algorithm. Each resulting score is then weighted against a statistical model. The statistical model captures how well the reasoning algorithm performed at establishing the inference between two similar passages for a particular domain during the training period of the Watson™ QA system. The statistical model may then be used to summarize a level of confidence that the Watson™ QA system has regarding the evidence that the potential response, i.e. candidate answer, is inferred by the question. This process may be repeated for each of the candidate answers until the Watson™ QA system identifies candidate answers that surface as being significantly stronger than others and thus, generates a final answer, or ranked set of answers, for the input question. More information about the Watson™ QA system may be obtained, for example, from the IBM Corporation website, IBM Redbooks, and the like. For example, information about the Watson™ QA system can be found in Yuan et al., “Watson and Healthcare,” IBM developerWorks, 2011 and “The Era of Cognitive Systems: An Inside Look at IBM Watson and How it Works” by Rob High, IBM Redbooks, 2012.
FIG. 2
FIG. 1
FIG. 4
100
100
100
100
200
100
204
206
106
208
100
104
104
100
100
depicts a schematic diagram of one embodiment of the QA system of . The depicted QA system includes various components, described in more detail below, that are capable of performing the functions and operations described herein. In one embodiment, at least some of the components of the QA system are implemented in a computer system. For example, the functionality of one or more components of the QA system may be implemented by computer program instructions stored on a computer memory device and executed by a processing device, such as a CPU. The QA system may include other components, such as a disk storage drive , and input/output devices , and at least one document from a corpus . Some or all of the components of the QA system may be stored on a single computing device or on a network of computing devices , including a wireless communication network. The QA system may include more or fewer components or subsystems than those depicted herein. In some embodiments, the QA system may be used to implement the methods described herein as depicted in and may be augmented or configured to implement the additional operations, functionality, and features described hereafter with regard to the illustrative embodiments describes in conjunction with the subsequent figures.
100
104
202
100
202
202
104
104
202
202
200
202
204
200
202
In one embodiment, the QA system includes at least one computing device with a processor for performing the operations described herein in conjunction with the QA system . The processor may include a single processing device or multiple processing devices. The processor may have multiple processing devices in different computing devices over a network such that the operations described herein may be performed by one or more computing devices . The processor is connected to and in communication with the memory device. In some embodiments, the processor may store and access data on the memory device for performing the operations described herein. The processor may also be connected to a storage disk , which may be used for data storage, for example, for storing data from the memory device , data used in the operations performed by the processor , and software for performing the operations described herein.
100
106
106
208
106
208
106
100
100
106
208
202
202
200
208
In one embodiment, the QA system imports a document . The electronic document may be part of a larger corpus of data or content, which may contain electronic documents related to a specific topic or a variety of topics. The corpus of data may include any number of documents and may be stored in any location relative to the QA system . The QA system may be capable of importing any of the documents in the corpus of data for processing by the processor . The processor may communicate with the memory device to store data while the corpus is being processed.
106
210
106
210
214
212
106
210
214
106
106
The document may include a set of questions generated by the content creator at the time the content was created. When the content creator creates the content in the document , the content creator may determine one or more questions that may be answered by the content or for specific use cases for the content. The content may be created with the intent to answer specific questions. These questions may be inserted into the content, for example, by inserting the set of questions into the viewable content/text or in metadata associated with the document . In some embodiments, the set of questions shown in the viewable text may be displayed in a list in the document so that the content users may easily see specific questions answered by the document .
210
202
202
216
106
216
106
202
210
216
106
The set of questions created by the content creator at the time the content is created may be detected by the processor . The processor may further create one or more candidate questions from the content in the document . The candidate questions include questions that are answered by the document , but that may not have been entered or contemplated by the content creator. The processor may also attempt to answer the set of questions created by the content creator and candidate questions extracted from the document , “extracted” meaning questions that are not explicitly specified by the content creator but are generated based on analysis of the content.
202
106
106
100
218
216
100
218
210
216
100
218
216
In one embodiment, the processor determines that one or more of the questions are answered by the content of the document and lists or otherwise marks the questions that were answered in the document . The QA system may also attempt to provide answers for the candidate questions . In one embodiment, the QA system answers the set of questions created by the content creator before creating the candidate questions . In another embodiment, the QA system answers the questions and the candidate questions at the same time.
100
222
100
100
100
The QA system may score question/answer pairs generated by the system. In such an embodiment, question/answer pairs that meet a scoring threshold are retained, and question/answer pairs that do not meet the scoring threshold are discarded. In one embodiment, the QA system scores the questions and answers separately, such that questions generated by the system that are retained meet a question scoring threshold, and answers found by the system that are retained meet an answer scoring threshold. In another embodiment, each question/answer pair is scored according to a question/answer scoring threshold.
216
100
216
216
106
216
216
106
214
212
After creating the candidate questions , the QA system may present the questions and candidate questions to the content creator for manual user verification. The content creator may verify the questions and candidate questions for accuracy and relatedness to the content of the document . The content creator may also verify that the candidate questions are worded properly and are easy to understand. If the questions contain inaccuracies or are not worded properly, the content creator may revise the content accordingly. The questions and candidate questions that have been verified or revised may then be stored in the content of the document as verified questions, either in the viewable text or in the metadata or both.
FIG. 3
FIG. 1
300
106
300
100
300
depicts a flowchart diagram of one embodiment of a method for question/answer creation for a document . Although the method is described in conjunction with the QA system of , the method may be used in conjunction with any type of QA system.
100
302
106
208
106
104
106
100
106
106
106
106
106
100
100
106
In one embodiment, the QA system imports one or more electronic documents from a corpus of data. This may include retrieving the documents from an external source, such as a storage device in a local or remote computing device . The documents may be processed so that the QA system is able to interpret the content of each document . This may include parsing the content of the documents to identify questions found in the documents and other elements of the content, such as in the metadata associated with the documents , questions listed in the content of the documents , or the like. The system may parse documents using document markup to identify questions. For example, if documents are in extensible markup language (XML) format, portions of the documents could have XML question tags. In such an embodiment, an XML parser may be used to find appropriate document parts. In another embodiment, the documents are parsed using native language processing (NLP) techniques to find questions. For example, the NLP techniques may include finding sentence boundaries and looking at sentences that end with a question mark or other methods. The QA system may use language processing techniques to parse the documents into sentences and phrases, for example.
304
212
106
106
212
106
212
100
212
208
212
106
212
106
In one embodiment, the content creator creates metadata for a document , which may contain information related to the document , such as file information, search tags, questions created by the content creator, and other information. In some embodiments, metadata may already be stored in the document , and the metadata may be modified according to the operations performed by the QA system . Because the metadata is stored with the document content, the questions created by the content creator may be searchable via a search engine configured to perform searches on the corpus of data, even though the metadata may not be visible when the document is opened by a content user. Thus, the metadata may include any number of questions that are answered by the content without cluttering the document .
306
100
216
216
106
216
216
The content creator may create more questions based on the content, if applicable. The QA system also generates candidate questions based on the content that may not have been entered by the content creator. The candidate questions may be created using language processing techniques designed to interpret the content of the document and generate the candidate questions so that the candidate questions may be formed using natural language.
100
216
106
100
216
100
218
212
100
208
208
216
100
218
When the QA system creates the candidate questions or when the content creator enters questions into the document , the QA system may also locate the questions in the content and answer the questions using language processing techniques. In one embodiment, this process includes listing the questions and candidate questions for which the QA system is able to locate answers in the metadata . The QA system may also check the corpus of data or another corpus for comparing the questions and candidate questions to other content, which may allow the QA system to determine better ways to form the questions or answers . Examples of providing answers to questions from a corpus are described in U.S. Patent Application Publication No. 2009/0287678 and U.S. Patent Application Publication No. 2009/0292687, which are herein incorporated by reference in their entirety.
216
218
308
212
216
218
218
212
100
218
106
216
218
212
100
106
216
216
216
218
106
100
The questions, candidate questions , and answers may then be presented on an interface to the content creator for verification. In some embodiments, the document text and metadata may also be presented for verification. The interface may be configured to receive a manual input from the content creator for user verification of the questions, candidate questions , and answers . For example, the content creator may look at the list of questions and answers placed in the metadata by the QA system to verify that the questions are paired with the appropriate answers , and that the question-answer pairs are found in the content of the document . The content creator may also verify that the list of candidate questions and answers placed in the metadata by the QA system are correctly paired, and that the candidate question-answer pairs are found in the content of the document . The content creator may also analyze the questions or candidate questions to verify correct punctuation, grammar, terminology, and other characteristics to improve the questions or candidate questions for searching and/or viewing by the content users. In one embodiment, the content creator may revise poorly worded or inaccurate questions and candidate questions or content by adding terms, adding explicit questions or question templates that the content answers , adding explicit questions or question templates that the content does not answer, or other revisions. Question templates may be useful in allowing the content creator to create questions for various topics using the same basic format, which may allow for uniformity among the different content. Adding questions that the content does not answer to the document may improve the search accuracy of the QA system by eliminating content from the search results that is not applicable to a specific search.
216
218
100
310
100
100
312
314
316
318
320
208
100
100
100
100
212
100
216
100
100
100
After the content creator has revised the content, questions, candidate questions , and answers , the QA system may determine if the content finished being processed. If the QA system determines that the content is finished being processed, the QA system may then store the verified document , verified questions , verified metadata , and verified answers in a data store on which the corpus of data is stored. If the QA system determines that the content is not finished being processed—for example if the QA system determines that additional questions may be used—the QA system may perform some or all of the steps again. In one embodiment, the QA system uses the verified document and/or the verified questions to create new metadata . Thus, the content creator or QA system may create additional questions or candidate questions , respectively. In one embodiment, the QA system is configured to receive feedback from content users. When the QA system receives feedback from content users, the QA system may report the feedback to the content creator, and the content creator may generate new questions or revise the current questions based on the feedback.
FIG. 4
FIG. 1
400
106
400
100
400
depicts a flowchart diagram of one embodiment of a method for question/answer creation for a document . Although the method is described in conjunction with the QA system of , the method may be used in conjunction with any QA system.
100
405
106
210
106
210
106
210
214
106
212
106
210
100
410
216
106
216
216
100
106
208
106
216
The QA system imports a document having a set of questions based on the content of the document . The content may be any content, for example content directed to answering questions about a particular topic or a range of topics. In one embodiment, the content creator lists and categorizes the set of questions at the top of the content or in some other location of the document . The categorization may be based on the content of the questions, the style of the questions, or any other categorization technique and may categorize the content based on various established categories such as the role, type of information, tasks described, and the like. The set of questions may be obtained by scanning the viewable content of the document or metadata associated with the document . The set of questions may be created by the content creator when the content is created. In one embodiment, the QA system automatically creates at least one suggested or candidate question based on the content in the document . The candidate question may be a question that the content creator did not contemplate. The candidate question may be created by processing the content using language processing techniques to parse and interpret the content. The system may detect a pattern in the content of the document that is common for other content in the corpus to which the document belongs, and may create the candidate question based on the pattern.
100
415
218
210
216
106
100
218
210
216
216
218
210
216
218
210
216
The QA system also automatically generates answers for the set of questions and the candidate question using the content in the document . The QA system may generate the answers for the set of questions and the candidate question at any time after creating the questions and candidate question . In some embodiments, the answers for the set of questions may be generated during a different operation than the answer for the candidate question . In other embodiments, the answers for both the set of questions and the candidate question may be generated in the same operation.
100
420
210
216
218
210
216
216
106
216
218
218
216
106
100
100
The QA system then presents the set of questions , the candidate question , and the answers for the set of questions and the candidate question to the content creator for user verification of accuracy. In one embodiment, the content creator also verifies the questions and candidate questions for applicability to the content of the document . The content creator may verify that the content actually contains the information contained in the questions, candidate question , and respective answers . The content creator may also verify that the answers for the corresponding questions and candidate question contain accurate information. The content creator may also verify that any data in the document or generated by the QA system in conjunction with the QA system is worded properly.
220
425
106
220
210
216
100
220
210
216
216
218
106
A verified set of questions may then be stored in the document . The verified set of questions may include at least one verified question from the set of questions and the candidate question . The QA system populates the verified set of questions with questions from the set of questions and candidate questions that are determined by the content creator to be accurate. In one embodiment, any of the questions, candidate questions , answers , and content that is verified by the content creator is stored in the document , for example, in a data store of a database.
100
100
100
100
The above description illustrates the manner by which content creators may generate metadata for use by a QA system when performing answer generation for input questions. As discussed above, the QA system also is used to answer input questions submitted by users via one or more client computing devices. For example, in a healthcare domain, the QA system may be utilized to receive questions directed to medical issues, such as diagnosis, treatment, and the like. The QA system may process such input questions through a QA system analysis pipeline to evaluate the input question against a corpus of data/information, which may include documents or content having associated metadata as previously described above, unstructured documents, or the like, and generate one or more potential answers to the input question.
FIG. 5
FIG. 5
illustrates a QA system pipeline for processing an input question in accordance with one illustrative embodiment. It should be appreciated that the stages of the QA system pipeline shown in may be implemented as one or more software engines, components, or the like, which are configured with logic for implementing the functionality attributed to the particular stage. Each stage may be implemented using one or more of such software engines, components or the like. The software engines, components, etc. may be executed on one or more processors of one or more data processing systems or devices and may utilize or operate on data stored in one or more data storage devices, memories, or the like, on one or more of the data processing systems.
FIG. 5
500
510
580
510
500
520
As shown in , the QA system pipeline comprises a plurality of stages - through which the QA system operates to analyze an input question and generate a final response. In an initial question input stage , the QA system receives an input question that is presented in a natural language format. That is, a user may input, via a user interface, an input question for which the user wishes to obtain an answer, e.g., “Who are Putin's closest advisors?” In response to receiving the input question, the next stage of the QA system pipeline , i.e. the question and topic analysis stage , parses the input question using natural language processing (NLP) techniques to extract major features from the input question, classify the major features according to types, e.g., names, dates, or any of a plethora of other defined topics. For example, in the example question above, the term “who” may be associated with a topic for “persons” indicating that the identity of a person is being sought, “Putin” may be identified as a proper name of a person with which the question is associated, “closest” may be identified as a word indicative of proximity or relationship, and “advisors” may be indicative of a noun or other language topic.
530
540
540
The identified major features may then be used during the question decomposition stage to decompose the question into one or more queries that may be applied to the corpus of data/information in order to generate one or more hypotheses. The queries may be generated in any known or later developed query language, such as the Structure Query Language (SQL), or the like. The queries may be applied to one or more databases storing information about the electronic texts, documents, articles, websites, and the like, that make up the corpus of data/information. The queries being applied to the corpus of data/information generate results identifying potential hypotheses for answering the input question which can be evaluated. That is, the application of the queries results in the extraction of portions of the corpus of data/information matching the criteria of the particular query. These portions of the corpus may then be analyzed and used, during the hypothesis generation stage , to generate hypotheses for answering the input question. These hypotheses are also referred to herein as “candidate answers” for the input question. For any input question, at this stage , there may be hundreds of hypotheses or candidate answers generated that may need to be evaluated.
500
550
The QA system pipeline , in stage , then performs a deep analysis and comparison of the language of the input question and the language of each hypothesis or “candidate answer” as well as performs evidence scoring to evaluate the likelihood that the particular hypothesis is a correct answer for the input question. As mentioned above, this may involve using a plurality of reasoning algorithms, each performing a separate type of analysis of the language of the input question and/or content of the corpus that provides evidence in support of, or not, of the hypothesis. Each reasoning algorithm generates a score based on the analysis it performs which indicates a measure of relevance of the individual portions of the corpus of data/information extracted by application of the queries as well as a measure of the correctness of the corresponding hypothesis, i.e. a measure of confidence in the hypothesis.
560
In the synthesis stage , the large number of relevance scores generated by the various reasoning algorithms may be synthesized into confidence scores for the various hypotheses. This process may involve applying weights to the various scores, where the weights have been determined through training of the statistical model employed by the QA system and/or dynamically updated, as described hereafter. The weighted scores may be processed in accordance with a statistical model generated through training of the QA system that identifies a manner by which these scores may be combined to generate a confidence score or measure for the individual hypotheses or candidate answers. This confidence score or measure summarizes the level of confidence that the QA system has about the evidence that the candidate answer is inferred by the input question, i.e. that the candidate answer is the correct answer for the input question.
570
580
The resulting confidence scores or measures are processed by a final confidence merging and ranking stage which may compare the confidence scores and measures, compare them against predetermined thresholds, or perform any other analysis on the confidence scores to determine which hypotheses/candidate answers are the most likely to be the answer to the input question. The hypotheses/candidate answers may be ranked according to these comparisons to generate a ranked listing of hypotheses/candidate answers (hereafter simply referred to as “candidate answers”). From the ranked listing of candidate answers, at stage , a final answer and confidence score, or final set of candidate answers and confidence scores, may be generated and output to the submitter of the original input question.
FIG. 5
520
525
520
527
525
527
As shown in , in accordance the illustrative embodiments, as part of the question and topic analysis stage , annotators are utilized to perform the feature extraction and annotation. That is, the annotations identify the types of features extracted from the input question, e.g., nouns, verbs, places, names, values, or domain specific types. As mentioned above, the annotators may comprise annotators of various domains including generic all inclusive domains, specialized domains for particular industries, topics, and the like, or any granularity of domain between general and specialized. The annotations may be stored as separate sets of annotations , associated with the input question, generated by each annotator . The annotations may be stored as separate data structures from the input question or may be stored as metadata of the input question. Thus, a first set of annotations may comprise annotations generated by an annotator configured to annotate financial terms in input questions. A second set of annotations may comprise annotations generated by an annotator configured to perform English language parts of speech identification. It should be appreciated that an annotator may actually not generate any annotations at all if the input question does not comprise terms or patterns of content matching those terms and patterns of content for which the annotator is configured to identify and annotate.
In one illustrative embodiment, the annotations may comprise parts of speech, definitions and/or types of terms, and expected context information. The parts of speech portion of an annotation identifies whether the term, phrase, or portion of text is a noun, verb, preposition, prepositional phrase, adverb, adjective, or other part of speech of a particular language. The definitions annotations provide the definitions of terms or patterns of terms from the viewpoint of the domain for which the annotation is configured. Thus, in one annotator a term may have a first definition, and in another annotator, the same term may have a second, different definition. The same is true of type designations, where the type may be domain specific. Furthermore, the type may designate such things as the focus of the input question, the lexical answer type (LAT) of the question, and other structural annotations associated with the terms, pattern of terms, or the like. The expected context information annotations comprise the expected domain of the question determined from analysis of the various parts of the question, e.g., that the question is determined to be in the financial, medical, oncology, English grammar, or other type of domain (subject matter area) that is expected to be the most likely area to provide a correct answer for the question.
525
585
Once the annotators have annotated the input question, domain determination engine determines a domain of the input question. Based on the annotations generated by the various annotators for the various terms in the question, patterns of terms, or the like, and the confidence scores associated with the annotations that are generated, the domain determination engine determines what the domain of the input question is. For example, one methodology for determining a domain of the input question is to match the set of terms of the input question and determine if they match a previously defined ontology, or map to a domain for which the system has been trained. In such a case, the terms of the annotations of the input question and the terms in the ontology may be paired up and the associated confidence scores of the annotations may be evaluated to thereby map the high confidence annotations to a domain, i.e., the annotators with highest confidence may impact or suggest a specific domain.
As another example methodology for determining a domain, the domain of the input question may be identified based on a domain of the annotator providing annotations with a highest confidence score for the annotations generated. Moreover, a more complex analysis may be employed in which, for example, weights may be given to different annotators based on their granularity of domain, e.g., more specific domains are given greater weight than more generic domains so that if a specific domain annotator generates annotations having a confidence score similar to the annotations generated by a more generic annotator, then the specific domain annotator may be given greater priority. Other priority mechanisms may be used to select annotators and their domains as being representative of the domain for the input question.
Alternatively, when the input question is received, a user may be prompted to identify the domain of the question and this selection of the domain may be forwarded with the input question and used as a basis for determining the domain of the input question. In an illustrative embodiment in which the operation of the illustrative embodiment is being applied to a portion of content from a corpus of documents, rather than an input question, then metadata associated with the source of the portion of the content may be used to identify the domain for the portion of content. Of course, any combination of these may also be used as well to identify the domain of the particular portion of text being analyzed by the mechanisms of the illustrative embodiments.
510
590
530
510
The sets of annotations generated by the various annotators operating on the input question , or portion of content if the mechanisms are applied to other content other than an input question are checked to see if any of the annotations for a particular term conflict with one another. This check is performed by the annotation conflict detection and resolution engine prior to the annotations being provided to the question decomposition stage for use in generating queries against the corpus of content used to generate answers for the input question . A conflict is present if two or more annotations for a same term, pattern of terms, or portion of the content whose annotations are being analyzed, are different from one another, e.g., one annotator annotates a term to be a noun and another annotator indicates the term to be a verb.
For example, consider the statement “John should have short AMG.” With a general purpose annotator, this statement may be parsed and annotated in the following manner (with annotations indicated in parenthesis): “John (Noun) should have (Verb) short (Noun) AMG (Unknown, Noun)”. However, a financial domain based annotator may recognize the term “short” to be a verb/adverb part of speech indicating the operation of “selling commodities high, buy low to return to holdings” or “sells borrowed stocks.” Furthermore, the financial domain annotator may be configured to identify particular types of terms corresponding to the financial industry, such as stock names, mutual fund names, stock exchanges, and the like. Thus, the financial domain annotator may annotate the same statement as follows: “John (Noun) should have (Verb) short (Verb) AMG (Noun, stock name).” Hence if both annotators were to run on the same statement, the annotators would generate annotations that conflict with one another both with regard to the term “short” and with the term “AMG”. These annotation conflicts may be identified by the mechanisms of the illustrative embodiments and rectified based on the determined domain of the content being analyzed, e.g., the input question or the portion of the corpus being analyzed.
590
525
525
527
527
590
That is, the annotation conflict detection and resolution engine , either in parallel with the operation of the annotators , or after operation by the annotators , in generating the annotations , may analyze the various annotations generated by each of the annotators and compare them to other annotations generated by other annotators for the same term, pattern of terms, portion of content, or the like. If there are different annotations for the same term, pattern, or portion of content, then a conflict is detected. Alternatively, in a more complex embodiment, differences between annotations may be further analyzed to identify whether a different is actually a conflict or a non-conflicting difference. For example, if one annotation is a sub-set, sub-type, or sub-category of another annotation, then a conflict may not be present even though there is an identified difference in the annotations. For example, if one annotator identifies a term as a “cancer type” and another annotator identifies the same term as a “lymphoma”, then lymphoma is a sub-category or type of “cancer” and in some illustrative embodiments a conflict may not be designated to exist with these annotations. The annotation conflict detection and resolution engine may be configured and have logic for distinguishing between differences in annotations and actual conflicts in annotations based on such identified differences.
595
597
599
585
595
595
597
599
595
597
595
500
595
597
500
If a conflict is present, then a reverse lookup of the term in a language model for the particular identified domain of the input question/portion of content is performed, and/or a lookup of a matching term usage in a domain specific corpora of the corpus used for performing candidate answer generation, is made. That is, the domain identified by the domain determination engine is used to identify a corresponding domain language model if one exists, or else a default domain language model may be used. In addition, or alternatively, a domain specific corpora within the corpus , that corresponds to the identified domain may be identified. A search for the term, pattern of terms, or portion of content, with its association annotations is performed to identify not only the matching, or similar, term, pattern of terms, or portion of content, but a matching/similar annotation to that of the conflicting annotation. If a match of the term (pattern of terms, portion of content, etc.), and its associated annotation(s), is found in the domain specific language model or domain specific corpora is found, and the matching usage of the term meets certain predetermined criteria, e.g., predetermined number of instances within the model or corpora , then the annotation is considered relevant and is maintained for use by the further stages of the pipeline while other conflicting annotations that are not found within the model or domain specific corporate , or which do not meet the threshold predetermined criteria, are eliminated and are not used by later down-stream portions of the QA system pipeline .
590
530
540
580
500
510
527
500
599
The annotations that pass the conflict detection and resolution operations performed by the conflict detection and resolution engine are forwarded along to the question decomposition stage with subsequent use in the other downstream stages - of the QA system pipeline to generate candidate answers and ultimately a final answer for the input question in the manner previously described above. In this way, domain specific filtering of annotations is performed in a QA system pipeline so as to improve the overall performance of the QA system. This improvement is achieved since the conflicting annotations will tend to skew the confidence scoring in the answers generated based on the terms, pattern of terms, or portions of content. This skew may artificially increase the confidence, i.e. indicating that the answer is much more likely to be the correct answer than it really is, or decrease the confidence, i.e. indicating that the answer is much less likely to be the correct answer than it really is. For example, if a general purpose annotator provide a general annotation for a term, that general annotation for that term may be found much more often within the corpus that a more domain specific annotation for the same term and may artificially increase the confidence score associated with that term. For example, a scoring algorithm in the candidate answer scoring phase may take the presence of a particular annotation or set of annotations in a domain as significant such that when they exist they skew the score for a candidate answer adding a large weight. This filtering helps to normalize and sometimes eliminate this type of activity.
599
599
As mentioned above, it should be appreciated that while the illustrative embodiments are described above as being performed with regard to an input question to a QA system, the illustrative embodiments are not limited to such. Rather, the illustrative embodiments may be applied to any portion of content, either in an input question, a portion of content in one or more documents or other sources of information in the corpus , or the like. Thus, in some illustrative embodiments, the conflict identification and resolution may be applied to annotations generated for documents in the corpus so as to improve the annotations stored in the metadata associated with these documents which may later be used by the QA system when performing candidate answer identification, hypothesis evidence evaluations, and the like.
FIG. 6
FIG. 6
is a flowchart outlining an example operation for annotation conflict identification in accordance with one illustrative embodiment. As an example implementation, and the following flowcharts will assume that the mechanisms of the illustrative embodiments are being applied to an input question received by a QA system. However, as mentioned above, in other illustrative embodiments, the mechanisms of the illustrative embodiments may be applied to any portion of content that may be annotated and whose annotations may have conflicts.
FIG. 6
610
620
630
640
650
660
670
As shown in , the operation starts by receiving an input question for processing by the QA system (step ). The input question is parsed and processed by a plurality of annotators to generate a plurality of sets of annotations (step ). A domain for the input question is determined by analyzing the annotations for the input question and their associated confidence measures (step ). The annotations for the input question are then parsed, analyzed, and compared to identify any conflicts between annotations (step ). The conflicts are resolved based on the identified domain for the input question by filtering out conflicting annotations that do not meet predetermined criteria with regard to the identified domain (step ). A resulting filtered set of annotations are maintained in association with the input question (step ). The filtered set of annotations are provided along with the parsed input question to downstream stages of the QA system pipeline for candidate answer generation and evaluation (step ). The operation then terminates.
FIG. 7
FIG. 7
FIG. 6
710
720
is a flowchart outlining an example operation for performing annotation conflict resolution. As shown in , the operation starts by receiving the various sets of annotations for a term, pattern of terms, portion of content, or the like (step ). Continuing the example of , these annotations may be for a particular term or set of terms in the input question, or for the entire input question, for example. A determination is made as to whether there is a conflict between any of the sets of annotations for the term, pattern of terms, or portion of content (step ). These conflicts may be conflicts between parts of speech, definitions or type designations associated with the term, pattern of terms, portion of content, or the like.
730
740
630
FIG. 6
If there are no conflicts identified, then the annotations are maintained in an annotation data structure associated with the portion of content (step ). If a conflict is identified, then a reverse-lookup operation is performed based on the identified domain associated with the portion of content (step ), e.g., the input question as identified in step of . This may be done by performing the reverse-lookup in a domain related language model, domain specific corpora, or the like. If domain specific corpora or language models are not present, then default corpora and language models may be used.
750
760
A determination is made as to whether there are matching instances of the portion of content and associated conflicting annotations in the domain specific language model and/or corpora (step ). If not, then the conflicting annotation is removed from the set of annotations for the portion of content (step ). Which conflicting annotation to remove may be selected based on various criteria including, but not limited to, removing the conflicting annotation having a least confidence value or removing a conflicting annotation that does not match a domain or ontology. Another alternative is to analyze surrounding annotations and their domains and then remove the conflicting annotation that does not reflect the same domain as the majority of the other surrounding annotations.
770
760
730
FIG. 7
If there are matching instances found, then a determination is made as to whether the matching instances meet predetermined minimum criteria for maintaining the conflicting annotation in the annotations for the portion of content (step ). This predetermined minimum criteria may be a predetermined threshold number of matching instances, a degree of matching between the annotations and the portion of content, or any other predetermined criteria that may be used to determine if instances within the language model/corpora are sufficient to warrant a maintaining or removal of an annotation from further consideration by the QA system. If the predetermined minimum criteria is not met, then again, the conflicting annotation may be removed from the set of annotations for the portion of content (step ). If the predetermined minimum criteria is met, then the conflicting annotation may be maintained in the set of annotations for the portion of content (step ). The operation then terminates. Although is shown as terminating at this point, it should be appreciated that the process may be repeated for each annotation and each portion of content being analyzed. Furthermore, the results of this operation are a filtered set of annotations for the portion of content which may then be used as a basis for hypothesis creation, candidate answer identification and evaluation, and other operations performed by the QA system pipeline.
Thus, the illustrative embodiments provide mechanisms for identifying and resolving annotation conflicts in annotated content for question and answer systems. The illustrative embodiments generate a filtered set of annotations for the content that reduce the likelihood of skewing of question and answer system results due to the presence of conflicting annotations. Thus, the question and answer system performance is improved as a result.
As noted above, it should be appreciated that the illustrative embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In one example embodiment, the mechanisms of the illustrative embodiments are implemented in software or program code, which includes but is not limited to firmware, resident software, microcode, etc.
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modems and Ethernet cards are just a few of the currently available types of network adapters.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
The invention, as well as a preferred mode of use and further objectives and advantages thereof, will best be understood by reference to the following detailed description of illustrative embodiments when read in conjunction with the accompanying drawings, wherein:
FIG. 1
depicts a schematic diagram of one illustrative embodiment of a question/answer (QA) system in a computer network;
FIG. 2
FIG. 1
depicts a schematic diagram of one embodiment of the QA system of ;
FIG. 3
depicts a flowchart diagram of one embodiment of a method for question/answer creation for a document;
FIG. 4
depicts a flowchart diagram of one embodiment of a method for question/answer creation for a document;
FIG. 5
is an example block diagram of a question and answer system analysis pipeline in accordance with one illustrative embodiment;
FIG. 6
is a flowchart outlining an example operation for annotation conflict identification in accordance with one illustrative embodiment; and
FIG. 7
is a flowchart outlining an example operation for performing annotation conflict resolution. | |
Why were the "great powers" of Europe so hell-bent on colonizing Africa in the 19th century? Setting aside the myriad moral issues that are hard for a modern-day observer to overlook--what did colonization of Africa actually accomplish, in the most cynical and pragmatic sense?
It's clear what Spain got from colonizing the Americas--mountains of gold and silver to swell their coffers. But it's not entirely clear what it was that made the cost of subduing Africa seem worthwhile to the United Kingdom in the Victorian era. Added prestige in the pissing contest between colonial powers? A desire to distract citizens from domestic issues?
Wonkish historical questions like that are the sort of thing that bedevil Chris King. He's not a historian--he's a game designer at Paradox Development Studio, where he has worked on franchises like Europa Universalis, Hearts of Iron, and Crusader Kings.
Paradox specializes in what they call "historical grand strategy games," which are built around real events and eras, and play out on real maps. In a well-received GDC talk, King described the unique challenges of plundering history to create this style of game.
He began by contrasting a Paradox game like Hearts of Iron to a less historically rigorous game like Civilization, which strives to first and foremost create a balanced setup in which player skill is key.
"In Hearts of Iron, playing as Luxembourg is not easy--you're pretty much hosed no matter what you do," said King. "In Civilization, when you lose it's more the direct result of your choices. But you can also get nuked by Gandhi, which is an immersion breaker for some people."
Paradox has built a following and a reputation for its attention to historical detail. But throughout King's talk, he pointed to the myriad tradeoffs and simplifications his team has had to make in order to create compelling play experiences. "How much history and how much game do you include?" he asked.
If you create a perfect representation of WWII, accurate in every detail and particular...then Germany will always lose. That's not fun or challenging. Also, any history game that's entirely built around a war of wits and cunning would be fundamentally inaccurate. "History is full of stupidity," said King. "You’d think Germany would have learned from losing WWI. But no, they kept declaring war on more and more countries."
"Not all history makes for good game mechanics," King added. "Game mechanics require precision--1 or 0. Mechanics rely on logic--if A then B."
King cites an example of a historical event that offers no solid gameplay hook--the 1219 Battle of Lyndanisse, in which Denmark conquered Estonia, "bringing light of Jesus to people who were not quite ready for it." Legend has it that the Danes were spurred on to victory when a flag bearing the symbol of their nation magically fell from the sky.
How exactly would you make a strategy game out of that? "I can’t go to our programmers and tell them to make it so that IF flag falls from sky, THEN Denmark wins," said King.
King exhorts developers to ruthlessly set limits and tighten scope, and make hard decisions on what to include and what to leave out. "A game has a precise start date--your year zero--but a lot of history has gone on before that," he said. "History is a process; you can’t divide it up into nice precise eras. Ask ten historians 'What are the Middle Ages and when did they happen?' and you'll get ten different answers."
King talked his audience through several case studies of design dilemmas in specific Paradox games, like the way they were forced to drastically simplify Christianity and Islam in their game Crusader Kings 2 to avoid getting bogged down in schisms and the gradual evolution of the religions. "Trying to identify the breakage inside religions is like hitting a moving target inside of a moving target," he says.
He also describes a problem he wrestled with in Victoria II, a game about industrialization and imperialism that unfolds from 1836 to 1936. It's the question that began this article--what exactly did the United Kingdom and other "great powers" of the era get out of the colonization of Africa? What material benefit did they derive that you could build a compelling strategy game around?
"Those colonies didn’t pay," said King. "Smart players will realize this and they won’t colonize, and thus a smart AI won’t either. Which means that Africa will look rather empty on the game map."
How could the colonization of Africa be incentivized, and turned into a satisfying game mechanic? Paradox went looking for a historical interpretation or worldview that they could plug into Victoria II that would solve this dilemma.
"There is one man who can explain everything," said King, "and that man is Karl Marx."
The father of communism had a deterministic, mechanistic view of history that was perfectly suited to game mechanics. "It's all about the struggle for raw materials with him," King says. "Get goods for factories, then get people to buy your goods. That fits nicely with our game."
A slide from this portion of King's talk has been circulated widely online with no surrounding context. Many seem to assume that the talk was about how the games medium could best be leveraged to promulgate communism.
King was actually saying the exact opposite--he was exhorting designers of historical strategy games to ignore ideology, and borrow from whichever historical interpretation will help them to create a fun and engaging play experience. Marx was employed to solve a specific design problem in Victoria II, and make the game a more successful commercial product.
"Choose the historian that gives the most gameplay," King said. "It pays to shop around." | https://www.gamedeveloper.com/design/how-paradox-plunders-history-for-great-gameplay-mechanics |
Jane A. Smith, Ph.D., is a lecturer in the
Department of Biomedical Science and Biomedical
Ethics at the University of Birmingham Medical School in Birmingham, England.
INTRODUCTION
Quite apart from philosophical considerations,
practical and scientific evidence may lead us to
assume that all mammals can experience something
analogous to (though most likely qualitatively
and quantitatively different from) the human
experience of pain. Humans, after' all, are
mammals; and although the details may differ, we
share our basic physiology with other mammalian
species. There is also a reasonableness, it
seems, in extending this view to include other
members of the Vertebrata. The further we move
away from the mammalian plan, the more difficult
it becomes to infer pain in other species. But
vertebrates, at least, have similarities in basic
anatomy and physiology, including similarities in
nervous organization, which are especially important in this context.
What, however, of the 95 percent of species in
the Animal Kingdom that do not possess a
backbone--the heterogeneous assemblage of
animals, organized very differently from the
vertebrate plan, which we call "invertebrates"?
Invertebrates are used in many disciplines in
biomedical research and also in toxicity testing.
Sometimes, invertebrate species are regarded as
"replacement" alternatives for vertebrates
(Office of Technology Assessment, 1986),
presumably because they are thought to be
insentient, or at least less sentient than vertebrate animals.
Is this contention true? Can any of the
invertebrates experience pain in anything like
the human, or the more general vertebrate, sense?
Can these animals, in this sense, "suffer"?
This short paper approaches such questions i:rom
a practical, rather than a philosophical, point
of view. Some biological evidence relating to the
possibility of pain in invertebrates is reviewed,
and some practical implications are raised.
There are unlikely to be any easy answers to the
difficult question of assessing pain in
invertebrates. It is hoped, however, that the
following discussion will provide some food for
thought and help to stimulate further debate.
EVIDENCE OF NOCICEPTION IN INVERTEBRATES
Most, if not all, invertebrates have the capacity
to detect and respond to noxious or aversive
stimuli. That is, like vertebrates, they are
capable of "nociception." Examples of aversive
stimuli include changes in temperature beyond the
animal's normal range, contact with noxious
chemicals, mechanical interference, or electric
shock. Under certain conditions, all of these
might be expected to cause pain in humans. In
general, invertebrates, like vertebrates, respond
to such stimuli by withdrawing or escaping so as
to reduce the likelihood that they will be damaged by the noxious conditions.
Behavioral Responses of Invertebrates to Noxious Stimuli
Even the "simplest" invertebrates, the
single-celled Protozoa, exhibit nociceptive-type
responses. The ciliated protozoon Paramecium, for
example, changes the rate and form of its ciliary
beat in response to aversive stimulation (such as
a poke with a fine needle) so as to effect
typical avoidance and escape reactions. The
animals, of course, have no nervous systems to
coordinate such responses; rather, these changes
in behavior are triggered by changes in the
electrical activity of the cell surface membrane (Naitoh, 1974).
As a detailed review by Kavaliers (1988)
describes, all other invertebrates (with the
possible exception of the Porifera, or sponges),
can also exhibit coordinated responses to
aversive stimuli. Thus, to take a few examples:
* sea anemones show protective withdrawal
responses by retracting their tentacles and oral
disc. Some may even detach from the substrate in
response to a variety of i aversive mechanical,
electrical, or chemical stimuli (Pantin, 1935; Ross, 1968);
* earthworms show rapid withdrawal reflexes
mediated by giant nerve fibers when subjected to unfavorable stimuli;
* medicinal leeches show pronounced writhing
and coiling responses when their skin is pinched
or damaged (Nicholls and Baylor, 1968);
* insects have a variety of avoidance and
escape responses (Eisemann et al., 1984), and
appear also to exhibit physiological changes to
aversive stimuli (Angioy et al., 1987). They may
be more responsive to some stimuli than to
others. Thus, most insects "do not flinch or
run," when the cuticle is cut, but high
temperature (such as a heated needle brought
close to the antennae) can produce violent escape
responses (Wigglesworth, 1980);
* gastropod snails of the species Cepaea
nemoralis show foot-lifting responses when placed
on a surface wanned to temperatures approaching
40� C, which is above their normal range (Kavaliers and Hirst, 1983); and
* cephalopod mollusks, such as octopuses, may
respond to noxious stimuli by withdrawing,
sometimes producing a cloud of ink from the ink
sac, and usually changing color.
Invertebrate Nociceptors
Some invertebrates, like vertebrates, also have
special sensory receptors called nociceptors,
which respond specifically to noxious
stimulation. Such nociceptive nerve cells have
been found in the segmental ganglia of the
medicinal leech, Hirudo medicinalis (Nicholls and
Baylot, 1968). Nerve impulses are generated in
these cells, which Nicholls and Baylor called N
cells, specifically in response to noxious
mechanical stimulation, such as pinching,
squeezing, or cutting of the body wall.
Modulation of Nociceptive Responses in Invertebrates
In mammals and other vertebrates, opioid
substances (including enkephalins and endorphins)
manufactured in the body can modify nervous
transmission in nociception, producing analgesic
effects. Administration of substances that mimic
the effects of these endogenous opioids (i.e.,
administration of opiate agonists, such as
morphine), also produces analgesia and thus may
reduce or abolish behavioral responses to noxious
stimuli. Furthermore, opiate antagonists such as
naloxone may suppress these analgesic effects.
Recent investigations have shown that similar
opiate systems may have a functional role in
invertebrate nociception (Fiorito, 1986; Kavaliers, 1988).
Enkephalin and b-endorphin-like substances have
been found in earthworms (Alumets et al., 1979),
and injections of nalaxone have been shown to
inhibit the worms' touch-induced escape responses
(Gesser and Larsson, 1986), suggesting that the
opioid substances may play a role in sensory
modulation. Opiate binding sites, with properties
similar to those of mammalian opiate receptors,
have been shown to be present in the neural
tissue of the marine mollusk Mytilus edulis
(Kavaliers et al., 1985). Kavaliers et al. (1983,
1985) have shown that administration of low doses
of the opioid peptides methionine-enkephalin and
b-endorphin produces "analgesic" effects in
terrestrial snails of the species Cepaea
nemoralis and that morphine has a similar effect.
All three substances increase the time taken for
the snails to respond by foot-lifting when placed
on a 40� C hot plate. Furthermore, naloxone has
been found to abolish the effect of morphine, and
all of the effects were dose-dependent.
Enkephalin-like substances and their receptors
have also been found in insects (Stefano and
Scharrer, 1981; EI-Salhy et al., 1983), and
opiate agonists and antagonists have been shown
to modulate nociceptive-type responses in several
species of arthropod, including mantis shrimps
(Squilla mantis) (Maldonado and Miralto, 1982),
honeybees (Nfinez et al., 1983), and praying mantes (Zabala et al., 1984.
EVIDENCE OF PAIN IN INVERTEBRATES
Invertebrates, it seems, exhibit nociceptive
responses analogous to those shown by
vertebrates. They can detect and respond to
noxious stimuli, and in some cases, these
responses can be modified by opioid substances.
However, in humans, at least, there is a
distinction to be made between the "registering"
of a noxious stimulus and the "experience" of
pain. In humans, pain "may be seen as the
response of the whole awake conscious organism to
noxious stimuli, seated.., at the highest levels
in the central nervous system, involving
emotional and other psychological components"
(Iggo, 1984). Experiments on decorticate mammals
have shown that complex, though stereotyped,
motor responses to noxious stimuli may occur in
the absence of consciousness and, therefore, of
pain (Iggo, 1984). Thus, it is possible that
invertebrates' responses to noxious stimuli (and
modifications of these responses) could be simple
reflexes, occurring without the animals being
aware of experiencing something unpleasant, that
is, without "suffering" something akin to what humans call pain.
Leaving aside the conceptual questions which
arise in trying to understand what other
individuals (of our own or other species) might
experience, it might be asked whether there is
any practical, physiological, or behavioral
evidence that could lead us to infer that
particular invertebrates might or might not
experience pain. What evidence might help in
distinguishing between nociceptive "responsiveness" and the perception of pain?
At the outset, it should be pointed out that
because pain is a subjective experience, it is
highly unlikely that any clear-cut, definitive
criteria will ever be found to decide this
question. However, certain evidence might lead to
judgements that pain is more or less likely to
occur in one particular kind of invertebrate than
in another kind. In particular, it can be argued
that evidence might come from further examination
of an animal's behavioral responses to noxious
stimulation and from consideration of the
complexity of its nervous organization (Smith and Boyd, 1991).
In mammals, responses to painful stimuli often
persist beyond a simple reflex withdrawal, so
that, for example, the animals may become
immobile, limp or "guard" the affected part, show
aggression when approached, reduce or stop
feeding and drinking, and show decreased sexual
activity (Morton and Griffiths, 1985). The
animals may also learn in the future to avoid
situations similar to the one in which the pain
occurred. Such responses, while not proof that
the animals have experienced pain, can indicate
that something more than a simple nociceptive
reflex is involved. Together, they may help the
animal to recover from damage caused by the
painful event and avoid being harmed in the future.
Insects and "Less Complex" Invertebrates
In the majority of examples of invertebrate
nociception noted above, there seems to be
little, if any, evidence that the animals'
responses persist in anything akin to the manner
described for mammals. As Eisemann et al. (1984)
have described in a review of the "biological
evidence" concerning pain in insects, "No example
is known to us of an insect showing protective
behavior towards injured parts, such as by
limping after leg injury or declining to feed or
mate because of general abdominal injuries. On
the contrary, our experience has been that
insects will continue with normal activities even
after severe injury or removal of body parts."
Eisemann et al. (1984) use a variety of examples
to support this contention, including:
* an insect walking with a crushed tarsus
continues "applying it to the substrate with undiminished force";
* a locust carries on feeding while being eaten by a mantis;
* a tsetse fly, although half-dissected, flies in to feed.
Although some insect behavior, such as the
writhing of insects poisoned by insecticides, or
the struggling of restrained living insects,
resembles that of "higher animals responding to
painful stimuli," Eisemann et al. conclude that
the resemblance is superficial and that it "no
more requires the presence of a pain sense than
do reflexive withdrawal responses." Similarly,
although it has been shown that fruit flies can
be trained to avoid certain odors and colored
lights when these are associated with impending
electric shock (Quinn et al., 1974), such
learning is open to explanation in terms of
neural mechanisms, without the need to postulate
subjective experience on the part of flies.
The "relatively simple organization" of the
insect central nervous system, Elsemann et al.
argue, "raises the question of whether any
experience akin to human pain could be generated"
in these animals (and by implication in other
invertebrates with a similar or less complex
nervous organization). On the analysis of Gould
and Gould (1982), the answer to such a question
would be "no," for these authors can find no
evidence for conscious experience in insects.
Certainly, on the limited amount of evidence
presented here, it seems very difficult to
imagine that insects and the other simpler
invertebrates mentioned above can "suffer" pain
in anything like the vertebrate sense.
Nevertheless, the issue certainly is not closed,
and further questions should be asked.
Perhaps such a view simply reflects a paucity of
(human) imagination. Griffin (1984) surely would
urge us to maintain an open mind on the issue,
having provided behavioral evidence which, he
argues, should challenge "the widespread belief'
that an insect, for example, "is too small and
its central nervous system too differently
organized from ours to be capable of conscious
thinking and planning or subjective feelings."
Indeed, to take a more radical view, perhaps "it
is presumptuous for us to assume that because our
suffering involves self-awareness, this should
also be true of other species" (McFarland, 1989).
Alternatively, perhaps, as Mather (1989)
suggests, we should simply accept that these
animals "are different from us, and wait for more data."
Cephalopods
Perhaps the question of pain in invertebrates
could be more easily settled where the "most
highly organized of all invertebrates"
(Russell-Hunter, 1979), the cephalopods, are concerned.
These animals, which include cuttlefish, squid,
and octopuses, "have the largest brains of all
invertebrates" (Wells, 1962). The ratio of
brain-weight to body-weight of many cephalopods
also exceeds that of most fish and reptiles
(Packard, 1972). The cephalopod brain has a
"hierarchical" organization (see Boycott, 1961),
the "higher" centers of the brain being concerned
with sensory analysis, memory, learning, and
decision-making. It has been suggested that these
areas of the cephalopod brain might be regarded
as analogous to the cerebral cortex of higher
vertebrates (Russell-Hunter, 1979). According to
Wells (1978), since in Octopus the brain
"represents only the more specialized sensory
integrative, higher movement control and learning
parts of a rather diffuse nervous system...it
becomes clear that one is dealing with an animal
that might well be expected to possess a central
nervous capability approaching that or exceeding
that of many birds and mammals."
Cephalopods show a remarkable ability to learn
and to be trained. In learning experiments,
Octopus vulgaris "clearly generalizes on the
basis of its own past experience,'' and the
animals may show marked individual preferences
(Wells, 1978). Anecdotal reports suggest
considerable individuality of behavior. Dews
(1959) describes how one of the octopuses he was
using in training experiments "spent much time
with eyes above the surface of the water,
directing a jet of water at any individual who approached the tank."
The evidence seems to suggest that at least some
of the cephalopods might have a nervous
organization that would allow them to experience
something like pain. It is unclear, however,
whether cephalopods are able to "suffer" pain.
Certainly, noxious stimuli such as electric
shocks are effective "negative reinforcers" when
used for training cephalopods in discrimination
learning experiments. It seems also that repeated
noxious stimulation can have long-term effects on
behavior. Wells (1978) describes the adverse
effects of repeated electric shocks given to
blinded octopuses. He describes how blinded
octopuses will normally be found sitting in their
tanks with their arms outstretched, allowing for
a "very standardized presentation'' of test
objects in tactile discrimination experiments.
However cases in which "the animal has become
withdrawn as a result of making large numbers of
errors and receiving many shocks in the course of
training, it is not so easy. Considerable
practice may then be required to recognize which
arm is in which tangle, and some delicacy may be
needed in presenting test objects since the
suckers are very sensitive and the animal may shy away from contacts."
Both Young's (1965) and Wells' (1978) models of
learning in the octopus include a "pain" pathway
leading into the "highest" center (the vertical
lobe) of the brain. Wells, however, notes that
although this nervous path is "generally assumed
to signal 'pain'...there is no proof of this and
it might well carry 'pleasure' or any other 'signal' ".
Although the evidence for pain perception is
equivocal, it seems that cephalopods might
exhibit body postures, color patterns and
behaviors that the human observer can interpret
as signaling, at least, whether or not "something
is wrong" with those animals. An anecdotal
example is quoted by Lane (1974), from Joseph
Sinel (1906), who handled hundreds of common
octopuses. "When highly content, as after a meal,
and perched, as it is fond of perching at times,
upon an eminence, the papillae [pimple-like
projections on the skin] are erected and these
are always of an orange color. Oftentimes the
whole body will be marked off in irregular,
honeycomb-like patches, or more like
crocodile-skin. First some of the patches are
purple, others orange, then these colors are
reversed. When danger threatens, or even when the
hand is raised towards it as if to strike, the
animal winces, and turns to ashy grey."
Mather (1989) describes how "...when I recently
had two octopuses in one aquarium and one of the
animals changed from its known daytime activity
in a hidden location and took on a coloration
previously associated with aversire stimuli, I
surmised before I saw the other animal attack it that there was a problem."
Wells (1978), however, is more guarded about
human abilities to empathize with these animals.
He agrees that it is very easy for humans "to
identify with Octopus vulgaris, even with
individuals, because they respond in a very
'human' way." Nevertheless, he argues, the
octopus has a very different way of life, and
"...we should not fall into the trap of supposing
that we can interpret its behavior in terms of
concepts derived from birds or mammals [since]
the animal lives in a very different world from our own."
It is important to bear in mind this caveat when
considering evidence concerning pain in
cephalopods. Nevertheless, the evidence certainly
does not preclude the possibility of pain in
these animals and, moreover, suggests that pain
is more likely in cephalopods than in the other
invertebrates with less "complex" nervous
organizations, considered in this review.
Comparisons between cephalopods and fish could
lend weight to this conclusion. Packard (1972)
has provided a comprehensive review of the
similarities between cephalopods and fish. He
concludes that "it might reasonably be argued
that the similarities between fish and
cephalopods are greater than between any other
two major groups belonging to different phyla.
The remarkable fact that cephalopods are like
fish in almost every other feature except in
their basic anatomical plan--that is, in its
simplest expression, cephalopods functionally are
fish--seems to have passed largely unnoticed."
Thus, if it can be agreed that fish have the
ability to perceive pain, this would suggest that
the possibility that cephalopods also feel pain
should be taken all the more seriously.
CONCLUSION: SOME PRACTICAL "WAYS FORWARD"
Clearly, in all this, there is the danger of
adopting an uncritical anthropomorphic (or, in
this context, perhaps a "vertebromorphic")
approach, which could lead to incorrect
conclusions about the experiences of invertebrates
(see Morton et al., 1990). Thus, it might be
inferred, incorrectly, that certain invertebrates
experience pain simply because they bear a
(superficial) resemblance to vertebrates-the
animals with which humans can identify with most
clearly. Equally, pain might incorrectly be
denied in certain invertebrates simply because
they are so different from us and because we
cannot imagine pain experienced in anything other
than the vertebrate or, specifically, human sense.
This limitation should be borne in mind when
considering the practical implications of the
tentative conclusions drawn from the evidence
presented above. Although pain might seem less
likely in the more "simple" invertebrates, than
in the most "complex" invertebrates, such as the
cephalopod mollusks (and, perhaps, decapod
crustaceans such as crabs and lobsters, not
considered here), this certainly does not mean
that the more "simple" invertebrates ought not to be afforded respect.
A principle of respect should lead those who use
invertebrates in research (or display them in
zoos, rear them for food, and so on) to try to
maintain the highest possible standards of
husbandry and care, so as to promote the animals'
general "well-being" and, whenever practicable,
to give the animals the benefit of the doubt
where questions of pain and suffering are concerned.
The well-being of invertebrates used for research
is being taken increasingly seriously.
Wigglesworth (1980), for example, has suggested
that for practical purposes it should be assumed
that insects feel pain and that they should,
therefore, be narcotized in procedures that have
the potential to cause pain. Cooper (1990) has
identified several practical ways in which the
well-being of invertebrates might be promoted. These include:
* providing husbandry conditions that match,
as closely as possible, those preferred by the species in the wild;
* assuring high standards of care, provided
by staff with an interest in invertebrates;
* avoiding unnecessary or insensitive handling or restraint;
* narcotizing the animals for any invasive or
disruptive procedures and during prolonged
restraint (some methods of anesthesia are described by Cooper, 1990) and;
* where possible, avoiding the use of the more "complex'' species.
To this list might be added:
* attempting to kill invertebrates by the
most humane methods possible and;
* providing suitable guidance and training
for all involved in the care and use of these animals.
Recently, the Canadian Council on Animal Care
(CCAC) established a Committee on Invertebrates
(CCAC, 1988a), and in the U.K., the Universities
Federation for Animal Welfare (UFAW) has
published a handbook on the care of cephalopods
in the laboratory (Boyle, 1991). Guidance on
caring for invertebrates might also come from
groups that keep these animals for purposes other
than research. In 1987, the National Federation
of Zoological Gardens of Great Britain and
Ireland convened a Working Group on
Invertebrates. Among other activities, this group
is producing codes of practice for those who keep
invertebrates. The second of these codes gives
guidance on methods of humane killing (National Federation of Zoos, 1990).
Consideration is also being given to including
invertebrates, especially the cephalopods, under
some systems of control of animal experiments.
Most such statutory or non-statutory systems
cover only vertebrate species. However, the
CCAC's list of "Categories of Invasiveness in
Animal Experiments" recognizes that "cephalopods
and some other higher invertebrates have nervous
systems as well developed as some vertebrates"
and so might be included in categories in which
pain and distress (including "severe pain") is
caused. Protocols involying these "higher"
invertebrates must be evaluated and approved by
an Animal Care Committee before the work can
commence (CCAC, 1988b). It has been suggested in
the U.K. also that there might be a case for
including cephalopods under the terms of the
Animals (Scientific Procedures) Act 1986 (Report
of a Working Party of the Institute of Medical
Ethics) (Smith and Boyd, 1991). Currently, the
Act protects only vertebrate animals, but its
terms provide for protection to be extended to
cover "invertebrates of any description" if, in
the future, this is thought appropriate. Whether
the inclusion of invertebrates species under
laboratory animal protection laws is indeed the
way forward is open to further discussion. Such a
debate, nevertheless, helps to promote careful
consideration of the use of all animals in
research, not simply the use of animals which possess backbones.
The question of pain in invertebrates will be
extremely difficult to resolve--if, indeed, it is
resolvable. In the meantime, perhaps it can be
agreed that it is most appropriate to concentrate
efforts on maintaining and improving the general
well-being of invertebrates used in research,
that is, to ensure that these animals are kept in
the best and most appropriate conditions during
their lives in the laboratory; given the benefit
of the doubt in procedures which have the
potential to cause pain and distress; and, when
the time comes, killed in the most humane manner possible.
ACKNOWLEDGEMENT
I am very grateful to the Institute of Medical
Ethics and the Leverhulme Trust for their support
in the preparation of this paper, which was
written while working for the Institute of
Medical Ethics' Working Party on the Ethics of
Using Animals in Biomedical Research.
National Federation of Zoos. 1990. Euthanasia of
Invertebrates. Codes of Practice for the Care of
Invertebrates in Captivity, 2. London: National
Federation of Zoological Gardens of Great Britain and Ireland.
Russell-Hunter, W. D. 1979. A Life of Invertebrates. New York:Macmillan.
Sinel, J. 1906. An Outline of the Natural History
of Our Shores. London: Sonnenschein.
Smith, J. A., and K. M. Boyd. eds. 1991. Lives in
the Balance: The Ethics of Using Animals in
Biomedical Research (Report of a Working Party of
the Institute of Medical Ethics). Oxford: Oxford University Press.
| |
Water is a critical factor limiting economic and social development in Morocco and the Mediterranean Basin. In addition to strong seasonality and high inter-annual variability, annual precipitation remains low (<500mm) ...
Strategic last-mile distribution network design under demand uncertainty
(Massachusetts Institute of Technology, 2020)
We propose quantitative models to incorporate demand uncertainty and physical distribution flexibility into the strategic design of last-mile distribution networks. Last-mile distribution typically constitutes the most ...
Tackling car-sharing service design problems at scale with high-resolution data : discrete simulation-based optimization approaches
(Massachusetts Institute of Technology, 2020)
This thesis considers the design of two-way (i.e., round-trip) car-sharing services. The optimization problems are formulated as high-dimensional discrete simulation-based optimization (DSO) problems. Existing DSO algorithms ...
Fundamentals in unsteady fluid fragmentation from drop impact
(Massachusetts Institute of Technology, 2021)
Fluid fragmentation is ubiquitous in industrial, agricultural and natural settings. An important class of fragmentation processes is unsteady, continuously generating droplets of properties that vary over time. Yet, the ...
A multiscale framework for the chemomechanical characterization of ancient heterogeneous materials
(Massachusetts Institute of Technology, 2021)
Over the course of hundreds--or sometimes even thousands--of years, ancient building materials have survived environmental exposure, modifications, and restorations, often to an extreme degree. These processes, which have ...
Numerical modeling, characterization and monitoring of the seasonal behavior of expansive clays
(Massachusetts Institute of Technology, 2020)
Seasonal ground movements associated with the swelling and shrinking of expansive clays represent a major cause of damage to buildings, roads, and pipelines. The processes that give rise to these movements involve complex ...
An environment-dependent framework to study ecological networks
(Massachusetts Institute of Technology, 2020)
Species interactions are central for the persistence of almost every form of life on Earth. Ecological networks provide an integrated representation of how species interactions are organized within ecological communities. ...
Risk Assessment and Optimal Response Strategies for Resilience of Electric Power Infrastructure to Extreme Weather
(Massachusetts Institute of Technology, 2021-06)
Extreme weather is an increasingly critical threat to infrastructure systems. This thesis develops a stochastic modeling and decision-making framework for proactive resource allocation and response strategies to improve ...
Toward antiquity-inspired design in materials and construction: Insights into the production and durability of the ancient materials Egyptian blue and Roman concrete
(Massachusetts Institute of Technology, 2021-06)
With increasing pressure on the global climate, there is a dire need to reduce the impact of both resource use and production of manufactured materials. In particular, modern ordinary Portland cement is responsible for up ...
Soil-Plant-Atmosphere Coupling during Interstorm Periods
(Massachusetts Institute of Technology, 2021-06)
The future trajectory of net terrestrial carbon uptake and agricultural yields are dependent on how vegetation responds to climate forcings. However, characterizing vegetation responses to water stress and other environmental ... | https://dspace.mit.edu/handle/1721.1/131022/discover?filtertype_0=department&filter_relational_operator_0=authority&filter_0=59d6a8cb484d5899fa11743141e4e7ab&filtertype=dateIssued&filter_relational_operator=equals&filter=%5B2020+TO+2022%5D |
The United Nations Population Fund (UNFPA) on Wednesday called on the Federal, State and Local Governments to implement laws and policies that would empower and guarantee women and girls’ bodily autonomy. The UNFPA Country Representative, Ms Ulla Muellar, made the call in Kaduna at the official launch of the 2021 State of the World Population Report.
Muellar, who was represented by the Deputy Representative, Erika Godson, said that this was the first time the report focuses on bodily autonomy – ‘the power to make choices about your body, without fear of violence or having someone else decide for you’. She added that women and girls need to be able to make fundamental choices about their bodies, gain their autonomy and advance in their health education, income and safety.
According to her, the denial of bodily autonomy is a violation of women and girls fundamental human rights. “This reinforces inequalities and perpetuates violence arising from gender discrimination and it is nothing less than an annihilation of the spirit and it must stop“.
A woman who has control over her body is more likely to be empowered in other spheres of her life by gaining not only in terms of autonomy, but also through advances in health and education, income and safety. “Only 55 per cent of women worldwide are fully empowered to make choices over healthcare, contraception and the ability to say yes or no to sex,” according to the report being launched in Kaduna“. In Nigeria only 46 per cent of married women between the ages of 15 to 49, are able to make decisions regarding their sexual and reproductive health and rights”.
Muellar said that the report documents many ways that the bodily autonomy of women, men, girls and boys was violated. She said that UNFPA would continue to stand with the hundreds of thousands of others who were chronically kept from making autonomous decisions about their bodies. | https://suprememagazine.org/unfpa-advocates-laws-policies-to-guarantee-women-body-autonomy/ |
Forrest Read is a Principal in the Raleigh, North Carolina, office of Jackson Lewis P.C. He has extensive experience in both business immigration law and employment law and has particular focus in legal issues in graduate medical education (GME).
Mr. Read's immigration practice focuses on assisting employers in obtaining employment-based nonimmigrant visas (e.g., H-1B, L, O, TN) for foreign national employees and work-related immigrant (green card) visas, including PERM Labor Certifications, and advising employers on compliance with U.S. immigration laws and regulations. He has broad experience in advising large, mid-size and small employers on their various immigration needs and developing strategies to help them navigate through complex immigration issues. He also has particular experience in counseling employers in the health care industry and addressing immigration-related issues that arise for their broad range of health care professional employees (including advising on and obtaining employment authorization for medical residents and fellows and obtaining J-1 visa waivers for foreign national physicians completing their medical training in the United States). His immigration practice also includes defending employers in connection with Department of Labor H-1B and H-2B investigations.
Mr. Read’s employment law experience includes representing management, particularly academic medical centers in the GME context, in a wide array of workplace disputes and litigation before federal and state courts and administrative agencies, including matters related to discrimination, retaliation, harassment, disability, family and medical leave, various wage and hour issues, contracts, and intentional torts. He advises academic medical centers on the interplay between applicable academic law and employment law and the ramifications of what are divergent legal requirements and standards. Mr. Read also provides counsel with respect to the legal impact of competency standards for residents and trainees in GME, including situations involving discipline, remediation, and dismissal. He provides advice and guidance in the peer review process, including provision of verification and assessment of training in response to third party inquiries.
As a member of the Firm’s Corporate Diversity Counseling group, Mr. Read also has experience in providing assessments and making recommendations to corporate and institutional clients with respect to diversity and inclusion policies and initiatives, conducting related internal investigations, and shaping, developing and enforcing effective policies and initiatives to ensure consistency with client values and in furtherance of business goals and objectives.
Update: Ethiopia Designated for Temporary Protected Status (TPS)
Ethiopia has been designated for Temporary Protected Status (TPS) for 18 months beginning on December 12, 2022 and extending until June 12, 2024. Only Ethiopians already residing in the United States as of October 20, 2022, who can also demonstrate continuous physical presence since December 12, 2022, will be eligible to register. Eligible applicants will…
Diversity Visa Program Open for FY 2024
The Diversity Visa (DV) Lottery is open for FY 2024. Applications may be filed online until 12:00 p.m. ET on November 8, 2022.
The DV Lottery program makes 50,000 immigrant visas (“green cards”) available every year to applicants from countries with low rates of immigration to the United States. Eligible individuals must meet certain requirements…
DHS Announces 18-Month Extension for Burma TPS
The Department of Homeland Security (DHS) has extended Temporary Protected Status (TPS) for Burma for an additional 18 months from November 26, 2022, through May 25, 2024, due to the extraordinary and temporary conditions in Burma that prevent individuals from safely returning. This means that approximately 1,000 current beneficiaries will be able to remain in…
USCIS Resumes the Cuban Family Reunification Parole Program
USCIS is resuming the Cuban Family Reunification Parole (CFRP) Program beginning with already pending CFRP applications. This program started in 2007 and has been on hold for some time. It allows beneficiaries of approved Forms I-130, Petitions for Alien Relative, to come to the United States on parole while waiting for an available visa number. …
Syrian Temporary Protected Status Extended Again
Syrian Temporary Protected Status (TPS) has been extended and redesignated until March 31, 2024.
Those already holding Syrian TPS must apply for the extension of their status and employment authorization (if desired) during the 60-day registration period beginning August 1, 2022, and running through September 30, 2022. Employment authorization will be automatically extended until September…
Venezuela Temporary Protected Status Extended for Additional 18 Months
Temporary protected status (TPS) for Venezuelans already in the United States has been extended until March 10, 2024.
Venezuelan TPS was first announced by Secretary of the Department of Homeland Security Alejandro Mayorkas in March 2021 due to the country’s severe political and economic crisis. That status was set to expire on September 9, 2022,…
Deferral of Enforced Departure Extended for Liberians
President Joe Biden has extended Deferral of Enforced Departure (DED) and employment authorization for Liberians until June 30, 2024. Accordingly, the Department of Homeland Security (DHS) will publish instructions regarding the implementation in the Federal Register.
Because of armed conflict, civil strife and Ebola, Liberians were granted Temporary Protected Status (TPS) in 1991. By 2007,…
How to Calculate EAD Automatic Extensions
Automatic Employment Authorization Document (EAD) extensions are confusing. Before you can figure out whether one of the various extensions applies, you need to identify the EAD category. | https://www.globalimmigrationblog.com/author/fread/ |
In the video industry, there are more problems than you might expect.
There are too many of them to list in one post.
And if you’re not up to speed on the current state of the industry, then maybe you’re just a little bit behind.
The 5 biggest ones: 1.
A lack of quality control: The video industry is full of problems.
The video editors and producers are getting better and better at their jobs, but there are still problems.
There is a lack of proper quality control in the production process.
There aren’t enough people with proper editing skills.
And as a result, many of the things we see on the internet are not produced in a way that’s actually the best way to create content.
This problem doesn’t just apply to video editing.
Video production has a lot of problems that affect how it looks and sounds, how it is organized and edited, how the people are approached and how the stories are told.
We are seeing this in everything from sports to documentaries to music.
If you look at any of these things, there’s a lot more of a problem than a lot better.
2.
Poor communication: In addition to the above problems, there is a great deal of communication that needs to be done.
Video editors, producers and other people involved in video production need to be on the same page.
Video can be very complex, and many of us don’t have the ability to communicate in a clear and understandable way.
This means there is always a lot going on, and it can be hard to follow along.
3.
Lack of budget: If we’re going to talk about the production of video, we’re talking about the budget.
We need to think about how much money is needed to make a video.
This can be complicated, but basically we need to figure out how much time we’re spending on each shot.
We also need to make sure that we have enough money to get the right kind of equipment to do the work that needs doing.
If we don’t do this, there will be problems down the line.
4.
Lack and confusion: The production process for video is complicated.
When it comes to making videos, there really isn’t much that can be said that can’t be done by someone else.
It’s not like you can get a bunch of people together and say, “Here’s the script, here’s the footage, and here’s what you’re going for.”
There is so much going on.
This is why we see a lot less time spent on a script than on the final product.
It takes time to do all of the editing and the filming and the final edit.
5.
Lack in communication: Communication is the most important thing.
There needs to really be an agreement about how to communicate things.
If a director or producer says something and then it’s not followed up, there may not be any progress made.
This creates a lot, and often a lot to work with.
If communication is poor, there could be problems in making a successful project.
So there are some of the problems that can make it difficult to make good video.
But in terms of the big problems, the ones that are the biggest, there aren’t many bigger.
Let’s start with the big ones.
1.
Poor quality control for video production: As I mentioned before, the problem of poor quality control is something that has existed for quite some time.
If the production team has trouble getting the right equipment, they may not know what to do with the footage.
If they don’t know what the equipment is going to do, there might not be enough time to get everything right before the project goes into production.
And if the quality control of the equipment gets to be too bad, there can be serious problems down any production line.
For example, if someone decides to make the film in a very dark room, there isn’t going to be any way to see the film with any kind of proper lighting.
If it gets too dark and you can’t see the characters, you won’t be able to tell if the film is good or not.
If the quality is poor and people don’t communicate well, it could cause problems down that line as well.
2.
Poor budget: There is no question that the production costs of video have gone up over the years.
But there are also more issues with the budget that have been overlooked.
When we think about it, there was a lot that went into making a film like the one that came out of this series called The Lad.
There was a $4 million budget, $3 million for the sound, $1 million for lighting and sound, and $500,000 for wardrobe.
The final product was $8 million.
3.
Lack communication and a lack in budget: This one is just a matter of common sense. | https://mirayyapim.com/archives/24 |
This unprecedented report is the result of several months of in-depth research by the Data Collection and Analysis Team of the SACD and it documents widespread and systematic violations suffered by Syrian who were forced to return to Assad-held areas of Syria. The researchers worked in extremely challenging conditions to interview 165 people in Homs, Damascus countryside, Dara’a and Aleppo to obtain a valid, reliable and comprehensive picture of the situation facing returnees in Assad-held areas of Syria. The report has a unique at this particular time when the fate of some 13 million displaced Syrians forms one of the key questions for the future of Syria, with implications for the stability of the region and beyond. The report’s importance is made more significant by the fact that no international organization, including the UNHCR, has real, uncensored access to all areas under Assad’s control.
Assad’s regime is intensively implementing a policy of demographic change aimed at stripping a huge portion of the displaced Syrians of their homes and properties through discriminatory laws, demolitions and false “reconstruction” activities. The regime and its Russian allies are desperate for international funds, especially from the European Union, to finance their “reconstruction” and create new realities on the ground with a multi-pronged effort to Syria’s demographic picture before the organized return of the displaced takes place. To achieve this objective, they are actively promoting a false narrative that the displaced are free to return to Assad-held areas, that the returnees will be safe from persecution and harassment, and allowed to reclaim their properties and enjoy a peaceful life. As this report reveals, nothing could be further from the truth.
This report and its underlying research com¬prise an unprecedented effort to gather tes-timonies from people who have returned to Assad-held areas (mostly due to dire living conditions in the displacement locations or because they believed the regime’s promis¬es of safe return) and those who remained in formerly opposition-controlled areas after they were retaken by regime forces under so-called reconciliation agreements. | https://syacd.org/reports/vengeance-repression-and-fear-reality-behind-assads-promises-to-displaced-syrians/ |
A Job Is Not Enough
Here at the SF Fed, we talk a lot about “full employment,” which our president John Williams describes as the situation where everyone who wants a job is able to find one. Although this is a critically important goal from a macroeconomic standpoint (and part of the Fed’s dual mandate), it doesn’t speak to the quality of those jobs or consider the changing nature of work itself and the resulting impact on the financial well-being of workers and families. Whether it’s part-time workers unable to find full-time jobs or low-wage workers displaced from neighborhoods near job centers, it’s becoming increasingly clear that, when it comes to financial stability, simply having a job is not enough.
In an effort to explore how these issues are playing out in the Bay Area, the SF Fed, in partnership with the Center for Financial Services Innovation, the Citi Foundation, and the San Francisco Office of Financial Empowerment, hosted a regional conversation on “Building Financial Resilience in the Bay Area,” centered on the recently released book The Financial Diaries: How American Families Cope in a World of Uncertainty. Rachel Schneider of CFSI and Jonathan Morduch of New York University, the book’s authors, kicked off the discussion by peeling back the layers of the standard measures we so often rely on, such as annual income or poverty and unemployment rates. By following the day-to-day financial lives of 235 families from across the country, The Financial Diaries paints a vivid portrait of the rise of income and expense volatility and the importance of a predictable paycheck and a savings cushion (not in the traditional sense of a retirement nest egg, but rather a resource to draw down in the near-term when income and expenses inevitably get out whack). In fact, a majority of American households would prefer financial stability to a higher income.
A panel of local experts reflected on these themes through the lens of the Bay Area, hitting on topics such as soaring housing costs and increasing homelessness, the difficulties of low-wage jobs in a high-cost area, and the need to foster equitable economies that work for people of all races and incomes. Charise Fong, COO of the East Bay Asian Local Development Corporation, described the incredible volatility in the Oakland housing market over the past decade, from the home price run up in the mid-2000’s to the devastation of the foreclosure crisis that wiped out generations of wealth building efforts in West and East Oakland, as well as the most recent crisis of homelessness increasing 39 percent over the last two years in Alameda County, all in the face of increasing financial fragility at the household level. “This level of housing and income volatility and instability is translating into a public health crisis,” said Fong. Speakers also pointed to possible interventions and solutions, such as how employers need to be engaged to improve the pipeline of lower-income workers into good paying jobs, efforts such as San Francisco’s Retail Workers Bill of Rights, and the necessity of improving the safety net for low-income people.
It was evident across the entire discussion that the issues of financial instability, housing, jobs, health, education, and financial services are deeply interwoven and must be considered holistically. “There is no magic pill we can take to fix everything—but if we continue to work in silos we will never reach our North Star,” said Brandee McHale, President of the Citi Foundation. The SF Fed is committed to fostering cross-sector approaches that expand economic opportunity for lower-income Americans, and regional conversations like this one are critical for evolving our collective understanding of how to change the narrative around economic insecurity and build financial resilience for all. | https://www.frbsf.org/community-development/blog/a-job-is-not-enough-full-employment/ |
Can teacher-preparation programs be ranked by effectiveness? Not if the rankings are based on student test scores, according to a new analysis.
Rankings of teacher-prep programs, when they are based on the test scores of the graduates’ students, are so prone to error that they may as well have been assigned at random. That’s what researchers discovered when they reviewed the evaluations of teacher-prep programs in Texas, Florida, Louisiana, Missouri, Washington state, and New York City.
“Where a program falls in a given year’s rankings, and whether it moves up or down from one year to the next, is typically more a matter of luck than of quality,” write the researchers Paul T. von Hippel and Laura Bellows. Hippel is an associate professor of public affairs at the University of Texas at Austin and Bellows is a doctoral student in public policy at Duke University.
The differences between programs in each of the six states, according to their analysis, were too small to matter. So students with teachers from a good (as opposed to an average) teacher-prep program might see a boost in their test scores of 1 percentile point or less. This was true even for programs in Louisiana and New York City, where earlier reports had claimed considerable differences. It was those reports that sparked the recent drive to hold teacher-prep programs accountable for the quality of their graduates, Hippel and Bellows say.
Their analysis did turn up some exceptions. Up to two programs per state graduate teachers whose impact on student test scores is significantly better than average. Teach For America and UTeach are examples, yet the researchers point out that “their effects are moderate in size and limited to math and science.” Further, the results were gleaned not from state report cards but from evaluations focused specifically on Teach for America and UTeach programs.
You may remember that in October 2016 the U.S. Department of Education released rules requiring states to rate teacher-preparation programs every year using several criteria, such as their graduates’ impact on student test scores. President Donald Trump signed a bill scrapping the rules the following year.
In spite of Trump’s bill, states still have policies that require teacher-prep report cards. As Hippel and Bellows report, Louisiana has been rating its programs for more than a decade. In 2010, 11 states and the District of Columbia won funding through Race to the Top to develop report cards. And some 21 states and the District of Columbia share data connecting teachers’ student outcomes to their prep programs.
So how should states rate the quality of their teacher-prep programs? The researchers say states should avoid relying on reports by principals or supervisors doing teacher observations, as these reports are often biased. Teachers’ own ratings of their prep programs would also likely prove biased, though they might be useful to the programs themselves.
Hippel and Bellows instead suggest that states track how successful teacher-prep programs are at keeping their graduates in the profession, especially at high-needs schools. This can be done by checking program rosters against employment records.
“If a large percentage of a program’s graduates are not becoming teachers, or not persisting as teachers, that is clearly a concern,” the authors write. “Likewise, if a large percentage of graduates are persisting, especially at high-need schools, that is a sign of success.”
See also:
- New Federal Teacher-Prep Rules Draw Praise and Criticism
- Trump Signs Bill Scrapping Teacher-Prep Rules
- Review of Graduate and Alternative Programs Finds Gaps in Teacher Prep
A version of this news article first appeared in the Teacher Beat blog. | https://www.edweek.org/teaching-learning/teacher-prep-rankings-that-use-student-test-scores-are-not-reliable-says-analysis/2018/05 |
Our department:
The business area Europe (E) is responsible for development, ownership and operation of wind and solar assets in Europe. The business area is also responsible for the project execution of large projects in Statkraft across the energy technologies, the group procurement function and new business opportunities.
The Health, Safety and Security (HSS) team in Statkraft’s Project Delivery Unit is responsible for HSS management during all phases of project execution and for developing and implementing the HSS practices across all the business area’s activities. It is also responsible for HSS expertise and resources in the projects.
We are growing our business and need a H&S advisor located in Norway to strengthen the support to developments in our Hydrogen portfolio. The position will be based in Oslo, but this is not an absolute requirement.
You will on a daily basis be part of the team supporting our hydrogen project portfolio, from early development through construction and handover to operations. The position reports to Head of Technical Safety, which is part of the HSS unit for the business area, located at the corporate headquarters in Oslo.
Your role:
You will have the role as H&S advisor for the hydrogen project portfolio. You will be the focal point on H&S in the hydrogen projects. You will influence and develop our way of working with hydrogen safety. During project development you will implement our way of working, ensure compliance and be part of shaping our projects. For the construction phase you will ensure that we have the resources to fulfil our role as Client.
As part of the HSS team in the business area you will also be involved in work related to other renewable technologies and general health and safety.
Your main responsibilities will be to:
-
Advice the project teams on H&S matters from early development throughout to handover to operations
-
Ensure that our hydrogen project portfolio is in compliance with applicable H&S rules and regulations, including the implementation of efficient H&S work processes
-
Hold the role as SHA-coordinator for the development phase (SHA – KP), including participation in the project procurement process
-
Coach, manage and follow-up SHA-coordinator for the construction phase (SHA – KU)
-
Liaison with contractors’ HSSE staff in the construction phase
-
Ensure H&S training and campaigns are rolled out as necessary in the projects
-
Contribute to the establishment of a good safety culture in the projects – including project kick-offs
-
Carry out technical safety reviews, inspections and audits across the hydrogen project portfolio
-
Participate in assurance and investigation activities to support projects elsewhere in our project portfolio
-
Liaise with authorities and government bodies, including participation in safety forums and technical committees on behalf of Statkraft
Qualifications
-
University degree in engineering or equivalent
-
More than 5 years relevant experience within technical safety in an industrial work environment, ideally from process industry or similar
-
Experience from development or execution of projects, and/or operation & maintenance
-
Good knowledge of Norwegian health and safety legislation, in particular rules and regulation from The Norwegian Directorate for Civil Protection (DSB) and relevant international standards
-
Familiar with ATEX standards
-
Experience in use of risk analysis techniques such as HAZID, HAZOP, but also quantitative risk assessments and CFD
-
Analytical and result oriented, structured and flexible with ability to create good work relations
-
A team player, who can work independently
-
Good verbal and written communication skills in Norwegian and English
Additional Information
A career with Statkraft is a career filled with purpose – meaning that every employee is not just making a living, they are making a real difference to the planet, our communities, and the future. With us, you’ll shape a career that is truly forward-facing with many amazing opportunities and offerings to match. This includes:
-
Professional and personal development in a company experiencing strong growth
-
An inclusive, positive working environment characterized by experienced, open and committed colleagues with a high degree of integrity
-
A diverse workplace with regards to gender, age, and cultural background
-
Competitive terms of employment and good benefit schemes
Statkraft manages critical infrastructure and services in several countries. The applicant must be eligible for security clearance and authorization.
The position will be located at the head office at Lilleaker, Oslo. Travelling will be required, both in Norway and internationally. | https://biogassbransjen.no/stilling/health-and-safety-advisor-hydrogen-technology/ |
We are very happy that we can share the workshop that Seeta Patel created for Sadler's Wells, London's Dance House.
In this 30 minute workshop, designed for over 60s, dancer and choreographer Seeta Patel guides you through the basic elements of the Indian classical dance style of bharatanatyam.
The workshop will focus on three main techniques of this ancient and traditional art form, including footwork, hand gestures and facial expressions. It has been specially adapted for those aged 60+ but anyone in your household can join in and enjoy! | https://korzo.nl/en/calendar/company-of-elders-workshop-bharatanatyam/ |
Skull remains of a naledi infant have been uncovered deep within the cave system where Homo naledi was discovered. The parts when put together reveal something about naledi anatomy at the age of six or thereabouts, but the spot where they were discovered may be the most relevant aspect of the find.
One of the major science stories of the recent decade was the discovery of Homo naledi. We have more of their fossils than most other hominins only from the Rising Star Cave System.
Nothing known about the behavior of this branch of the human family living alongside modern humans, the discovery of the skull of a naledi infant named Leti, the first naledi child fossil, may provide us with a starting point.
Leti’s finding was published in PaleoAnthropology, along with an article that updated our knowledge of the cave system. Leti had attained “90 percent to 95 percent of its adult brain capacity” with a brain size of 480-610 cubic centimeters (29-37 cubic inches), despite her teeth indicating she was just four to six years old, according to Dr. Debra Bolter, a co-author on the research. (Anthropologists are using female pronouns for the time being because Leti’s gender has not been established.)
Professor Lee Berger, the team’s leader, remarked, “Homo naledi remains one of the most intriguing early human cousins ever discovered.” “It is certainly a primitive species, surviving at a period when we thought Africa only had modern people. Its existence at the period and in this location complicates our understanding of who invented what first in terms of intricate stone tool civilizations and even ceremonial behaviors.”
Because of naledi’s modest brain size, it was once thought to be exceedingly old, with one estimate putting the fossils’ age at two million years. However, a further study utilizing electron spin resonance revealed that the teeth were between 335 and 241 thousand years old, indicating that Homo sapiens, or our direct ancestors, were living in Africa at the time, most likely quite nearby.
“The place where Leti was discovered is part of a spiderweb of confined corridors,” said Maropeng Ramalepa, who assisted in the retrieval of things. Exploring these tubes, which may be as narrow as 15 cm (6 inches) in width, has proven difficult, with only petite women being able to access many portions of the system, and then only with difficulty.
Although Homo Naledi was smaller than us, they must have found certain cave tunnels to be a tight squeeze, which they apparently handled without the aid of light.
Leti is a truncation of letimela, which means “the lost one” in Setswana because his skull was discovered so far away from other naledi corpses. Leti’s other bones are missing, and the head, which is 80 centimeters (32 inches) above the cave floor, couldn’t have been washed or dragged there by animals.
Other naledi must have deposited the skull there, according to the authors. It’s unclear why they did this. Perhaps it was a gesture of respect from a bereaved parent. If this is the case, it means that the naledi, although having brains far smaller than ours, conducted fundamental burial ceremonies.
Previous research has shown that the adult naledi fossils discovered in the Rising Star Cave System did not die there, but rather that the caverns served as a mausoleum for the deceased, maybe to shield remains from predators. If that is the case, the lack of damage by predators or scavengers indicates that it was a success. | https://www.assignmentpoint.com/science/plants-and-animals/homo-naledi-childs-skull-may-reveal-how-they-treated-their-dead.html |
Assessment of clinically relevant dose distributions in pelvic IOERT using Gafchromic EBT3 films.
In IOERT a single dose of radiation is delivered to the tumour site during surgery. Manual dose calculations are used and the irradiation target volume, electron energy and applicator are decided on site by the radiation oncologist. This work assesses the effect that irregular and curved surfaces, typical of pelvic IOERT, may have on the expected dose distribution. The feasibility of using Gafchromic EBT3 films and a slab phantom to obtain 2D dose distributions was investigated. Different set-ups were tested by comparison with water tank measurements, applying the gamma function analysis with 2% and 2 mm criteria. The validated set-up was then used to obtain reference dose distributions, which were converted to colour-coded graphical representations. Phantoms with step-like and curved surfaces were created to simulate typical pelvic IOERT irradiation surfaces, and the dose distributions were obtained and compared with the reference distributions. Good agreement with water tank measurements was obtained for all applicators below 2 mm, using the chosen setup in reference conditions. In non-reference conditions, the presence of a step-like surface creates an adjacent hotspot, followed by a quick reduction of the dose in depth. With curved surfaces, the dose distribution is shifted forward, becoming curved and deeper, but when the applicator is larger than the hole, hotspots are also observed. The shape of the irradiation surfaces alters the dose distribution. Visualization of these effects is important to assess target coverage and interpret in vivo measurements in pelvic IOERT.
| |
Like Alma-Tadema, E. B. Leighton paid tremendous attention to detail and historical accuracy in his work. He had an extensive collection of original 18th century costume pieces, instruments, and weaponry that he made good use of in his paintings. It must be said that a key element in both his medieval and 18th century costume works was a careful representation of costumes and fabrics. It was so important to him that if he could not find an original piece that suited him, his wife would work with a seamstress in an upstairs room recreating a replica from original dress patterns. He would use the live model to sketch out the precise way the fabric hung, and then transfer it to a dummy he kept in his studio, arranging it carefully in exactly the same manner to be left undisturbed until he had finished that section of the painting. He must have found them very beautiful and had a true passion for painting them. A particularly good example of this is Ribbons and Laces for Very Pretty Faces, which was a very popular work from his day. In this work alone EBL utilizes 19 different types of fabrics varying from lace, to silk, to embroidery, to velvet, to quilt, all painted with extreme detail, skill, and dedication.
Three woman stand at a doorway dressed in the most magnificent of gowns examining a selection of beautiful fabrics and ribbons. The brunette appears to be as taken with the seller as with the fabrics, while the youngest leans on her sister's arm, gazing off, having lost interest in the finery she is too young to appreciate. The viewer, whether they are a fan of Academic 19th century painting or not has to acknowledge that this work is a veneration of beauty, not only of fabrics but of young adulthood as well.
The copyrights for this work were purchased by the Berlin Photographic Company shortly after it was painted and the image was reproduced in fine quality prints for the public consumption. In addition Ribbons and Laces for Very Pretty Faces was given a full page plate in the 1913 art annual by Alfred Yockney and also illustrated in the 1904 Winsor Magazine.
--Kara Ross
Kara Ross, ARC Director of Operations, is researching and writing the Catalogue Raisonné on Edmund Blair Leighton. | https://uat1978.artrenewal.org/Artwork/Index/38884 |
Today there are more and more images in circulation than ever before in the history of photography and that is only likely to increase exponentially as people gain access to more technology in their lives capable of recording images. If I ignore my professional cameras in our house we have more than a dozen devices capable of recording images ( smartphones, computers, games consoles and surveillance cameras.) We are an increasing visual society because and our attention span continues to decrease something John Berger remarks on this fact in the film “Art, Poetry and Particle Physics” (2004) by Ken McMullen. I am casting my practice into this sea of images where attention span of the observer is reducing which poses the question of how to differentiate my practice for another technically accomplished photographer’s practice. This week’s topic has encouraged me to consider this challenge or opportunity (I prefer the positivity of the later). After further considered reflection I have come to the realisation that my practice is an extension of me rather than conforming to a specific photographic style or genre.
When aligning my practice to a specific ideology by inference it is about my own ideological alignment. Ideologically I consider myself as an Individualist with the right to self-determination through knowledge. Such a statement comes with a great deal of responsibility towards my subject matter and the reader. I believe my photography is not there to provide others with the answers but instead to encourage them to question subjects, through the application of knowledge and reach their own conclusions. I would go further and view it as freethought based on the following quote.
“The person who is free in any respect is free from something; what is the free thinker free from? To be worthy of the name, he must be free of two things: the force of tradition, and the tyranny of his own passions. No one is completely free from either, but in the measure of a man’s emancipation he deserves to be called a free thinker.”
— Bertrand Russell, The Value of Free Thought.
My images encourage the reader to ask questions of themselves, society and their environment without necessarily providing answers to those questions. This is summed up a quote from Barthes in Camera Lucida.
If I like a photograph, if it disturbs me, I linger over it. What am I doing, during the whole time I remain with it? I look at it, I scrutinize it, as if I wanted to know more about the thing or the person it represents.
As photographer I am in a position of power because I determine when the camera records the referent. Barthes describes it with following quote.
This fatality (no photograph without something or someone) involves Photography in the vast disorder of objects-of all the objects in the world: why choose (why photograph) this object, this moment, rather than some other?
My practice is diverse and the negotiation of power between subject and photographer shifts depending upon the specific body of work. When shooting objects and landscapes I am the sole arbiter and assume overall accountability as to how I represent the subject. When working with a sitter the power negotiation occupies a broader spectrum of outcome. If the sitter is commissioning the work they have the final say but the reason I am photographing them is because they want my aesthetic incorporated into the image and this creates a more complex power negotiation. In between these two examples is the situation where I am engaging with models or sitters to collaborate with me on a body of work.
The primary direction for my practice is biased towards fine art and therefore I want my bodies of work to be compared with other works of art and not viewed exclusively within a photographic context. | http://fineart.photography/a-sea-of-images-reflection/ |
photo credit: Horia Varlan
Imagine, if you will, a United States Congress in which each member is elected by the entire country. 535 Senators and Representatives appeal to the American masses for their election, and all congressmen represent everybody in an “at-large” political body.
Your wrinkled facial expression betrays a near-universal reaction to such a proposal: disgust, strong disagreement, and numerous predictions—all likely true—of what an “at-large” Congress would end up doing to the country. There is a principle upon which all agree who understand the importance of the structure put in place this nation’s founders. That principle is proper representation.
“The difference most relied on, between the American and other republics,” wrote James Madison, “consists in the principle of representation.” The separate and often contrasting interests between different States were united through a compound Republic with a bicameral legislature. The nature of representation was one widely debated in the formation of the Constitution. Consider the following from one of the Anti-Federalists:
Experience has taught mankind, that legislation by representatives is the most eligible, and the only practicable mode in which the people of any country can exercise this right, either prudently or beneficially. But then, it is a matter of the highest importance, in forming this representation, that it be so constituted as to be capable of understanding the true interests of the society for which it acts, and so disposed as to pursue the good and happiness of the people as its ultimate end. The object of every free government is the public good, and all lesser interests yield to it. That of every tyrannical government, is the happiness and aggrandisement of one, or a few, and to this the public felicity, and every other interest must submit.
Analyzing the issue in detail, it was decided, as one delegate in New York mentioned, “that the representative should be chosen from small districts.” Only then could the distinct interests of the people find a voice in influencing legislation and better informing how to promote the general welfare, of which they were a part.
This principle is not one which finds no other reasonable application outside of Congress. Indeed, the same holds true at the state level; individuals are elected from the various parts of the state to join together in one legislative body to discuss matters of importance to the whole, with each representing their different (and differing) constituencies. The absurd example mentioned at the outset of this article applies equally here. Few would consider a legislative body to be truly representative of the whole when its members are comprised from a small area of the geographical boundaries of that state. Having little to no relations with those in the outlying or un-represented areas, they would be ignorant of their concerns and ambivalent to their unique interests.
But why stop at the state level? If proper representation is a true principle for legislative bodies claiming to act in the name and for the good of the people within their jurisdiction, then that principle applies equally well at the municipal level.
An article in yesterday’s Daily Herald highlights an upcoming initiative that would give citizens in Lehi the opportunity to enforce this principle by changing the form of the city council. Whereas the council is currently comprised of five members elected “at-large”—meaning that each is elected by the votes of a majority of the whole city—the initiative, if passed, would create five districts for city council representation. Current council members would each be assigned to one district, and future elections would be on a district basis, with each subgroup of the city voting on only those candidates who reside in their district and seek the council position that pertains to their area.
For instructive purposes, here is a map of where the current council members live in Lehi, along with a (very rough) depiction of the city boundaries. Note that the newer communities in the north-western area of the city are in representative isolation:
Now, one might correctly rebut this insinuation of un-representation by suggesting that the voters in those isolated areas could mobilize and get their own candidates on the ballot, and turn out in droves to see them elected. This is true. But imagine that the residents in this area mobilize so well that they get every position on the council filled with an individual from their part of town. Then the map would simply reverse, and the city’s representatives would be based in a concentrated area still. Districts will solve this imbalance and ensure an equitable and fair representation between the separate parts of the city—especially important considering Lehi’s unusual geographic and demographic diversity.
Under districts, elections would be easier and cheaper for those interested in running, as they would be required to appeal to a lower number of voters. Accountability would increase, since the council member’s constituency would be smaller in size, and those voters could focus on a single council member over whom they have voting control. Each area of the city would feel like they had a voice on the council to advocate for their different interests.
Naturally, the idea is not being met without resistance. Quoted in the Herald article is Lehi’s mayor, who stated:
I’m an at-large kind of guy. Sometimes you don’t get the best decisions for the whole city when they are like that [when councils are district-based]. I like it the way it is right now, I think that if it’s not broke don’t fix it. People who are in council right now, they have the whole city in mind. It’s not my area and your area — it’s my community, you know.
Clearly, this response is not based on any principle or fundamental concept. It’s based instead on the status-quo, and an intellectually bankrupt defense of a system whereby council members claim to “have the whole city in mind.” Would 535 “at-large” congressmen really have the whole country in mind? Would a concentration of representatives based in the more populous areas of Utah have the whole state in mind?
Under an “at-large” system, each of the council-members are elected by the entire city. Thus, their constituency overlaps, and all five claim to represent everybody. I argue, as I was quoted in the Herald’s article as saying, that when multiple individuals in the same legislative body claim to represent the same group, that they in fact do not represent anybody. Each can pursue his own interests, content in the thought that the other members, representing the same group of people, are doing the actual “representing”.
This is not to say that the current council members are guilty of this poor representation. I am not making an accusation either way on that issue. This is not about them—it’s about proper representation. Lehi could enjoy a council filled with stellar individuals who try their hardest to represent the residents of the city, and I would still pursue this issue. It’s right, it’s grounded on principle, and it’s especially needed in a large city with a diverse demography.
I advocate that all overlapping constituencies be done away with, that the separate groups of different individuals be given an actual voice of representation for their unique concerns and interests. There are several cities in Utah which have followed this district-based format already—Provo, Ogden, Midvale, Riverton, Murray, Sandy, West Jordan, and many others—and should this initiative pass, as I hope it will, Lehi will be the next. | https://nothingwavering.org/2011/01/26/26187-real-representation-in-lehi-a-district-based-city-council.html |
An election can be defined as the process in which the citizens select the officials they want to run their government. The system of government in place in United States is a representative democracy in which Americans select representatives to reflect their interests at the governmental level.
In the United States, members of political parties hold various types of political primary elections to nominate the leaders they wish to represent them in both Presidential Elections and Congressional Elections.
Presidential Elections
Presidential elections take place in the United States every four years and include a President and Vice President. Presidents are limited to two terms in office to ensure that no one leader consolidates too much power and influence over the country, whereas Vice Presidents have no term limits.
The Electoral College is the process by which the President and the Vice President are officially elected. It is through this process that the United States is declared a representative democracy. Each individual state has a certain amount of “electors” as determined by their population and this number matches the number of members of Congress to which each state is entitled. Thus, there are 538 electors total, which correspond to the 435 members of the House and 100 members of the Senate and include 3 additional electors from the District of Colombia.
These electors are representative of the citizens of each state, as they pledge to vote in accordance with their constituents. The electoral votes needed to win in a presidential election are currently 270. These electoral votes are given on a winner take all basis where the majority of votes awarded to a candidate are then transferred to the electoral votes that candidate will receive from that particular state.
Congressional Elections
In the case of the legislative body of the U.S. Government, Senators are elected to a 6-year term and members of the House of Representatives are elected to 2-year terms. Congressional Elections are held every two years. Every other Congressional Election is held during the Presidential Election, where voters typically vote for their candidates of choice using a single ballot. During the alternate election cycles, Congressional Elections are referred to as Mid-term Elections.
The process for electing Senators and members of the House of Representatives in different than that of the President. Representatives and Senators are elected directly. For Representatives, only those with in the candidate’s corresponding district may vote, as each district has its own representatives seeking the election. In the case of Senators however, any registered voter in the corresponding state can vote in their election. | https://followmyvote.com/us-electoral-process/ |
When our beach house fell off a cliff due to El Nino years ago, we felt a horrible sense of loss at this sudden catastrophe. We had been married on the back deck, and the spot we’d stood upon and said our vows now hung out sixty feet in the air, a hundred feet above the roaring surf. In combing the beach after the disaster, I picked up one brick from the fireplace that we’d spent many long, peaceful hours in front of, watching the crackling fire and listening to the pounding surf.
I kept that brick on my kitchen window sill for years, and you can imagine the symbolism it held for me—and not just reminding me of my loss. For it also symbolized for me that something solid was salvaged from the wreck of my house (and of my family, which suffered massive emotional destruction). Seeing it gave me resolve, comfort, inspiration.
Objects in your novels can do likewise for your characters when you tie them in with key events in their past.
So you can start, perhaps, with an object that serves as a key motif in your story, then try to take it further. Explore this object in your mind and see what ideas it sparks. We discussed last week about using word associations. Think of emotional associations you can generate for this object (for your character) that will serve your plot and your character’s goal. What kind of object can symbolize persistence for him? Or represent an obstacle? What note would your character write and stick on his fridge to keep him going?
Secondary Characters Can Introduce a Motif
I try to come up with at least four or five motifs for every novel I write. I think of an object or two to work with, as well as a few key words or phrases that I have characters repeat either in speech or in their heads or both. Often a secondary character who serves as an ally to the protagonist will be the one to impart words of wisdom and advice, and this is a good opportunity to come up with a special phrase (and if possible, associated with some object) that can then be an important motivator for the protagonist.
In my sweet historical Western romance Colorado Promise (written under my pen name Charlene Whitman), I had a secondary character tell my protagonist that people in their town had a saying (I found this via my research, and it was perfect for the motif I had in mind for my book): “Bloom where you’re planted.” Since I had my botany-loving heroine take out west a special plant she loved, I repeated the motif and symbolism of both the plant (object) and the concept (growth, thriving, withering, adaptation) in various scenes, including the last wrap-up scene, which shows her finally planting the small tree in Colorado soil so it can “bloom where it’s planted.”
So think about a secondary ally character that can give advice or insight in a way that will introduce or reinforce a motif in your story.
Motifs Add Richness to Characters
In my novel Intended for Harm, I gave each of my seven main POV characters a motif. Each character was developed around a natural element. Jake was wood, Leah was water, Reuben was rock, Simon was fire, Levi was metal, Dinah was air, and so on. From this idea came multiple levels of motifs. Simon had a fiery temper. He smoked all the time. He embodied anger due to the specific hurt and rejection he suffered. He set the bed on fire. Reuben, the firstborn son, was the rock of the family. He loved to rock climb. He was also the big obstacle (rock) in the way for his mother. I had a great time playing one element off another. For Leah (water) was the only one who could calm Simon and take the fire out of him, whereas Simon’s “fire” kept setting his father (wood) aflame with anger.
This may seem way over the top, but to me, using these elements as rich motifs and symbols helped me write what I feel is my best novel. These elements, please note, were not randomly chosen. They inspired some of the characters’ traits, but they worked purposefully in my story. Otherwise I wouldn’t have used them.
So don’t choose random objects or words for motifs just because they’re catchy or unusual. Motifs need to serve the plot, and tie in carefully with your themes.
Think about your characters and their personalities. Is there an object that can emphasize a key trait? Give insight into your character? Something they look at or hold that keeps them going, keeps them plodding despite pain and opposition to their goal?
If you take the time to bring these motifs into your story, you won’t regret it. Your plot might not necessitate a motif, but I highly encourage you to consider building this pillar of novel construction. If done well, it can only help to make your novel more solid, substantial, and memorable.
And . . . It’s a Wrap!
Believe it or not, we’ve now covered all twelve key pillars of novel construction! You have below all your inspection checklists. Print them out and use them to closely examine your novel structure. If you can answer all 144 sets of questions to your satisfaction (and be hard on yourself!), your novel will bear the weight of scrutiny. With twelve strong, solid pillars, you can’t help but build a lasting, memorable novel.
In the last couple of weeks of this year, I’m going to review some key points about each pillar and share some last insights on this whole topic of novel construction. Be sure to bring any questions you have and share what has helped you the most in this course this year.
Any thoughts on motifs? Have you come up with a great one or two for your novel? If so, share what it is and why and how it works in your story.
Inspection Checklists: | https://www.livewritethrive.com/2014/12/17/layering-motifs-in-your-novel-for-powerful-effect/ |
Every day I start my morning by looking at hundreds of websites created by individuals, small studios, and other businesses. These past few weeks this routine habit turned into a harsh experience, as I followed many businesses' paths into a state of uncertainty and involuntary survival mode. And while seeing these businesses reinvent themselves and changing their products or brands is nothing short of astonishing, still, it’s distressing to understand where this change is coming from. As many small businesses and freelancers struggle to survive, facing the need to quickly adapt to unprecedented changes, these people set a humbling example for what it truly means to be creative. By keeping their work afloat, they demonstrate that creativity is much more than aesthetics, but an ability to meet an unimaginable challenge.
Having a family during this time means that days are extremely busy, with little to no spare time. I’ve noticed a spark in the need to create with those closest to us. We are more openly sharing our lives on social media, whether this is through exchanging crafting tips, cooking, or sharing our reading lists. But not everything is picture perfect. Our days are also filled with mundane tasks and real hardships that we can all relate to. We see the rise in the need to capture even these moments, and share those of others. Our focus has shifted from sharing only the “good life” to sharing our actual life. And as trend reports are already trying to assess what impact this event will have on our lives and on our work as designers, we can take a closer look at these non-Instagram-able moments, and see how they will shape the products we will design or the rebranding processes of existing ones. So many things will change, and from fashion and home decor to healthcare services, designers will help shape this change.
These new elements can also be found in our working habits. In our Design Team we’re training new creative muscles, placing a stronger emphasis on communication and clarity. The distance has also made an impact on our decision-making processes. In design, ideas and feedback can be personal, but this new online environment brings a refreshing impersonal perspective, making way for challenging, innovative ideas. And while these new ideas are welcomed, the feeling of togetherness we’re used to having is still crucial. This new situation means that we need to look for new ways to preserve this intimacy even though we are far apart, encouraging small gestures and acts of kindness.
During this time, we’re also thinking more about the real value and power of our community. We’re committed to you more than ever. Our efforts are invested in finding new ways to inspire and empower you through our platform of sharing knowledge and skills. You will get an invitation to our first online event soon, curated for our design community around the world. We are working on online workshops and masterclasses, portfolio reviews, inspirational lectures, the web design academy program, Instagram and more.
Looking at all that’s happening, I am humbled and inspired by the motivation driving and pushing these individuals forward. From businesses, freelancers, artists, studios, to my own community, family and teams I work with - we are all facing an important and challenging time, where creativity will play an important - if not critical - role as a tool for survival. We will continue to serve as a platform for ideas, tools and solutions to answer these needs. If you would like to share your own ideas of things you find inspiring and interesting, please write to us at [email protected] and let us know your thoughts. On behalf of everyone at Wix and our Design Team, I hope you and your loved ones are healthy and safe at this time. | https://www.wix.com/playground/post/a-personal-note-from-our-vp-of-design-brand-hagit-kaufman |
The Data Download tab of the survey page enables you to download survey data in a variety of formats. Note, however, that downloading data from the survey page means downloading all of the data that your survey has collected. If you want to download only a subset of the data returned by a query, see Downloading Results.
Click the Download Data tab on the Survey page.
Choose the type of data to download. Summary data includes only statistics about the results, such as counts and percentages. Raw data includes all of the actual responses that participants have submitted.
Choose a file format. These are explained in more detail below.
Choose the time period. Most surveys have only one time period. Longitudinal surveys, which may be administered to a population repeatedly over time, include multiple time periods.
A number of different file formats are available. SPSS and SAS data can be viewed in the raw data format only. Summary data are not available for SPSS and SAS. Data can be downloaded raw or summary data in Excel, HTML, Tab Delimited text, or XML.
HTML – This is suitable for formatted display in most current browsers, including Internet Explorer and MozillaFirefox.
XML – This is suitable for applications that can manipulate XML.
SPSS (.sav) – This format will import the scale code and label for questions with text datatype/scale codes. There is no limit to the length of the scale code. The maximum length of text data is 32767.
SPSS Syntax – This is suitable for import into newer versions of SPSS.
SPSS (Short Names) – This is suitable for import into newer or older versions of SPSS.
SAS (zip) – The ZIP file contains a syntax or program file and a separate data files. Contains all the features outlined in the SAS download section. The separate data file allows text data to be as long as 32760 characters. The data file is encoded using UTF-8 (Unicode) so non-ASCII chars are preserved.
SAS (raw data only) – This is suitable for import into SAS.
Double quote values (“) are preserved in text values.
The pipe character (|) is replaced by an asterisk (*) in text values.
Have output formats for date (DATE9), time (TIME8), and date/time (DATETIME18) data types. Without an output format, these values display as a numeric value which is not very human readable.
The text “informat” length is calculated and based on the maximum length contained in the data set for each specific text property.
Text data is truncated at 958 characters.
Tab Delimited – This is suitable for unformatted viewing in Microsoft Excel or in any text editor. In addition,many SQL databases will import data from tab-delimited text files.
Excel – This is suitable for formatted display in Microsoft Excel.
Insert data into the tables.
The SPSS (Short Names) format limits all variable names to eight characters, to comply with naming restrictions in older versions of SPSS. The other SPSS format leaves your survey variable names intact, and is compatible with newer versions of SPSS.
If you want to import data into a SQL database other than Microsoft SQL Server, you may download the MS SQL format and run the CREATE TABLE statements in the file. You can then import the data by removing or replacing the GO statements, or by downloading the tab-delimited data and import that into the newly created database tables.
The summary data format displays the aggregate values that can be calculated from the participant data (Count, Percent, Max, Min, Mean, etc). With summary data it is easy to see the breakdown of responses for a particular question. With questions that allow for free-form text responses, such as comments, aggregate values cannot be calculated. Only the number of the responses can be calculated. If you would like to view text-items in a list instead of viewing only the number of responses to this type of question, choose the “list text items” option. This will provide an overall report that includes summary data for questions with scale values and raw data for text-entry questions. Please note, if there are a large number of responses, there may be a long list of comments in the report.
The raw data format displays questions in a large table. This is your standard spreadsheet layout where each column is a question, and each row is a participant’s response. Each cell of the table is a participant’s response to a particular question. If you plan to run your own reports, download the raw data and import them into your favorite statistical package.
SAS and SPSS download formats may include only raw data. The options to List Text Items and Include Value Labels do not apply to these formats. Because these formats can only include raw data, the text items are always part of the download. In addition, the downloads include not only the data, but a data dictionary SAS and SPSS automatically import. This means that the value labels always come with the SAS and SPSS downloads and will be present when you import the data into SAS or SPSS. There are 2 different formats to download SAS and 3 formats for SPSS.
Summary results include no useful information about text items. Because text questions are open-ended, permitting an almost unlimited range of responses, Illume does not calculate counts, percentages, or other statistics for these questions.
When you check the List Text Items option, your download will include raw data for each of the text questions in your survey. For example, if 100 participants typed in their first names, the download will include all 100 first names.
The Include Value Labels option adds value labels next to the value codes in the data you download. For example, a question called GENDER may have two response options: 1 = Male and 2 = Female. When you download the raw data, the GENDER column will be a list of 1’s and 2’s.
When you check Include Value Labels, each entry in the GENDER column will be either 1:Male or 2:Female.
This option makes the data more readable to humans, but it hinders applications such as Excel from processing the data in a purely numeric way.
The Include Value Labels option applies only to Raw data in formats other than SAS and SPSS.
When a survey is stopped and restarted, there is an option to create a new time period. Time periods allow a convenient way to group participant responses and query the data.
The General tab of the Survey page displays the response rate and history for a single time period. By default, this is the current or most recent time period. To display the response history for another time period, simply choose the desired period from the Time Period list.
When downloading data, you have the option to download all the survey data or only data belonging to a specific time period. By default, the time period is set to the current or most recent time period. You may download data for any time period by selected the period under the Data Download tab. | http://academy.datstat.com/illume/data-manager-surveys/downloading-data |
Disseminating Human Rights through Emotional Narrative: An Overview of Kathryn Abrams Research
Mrs A. Sayi Bala,
Assistant Professor,
Dept of English, Gayatri Vidya Parishad College for Degree & PG Courses(A) Visakhapatnam, India Email Id:[email protected]
Mr Krishnaveer Abhishek Challa PhD Research Scholar,
Dept of Linguistics, Andhra University Soft Skills Trainer,
Dept of Foreign Languages,
Andhra University Secretary,
Linguistics Research Society,
Visakhapatnam, India Email Id: [email protected]
Abstract:
A Narrative is certainly the most influential tool. Many a times, a Narrative has influenced the Contemporary Society and affected Policy Making. Emotional Narrative that advocate the plight of Oppressed People is one of the main channel of protest for the underprivileged, who are devoid of their basic human rights. In this paper, we would like to delve upon the role of Emotional Narrative in Disseminating Human Rights.
Keywords: Human Rights, Emotional Narrative Bama Faustina, Kathryn Abrams
Introduction:
What is the relation between emotions and rights? It is not a question for which answers spring readily to mind. Rights may be conceived as inhering in, or being conferred upon, a post Enlightenment, rationalist subject, who is hardly a creature brimming with affect. They may be associated, for some, with abstract claims of entitlement, and, for others, with intricate Hohfeldian frameworks that connect them with state or private obligations: neither association brings emotions to mind. Moreover, the literatures which explore the meaning, mobilization, recognition, and constitutive effects of rights provide little more guidance. Few acknowledge the emotions; those that do often neglect the diverse contexts of rights assertion, and the differentiation or social formation of emotions. Emotion is intertwined with rights claiming in many different ways. Kathryn Abrams (2010).
“Naming, Blaming, Claiming,” rights assertion begins with the recognition of an injury. A present injury, or the discovery that one has been injured in the past, constitutes what sociologists of protest call a “moral shock”: a startling and significant event that has the potential to reorient us to our environment and the other actors who populate it. Apprehending this shock—understanding that one has sustained an injury—may be the initial stage of this reorientation; but this perception is followed by an equally important phase of interpretation. The affected individual must perceive the effect as something that is not an inevitable state of affairs, but is rather a development to which she might productively respond. Although many accounts characterize this progression as a predominantly cognitive process, a range of emotions—which I understand to be entwined with cognitive judgments—may help prospective claimants achieve these perceptions and understandings. James M. Jasper (1998).
Some of these emotions are individual responses. Experiencing a moral shock may itself trigger a range of emotions that vary with the nature of the shock and the person receiving it: from grief or shock (at a devastating change in life circumstances) to fear (about the present or future effects of such a change) to anger (at suffering or seeing another suffer poor treatment) to shame (at being subjected to such treatment). Whether these initial emotions lead to the conclusion that the moral shock or injury is the product of a wrongful act that should be addressed (or redressed), rather than an inevitable state of affairs, may depend on still other emotions or affective dispositions: dispositions toward the self and the relation of the self to the world it inhabits. For example, the emotion of self-respect—the sense of oneself as a person who is entitled to some basic level of decent treatment by others, or to better than the injurious treatment that she has received—provides a potent affective backdrop to the prospective claimant’s efforts to respond to the perception of injury. It may determine whether the person perceiving an injury is able to move from fear or shame, both of which tend to immobilize or turn the injured party inward, into outrage or indignation, which can fuel outward-directed efforts to stop the injury or to seek some form of redress. Also implicated is the emotion of hope—a future different from the present—which may be difficult, though not impossible, to achieve. Without this capacity, it becomes likely that those suffering a wrong or injury will perceive even highly undesirable states of affairs as natural, inevitable, or at least dauntingly difficult to change. Kathryn Abrams (2010).
But response to a moral shock—regardless of whether it is created by an injury warranting some response—is not conditioned entirely by individual emotions. It may also be shaped by emotions shared with others or emotions fostered by one’s connection to others. Affective connections with others, for example, may permit individuals to perceive patterns of injury that they would have been unable to identify on their own. One woman may mention to another an uncomfortable experience in the workplace, and learn that other people had experienced similar incidents. This communication might help her to see her experience as part of a pattern of unequal or sexualized treatment, and it might shape her individual, affective response to it. Affective connections among people may also condition responses at a more collective level. “Emotion norms” or “emotion cultures”—i.e., shared understandings regarding appropriate affective response among members of a family, group, community, or culture—may powerfully condition reaction to a moral shock. Kathryn Abrams (2010).
The recognition that one has sustained an injury which may transform one’s life circumstances can be an affectively isolating event. A feeling of grief may make it difficult to relate to others, or even to conduct oneself conventionally in the presence of others. A feeling of shame about this mark of difference, or anxiety about whether one is somehow responsible for this suffering, may lead the person who has experienced a moral shock to withdraw from others. But in many cases the sense of impending isolation produced by a reorienting event or injury may have precisely the opposite effect: it may cause people to reach out to others. In the first instance, those who have sustained an injury may reach out to their family, friends, neighbors, or co-workers, who may help them to regain their affective balance in the midst of an unfamiliar circumstance, or to strategize about possible ways of responding. Kathryn Abrams & Hila Keren (2007).
Sometimes, however, an injury may create a sense of separation from one’s familiar or accustomed communities; the resulting feeling of loneliness may cause an injured party to seek out others who are similarly situated. Parents whose child has been diagnosed with a life-limiting disease may suddenly feel distant from their usual circle of friends and neighbors, and may seek out other parents whose children have been similarly afflicted. Often this outreach stems from a simple need to know that one is not alone in a particular form of suffering, or from a desire for the access to information or emotional support that can arise from shared, challenging circumstances. In other cases, those who have suffered a moral shock reach out in order better to understand their predicament. This dynamic, for example, was central to the early stages of the second-wave feminist movement. Kathryn Abrams & Hila Keren (2007).
This desire to reach out to others may also be mediated by those who might be described as “emotional entrepreneurs”: those who identify or even seek to foster particular feelings in a group of people that has suffered a moral shock in order to bring them together. This effort may be primarily other-oriented or altruistic, such as the work of a non-profit organization that seeks to bring together cancer survivors for mutual support, sharing of information and strategy, and the sense of commitment to a collective effort. Or this entrepreneurship may be undertaken by those who seek to harness shared feelings of loss, anger, distrust, or indignation to fuel some form of legal or political action that they view as individually or collectively advantageous. Kathryn Abrams (2007).
Groups that coalesce in response to a specific moral shock, or the feelings that arise from it, frequently aim to explain that shock as a first step toward responding to it. This explanation may relate the events producing the shock to other historical or contemporaneous developments. But such explanations more frequently have the goal of attribution: ascribing responsibility for the shock and its material and emotional effects to a particular actor or institutions. But the process of ascribing responsibility for a particular injury is often strongly mediated by emotion. Anger may provide the energy necessary to track the lines of causation to a responsible party, as well as the motivation to hold a responsible party accountable. Conversely, an overwhelming feeling of grief in the wake of a loss or injury, for example, may render the focus on a responsible party irrelevant. Kathryn Abrams (2007).
Emotions may also influence which actors are likely to be held responsible for an injury or other moral shock. In an affectively infused search for a perpetrator—a search which is often articulated in the register of blame rather than the more neutral register of responsibility—“we want [the wrong] to be the result of a choice to act by someone capable of reasoning.” This may make it easier for rights claimants to mobilize in response to acts attributable to individual choice, and harder for them to mobilize in response to acts attributable to governmental inaction, inattention, or neglect. It may also, as Bandes argues, cause those claiming a wrong to anthropomorphize governmental action, which can lead to distortions in claims for and adjudication of governmental responsibility. Efforts by leaders to mobilize members of social movements may also shape and even distort ascriptions of responsibility. As William Gamson has argued, “injustice frames”—narratives which describe an injury as a wrong perpetrated by some identifiable actor against others—help prospective claimants respond to their injuries with outrage or indignation rather than sadness or resignation. They fuel the “fire in the belly and steel in the soul” that enables those injured to press their claims. Gamson notes, however, that social movement leaders often point to ostensibly responsible actors, even in the face of ambiguity about their causal role, because this identification produces a galvanizing emotional response. Kathryn Abrams & Hila Keren (2010).
Ascription of responsibility may also be affected by the “emotion cultures” of the groups to which individuals turn for support. These norms may encourage or discourage the search for responsible actors in general. For example, an emotion culture that values fearlessness in speaking of truth to power, or defiance in calling wrongdoers to account, may bolster the process of looking for a responsible or remedial actor. But a group that is committed to helping its members to “move on,” or to achieve emotional healing, after an accident or natural disaster may be deeply ambivalent about becoming mired in the process of assigning blame. Moreover, some emotion cultures may tend to attribute responsibility to particular kinds of actors. The identification of a responsible party may itself fuel emotional responses that affect the ability of those who have suffered an injury to contemplate mobilizing a right. “Injustice frames”—which point to a wrong perpetrated by some identifiable actor—can inspire the outrage and indignation that motivate action. Kathryn Abrams & Hila Keren (2010).
Identifying a responsible actor, or one who can intervene to prevent future injury, is a necessary but not a sufficient step toward the mobilization of rights claims. It locates the possible targets of action, but does not entail a claim that some social or legal entitlement has been violated, or that some remedy or response is required. The decisions to articulate one’s injury as a violation of rights and to press for greater visibility, remediation, or prevention are distinct parts of the trajectory that we examine here. Although they are importantly structured by cognitive judgments—actors might ask, for example, whether there is a law or broader social understanding that prohibits the actions in question—they are also shaped by a variety of affective responses. Kathryn Abrams & Hila Keren (2010).
The ability to mobilize a claim framed in the language of rights— whether it be a legal right or a declaration that “no one has the right to treat us like that!”—itself requires certain emotions. The rights claimant, as Jeremy Waldron has argued, is “aware and vigorously conscious of what [she] is entitled to demand from others”; she has “or can develop the capacity and virtue to stand bravely witness to, and indomitably defiant of, assaults on [her] dignity as [a] person[ ].” Although Waldron’s vision evokes an ideal type, it captures emotions that may undergird rights claiming, even when it is less formal or more ambivalent. Rights claiming requires a feeling of self-respect or dignity: a feeling that one is worthy both of decent treatment by others and of commanding their attention when one does not receive it. It is sometimes the tension between this feeling of self-respect or entitlement, and the conspicuous lack of respect in the way that one is being treated by others, that motivates the move to action. Kathryn Abrams & Hila Keren (2010).
Among the choices that individuals or groups must make is selecting the strategy through which claims of right might be mobilized, and violations publicized, remedied, or prevented. Claimants may engage in some form of public statement, protest, or movement that involves similarly motivated others. This form of political action articulates a claim of right, but may or may not have specifically legal goals. Claimants might also make a claim of legal right: this kind of claim, which may emerge from political protest or may be framed independently, may be addressed to a court, to a legislature, or to other governmental regulators. Kathryn Abrams (2010); Susan A. Bandes (2009).
Human Rights & Dalit Emotional Narrative:
Dalits have history of being excluded from social, economic, cultural, civil, and political rights. Dalits are marginalized on the basis of traditional Indian Brahminical caste system. Earlier they were called as “shudras” but of late they have been given the title of Dalits. Dalit forms a kind of umbrella term which apart from “shudras” or “untouchables” includes all other below poverty line people. Women in general are always marginalized by patriarchy, so Dalit women are more marginalized than Dalit men; they are facing humiliation due to upper caste people as well as due to their own men folk. The plight of Dalit women is more depressing than Dalit men. Dalit women started resisting against oppression with the help of their writings. They wanted to make their plight known to whole world, but mostly due to lack of proper education their works were written in regional languages, but in late 20th century many of the works of Dalit women were being translated. Dalit feminism falls under one of the lowest rungs of the feminism ladder. With its fingers pointed towards the subaltern classes in the third world countries, subaltern feminism takes into its embrace the Blacks, Dalits, Adivasi, various suppressed tribes, outcast immigrants etc. Its concerns lie with the suppressed group of the third world where women are further suppressed in the system. Dalit Feminism is a budding social movement in the Indian terrain struggling to raise its voice to be heard beyond India. Along with the scheduled tribes and scheduled castes, the unidentified tribes of various hilly regions, the Adivasi clan and other oppressed groups of the nation come under Dalits. While the Dalits are outcast and oppressed by the third world, the women within the Dalits are oppressed and brutally suppressed by the Dalit men. Rao, S.N & Reddy, S.P. (2013).
Bama is a Tamil Dalit writer who is one of the first Dalit women to publish their books in English. Bama is a celebrated Dalit feminist writer who has concerned herself with the predicament of Dalit women and how they can freed from the callous system of male domination. She explains how the Dalit men who after facing so much discrimination by the society finally vent their anger and frustration on the women at home. Her narration of few radical incidents where the women are mentally suppressed by the society show how ignorance can push one into darkness that can be avoided with one single step out of the arena. Literature, over the years, has played a major role in Social Awakening. Narrative was considered as the best way of Emotional Dissemination. As a Narrative is interesting and interactive, it succeeds in sustaining the emotions of people. Narratives are filled with all kinds of emotions like love, hatred, melancholy, disgust, etc. Reading a given narrative makes us emotionally connect with the characters of that fiction/non-fiction. Therefore, emotional narratives manifest emotions in the common man and thereby make them realize the human rights violation. Singh, A. (2016).
Autobiographical Memoirs and Non-fictions are the best way to provide this emotional communication as they are realistic. Emotion naturally affects the way autobiographic memories are encoded. Emotional episodes are remembered better and have more attention drawn to them. Through remembering past, achievements and failures, the autobiographer’s memories directly affect how he perceives and feels about himself. Narratives that focus on plights of downtrodden can be considered as the best bets as emotional narratives. The novels of Bama Faustina, a dalit feminist writer, can also be included in emotional narratives as she focused more on hope and emotional resistance. It is very essential to touch the emotions inorder to propel rights. Bama’s writings provide that social context which is culturally suitable to the reader’s mental perception and which can invoke emotions in the reader through its melancholic and protest voice and thereby it successfully connects with people. Through her autobiographical novels, Bama successfully portrayed how the human rights of Dalit Women were compromised. Thereby, it can be concluded that Literature has a given the suppressed women a great deal of strength in talking about their rights. This literature is rather emotional and that evokes more effect on narratives that delve upon on rights. Singh, A. (2016).
Conclusion
We can infer that Emotional Narrative is the best way to disseminate Human Rights. Bama Faustina through her realistic memoirs has instigated emotions in all her readers by portraying the plight of Dalit Women and through this she successfully communicated human rights violation in the case of lower caste women. She achieved her purpose as he was able to move the people and government in giving Dalit Women the rights they truly deserve.
References
James M. Jasper (1998). The Emotions of Protest: Affective and Reactive Emotions In and Around Social Movements, 13 SOC. F. 397
Kathryn Abrams & Hila Keren (2007). Law in the Cultivation of Hope, 95 CALIF. L. REV. 319, 324
Kathryn Abrams (2007). Women and Anti-War Protest: Rearticulating Gender and Citizenship, 87 B.U. L. REV. 849, 865
Kathryn Abrams (2010). Dean’s Lecture: Empathy and Experience in the Sotomayor Hearings, 36 OHIO N.U. L. REV. 263, 280
Kathryn Abrams & Hila Keren (2010). Who’s Afraid of Law and the Emotions?, 94 MINN. L. REV. 1997, 2034–40, 2068–73
Kathryn Abrams (2010). Emotions in the Mobilization of Rights , Berkeley Law Faculty Retreat, and the Mindful Lawyer Conference at UC Berkeley School of Law, Harvard Civil Rights-Civil Liberties Law Review
Rao, S.N & Reddy, S.P. (2013). Fourth World Literature: An Introduction, Online International Interdisciplinary Research Journal, Vol-III, Special Issue. | http://ngo.tejasviastitva.com/disseminating-human-rights-through-emotional-narrative/ |
In Julia Alvarez’s poem, “Sometimes the Words are So Close,” the writer tries to discover her potentiality but the main challenge is that she imagines the fact that she has not found her own voice. In line 4, she states that her life is still practicing for her real self. This is the first plausible reading. She later discovers that she can stand on her own and speak in her own voice. She finally started writing poems in her own inner voice, when she encourages the readers who have been in such difficulties to take heart from her. The writer began being factual about the passion in her work as a poet and writer. In “Sometimes the Words are So Close,” the writer, Julia Alvarez, showcases a situation in which a person undergoes the same kind of experience, hoping to be in two worlds at the same time, but he/she is in self-discovery as an individual. She discovers her inner voice and talks on behalf of all females who find their prowess, and all the happiness that comes with discovering oneself. This is the second plausible reading of the poem. It is more important than the first plausible reading because it leads to discovery of oneself.
In the first three lines, Alvarez introduces the reader to the fact that she can write in her own inner voice, which is the discovery of her true self. She states that she is more herself when she is down on paper than anywhere else (Alvarez 1–3). The author traces her own conflict in defining herself, stating that in the guise of her poems, she reveals herself completely. (Alvarez 5–6). The writer gets confused in living her dream through in line 9.
This could translate to the difficulties she faces in discovering her inner self and the everyday challenges that the readers face in achieving their daily dreams. She states in line 12 that she was once in as many drafts and concludes in line 14 by saying that anyone who touches, translatable to readers, the poem touches on a woman. This means that Alvarez and her readers will find their true selves in her poems.
In finding their true selves, readers are in a position to not only stand for their rights but also defend them. It is a situation of self-independence and freedom. Alvarez wants to show her audience the other side of their lives that they have never discovered. In line, the audience can understand that the writer wants to reach out to the people but she gets confused. The poem has a resonant theme of self-discovery and re-invention of the self. Readings of lines 10 and 11 of “Sometimes the Words are So close” view the call to self-discovery as a general call to her readers and not necessarily a feminist agenda. This is based on the fact that her readers are drawn from both genders.
The wording in lines 10 and 11 also allude to “The New Colossus” by Emma Lazarus. The resounding theme of “The New Colossus” was a call and welcome to ‘the poor, the tired and the masses yearning for freedom’ (Lazarus 10–11). Some theorists argue that the echoing of lines 10 and 11 of the New Colossus in Alvarez’s line 10 and 11 is significant in that while Lazarus invited the seeking to America, Alvarez invites the lost to what she defines as her ‘portable homeland’, poetry. In both cases, these new frontiers offer an opportunity for self-expression and fulfillment.
The poem is an affirmation of new styles of poetry as was Walt Whitman’s “Leaves of Grass.” The user does not employ continuous prose or any consistent rhyme scheme. The author instead uses enjambment to ensure a flow of ideas from one line to the next. This style persists throughout the poem. She uses simple language probably because she wants every reader to understand the message she is trying to relay to them…
This poetry sample from BuyEssay.org has been prepared especially for you. Thanks to this work, you can see the quality of our papers. If one day you suddenly need a particular type of assignment, you know where to find us. What should you know about our service? We work only with PhD and MBA writers, our papers are original, and we provide 100% confidentiality.
Also, we have established fixed prices, so that you can find out how much you will need to pay before you make an order. Our poetry sample shouldn’t be submitted as your own work because you will fail from plagiarism. We don’t recommend that you take that risk. However, feel free to contact us anytime and get original papers written from scratch just for you! | https://buyessay.org/blog/poetry-sample-sometimes-the-words-are-so-close/ |
Shawanda R. Randolph is the eldest of four children. She has a lot of cousins too, and think of them as her siblings. She’s from New Jersey. She’s lived in 4 different states and attended 5 high schools. A few years after graduating high school, and briefly attending Rutgers University, she joined the United States Air Force. She retired from the Air Force after proudly serving 20 years. She writes mostly Christian nonfiction.
She currently resides in Arizona with her son. She loves spending time with family when she is not busy. Shawanda’s work is inspirational and also includes some biblically inspired poetry.
I asked her to talk about her upcoming novel. Here’s what she had to share:
Fresh Manna: Journey To A New Beginning, is a devotional. The idea is for the reader to take a personal 40-day journey through the book.
It can be used to help individuals “stuck” in life situations. By taking time to venture through the journey, the book will provide challenges to help gain a better perspective on how to move forward, by first discovering why they were stuck in the first place.
It was republished 1 April 2018 with new content. The new book contains thought-provoking questions or challenges at the end of each day. The idea is for the reader to reflect and (possibly) journal their responses, for continued reflection that will contribute to their growth.
It is currently only available in paperback. I understand we love our electronic devices, yet, I present a challenge to “unplug” with no possible distractions and spend that time reading and reflecting.
Sounds interesting, doesn’t it? Stay with me to find out where you can buy it. Hint: It’s toward the end of this article.
I asked what inspired her to write this book. Here’s her response:
This book was truly inspired during my personal devotional time with God. I explain in greater detail during the first devotional day, how the day’s events unfolded.
The goal, however, is to challenge the reader’s thought process along their journey. The reader will examine what influences their views and why. Do we view society through the eyes of God or view God through the eyes of society?
Once our eyes are open, we can begin to realign ourselves, our minds, and actions with God, and begin learning what it means to walk in covenant with him. Decisions and choices become easier to make when we walk with God.
I wanted to know if she had any more information to give about her experience writing this book. She did:
Unlike, many other devotionals, this can be used time and time again and can accompany a period of fasting. It, in a sense, takes the reader on a personal exodus or wilderness journey.
One does not have to be stuck either. Perhaps, one is just seeking a closer time with God. This will surely help anyone no matter where they are in their walk with God, even an unbeliever or one uncertain.
A plus about this devotional is there are ways to connect with me for additional support/guidance as readers embark on their journey. This was added due to requests made by previous readers and others I continue to work with.
There are programs available where people can request individual time to ask questions or talk through challenges they have during their journey.
Wondering if this is her first published book?
This is my first published novel. Initially, it was released in December 2017. It was republished with additional content in April 2018.
The second release contains questions and challenges at the end of each day. The idea is for the reader to take additional time to reflect and possibly journal their responses.
I asked if she had anything she’s currently working on. She does!
I plan to have it completed by August 2018 and published no later than September. Readers can follow me on social media to learn more about the release date.
The work in progress is about how we “see, feel, and relate” to God. As with all of my writings, this novel is for the ‘churched’ and ‘unchurched’ alike. It takes a look at how and why people may struggle with relationships (or deeper relationships) with God as well as ways to move forward. The key is using practical and relatable lessons to explore these areas.
Here’s what she really wants you to get from her work:
I am merely a vessel. I desire that people get to really know God and His Love. If I can help in any way, through my life or my writings, then that is what I want.
I strongly believe we are all born with a purpose. God desires that we come to discover our identity and purpose in Him. It’s my passion and purpose to help others rediscover themselves and the world through the eyes of God, the Creator.
In some ways, this is done through the healing of past wounds and gaining the ability to have a fresh outlook on life.
There is no greater joy than to help people realize or begin to work towards their God-given purpose and beginning to fulfill their destiny rather than walking in the identity that others have created for them. I want to see people begin to understand what it means to “walk with God” and following Him in a relationship rather than leaning on their own understanding and struggling to get through life.
Fresh Manna is available for purchase on Amazon.com, Barnes & Noble, Books-A-Million, and other online retailers. Readers can also purchase autographed copies of Fresh Manna here.
Her advice for people wanting to follow their dreams:
GO FOR IT!! Do not be discouraged by what anyone else does. Your work will always reach those who need it the most. Stay true to your writing and never let anyone change your message. God gave you a gift to reach certain people, not everyone, so stay encouraged. | https://peaksjournal.com/2018/06/28/profile-shawanda-r-randolph/ |
How do you critically read a research article?
How do you critically read a research article?
TakeawaysAlways read with a critical eye. Ask yourself questions as you go.Note the study design and use this to think about potential limitations.Once you become familiar with a topic, try to move towards the results first approach.Practice!
How do you critically Analyse literature?
Critical Reading & AnalysisThink about what you expect from the article or chapter, before reading it.Skim the abstract, headings, conclusion, and the first sentence of each paragraph.Focus on the arguments presented rather than facts.Take notes as you read and start to organise your review around themes and ideas.
How do you write a critical analysis of a poem?
How to Write a Critical Analysis of a PoemStep 1: Read the poem. Step 2: Know who the speaker is. Step 3: Identify the main theme of the poem. Step 4: Establish the context. Step 5: Identify inter-textuality. Step 6: Identify the genre of the poem. Step 7: Create a checklist for your critical analysis. Step 8: Review the poem’s plot.
What are the 6 steps to analyzing a poem?
Check out these six ways to analyze a poem.Step One: Read. Have your students read the poem once to themselves and then aloud, all the way through, at LEAST twice. Step Two: Title. Think about the title and how it relates to the poem. Step Three: Speaker. Step Four: Mood and Tone. Step Five: Paraphrase. Step Six: Theme.
What are the elements of poem?
Elements: Poetry. As with narrative, there are “elements” of poetry that we can focus on to enrich our understanding of a particular poem or group of poems. These elements may include, voice, diction, imagery, figures of speech, symbolism and allegory, syntax, sound, rhythm and meter, and structure.
How do you write a critical appreciation of a story?
Writing a Critical Analysis of a Short Storynames the work discussed and the author.provides a very brief plot summary.relates some aspect of that plot to the topic you have chosen to address.provides a thesis statement.indicates the way you plan to develop your argument (support your claim).
How do you write appreciation?
A thoughtful, well-written and sincere letter of appreciation is the simplest and most impactful way to let someone know you’re grateful for them….How to write a letter of appreciationBe prompt.Choose the appropriate format.Write a greeting.Express the letter’s purpose.Be specific.Conclude and sign.Proofread.
How do you write a book appreciation?
How to Write a Critical Appreciation Book ReportRead the Book Actively. While skimming the boring parts and reading for basic comprehension might work for other assignments, your report’s success depends on a careful, involved reading of the book. Identify the Thesis and Formulate Your Own. Give Your Readers Context. Evaluate the Content. Recap and Wrap-Up.
How do you write a short critical essay?
How to write a critical essay:Examine a source: read it carefully and critically.Organize your thoughts: figure out the core claim and evidence, do research of secondary resources.State a thesis: make sure it has both a claim and details sustaining it.Write an outline.Write a draft of your critical essay.Edit and improve your essay.
How long is a critical essay? | https://diaridelsestudiants.com/how-do-you-critically-read-a-research-article/ |
Looking for a Primary & Secondary HINDI Teacher.
Qualification : BA / MA HINDI, B.Ed
Conduct and organize the learning process/session in classroom
Gear the process of teaching to the needs of all students with a concern for their interests, special talents, individual styles and pace of learning.
Treat children with dignity and respect.
Be approachable to students and parents
Promote maximum student participation and assist students in analyzing and improving methods and habits of study.
Monitor students progress constantly and adjust the pace of work accordingly.
Ensure that all children pay attention to the Lesson plan delivered
Enforce regulations concerning the students conduct and discipline and maintain appropriate standards for student behavior in the classroom and in the school premises.
Enhance and implement teaching methodologies such as hands on learning activities, games, classroom discussions, documentaries, movies and mind maps .
Be responsible for the emotional and physical well being of every child.
Salary: Not Disclosed by Recruiter
Industry:Education / Teaching / Training
Functional Area:Teaching , Education , Training , Counselling
Role Category:Teachers
Role:School Teacher
Education-
UG: Any Graduate - Any Specialization, B.Ed - Education, B.A - Hindi
PG:M.A - Hindi
Doctorate:Doctorate Not Required
Vibgyor High School, | http://www.cbseguess.com/jobs/jobs_detail/opening-for-hindi-teacher-1387 |
The Hunt (7 x 60’) – Takes a totally fresh look at the most dramatic behaviour in nature: the competition between predators and their prey. Across the globe, predators face unique challenges wherever they live, and these different challenges drive the narrative of each episode. Using character-driven stories, the series will dissect the clever and complex strategies predators use to catch their prey, showing viewers how these are some of the hardest working animals in the natural world. Sequences with some of the planet’s top predators include polar bears filmed hunting bearded seals for the very first time, using a fascinating aquatic stalking technique; golden eagles and wolves working together to capture mountain lambs high in the Rocky mountains; and a breathtaking hunt where a pack of killer whales chase a humpbacked whale calf for two hours. | http://www.tvmole.com/2013/10/greenlit-the-hunt-bbc1/ |
The mission of Great Expectations is to motivate, inspire, and challenge individuals to achieve excellence in learning and living. This model is guided by six basic principles: (1) high expectations for students and teachers to reach their potential; (2) teachers possessing an attitude and a responsibility requiring excellence in all their students; (3) a belief that all children can learn; (4) the building of self-esteem in students to help them believe they are capable of learning; (5) creating a climate of mutual respect which empowers students to take risks; (6) building teachers’ knowledge in learning theory and skill set in pedagogy.
The Board of Directors of Great Expectations (GE) is committed providing a high quality program that accomplishes the mission and adheres to the six principles of the program. While they have a plethora of qualitative data that supports the success of the program, they believed it was necessary to have quantitative data to assist them in their ongoing evaluation and commitment to continual improvement of the program. The program is currently being evaluated using a longitudinal quasi-experimental design. A sample of 36 Great Expectation model elementary schools were matched with 556 Oklahoma non-Great Expectations elementary schools based on the following variables: ethnicity, free and reduced lunch eligibility, school size, average number of days students absent, percent of parents attending conferences, percent of teachers with advanced degrees, percent passing third grade reading test, district population size, unemployment rate, average household income, teachers per administrator, percent of student’s in special education, instructional support budget, and district percent passing Algebra I. Five years of pass rates on third grade reading and third grade math state exams were examined. Data was collected two years prior to schools being named a Model School, the year of being designated a Model School and two years after being named a Model School.
The descriptive analysis of the data reveal that GE Model Schools had a higher mean passing rate than non-GE schools in third grade reading.
The descriptive analysis of the data reveal that GE Model Schools maintain the higher mean pass rates in third grade math and reading despite higher student to teachers ratios, teacher to administrator ratios, and special education populations as well as lower rates of spending on instructional supports.
From the longitudinal analysis the mean of GE Model Schools showed a positive growth trajectory from 2009 through 2013 in third grade reading scores.
From the longitudinal analysis the mean of GE Model Schools showed a positive growth trajectory from 2009 through 2013 in math scores.
The mean growth rate in the third year of Model GE school status doubled the rate of growth as compared to the first and second year of Model GE school status in third grade math.
During the 5 year period, 86% of the Model GE schools increased their reading scores.
The lowest performing GE Model School in the first year of the five-year study increased their pass rate from 46% to a pass rate of 72% in third grade reading.
A GE Model School with a pass rate of 61% in the first year of the five-year study increased their pass rate to 98% in third grade math. | http://www.greatexpectations.org/k20-research-center-study |
As Head of Technology for the Pensions Dashboards Programme, James will be responsible for ensuring that our technology delivery partner meets design and service standards.
James has worked in technology for over 15 years, as a business analyst, product and portfolio owner and consultant. He spent over 12 years at KPMG before moving to Single Source Regulations Office, a non-governmental executive that regulates non-competitive defence contracts. Throughout that time he led development on numerous bespoke applications in employment tax, HR and financial reporting, which spanned desktop applications, software as a service and mobile apps.
James is passionate about creating intuitive, user-centric applications that can convey complex financial information in a simple, easily-understood way.
James is a certified business analyst, enterprise architect and scaled agile leader. | https://pensions-wp.azurewebsites.net/team/james-reardon/ |
Students at Salina South and Salina Central high schools plan a 17-minute walkout at 10 a.m. Wednesday in solidarity with the nationwide movement spearheaded by EMPOWER.
Wednesday will mark one month since a shooter walked inside a Florida high school and opened fire, killing 17 students, teachers and staff and injuring at least 14.
Students and educators across the country are planning to walk out of their schools and universities on Wednesday to honor the lives of the 17 people killed at Marjory Stoneman Douglas High School and to press lawmakers to pass stricter gun-control laws. EMPOWER is pushing specifically for a ban on assault weapons and universal background checks before gun sales.
“This is something that really affects us and it’s also a chance for us to raise direct awareness,” said Salina Central High School senior Carolyn Gutsch who helped plan her school’s walkout.
The Central High walkout, like others across the country, will last 17 minutes, one minute for each person killed in the Florida school shooting.
Students will walk out at 10 a.m. and gather on the lawn at the intersection of Front and Crawford streets. The plan is for 17 different people to speak.
Gutsch said students had the full support of Central High staff and Principal Nate Showman.
Gutsch said students will also have support from parents, organizations and other community members.
“We’re grateful for a public dialogue that goes beyond just thoughts and prayers for the dead,” said David Norlin, a member of the organization Salina Resistance, which will support Central High students Wednesday.
The South High student council and its sponsor, Nikki Chamberlain, also are organizing a walkout Wednesday.
At 10 a.m., those choosing to participate will exit South High and observe a moment of silence, said senior student council secretary Albanee Garcia.
Garcia said she and other members of the student council were approached by South High senior Asi Lou Mailau about organizing a walkout.
Garcia said she hopes all South High participants understand the meaning behind the walkout.
Ell-Saline Junior-Senior High School Principal Doug Wilson and Southeast of Saline Junior-Senior High School Principal Roger Stumpf said they were unaware of any plans for walkouts at their schools.
“There is nothing planned at this point. That doesn’t mean they may not try to organize something last-minute in support of their peers,” Stumpf said.
Neither principal mentioned any disciplinary action for students walking out of class. | https://www.gctelegram.com/news/20180313/central-south-high-students-plan-walkout-wednesday |
Balaks (Balâk, pl. Balâğaş) are a Vaniuan ethnic group that originally formed in the Kashis River basin.
Contents
Language
Balak is a member of the Vaniuan family from the Kashisan sub-group of Eastern Vaniuan languages, spoken in present-day Balakia and surrounding nations. The language itself is distinguished by its moderately agglutinative typology and large substratum of Khamaian loanwords, along with whistled sibilants, a feature not present in any other Vaniuan language and shared only with Amaian.
Balak is the official language of Balakia. It is also spoken on reduced pockets around the surrounding countries of Balakia and the southern territories. | https://wiki.conworkshop.com/w/Balak_people |
Downeast Lakes Land Trust’s carbon project covers more than 19,000 acres of the trust’s 33,700 Farm Cove Community Forest in eastern Maine, and registered nearly 200,000 offsets; each offset is equivalent to one ton of carbon dioxide.
Climate change has already been linked to changes in crop distributions, productivity. and viability, as well as increased drought and fire disturbance. As temperatures continue to warm, these changes will continue. To address current and future challenges, land trusts involved in working farms or farmland conservation are taking steps to manage agricultural lands for climate change.
Old Growth in a New Economy is a moderated dialog facilitated by Pacific Forest Trust that highlights how forest stewardship benefits climate, wildlife, water, and a sustainable economy.
The Pacific Forest Trust is a pioneer of approaches and standards used to create forest climate policies including carbon emissions reductions or offset projects which harness and protect the natural ability of forests to accumulate and hold carbon, acting as carbon “sinks” and providing essential climate benefits.
Blackwater 2100 is a collaborative strategic conservation plan that aims to address salt marsh loss and migration in Maryland’s Chesapeake Bay.
The Peconic Land Trust’s Shellfisher Preserve is a collaborative enterprise that combines conservation with aquaculture activities to raise funds for property stewardship and further research on the Peconic Bay Estuary.
Opportunities exist to improve soil management in order to increase carbon sinking or sequestration in agricultural and grassland systems.
Sea level rise amplifies hazards such as coastal erosion, inundation due to storm surge, extreme tides, and tsunami, and is projected to lead to more frequent and increasingly severe flooding. To respond to these threats conservation efforts on the 277-acre Waihe’e Coastal Dunes and Wetlands Refuge aim to mitigate impacts of sea level rise, promote habitat restoration, and support food security and community sustainability.
The United States Department of Agriculture (USDA) National Agroforestry Center (NAC) aims to “accelerate the application of agroforestry,” which is “practice of combining trees and shrubs with crops and/or livestock to create integrated and sustainable land-use systems.”
Wetlands restoration efforts on this working farm protect human land uses and improve the surrounding slough system.
Copyright © 2019, Land Trust Alliance. All rights reserved. | http://climatechange.lta.org/toolkit-tags/working-lands/page/2/ |
Double Bar Graphs - Practice 7.1
In this double bar graph worksheet, students make a double bar graph from given information, then solve related problems in addition to 2 test prep problems. Houghton Mifflin text referenced.
29 Views 77 Downloads
Concepts
Resource Details
Get on your Mark, Get Set, Go! Collect, Interpret, and Represent Data Using a Bar Graph and a Circle Graph
Start an engaging data analysis study with a review of charts and graphs using the linked interactive presentation, which is both hilarious and comprehensive. There are 27 statistics-related vocabulary terms you can use in a word sort.... | https://www.lessonplanet.com/teachers/double-bar-graphs-practice-71 |
The stainless steel elbow is a pipe fitting that changes the direction of the pipeline. Stainless steel elbow is an elbow made of stainless steel as the main raw material. Stainless steel elbows are generally distinguished from carbon steel elbows. Their main difference lies in the different materials, which show various characteristics.
Classification: According to the angle of the elbow, there are generally three types of stainless steel elbows, including 45-degree angle, 90-degree angle, and 180-degree angle. These three are the most common specifications of stainless steel elbows, which are more popular.
Features: The biggest feature of the stainless steel elbow is that it is not easily corroded and rusted, so the service life is longer. Stainless steel itself is a steel that is resistant to air, steam, and weakly corrosive chemicals. Stainless steel elbows made from it are naturally equipped with weak corrosion resistance. Therefore, stainless steel elbows have gradually replaced traditional elbows and are widely used. used.
Corrosion resistance of stainless steel elbow:
The stainless steel elbow has the advantages of smooth inner wall, low resistance to heat medium flow, acid and alkali resistance, long service life, and easy installation. Stainless steel elbows are resistant to corrosion by weak corrosive media such as air, steam, water, and chemically corrosive media such as acids, alkalis, and salts. Also known as stainless acid-resistant steel. In practical applications, steel that is resistant to corrosion by weakly corrosive media is often called a stainless steel stamped elbow, and steel that is resistant to chemical media is called acid-resistant steel. Due to the difference in chemical composition between the two, the former is not necessarily resistant to chemical media corrosion, while the latter are generally stainless.
The corrosion resistance of stainless steel elbows depends on the alloying elements contained in the steel. Chromium is the basic element that enables stainless steel elbows to obtain corrosion resistance. When the chromium content in the steel reaches about 1.2%, chromium interacts with the oxygen in the eroding medium to form a thin oxide film on the steel surface (self-passivation) Membrane), can prevent the steel matrix from further erosion. Stainless steel elbows have different production processes and processes. In the processing, they need to be produced and processed according to certain conditions. Elbow fittings of different properties need to pay attention to some matters during processing. | https://www.seereinpipe.com/mw/stainless-steel-elbow/ |
Metabolic responses of untrained individuals to warm-up.
Seven untrained male subjects were studied for the effects of mild warm-up on oxygen uptake and lactic acid production. Each subject completed two standardized workloads on a bicycle ergometer requiring 75% of their physical work capacity. Protocols of the two tests consisted of either no warm-up or a 4-min warm-up preceding a 5-min exercise at approximately 80% of their maximal oxygen uptake. The contrasting protocols did not reveal any significant differences between heart rate, lactic acid, and oxygen uptake. The dominant influence on the metabolic processes was the absolute workload of the tasks and not the presence or absence of preliminary related activity. It was concluded that an untrained individual lacks the cardiovascular and cellular adaptations necessary to demonstrate metabolic benefits from warm-up.
| |
---
abstract: 'Cost functions in problems concerning the existence of Nash Equilibria are traditionally multilinear in the mixed strategies. The main aim of this paper is to relax the hypothesis of multilinearity. We use basic intersection theory, Poincaré Duality and the Dold-Thom Theorem to establish existence of Nash Equilibria under fairly general topological hypotheses. The Dold-Thom Theorem provides us with a homological version of a selection Theorem, which may be of independent interest.'
address:
- 'Quantitative Methods and Information Systems Area, Indian Institute of Management Bangalore-560076, India'
- 'RKM Vivekananda University, Belur Math, WB-711 202, India'
- 'RKM Vivekananda University, Belur Math, WB-711 202, India'
author:
- Arnab Basu
- Samik Basu
- Mahan Mj
title: Nash Equilibria via Duality and Homological Selection
---
\[section\] \[theorem\][Proposition]{} \[theorem\][Lemma]{} \[theorem\][Corollary]{} \[theorem\][Definition]{} \[theorem\][Conjecture]{} \[theorem\][Remark]{} \[theorem\][Question]{} \[theorem\][Claim]{} \[theorem\][Definition-Theorem]{}
[^1]
Introduction
============
We shall work in the framework of non-cooperative games with mixed strategies, where the domain for every player is a finite dimensional simplex. The cost functions (or alternately payoff functions) in traditional problems of Nash Equilibria are multilinear in the mixed strategies. The main aim of this paper is to relax the hypothesis that cost functions are multilinear. The original proof of existence of Nash Equilibria [@nash] uses fairly simple Algebraic Topology, namely the Brouwer or Kakutani Fixed Point Theorems. This approach has been refined in various ways [@lh; @gale; @km] (see also [@hs] for an effective approach using a minimax technique). Our approach in this paper is quite different inasmuch as we use standard but more sophisticated tools from Algebraic Topology to establish existence of Nash Equilibria under considerably more general conditions on cost functions. The tools we use are basic intersection theory, Poincaré Duality and the Dold-Thom Theorem. We use the Dold-Thom Theorem to prove the existence of certain relative cycles contained in graphs of multifunctions. The chains thus constructed may be thought of as homological versions of selections [@michael1; @michael2; @michael3]. This furnishes us with a Homological Selection Theorem \[multisel\], which might be of independent interest.
The conditions we use on the cost functions are detailed in Section \[hyp\]. We give a brief sketch here for a 2-player non-cooperative game to stress the soft topological nature of the hypotheses used. Consider a game between players 1 and 2 with mixed strategy spaces ${{\mathbb A}}_1, {{\mathbb A}}_2$. We use the notation ${{\mathbb A}}_{-1}={{\mathbb A}}_2$ and ${{\mathbb A}}_{-2}=A_1$.
A cost function $r_i(x,y)$ for player $i$ ($i=1,2$) is said to be polynomial-like if\
1) the set of local minima of the best response multifunction $R_i(y)$ (for each $y\in {{\mathbb A}}_{-i}$) of the function $r_i(x,y)$ ($x\in {{\mathbb A}}_{i}$) is finite; and\
2) Counted with multiplicity, the set of local minima $R_i(y)$ is continuous on $ {{\mathbb A}}_{-i}$.\
A weakly polynomial-like cost function is one whose set of local minima can be arbitrarily well-approximated by the set of local minima of a polynomial-like function.
Two kinds of hypotheses will be relevant in this paper.\
**(A1)** For each $i$, the map $R_i$ is continuous.\
**(A2)** For each $i$, the map $R_i$ is weakly polynomial-like.\
The main Theorem of this paper (Theorem \[existNash\]) proves that assumption **(A2)** is sufficient to guarantee the existence of Nash equilibria.
In Section \[ctreg\] we shall give an example to show that assumption **(A1)** is not sufficient to guarantee the existence of Nash equilibria. A word about this counterexample ahead of time. It is easy to see that the multifunction $f(z) = \pm \sqrt{z}$ from the unit disk $\Delta$ in the complex plane to itself has no continuous selection. However the graph $gr(f)(\subset \Delta \times \Delta)$ does support a non-zero relative cycle in $H_2(\Delta \times \Delta, \partial \Delta \times \Delta)$ and hence admits a [*homological selection*]{} in our terminology (see Section \[hom\]). The counterexample in Section \[ctreg1\], which is a continuous map from ${{\mathbb D}}^2$ to $Sub_3({{\mathbb D}}^2)$, shows that a continuous multifunction need not admit even a homological selection. (Here $Sub_3({{\mathbb D}}^2)$ denotes the collection of subsets of ${{\mathbb D}}^2$ with at most 3 points equipped with the Hausdorff metric.) It follows (cf. Section \[brs\]) that any higher dimensional analog of weighted branched surfaces in codimension greater than one cannot be a straightforward generalization of 2-dimensional weighted branched surfaces in 3-manifolds (cf. [@go]).
[**Convention:**]{} For this paper, we fix the metric on the $n-$dimensional ball ${{\mathbb D}}^n$ as $d(x,y)=|x-y|= sup_i (|x_i-y_i|)$.
[**Acknowledgments:**]{} The third author would like to thank Sasha Dranishnikov for telling us the proof idea of Lemma \[Dold\].
Nash Equilibria
---------------
We refer to [@basar] for the basics of Game Theory. An $N$-person non-cooperative game is determined by $2N$ objects $({{\mathbb A}}_1,\ldots,{{\mathbb A}}_N,r_1,\ldots,r_N)$ where ${{\mathbb A}}_i$ denotes the [*strategy space*]{} of player $i$ and $r_i : {{\mathbb A}}\stackrel{def}{=} {{\mathbb A}}_1 \times \cdots \times {{\mathbb A}}_N {\rightarrow}{{\mathbb R}}$ is the cost function for player $i$. We shall call ${{\mathbb A}}$ the [*total strategy space*]{}. Each ${{\mathbb A}}_i$ will, for the purposes of this paper, be the space of probability measures on a finite set of cardinality $(n_i+1)$ and hence homeomorphic to ${{\mathbb D}}^{n_i}$. Thus, in Game Theory terminology each element of ${{\mathbb A}}_i$ is a [*mixed strategy*]{} or equivalently a probability measure on a finite set. Thus, ${{\mathbb A}}_i$ is the space of mixed strategies or player $i$. Vertices of the simplex ${{\mathbb A}}_i$ are also referred to as [*pure strategies*]{}. A mixed strategy may therefore be regarded as a [*probability vector*]{} with $(n_i+1)$ components. Each player $i$ independently chooses his strategy $a_i \in {{\mathbb A}}_i$. For a strategy-tuple $a = (a_1, \cdots, a_N)$, player $i$ pays an immediate cost $r_i(a)$.
[**Goal:**]{} Each player wants to minimize his cost.
[**Notation:**]{} We denote ${{\mathbb A}}_{-i} \stackrel{def}{=} {{\mathbb A}}_1 \times \cdots {{\mathbb A}}_{i-1} \times {{\mathbb A}}_{i+1} \times {{\mathbb A}}_N$ for all $i$. For any strategy-tuple $(a_1, \cdots, a_N) \in {{\mathbb A}}$, $a_{-i} \stackrel{def}{=} (a_1,\ldots,
a_{i-1},a_{i+1},\ldots,a_N) \in {{\mathbb A}}_{-i}$. Also for convenience of notation we change the order of the variables and assume that $r_i: {{\mathbb A}}_i \times {{\mathbb A}}_{-i}{\rightarrow}{{\mathbb R}}$ is the i-th cost function.
\[Nash\] A strategy-tuple $a^* = (a_1^*,\ldots,a_N^*) \in {{\mathbb A}}$ is called a Nash equilibrium if $$\begin{aligned}
&& {r}_i^* \stackrel{def}{=} {r}_i(a^*) \leq {r}_i(a_i,a_{-i}^*),\ \forall a_i \in {{\mathbb A}}_i,\ i =1,\ldots,N,\end{aligned}$$ where,
Given a metric space $(X,d)$, let ${{\mathcal H}}_c(X)$ denote the space of all compact subsets of $X$ equipped with the Hausdorff metric $d_H$ i.e, for all $A,B \in {{\mathcal H}}_c(X)$, $$\label{hausmetric}
d_{H}(A,B) \stackrel{def}{=} \max\{\sup_{x\in A}\inf_{y \in B} d(x,y), \sup_{y \in B}\inf_{x \in A} d(x,y)\}.$$
\[optresp\] For any player $i$, given a strategy-tuple $a_{-i} \in {{\mathbb A}}_{-i}$ of the other players, we define his best-response $R_i(a_{-i})$ as follows $$R_i(a_{-i}) \stackrel{def}{=} {\arg\min}_{a_i \in {{\mathbb A}}_i} {r}_i(a_i,a_{-i}) \in {{\mathcal H}}_c({{\mathbb A}}_i).$$
Here ${\arg\min}$ denotes the [*argument*]{} of the minima set, i.e. the set of values $x\in {{\mathbb A}}_i$ such that ${r}_i(x,a_{-i})$ is minimum as a function of $x$.
[**Note:**]{} It will not affect our arguments at all if we take ${\arg\min}$ to denotes the argument of the [*local*]{} minima set, i.e. the set of values $x\in {{\mathbb A}}_i$ such that ${r}_i(x,a_{-i})$ is a local minimum as a function of $x$ provided we modify Definition \[Nash\] appropriately. In such a case, we are looking at [*local Nash equilibria*]{} which are defined by demanding that the ${r}_i^*$ appearing in Definition \[Nash\] are [*local minima*]{} rather than global minima as defined there.
\[optrespgr\] For any $i$, the graph $\mbox{gr}(R_i)$ of $R_i$ is defined as $$\mbox{gr}(R_i) \stackrel{def}{=} \{(a_{-i},a_i): a_i \in R_i(a_{-i}),\ a_{-i} \in {{\mathbb A}}_{-i}\}.$$
Motivational Example: Nash Equilibria for Bi-matrix Games
---------------------------------------------------------
We motivate our main Theorem by giving a simplified version of our proof of the existence of Nash equilibria in the special case of standard 2-person bimatrix games.
Consider a two-player bimatrix game where each player $i$ has strategy space ${{\mathbb A}}_i \stackrel{def}{=} \{(x_i,1-x_i): 0 \leq x_i \leq 1\}$, for $i=1, 2$. The cost function for player $i$ is a bilinear function of the form $r_i(x_1, x_2)=x_1^TM_ix_2$, where $M_1, M_2$ are $2 \times 2$ matrices and $x_1, x_2$ are probability vectors (mixed strategies) for players $1, 2$.
Then the best response $R_i(x_j)$ ($i \neq j$) of player $i$ when player $j$ chooses $x_j \in [0,1]$ is given by $$\label{optrespeq}
R_i(x_j) = {\arg\min}_{x_i \in [0,1]} {r}_i(x_i,x_j),$$ which is a [*singleton*]{} set $\{x_i^*(x_j)\}$ due to the component-wise linearity of the payoff function. Moreover, the dependence of $x_i^*$ on $x_j$ is continuous. Hence $\mbox{gr}(R_i)$ for $i=1, 2$ are continuous paths in $[0,1]\times [0,1]$ where $\mbox{gr}(R_1)$ is a path from the bottom ($[0,1] \times \{ 0 \}$) to the top ($[0,1] \times \{ 1 \}$) and $\mbox{gr}(R_2)$ is a path from the left($\{ 0 \} \times [0,1]$) to the right ($\{ 1 \} \times [0,1]$). Hence $\mbox{gr}(R_1)$ and $\mbox{gr}(R_2)$ must intersect (for a formal proof of this intuitively clear fact, see Lemma 2 of [@maehara] for instance). Hence there exists $(x_1^*, x_2^*)$ such that $(x_1^* = R_1(x_2^*), x_2^* = R_2[x_1^*])$ i.e. a Nash equilibrium.
Ordered and Unordered Tuples of Points
--------------------------------------
Let ${{\mathbb D}}^d \stackrel{def}{=} \{(x_1,\ldots,x_{d}) \in {{\mathbb R}}^{d}: \sum_{j=1}^{d} x_j^2 \leq 1\}$ denote the $d$-dimensional disk. Given a set $A$, let \#$A$ denote its cardinality. For positive integers $k$ and compact metric spaces $X$ we define the topological space of subsets of cardinality $\leq k$, $$Sub_k(X) \stackrel{def}{=} \lbrace subsets\, of \, X \, of \, cardinality\, \leq k \rbrace.$$ This has a topology induced as a subset of $C_c(X)$. An analogous construction is the configuration space, $$C_k(X) \stackrel{def}{=} \{(x_1,\ldots,x_k) \in X^k\} / \Sigma_k$$ where $\Sigma_k$ is the symmetric group on $k$ symbols. The elements of $C_k(X)$ can be written multiplicatively $x_1^{i_1}\ldots x_j^{i_j}$ with $i_1+\ldots +i_j =k$ or as equivalence classes $[x_1,\ldots , x_k]$. There is a metric on $C_k(X)$ given by $$d_k([x_1,\ldots , x_k] , [y_1,\ldots , y_k])= min_{\sigma \in \Sigma_k} ( sup_i (d(x_{\sigma (i)},y_i)) ).$$ We have a map $q_k: C_k(X) \rightarrow Sub_k(X)$ that maps $[x_1,\ldots , x_k]$ to $\lbrace x_1, \ldots , x_k \rbrace$. It is a surjective continuous map (as $d_H (\lbrace x_1,\ldots , x_k \rbrace , \lbrace y_1, \ldots y_k \rbrace) \leq d_k([x_1,\ldots , x_k] , [y_1,\ldots , y_k])$).
The quotient topology on $Sub_k(X)$ induced from the map $q_k$ is the same as the topology induced by the metric $d_H$. \[subconf\]
The argument above already shows that if $U$ is an open set in the Hausdorff metric the inverse image is open and so it is open in the quotient topology. Conversely suppose $U$ is such that $q_k ^{-1}(U)$ is open. Then we must show that $U$ is open in the Hausdorff topology. Consider a point $p\in U$. If $\#(p)= k$ then $q_k^{-1}(p)$ has exactly one point which we also write $p$ and because $q_k ^{-1} (U)$ is open, an open ball of $B(p,\delta)$ is contained in it.
Let the minimum distance between points of $p$ be $\lambda$. We note that if a point $q$ is of distance less than $\lambda / 2$ from $p$ then it has the same cardinality as $p$ and $d_k(p,q)=d_H (p,q)$. Therefore, if $r=min(\delta, \lambda / 2)$, the ball $B(p,r)$ is contained in $q_k^{-1} ( U)$. The ball in the Hausdorff metric of radius $r$ is $= q_k(B(p,r))$ which is contained in $U$ since $r \leq \delta$, showing that $U$ contains an open neighborhood of $p$.
Now we let $p$ have cardinality $< k$ so that there are many points mapped to $p$ by $q_k$. Suppose these points are $p_1,p_2,\ldots ,p_n$. Since $q_k^{-1}(U)$ is open,
\(1) It is contains a ${\epsilon}$ neighborhood of each of the $p_i$ (we can choose this uniformly since $n$ is finite), and
\(2) $2{\epsilon}$ is less than the minimum distance of points of $p$.
Now suppose there is a point $q$ in the ${\epsilon}$ neighborhood of $p$. The latter condition ensures that a point in $q$ is ${\epsilon}$ close to a unique point of $p$ inducing a function $\Lambda:q \rightarrow p$. Hence, any weighted product of elements of $q$ so that the total weight is k and each $q$ point has a non zero weight, is ${\epsilon}$ close in the metric $d_k$ to the product obtained by applying $\Lambda$ pointwise. Since every point in $p$ is ${\epsilon}$ close to at least one point of $q$, the element obtained maps to $p$. Thus, there is one $q_i \in q_k^{-1}(q) $ which is ${\epsilon}$ close to $p_i$, implying $q \in U$. Therefore $U$ contains an ${\epsilon}$ neighborhood of $p$. This completes the proof.
Hypotheses for Existence of Equilibria {#hyp}
--------------------------------------
The next definition establishes the generality in which we shall work in this paper. The terminology is motivated by a continuously parametrized family of complex polynomials of a fixed degree, where the set of roots counted with multiplicity varies continuously.
A cost function $r_i: {{\mathbb A}}_i \times {{\mathbb A}}_{-i}{\rightarrow}{{\mathbb R}}$ is said to be [**polynomial-like**]{} if the response function $R_i:{{\mathbb A}}_{-i} \rightarrow {{\mathbb A}}_i $ can be lifted to a map $R_i^M:{{\mathbb A}}_{-i} \rightarrow C_M({{\mathbb A}}_i) $ some configuration space $ C_M({{\mathbb A}}_i)$.\
A cost function $r_i: {{\mathbb A}}_i \times {{\mathbb A}}_{-i}{\rightarrow}{{\mathbb R}}$ is said to be [**weakly polynomial-like**]{} if for all ${\epsilon}> 0$ there exists $R_{i,{\epsilon}}:{{\mathbb A}}_{-i} \rightarrow {{\mathbb A}}_i $ such that
1. $R_{i,{\epsilon}}$ can be lifted to a map $R_i^M:{{\mathbb A}}_{-i} \rightarrow C_M({{\mathbb A}}_i) $ some configuration space $ C_M({{\mathbb A}}_i)$,
2. $d_H(R_i(a_{-i}) , R_i^M(a_{-i})) < {\epsilon}$ for all $a_{-i}\in A_{-i}$.
\[pol\]
Equivalently, a cost function $r_i$ is polynomial-like if\
1) the set of local minima $R_i(a_{-i})$ of the function $r_i(a_{i},a_{-i})$ is finite for each $a_{-i}\in {{\mathbb A}}_{-i}$; and\
2) Counted with multiplicity, the set of local minima $R_i(a_{-i})$ is continuous on $ {{\mathbb A}}_{-i}$.\
Also, a weakly polynomial-like cost function is one whose set of local minima can be arbitrarily well-approximated by the set of local minima of a polynomial-like function.
There are two assumptions that will be relevant in this paper.\
**(A1)** For each $i$, the map $R_i$ is continuous in $a_{-i}$.\
**(A2)** For each $i$, the map $R_i$ is weakly polynomial-like in $a_{-i}$.\
Condition **(A1)** is clearly a consequence of **(A2)**. The main aim of this paper is to prove the existence of Nash equilibria under assumption **(A2)**.
In Section \[ctreg\] we shall give a counter-example to show that assumption **(A1)** is not sufficient to guarantee the existence of Nash equilibria.
Homological Selection {#hom}
=====================
In this section we will prove a result about the homology of $gr(R_i)$ under the assumption (**A2**). The result will be used to prove the existence of Nash equilibria in the next section.
For a topological space $X$ with a basepoint $*$, we define the space $SP^r(X)$ to be the quotient of $C_r(X)$ under the relation $*=1$ (here we adopt the notational convention that elements of $C_r(X)$ are written multiplicatively). This space is called the symmetric product of $X$. It is n-connected if $X$ is. Using the natural inclusions of $SP^r(X)$ inside $SP^{r+1}(X)$ we can form the union $SP^\infty(X)$ the infinite symmetric product of $X$. The homotopy groups $\pi_n(SP^\infty (X))$ are the homology groups $H_n(X)$ of $X$ by the Dold-Thom theorem ([@hatcher] Section 4.K) and the Hurewicz homomorphism is induced by the inclusion of $X= SP^1(X)\hookrightarrow SP^\infty(X)$. We start with the following lemma, whose proof-idea is due to A. Dranishnikov.
\[Dold\] Suppose that $f: {{\mathbb D}}^m \rightarrow C_r({{\mathbb D}}^n)$ is a continuous function that has the same value $(0,\ldots,0)$ on the boundary $\partial {{\mathbb D}}^m =S^{m-1}$, and define $gr(f) = \lbrace (x,y) \in {{\mathbb D}}^m \times {{\mathbb D}}^n\, |\, y \, \mathit{is}\, a \,\mathit{factor}\, in \, f(x)\rbrace$. Consider the map $i: S^{m-1} \rightarrow gr(f)$ with $i(x)= (x,(0,\ldots ,0))$. Then $$i_* \otimes \mathbb{Q} : H_{m-1}(S^{m-1}) \otimes \mathbb{Q} \rightarrow H_{m-1}(gr(f)) \otimes \mathbb{Q}$$ is zero.
We will apply the Dold-Thom theorem. Consider $\beta(f) : {{\mathbb D}}^m \rightarrow SP^r(gr(f))$ given by the formula $$\beta(f)(x) = (x,y_1)^{i_1} \ldots (x,y_k)^{i_k}$$ if $f(x)= y_1^{i_1}\ldots y_k^{i_k}$. This is a continuous embedding of the disk in the $r$-fold symmetric power of the graph. The boundary of this map is the diagonal embedding $e_r: x\mapsto (x,0)^r$. It factors as the composite $SP^1(S^{m-1}) \stackrel{e_r}{\rightarrow} SP^r(S^{m-1}) \stackrel{SP^r(i)}{\rightarrow} SP^r(gr(f))$. We also have an inclusion $i_r : S^{m-1} \simeq SP^1(S^{m-1}) \rightarrow SP^r(S^{m-1})$ which is defined as $i_r(x) = x.*^{r-1}$.
Note that $H_{m-1} (SP^r(S^{m-1})) \cong \mathbb{Z}$. At the level of homology groups, it is clear that ${e_r} _*(1)= r. {i_r}_* (1)$. The space $SP^r(S^{m-1})$ is $(m-2)$-connected so by Hurewicz’s theorem we obtain $e_r \simeq r.i_r$. Therefore we have,
$$\xymatrix{ S^{m-1} \ar[r]^{\simeq} & SP^1(S^{m-1}) \ar[r]^{i} \ar[d]_{e_r \simeq ri_r} \ar@{-->}[dr]^{e_r} & SP^1(gr(f)) \ar[r]^{\simeq} \ar[d] & gr(f) \\
& SP^r(S^{m-1})\ar[r] \ar[d] & SP^r(gr(f)) \ar[d] & \\ & SP^{\infty}(S^{m-1}) \ar[r] & SP^{\infty}(gr(f)) & }$$
We know that $\pi_*(SP^\infty(X) \cong H_*(X; \mathbb{Z})$ by the Dold-Thom Theorem. So, $i_* : H_{m-1}(S^{m-1}) \rightarrow H_{m-1}(gr(f))$ is the same function as $\pi_{m-1}(SP^\infty (i)): \pi_{m-1} (SP^\infty(S^{m-1})) \rightarrow \pi_{m-1}( SP^\infty(gr(f))).$ Since $\beta(f)$ gives a nullhomotopy of $e_r \simeq r.i_r$, we get that $$r.SP^{m-1}(i) \simeq 0$$ $$\implies r.SP^\infty(i) \simeq 0$$ $$\implies r.i_* =0$$ $$\implies i_* \otimes \mathbb{Q} =0.$$
[\[min\]]{} In the case $n=1$ of the above lemma, we get an easier proof which works even for a map ${{\mathbb D}}^m \rightarrow Sub_r(I)$. Here sending a subset to its minimum is a continuous function from $Sub_r(I)$ to $I$. Therefore we have a disk ($x\mapsto (x,min(f(x))$) in $gr(f)$ whose boundary is $S^{m-1}= \partial gr(f)$. This shows that $i_* =0 $ and hence, $i_* \otimes \mathbb{Q} =0$.
[\[linear\]]{} In the case $m=1$ also the above conclusion is correct. The graph $gr(f)$ is path connected so one can choose a path from the point over -1 to the point over 1. Removing loops one obtains a 1-cell with boundary $\partial gr(f)$.
Lemma \[Dold\] has an interesting interpretation in the context of Selection Theorems (cf. [@michael1; @michael2; @michael3]. We make the following definition.
Suppose that $f: {{\mathbb D}}^m \rightarrow {{\mathcal H}}_c({{\mathbb D}}^n)$ is a continuous function from $ {{\mathbb D}}^m$ into the space of compact subsets of $ {{\mathbb D}}^n$.
Let $gr(f) = \lbrace (x,y) \in {{\mathbb D}}^m \times {{\mathbb D}}^n\, |\, y \in \, f(x)\rbrace$ and let $gr(\partial f) = \lbrace (x,y) \in \partial {{\mathbb D}}^m \times {{\mathbb D}}^n\, |\, y \in \, f|_{ \partial {{\mathbb D}}^m}(x)\rbrace$, where $f|_{ \partial {{\mathbb D}}^m}$ denotes the restriction of $f$ to ${ \partial {{\mathbb D}}^m}$.
A non-zero $m-$dimensional chain $c_m$ supported in $gr(f)$ is said to be a [**homological selection**]{} of $f$ if its boundary $\partial^m c_m$ is supported in $gr(\partial f)$ and the projection $H_m(gr(f),gr(\partial f)) \rightarrow H_m({{\mathbb D}}^m,\partial {{\mathbb D}}^m)$ maps $c_m$ to a non zero class. In such a situation we say that $f$ admits a homological selection.
Theorem \[multisel\] below is now a consequence of Lemma \[Dold\].
[**Homological Selection Theorem:**]{} Suppose that $f: {{\mathbb D}}^m \rightarrow C_r({{\mathbb D}}^n)$ is a continuous function that has the same value $(0,\ldots,0)$ on the boundary $\partial {{\mathbb D}}^m =S^{m-1}$. Then $f$ admits a homological selection. \[multisel\]
We know from Lemma \[Dold\] that the map $$H_{m-1}(S^{m-1})\otimes \mathbb{Q} \cong H_{m-1}( gr(\partial f)) \otimes \mathbb{Q} \rightarrow H_{m-1}(gr(f))\otimes \mathbb{Q}$$ is zero. We consider the commutative square $$\xymatrix{ H_m(gr(f),\partial gr(f)) \ar[r]^{\partial} \ar[d]_{{\Pi_i}_*} & H_{m -1}( gr(\partial f)) \ar[d]^{\cong} \\
H_m({{\mathbb D}}^m,\partial {{\mathbb D}}^m) \ar[r]^{\cong} & H_{m -1}(\partial {{\mathbb D}}^m) }$$ It suffices to show that the boundary map from $H_m(gr(f),\partial gr(f))$ to $ H_{m -1}( gr(\partial f))$ is non zero. The latter group is the top homology of the sphere, hence $\cong \mathbb{Z}$. The next term in the long exact sequence is $H_{m -1}(gr(f))$. Equivalently we must have the map $ H_{m -1}(\partial gr(f)) \rightarrow H_{m -1}(gr(f))$ has non zero kernel, which because the left group is $\mathbb{Z}$ is the same as saying the above map is 0 after tensoring with $\mathbb{Q}$. Hence by Lemma \[Dold\] we are done.
The hypothesis that $f: {{\mathbb D}}^m \rightarrow C_r({{\mathbb D}}^n)$ has the same value $(0,\ldots,0)$ on the boundary $\partial {{\mathbb D}}^m =S^{m-1}$ can be dropped. Any $f: {{\mathbb D}}^m \rightarrow C_r({{\mathbb D}}^n)$ can be extended by a linear homotopy to such a function $f_1$ by enlarging ${{\mathbb D}}^m$ slightly by adding an annulus $A_m$. We note that $gr(A_m)=\lbrace (x,y) \in A_m \times {{\mathbb D}}^n\, |\, y \in \, f|_{ A_m}(x)\rbrace$ deformation retracts to the outer boundary $S^{m-1}$. Therefore, $$H_m(gr(f_1), gr(\partial f_1)) \cong H_m(gr(f_1), gr(A_m)) \cong H_m(gr(f),gr(\partial f))$$ the second isomorphism coming from excision. Since $f_1$ admits a homological selection by Theorem \[multisel\] the same class under the above isomorphisms gives a homological selection for $f$.
Given any set $A$ in a metric space $(X,d)$ and any ${\epsilon}> 0$, we denote the ${\epsilon}$-neighborhood of $A$ by $A^{\epsilon}$. Given any ${\epsilon}> 0$ and for all $i$, $\mbox{gr}(R_i)^{\epsilon}$ is intrinsically a manifold with boundary and an open subset of ${{\mathbb A}}$. Let $\Pi_i$ denote the (continuous) projection $\Pi_i : \mbox{gr}(R_i)^{\epsilon}{\rightarrow}{{\mathbb A}}_{-i}$. Let $\mbox{dim}({{\mathbb A}}_{-i}) =\sum_{j=1,j\neq i}^N n_j \equiv d_i$. Also , let $d_0 = \sum_{j=1}^N n_j $ so that $d_i = (d_0 -n_i)$. As usual, we denote the boundary of a manifold $M$ by $\partial M$.
We now state and prove the following crucial proposition.
\[homocohomomap\] Suppose that a cost function $r_i: {{\mathbb A}}_i \times {{\mathbb A}}_{-i}{\rightarrow}{{\mathbb R}}$ is weakly polynomial-like. Let $R_i$ be the response function of $r_i$. Then there exists ${\epsilon}_0 > 0$ such that for all $0 < {\epsilon}< {\epsilon}_0$ and for all $i$, the induced homomorphism of $\Pi_i$ in the relative (co)homology $$\Pi_i^* : H^{d_i}\left({{\mathbb A}}_{-i},\partial {{\mathbb A}}_{-i}\right) {\longrightarrow}H^{d_i}\left(\mbox{gr}(R_i)^{\epsilon},\partial \mbox{gr}(R_i)^{\epsilon}\right)$$ or equivalently $$\Pi_{i*} : H_{d_i}\left(\mbox{gr}(R_i)^{\epsilon},\partial \mbox{gr}(R_i)^{\epsilon}\right) {\longrightarrow}H_{d_i}\left({{\mathbb A}}_{-i},\partial {{\mathbb A}}_{-i}\right)$$ is nonzero.
Suppose that in an ${\epsilon}$ neighborhood of $R_i$ there is a continuous function $f$ from ${{\mathbb A}}_{-i}$ for which $H_{d_i}(gr(f),\partial gr(f)) \rightarrow H_{d_i}({{\mathbb A}}_{-i},\partial {{\mathbb A}}_{-i})$ is non zero. This non zero map can be written as the composite $$H_{d_i}(gr(f), \partial gr(f)) \rightarrow H_{d_i}\left(\mbox{gr}(R_i)^{\epsilon},\partial \mbox{gr}(R_i)^{\epsilon}\right) {\longrightarrow}H_{d_i}({{\mathbb A}}_{-i},\partial {{\mathbb A}}_{-i})$$ which forces the latter map to be non zero. This is the statement we need.
Since $r_i$ is weakly polynomial-like, for every ${\epsilon}> 0$ there exists $f$ such that\
a) $gr(f)$ is contained in an ${\epsilon}$-neighborhood of $gr(R_i)$, and\
b)$f$ can be lifted to the space $C_N({{\mathbb D}}^n)$.\
Lemma \[Dold\] now completes the proof.
Existence of Nash Equilibria
============================
In this section, we prove the existence of Nash equilibria under the assumption (**A2**).
For any $k \in \mathbb{N}$ we denote $[k] = \{1,2,\ldots,k\}$. We begin with the useful lemma.
\[hausintersect\] Given closed subset sequences $\{A_{ji}\}_{i \in \mathbb{N}},j \in [k]$ of a compact subset $S$ of $X$ such that $\bigcap_{j}A_{ji} \neq \emptyset,\forall i$ and $d_{H}(A_{ji},A_j) \stackrel{i {\rightarrow}\infty}{{\longrightarrow}} 0$ for given non-empty subsets $A_j,j \in [k]$ of $S$, then $\bigcap_j A_j \neq \emptyset$.
Choose any ${\epsilon}> 0$. Since, for any $j \in [k],\ d_{H}(A_{ji},A_j) \stackrel{i {\rightarrow}\infty}{{\longrightarrow}} 0$, there exists $i_0(j)$ such that for all $i \geq i_0(j),\ A_{ji} \subseteq A_j^{{\epsilon}}$. Let $i_0 = \max_{j \in [k]}\{i_0(j)\}$. Now, since by assumption $\bigcap_{j}A_{ji} \neq \emptyset,\forall i \geq i_0$, for all $j$, we have $\bigcap_{j}A_j^{{\epsilon}} \neq \emptyset$. Now suppose $\bigcap_j A_j = \emptyset$. Then we can construct a non-empty set $$\Xi \equiv \{(\Lambda_1,\Lambda_2) \in 2^{[k]} \times 2^{[k]}:\ \Lambda_1 \cap \Lambda_2 = \emptyset,\ \cap_{i \in \Lambda_1} {{\mathbb A}}_i \neq \emptyset,\ \cap_{j \in \Lambda_2} A_j \neq \emptyset\}.$$
For each tuple $(\Lambda_1,\Lambda_2) \in \Xi$, there exists $${\epsilon}_{\Lambda_1,\Lambda_2} \equiv \min_{i \in \Lambda_1} \inf_{x\in {{\mathbb A}}_i}\inf_{y \in \cap_{j \in \Lambda_2} A_j}d(x,y) > 0.$$
Choose ${\epsilon}_0 \equiv \frac{1}{3} \min_{(\Lambda_1,\Lambda_2) \in \Xi}{\epsilon}_{\Lambda_1,\Lambda_2}$. Then, for any $0 < {\epsilon}< {\epsilon}_0$ and for all $(\Lambda_1,\Lambda_2) \in \Xi$, $$\begin{aligned}
\cap_{i \in \Lambda_1} {{\mathbb A}}_i^{\epsilon}\bigcap \cap_{j \in \Lambda_2} A_j^{\epsilon}&\subseteq \cup_{i \in \Lambda_1} {{\mathbb A}}_i^{\epsilon}\bigcap \cap_{j \in \Lambda_2} A_j^{\epsilon}\nonumber \\
&\subseteq \left(\cup_{i \in \Lambda_1} {{\mathbb A}}_i\right)^{\epsilon}\bigcap \cap_{j \in \Lambda_2} A_j^{\epsilon}\nonumber \\
&\subseteq \left(\cup_{i \in \Lambda_1} {{\mathbb A}}_i\right)^{\epsilon}\bigcap \left(\cap_{j \in \Lambda_2} A_j\right)^{2{\epsilon}} \nonumber \\
&= \emptyset. \nonumber\end{aligned}$$
Hence $\bigcap_{j}A^{{\epsilon}}_{j} = \emptyset$ for $0 < {\epsilon}< {\epsilon}_0$ which is a contradiction.
Before we state our main theorem we recall the notion of [**external cup product, or cross product**]{} of relative cohomology classes ([@hatcher] p. 220). Since ${{\mathbb A}}= {{\mathbb A}}_i \times {{\mathbb A}}_{-i}$, we have an isomorphism $H^{n_i}({{\mathbb A}}_i, \partial {{\mathbb A}}_i) \otimes H^{d_i}({{\mathbb A}}_{-i}, \partial {{\mathbb A}}_{-i}){\rightarrow}H^n({{\mathbb A}}, \partial {{\mathbb A}})$ ([@hatcher] Theorem 3.20). This isomorphism is implemented by the cross product $a \times b = p_1^\ast (a)\cup p_2^\ast (b)$, where $p_1: ({{\mathbb A}}_i \times {{\mathbb A}}_{-i}, \partial {{\mathbb A}}_i\times {{\mathbb A}}_{-i}) {\rightarrow}({{\mathbb A}}_i, \partial {{\mathbb A}}_i)$ and $p_2: ({{\mathbb A}}_{-i} \times {{\mathbb A}}_i, \partial {{\mathbb A}}_{-i} \times {{\mathbb A}}_i){\rightarrow}({{\mathbb A}}_{-i}, \partial {{\mathbb A}}_{-i})$ are projections of pairs. Also, since $H^{n_i}({{\mathbb A}}_i, \partial {{\mathbb A}}_i) = H^{d_i}({{\mathbb A}}_{-i}, \partial {{\mathbb A}}_{-i})= H^n({{\mathbb A}}, \partial {{\mathbb A}}) = \mathbb{Z}$, (relative) Poincaré Duality holds in this set up.
Using Definition \[optrespgr\] the existence of Nash equilibria can be stated as follows.
\[existNash\] Consider an $n-$person non-cooperative game with mixed strategy spaces satisfying assumption **(A2)**. Let $r_1, \cdots, r_n$ be the cost functions and $R_1, \cdots, R_n$ be the response functions. Then, $\bigcap_{i=1}^N \mbox{gr}(R_i) \neq \emptyset$. Equivalently, the game has at least one Nash equilibrium.
We continue with the notation of Proposition \[homocohomomap\], which gives the following: $$\Pi_{i*} : H_{d_i}\left(\mbox{gr}(R_i)^{\epsilon},\partial \mbox{gr}(R_i)^{\epsilon}\right) {\longrightarrow}H_{d_i}\left({{\mathbb A}}_{-i},\partial {{\mathbb A}}_{-i}\right)$$ is nonzero. For each $i$, choose a relative $d_i-$cycle $z_i \in H_{d_i}\left(\mbox{gr}(R_i)^{\epsilon},\partial \mbox{gr}(R_i)^{\epsilon}\right)
(\subset H_{d_i}({{\mathbb A}}_{-i}, \partial {{\mathbb A}}_{-i}))$ such that $w_i=\Pi_{i*} (z_i) \neq 0$.
Let $w_i^\ast (\neq 0) \in H^{n_i}({{\mathbb A}}_i, \partial {{\mathbb A}}_i) $ be its (relative) Poincaré Dual. Then $\bigcup_{i=1 \cdots N}
w_i^\ast \in H^n({{\mathbb A}}, \partial {{\mathbb A}})$ is a non-zero cohomology class. Hence, by (relative) Poincaré Duality again the intersection of the supports of the chains $z_i$ is non-empty, i.e. $\bigcap_{i=1 \cdots N} \mbox{supp} (z_i)
\neq \emptyset$. One way to see this is to take simplicial approximations of the chains $z_i$ homologous to $z_i$ contained in $\mbox{gr}(R_i)^{\epsilon}$ and ensure that their supports are in general position. Then $\bigcap_{i=1 \cdots N} \mbox{supp} (z_i)$ is the support of a zero-cycle (Poincaré) dual to $\bigcup_{i=1 \cdots N}
w_i^\ast$. Hence the intersection of the closures $Cl(\mbox{gr}(R_i)^{\epsilon})$ is non-empty, i.e. $\bigcap_{i=1 \cdots N} Cl(\mbox{gr}(R_i)^{\epsilon})
\neq \emptyset$. Since this is true for all ${\epsilon}> 0$, it follows from Lemma \[hausintersect\] that $\bigcap_{i=1 \cdots N} \mbox{gr}(R_i)
\neq \emptyset$.
A Counterexample {#ctreg}
================
In this section we give an example where (**A2**) is not satisfied though (**A1**) is satisfied and the conclusion in Proposition \[homocohomomap\] is not true, thereby affirming the necessity of the assumption. Proposition \[subconf\] indicates that the topology on $Sub_n({{\mathbb D}}^m)$ is the quotient topology inherited from $C_n({{\mathbb D}}^m)$ by forgetting weights/multiplicities. This shows that there is no trivial counterexample.
The example below will involve a map ${{\mathbb D}}^2 \rightarrow Sub_3({{\mathbb D}}^2)$ (that is, $m=n=2$) . Note that this is the smallest case where such an example can exist: by Remark \[min\] the conclusion in Proposition \[homocohomomap\] is satisfied if $n=1$. By Remark \[linear\] we have the case $m=1$, and since $Sub_2(X) = C_2(X)$ we obtain the result for the case ${{\mathbb D}}^2 \rightarrow Sub_2({{\mathbb D}}^2)$. We also use the counterexample to demonstrate that Nash equilibria might not exist or equivalently that Theorem \[existNash\] does not hold if we assume only (**A1**). However, before we get into the counterexample, a remark is in order.
[Let ${{\mathcal P}}({{\mathbb D}}^j)$ denote the set of probability measures on ${{\mathbb D}}^j$ equipped with the weak topology. Also let ${{\mathcal P}}_n({{\mathbb D}}^j)$ be the subspace of probability measures supported on (at most) $n$ points. Any continuous function $f:{{\mathbb D}}^l {\rightarrow}Sub_n({{\mathbb D}}^j)$ can be lifted to ${{\mathcal P}}_n({{\mathbb D}}^j)$ by Michael’s Selection Theorem [@michael3]. Equivalently any continuous function $f:{{\mathbb D}}^l {\rightarrow}Sub_n({{\mathbb D}}^j)$ can be lifted to a continuous [**weighted real valued multifunction**]{} with total weight constant at each point, where all weights are non-negative. The following counterexample shows that we cannot upgrade this to a continuous weighted [**rational-valued**]{} (or equivalently integer-valued, after normalization) multifunction with constant total weight at each point.]{}
Counterexample to Proposition \[homocohomomap\] {#ctreg1}
-----------------------------------------------
The idea of the counterexample is simple in outline. Consider a map $g:S^1 {\rightarrow}Sub_3({{\mathbb D}}^1)$ given by $g(e^{2\pi i \theta}) = \{0, 1, \theta \}$, where $\theta \in [0,1]$ and ${{\mathbb D}}^1$ is identified with $[0,1]$. Any lift ${\widetilde}{g}:S^1 {\rightarrow}SP^k({{\mathbb D}}^1)$ for some $k\geq 3$ assigns non-negative integer weights to each point in $g(x)$ for all $x \in S^1$. Choose a regular point $a \in S^1$ (for $g$), i.e. a point such that $\# g(a) = 3$. Let $g(a) = \{ a_1, a_2, a_3\}$ (see figure below). Let $w_i$ be the weight assigned to $a_i$ so that $(w_1+w_2+w_3)=k$.
{height="70mm"}
By continuity, the weights on the strands containing each of the $a_i$’s is constant over all regular points. Let $b=e^{2\pi i}$ be the only non-regular point and let $g(b) = \{ b_1, b_2\}$. Let $u_i$ be the weight assigned to $b_i$ so that $(u_1+u_2)=k$. Then $u_1=w_1 + w_2$ and $u_2=w_2+w_3$. It follows that $w_2=0$, i.e. the weight assigned to $a_2$ is zero.
The main idea behind the counterexample below is to [*wedge three copies of the above picture together appropriately*]{}. More precisely, wedge three copies $S^1_1, S^1_2, S^1_3$ of the circle $S^1$ along a regular point $a$ and permute the multifunction values $g(a) = \{ a_1, a_2, a_3\}$ over the three copies during the gluing operation such that by the computation above, each $w_i$ is forced to be zero. Equivalently, $a_i$ is forced to lie in the middle strand on $g(S^1_i)$. Next this multifunction $g$ is extended to a wedge $W$ of 3 disks $D_1, D_2, D_3$, where $D_i$ is bounded by $S^1_i$, $i=1,2,3$. Finally embed $W$ into a disk $D$ and extend the multifunction to all of $D$.
We now start with a formal description. Fix a path $P(t)$ in ${{\mathbb D}}^2$. Define $g_P:{{\mathbb D}}^2 \rightarrow Sub_3({{\mathbb D}}^2)$ as follows:\
On the ray from (0,0) to (1/2,0) define $g_P(t,0) = \lbrace P(0),P(2t) \rbrace$ so that $g_P(0,0)=\lbrace P(0) \rbrace$. Now define $g$ on the circle of radius $t$ by $$g_P(tcos 2\pi a, t sin 2\pi a)= \lbrace P(0),P(2t), P(2at) \rbrace$$ We extend $g_P$ to ${{\mathbb D}}^2$ by using a linear homotopy from the map on the circle of radius half to the constant function $(0,0)$, and putting this homotopy as the function on the outward rays. Then $g_P$ is continuous, and there is no lift to $SP^3({{\mathbb D}}^2)$ as any assignment of weights to the points forces the weight of the points $P(at)$ for $a\neq 0$ over $( tcos 2\pi a, t sin 2\pi a)$ to be zero (see argument above). Note however that one can pass to a continuous submultifunction (leaving out the subset of the above form $-$ the middle strand in the picture) on which weights can be defined and hence the conclusion of Proposition \[homocohomomap\] remain true.
The topological space $gr(g_P)$ is homeomorphic to the sphere $S^2$ with the north pole and south pole identified along with a disk whose boundary is the wedge of the longitude and the meridian. We now write a CW complex structure of $gr(g_P)$: There are two 0-cells $v, \, w$ with $v$ as the pinched point (north pole = south pole = the point lying over $(0,0)$) and $w$ as the point on the boundary lying over the point $(1,0)$; There are three 1-cells $a_1,\, a_2,\,\alpha$, where $a_i$ are the two lines lying over the line joining $(0,0)$ to $(1,0)$, and $\alpha$ is the boundary. There are three 2-cells $e_1,e_2,e_3$, the three inverse images of the disk minus the line joining $(0,0)$ to $(1,0)$. The boundaries are given by: $$\partial e_1 = \alpha \cup a_1 \cup (-1)a_1,$$ $$\partial e_2 = \alpha \cup a_2 \cup (-1)a_2,$$ $$\partial e_3 = \alpha \cup a_1 \cup a_2$$ and $$\partial a_i = v \cup w \,(i=1,2),$$ $$\partial \alpha = v\cup v.$$
We use the above $g_P$ to get a counterexample by wedging three similar maps at a regular point. Formally, we use three arcs of a circle as our paths. Fix a circle $C$, define $h_C : {{\mathbb D}}^2 \rightarrow Sub_3({{\mathbb D}}^2)$ as follows. Divide $C$ into three arcs $I_1,\, I_2,\, I_3$ by choosing three points $A_1,A_2,A_3$ in order on it and defining $I_1=A_2A_3,\,I_2=A_3A_1,\,I_3=A_1A_2$. Define $P_i=C-I_i$ for $i=1,2,3$. The orientation of $P_i$ is defined by starting at the end of $I_i$ and ending at the beginning (for example, $P_1$ starts at $A_3$ passes through $A_1$ and ends at $A_2$). In ${{\mathbb D}}^2$ consider three smaller disks $D_i \, (1\leq i \leq 3)$ in the interior wedged at the point $(0,0)$. On the disk $D_i$ define $h_C$ as the function $g_{P_i}$ in the half disk (by fixing an orientation preserving homeomorphism between the half disk and $D_i$ in such a way that the point corresponding to $(0,0)$ is mapped by $g_{P_i}$ to $\lbrace A_1,A_2,A_3\rbrace$ ). On the complement of $\cup D_i$ we use a linear homotopy to get the value $(0,0)$ on the boundary. We prove that the boundary circle is a free generator for $H_1(gr(h_C); \mathbb{Z})$ thus violating the conclusion of Proposition \[homocohomomap\].
The topological space $gr(h_C)$ can be obtained from the spaces $G_i=gr(g_{P_i})$ (all the three $G_i$ are homeomorphic) by slicing each over a regular point of the disk (with three inverse images) and gluing the three together via the three cyclic permutations. Then we can write down a CW complex structure on $gr(h_C)$ as follows:\
There are six 0-cells $v_i,\,w_i \, (i=1,2,3)$ corresponding to the notation in the case of $G_i$; There are nine 1-cells $a_1^i,\, a_2^i \,(i=1,2,3)$ (the same definition as before in the $G_i$) and $\alpha_{1,2},\, \alpha_{2,3}, \, \alpha_{3,1}$ where $\alpha_{i,j}$ joins $v_i$ to $v_j$ on the boundary; There are still three 2-cells (since connecting the disks only results in a bigger disk) $e_1,\,e_2,\,e_3$. The boundary maps are given by the following(where the boundary $\alpha = \alpha_{1,2},\cup \alpha_{2,3}, \cup \alpha_{3,1}$): $$\partial e_1 = \alpha \cup a_1^1 \cup (-1)a_1^1 \cup a_2^2\cup (-1)a_2^2\cup a_1^3\cup a_2^3,$$ $$\partial e_2 = \alpha \cup a_1^1\cup a_2^1\cup a_1^2\cup (-1) a_1^2 \cup a_2^3 \cup (-1)a_2^3,$$ $$\partial e_3 = \alpha \cup a_2^1\cup (-1)a_2^1 \cup a_1^2\cup a_2^2 \cup a_1^3 \cup (-1)a_1^3$$ and $$\partial a_j^i = v^i \cup w^i \,(j=1,2, \, i=1,2,3),$$ $$\partial \alpha_{k,l} = v_k\cup v_l \,(k=1,2,3 , \, l=1,2,3).$$ Now we can compute the CW homology of $gr(h_C)$. We obtain that $H_1(gr(h_C)) \cong \mathbb{Z}$ with generator $\alpha$ which is homologous to each $a_1^i \cup a_2^i$. This violates the conclusion of Proposition \[homocohomomap\], proving the counterexample. $\Box$
Counterexample to Theorem \[existNash\]
---------------------------------------
Theorem \[existNash\] asserts the existence of Nash equilibria under the condition (**A2**). Using the above counter-example, we construct an example where Nash equilibria do not exist. To do this we realize the graph of any continuous function $f:{{\mathbb A}}_{-i} \rightarrow Sub_N({{\mathbb A}}_i)$ as the set of minima of a cost function.
\[minsettoprofit\] Let $f:{{\mathbb A}}_{-i} \rightarrow Sub_N({{\mathbb A}}_i)$ be a continuous function. Then there is a function $F:{{\mathbb A}}_{-i} \times {{\mathbb A}}_i \rightarrow {{\mathcal R}}$ such that, $$f(x)= \lbrace y\,|\, y\, is \, a \, local\, minimum\, of\, y\mapsto F(x,y)\rbrace .$$
Consider the graph of $f$, $gr(f)$. This is a closed subset of the compact set ${{\mathbb A}}_{-i} \times {{\mathbb A}}_i$ and is therefore, compact. We define $F$ to be the distance function to $gr(f)$ which is greater than zero if $(x,y) \notin gr(f)$ and $0$ if $(x,y) \in gr(f)$. Thus, the set of minima of $F$ are exactly the elements of the set $gr(f)$.
The above proof also works if we replace local minima by global minima. We now write down the counterexample to the statement analogous to Theorem \[existNash\] obtained by replacing assumption (**A2**) by (**A1**). For the example below, the number of players $N =2$, ${{\mathbb A}}_1$ and ${{\mathbb A}}_2$ are two dimensional disks. We have to construct functions $f_1: {{\mathbb A}}_1 \rightarrow Sub_k({{\mathbb A}}_2)$ and $f_2: {{\mathbb A}}_2 \rightarrow
Sub_l({{\mathbb A}}_1)$ such that $gr(f_1)$ and $gr(f_2)$ do not intersect.
Define $f_1$ as the example $h_C$ above by using the same formula on the disks ${{\mathbb D}}_i \, (i=1,2,3)$. Draw a continuous family of linear trajectories joining the boundary circle to the closest point on $\cup \partial {{\mathbb D}}_i$. Extend $f_1$ to ${{\mathbb A}}_1$ such that it is constant on each of the trajectories. Note that this defines uniquely a continuous function $f_1: {{\mathbb A}}_1 \rightarrow Sub_3({{\mathbb A}}_2)$.
Next, we shall choose $f_2$ judiciously so that $gr(f_2)$ does not intersect $gr(f_1)$. Note that $Im(f_1)$ is contained in $Sub_3(C)$, so that any intersection value must have second coordinate in the circle $C$. It is therefore enough to make the judicious choice over $C$ and take any extension (such extensions are always possible since the inclusion of the circle $C$ is a neighborhood deformation retract and $Sub_3({{\mathbb A}}_1)$ is contractible).
Divide the circle $C$ into three arcs $\alpha_1,\, \alpha_2,\, \alpha_3$ where $\alpha_1 $ is the arc joining the mid-point of $A_3A_1$ to the mid-point of $A_1A_2$ and passing through $A_1$ (and similarly $\alpha_2, \alpha_3$). Define $f_2$ on the circle $C$ to be the [*single valued*]{} function mapping $\alpha_i$ to $\partial {{\mathbb D}}_i$ such that\
a) the map is an orientation preserving homeomorphism,\
b) the boundary points of $\alpha_i$ are mapped to $(0,0)$, and\
c) the point $A_i$ on $\alpha_i$ is mapped to the point diametrically opposite to $(0,0)$ in $\partial {{\mathbb D}}_i$.\
Recall that this point on $\partial {{\mathbb D}}_1$ (resp. $\partial {{\mathbb D}}_2$, $\partial {{\mathbb D}}_3$) is mapped by $f_1$ to $\lbrace A_2,A_3\rbrace$(resp. $\lbrace A_1,A_3\rbrace$, $\lbrace A_1, A_2\rbrace$). We extend $f_2$ to ${{\mathbb A}}_2$ by the recipe given in the previous paragraph.
To see that $gr(f_1) \cap gr(f_2) = \emptyset$, note that the contrary would imply that there is an $x \in {{\mathbb A}}_2$ with $x\in f_1(f_2(x))$ because $f_2$ is single valued on $C$. The point $x$ cannot belong to the boundary of the $\alpha_i$ because then $f_1(f_2(x))=\lbrace A_1,A_2,A_3\rbrace$ and none of the $A_i$ lie on the boundary.
If $x$ is in the interior of $\alpha_1$ then $f_1(f_2(x))= \lbrace A_2, A_3, y\rbrace$. Note that as the point $x$ traverses from the mid-point of $A_3A_1$ to the mid-point of $A_1A_2$ the point $y$ starts at $A_1$ and moves along the arc $A_1A_2$. When $x$ is close to $A_1$ the point $y$ is close to $A_2$. Therefore if $x\in A_3A_1 \cap \alpha_1$, $y\in A_1A_2$. Similarly, we observe that if $x\in A_1 A_2\cap \alpha_1$, then $y\in A_3A_1$. Therefore, $x\notin f_1(f_2(x))$.
The same proof works for $x$ in the interior of $\alpha_2$ and $\alpha_3$. Therefore, $f_1$, $f_2$ as above give cost functions $F_1$, $F_2$ by Proposition \[minsettoprofit\] such that the game defined by the cost functions $F_i$ for player $i$ ($i=1,2$) does not have a Nash equilibrium. [*Thus Theorem \[existNash\] does not hold if assumption (**A2**) is replaced by (**A1**).*]{} This completes the counterexample. $\Box$
Generalizations of Branched Surfaces {#brs}
------------------------------------
The theory of train-tracks in dimension two [@Thurstonnotes] and that of branched surfaces in dimension three [@go] has been very fruitful. It is therefore tempting to try to generalize these to higher dimensions. A train-track (resp. branched surface) is a 1-complex (resp. 2-complex) in a 2-manifold (resp. 3-manifold) with a well–defined $C^1$ tangent space everywhere. The set of points where a train-track is not a 1-manifold is a discrete collection of isolated points, i.e. a 0-manifold. However, one dimension higher, the set of points where a branched surface is not a 2-manifold is only a 1-complex, and is called the branch locus. The branch locus is not a 1-manifold only at isolated points, where two lines of the branch locus cross each other transversely. It is important to note that both train-tracks and branched surfaces are codimension one objects. In applications, branches of train-tracks and branched surfaces are assigned weights consistently. The counterexample in Section \[ctreg1\] shows that the graph of a multifunction $f:{{\mathbb D}}^n {\rightarrow}Sub_k({{\mathbb D}}^m)$ [*cannot*]{} serve as an analog of a non-trivially weighted branched surface in higher codimensions. On the other hand, Proposition \[homocohomomap\] indicates that the graph of a multifunction $f:{{\mathbb D}}^n {\rightarrow}C_k({{\mathbb D}}^m)$ does support a non-trivial relative cycle and could serve as the starting point for a theory of weighted branched surface in higher codimensions.
[10]{} , [*Dynamic Noncooperative Game Theory*]{}, Academic Press, New York, 1982. , [*Essential Laminations in 3-Manifolds*]{}. Ann. of Math., Vol. 130, (1989) pp. 41-73. , [*The game of Hex and the Brouwer fixed-point theorem*]{}, Amer. Math. Monthly, 86(1979), pp. 818-827. , [*Existence of correlated equilibria*]{}, Math. Oper. Res. 14 (1989), no. 1, pp. 18-25. , [*On the strategic stability of equilibria*]{}, Econometrica, 54(5), (September 1986), pp. 1003-1037. , [*Equilibrium points in bimatrix games*]{}, SIAM Journal on Applied Math, 12 (1964), pp. 413-423. , [*The Jordan Curve Theorem Via the Brouwer Fixed Point Theorem*]{}. Amer. Math. Monthly 91 (1984), no. 10, pp. 641-643. , [*Continuous selections. I*]{}. Ann. of Math., Vol. 63, No. 2, (Mar., 1956) pp. 361–382. , [*Continuous selections. II*]{}. Ann. of Math., Vol. 64, No. 3, (Nov., 1956), pp. 562-580. , [*Continuous selections. III*]{}. Ann. of Math., Vol. 65, No. 2 (Mar., 1957) pp. 375-390.
, [*Algebraic Topology*]{}, Cambridge University Press, 2002. , [*Non-Cooperative Games*]{}. Ann. of Math., Vol.54, No. 2 (Sep., 1951), pp. 286-295. , [*The [G]{}eometry and [T]{}opology of 3-[M]{}anifolds.*]{}, Princeton University Notes, 1980.
[^1]: Research of first author supported partly by DST GoI Grant no: SR/FTP/MS-08/2009 and partly by IIM Bangalore Research Chair Grant no: 190. Research of third author partly supported by CEFIPRA Indo-French Research Grant 4301-1.
| |
Work within Ground Operations team, at Subcontracting and Product Assurance areas.
The action range begins supporting the Engineering team with Part Number designs, and ends with the correct entry of those components in our Stock (including manufacturing, iteration with suppliers, Product Assurance and Documentation).
Responsibilities
- Work with our Design and Integration engineers in evolving our designs to improve quality and manufacturability. Then implement in a rapidly-evolving production environment.
- Technical reviews with manufacturers of components designed by PLD Space (drawings study, manufacturing tolerances…).
- Selection of manufacturer for aerospace metallic (small and medium size machined parts, pressure vessels, laser cut…) and composite structures (monolithic panels, filament winding, hand lay-up, RTM…), in terms of quality, delivery time and price. Negotiation and risk management.
- Manufacturers and suppliers follow-up, control and in-person visits.
- Execution of manufacturing purchase orders, internal logistics and BoMs management.
- Verification and validation of components: Product Assurance Quality Control.
- Work on the quality of the data of our management system and QA, in terms of continuous improvement. Metrics and indicators.
Required competences
- 2 years of verifiable experience in Manufacturing, Mechanical Design, Supply Chain, Product Assurance, QC or similar fields.
- Higher Education (Mechanical, Aerospace, Manufacturing Engineering, or relevant fields).
- Ability to communicate fluently in English and Spanish (spoken and written).
- Knowledge of manufacturing and production technologies of aerospace components: machining, laser cut, composite materials manufacturing, metrology processes, associated documentation…
- Understanding of engineering fundamentals for mechanical design and manufacturing, including working knowledge of GD&T, fits and clearances, materials used…
- Full proficiency in MS office tools expected.
- Working with databases, exports and creation of dashboards.
Desired Competencies
- 2 years of experience in high-tech production environments. Aerospace/Aeronautical/Automobile Sector.
- Knowledge in Lean Manufacturing, Six Sigma or similar.
- Experience in the field of Technical Production Engineering and quality methodologies such as statistical process control and FMEA is an advantage.
- Experience in Manufacturing and/or Design Engineering: CAD/CAM/CAE, 3D models and 2D engineering drawings.
- Experience with quality standards EN9001 and/or EN9100 (or similar standards).
Others
- A self-starter mentality, with minimum direction required.
- Comfortable with multi-tasking and able to adapt to constant changing work assignments in a fast-paced work environment.
- Great team-work spirit and willing to help others beyond your main responsibilities.
- Excellent concentration and attention to detail with outstanding work efficiency and accuracy.
- Strong negotiation skills and multi-disciplinary problem solving, and critical thinking skills.
Equal Employment Opportunity
Payload Aerospace SL is an equal opportunity employer and does not discriminate against gender, marital status, religion, age, colour, race, sexual orientation, nationality or disability.
We are compromised in maintaining a diverse and free from discrimination working environment where everyone is treated with respect. Employment is based on an individual’s merit and qualifications, directly related to job competence.
These principles are included in all aspects of employment: recruiting, hiring, training, compensation and benefits, and promotion. | https://www.pldspace.com/en/career/subcontract-engineer |
Sport Multimedia Storytelling is an introduction to the elements of news gathering and writing. Topics include effective leads, deadline coverage, feature and news story writing, interviewing sources, diversity and inclusion, ethical reporting, and effective research. Students will learn how to develop story ideas, organize materials, plan, outline, and write the story. Additionally, students will learn how to write and create for audio mediums, like podcasting. | https://www.sps.nyu.edu/homepage/academics/courses/TCSM1-UC2120-sport-media-storytelling-.html |
Do you remember what you were doing on September 8th this year? Perhaps you spent the day working on homework that you forgot about or went out to eat with your family. In either case, this particular Sunday passed by uneventfully and classes began all too soon again the next day. However, did you know that September 8th is International Literacy Day?
Former Editor Called For More Student Involvement
For some time now, I have been noticing an interesting phenomenon on the campus. Ministry groups are struggling to get people to serve in them; [theater] students are begging others to come and try out for the play so that the theatre department can perform. And, the choir is showing remarkably dwindled numbers compared to previous years. The yearbook (and the KAYSEEAN, for that matter) struggles to find people willing to put a little effort into a publication…
Motivation, Dedication: Two Different Sides of the Same Coin
Last month, as I spent Saturdays and Sundays grinding out five-hour cycling rides through rain, snow, and bitter cold, I started thinking about the difference between motivation and dedication. Many people use the words interchangeably, and such an error can be forgiven since both motivation and dedication result in the completion of a task. But, as I thought about why I procrastinate and fall short of goals, I realized that there is a difference between the two words. Motivation is fickle, while dedication is constant.
Covid-19 and “Prayers That Are Made Out of Grass”
Perspective: First Things First
Perspective: King University’s Chair of Criminal Justice On Black Lives Matter
What Christmas Means To Me
Christmas, a holiday that is celebrated all around the world by different people of different cultures, can be expressed in many ways. It amazes me that just one holiday can bring families together laughing, singing, and exchanging gifts. | https://thekayseean.com/tag/opinion/ |
Island species are susceptible to invasive mammals because of their small populations, specialised habitats and reduced likelihood of recolonisation. For more than 50 years, invasive mammals have been eradicated from islands around the world. Despite the success of eradications, there are few publications in the primary literature detailing the ecological benefits and consequences of these eradications. Here we conduct a review of the published literature focussing on rodent eradications conducted on Australian and New Zealand islands and we evaluate the extent of reporting of non-target mortality and ecological monitoring following an eradication. A search of the Database of Island Invasive Species Eradications website identified that successful, whole-island rodent eradications were conducted on 66 Australian and 124 New Zealand islands in the period from 1964 to 2016. We found that non-target mortality was rarely ever reported (3% and 12% for eradications on Australian islands and New Zealand islands, respectively). Results of any quantitative ecological monitoring following eradications were published for only 10% of all successful rodent eradications on Australian islands and 19% of all eradications on New Zealand islands. There also has been no change in reporting of potential benefits and consequences of rodent eradications in Australia and New Zealand over the last few decades despite an increased awareness of the problem of under-reporting. We discuss the detailed benefits and consequences of these eradications in Australia and New Zealand and highlight the need to incorporate ecological monitoring into new projects to document benefits and consequences of eradications to inform future eradications. | https://researchoutput.csu.edu.au/en/publications/review-of-the-reporting-of-ecological-effects-of-rodent-eradicati |
Mandelbrot, Benoit: K-12 TLC Guide.
Math, Art and Music K-12 TLC Guide.
Exploring Fractals, University of Massachusetts.
Fractal Applet, International Educational Software.
Fractal Galleries on the Internet.
The Fractal Microscope, University of Illinois.
The Mandelbrot Set, Loughborough University.
Math Archive, University of Tennessee Knoxville.
Math Art Gallery, Catholic University of Nijmegen.
Peano Curves: K-12 TLC Guide.
Fractals: A Math of Art. | http://k12tlc.net/content/fractals.htm |
Bruce Hanington, Bella Martin
This handy, portable version of the authoritative Universal Methods of Design provides the same thorough and critical presentation, updated and expanded to include 125 research methods, synthesis/analysis techniques, and research deliverables for human-centered design.
Each method of research is distilled down to its most powerful essence, in a format that will help individual practitioners as well as design teams select and implement the research methods best suited to their design culture within the constraints of their projects. This valuable guide:
- Dismantles the myth that user research methods are complicated, expensive, and time-consuming
- Creates a shared meaning for cross-disciplinary design teams
- Illustrates methods with compelling visualizations and case studies
- Characterizes each method at a glance
With the concise, accessible format of The Pocket Universal Methods of Design, you and your team will be designing in a completely new, more effective way.
The titles in the Rockport Universal series offer comprehensive and authoritative information and edifying and inspiring visual examples on multidisciplinary subjects for designers, architects, engineers, students, and anyone who is interested in expanding and enriching their design knowledge.
Bruce Hanington is a professor and head of the School of Design at Carnegie Mellon University in Pittsburgh, Pennsylvania. Prior to this, he was director of graduate studies, and program chair of industrial design. Bruce has dedicated his teaching and research to methods and practices for human centered design, with an emphasis on design ethnography, participatory design, and the meaning of form in context. In addition to working with industry partners through collaborative projects and executive education, his work has been published in Design Issues, The Design Journal, and Interactions, with chapters in Affective Sciences in Human Factors and Human-Computer Interaction and The Routledge Handbook of Sustainable Design.
Bella Martin is a Lead User Experience Researcher in Atlanta, Georgia. After contributing to award-winning design projects for Microsoft Research, the US Postal Service, GlaxoSmithKline, and Allstate Financial, she now invests much of her time working with organizations who are new to the methods of user-centered research, but eager to give their users a voice in the design process. Bella holds a Master of Design from Carnegie Mellon University, where she first began her ongoing work in visualizing user-centered research methods. | https://walterfoster.com/more-quarto-book/the-pocket-universal-methods-of-design-revised-and-expanded/ |
352 English Irregular Verbs - Practice Book #ad - Practice. Chapter 4. The practice book “352 english Irregular Verbs” presents five groups of the verbs according to the type of forming. Why are these verbs irregular. Chapter 2. Poems. Chapter 8. Quotes. Chapter 7. Past participlePart 2. Puzzles, games, exercisesAppendices. I group list. Ii group list. Iii group list.
The English Tenses Practical Grammar GuideEnglish Lessons Brighton #ad - How do english speakers use two tenses to mean the same thing? Why do the rules not always apply? This bestselling grammar guide reveals all. Exploring the usage patterns of the 12 key tenses of the English language, this book covers all the rules and patterns for the past, present and future in simple, continuous and perfect forms.
As well as seeing how to build the tenses, you'll learn how English speakers really use them. The english tenses: practical Grammar Guide is ideal as either an accompaniment to core texts or as a full self-study guide. It introduces the reader to flexible uses of the English tenses, easy-to-follow explanations, with simple, colourful examples and enlightening comparisons.
The English Tenses Practical Grammar Guide #ad - To continue your journey towards mastering English grammar, get The English Tenses now. Quickly discover the many uses of the English tenses.
English Grammar: The Verb TensesSam An Teng #ad - It highlights the sentence constructions, explanations, key usages, and comparisons of each tense with comprehensive examples. The book guides learners to the verb tenses present, past, and future in English grammar.
150 English Prepositions#ad - Verbs without prepositionsPart 4. Prepositions of place and movement illustratedChapter 2. 2. Prepositions of means, Chapter 2. 5. Verb+prepositionChapter 3. 6. Adjective/participle+preposition Chapter 3. 5. The guide is addressed to all those who begin or continue studying English. Preposition+gerund Chapter 3. 3. Prepositions in the alphabetical orderPart 2.
Prepositions of support, concession, reference, exceptionPart 3. Prepositions of reason, consequenceChapter 2. 6. ConstructionsChapter 3. 1. All the prepositions and their meanings were checked in several dictionaries. Contents:IntroductionPart 1. Prepositions of time illustratedChapter 2. 4. Groups of prepositions Chapter 2.
150 English Prepositions #ad - 1. Preposition+noun Chapert 3. 2.
Parts of Speech in EnglishSam An Teng #ad - Parts of Speech in English #ad - This book is designed for writers and learners who wish to improve their grammar skills. It includes analyses, usage guides, explanation, and varied examples each word class. Highlighted features: • definitions and explanations • Functions in sentences • Usage tips • Additional examples.
Word Order in English SentencesEnglish Lessons Brighton #ad - A complete foundation in word order and sentence structure for the English language, Word Order in English Sentences is a full self-study guide that takes you from the basic rules through to flexible structures. The rules and patterns are all demonstrated through easy-to-follow explanations with clear, engaging examples.
Word Order in English Sentences #ad - This concise grammar guide is a must-have for starting students and language enthusiasts alike. As well as learning the standard building blocks of English, you’ll find the answers to positioning adverbial phrases building complex sentences, with exercises to test understanding. Phil williams takes you beyond the basics to make advanced English accessible for everyone - try it today.
1 bestseller - grammar#1 bestseller - english as a foreign language Want to master the basics of English structure?Do you fully understand ‘subject-verb-object’?Can you rearrange clauses confidently?This book explains all.
Phrases and Clauses in EnglishSam An Teng #ad - This book aims to provide basic knowledge of the sentence building blocks, phrases and clauses. Each lesson includes explanation, examples, and usages which are useful for you to improve your English and writing skills.
Spoken English in Dialogues: 833 common English sentences used by native speakers in everyday life situations#ad - Spoken English in Dialogues: 833 common English sentences used by native speakers in everyday life situations #ad - Do you know some english but still have trouble expressing yourself in social situations? If yes, then this is the right book for you to improve your daily English conversation skills. The book presents a lot of valuable phrases and sentences you will never think of unless you come across them. It contains plenty of common sentences used by native English speakers in everyday life.
The book covers topics such as meeting new people and making small talk, emergency situations and doctor’s appointments, car and flat rental, staying in hotels and traveling by air, dating and visiting friends, shopping and bargaining.
Complete English Grammar Rules: Examples, Exceptions, Exercises, and Everything You Need to Master Proper Grammar The Farlex Grammar Book Book 1Farlex International #ad - Farlex brings you the most comprehensive grammar guide yet: all the rules of English grammar, explained in simple, easy-to-understand terms. Don't rely on multiple incomplete textbooks that contradict each other—fill in all the gaps in your grammar knowledge with one go-to guide. Finally, all the rules of English grammar in one comprehensive book, explained in simple terms.
The grammar book for the 21st century has arrived, from the language experts at Farlex International and TheFreeDictionary. Com, the trusted reference destination with 1 billion+ annual visits. Only complete english grammar rules gives you key exceptions, common grammar mistakes, thousands of real-world examples, and hundreds of grammar quizzes designed to help you retain what you've learned.
Complete English Grammar Rules: Examples, Exceptions, Exercises, and Everything You Need to Master Proper Grammar The Farlex Grammar Book Book 1 #ad - With complete english grammar rules, you'll be able to: • Quickly master basic English grammar and tackle more advanced topics. Properly use every type of noun, verb, and even the most obscure grammar elements. Master verb tenses, including irregular verbs and exceptions. Over 500 pages of proper grammar instruction—2x more than the leading grammar book! Whether you're an expert or a beginner, there's always something new to learn when it comes to the always-evolving English language.
Avoid embarrassing grammar errors. Immediately put your skills into action! Become a more effective writer and communicator in school, at work, and in everyday conversation.
Building Better SentencesSam An Teng #ad - Building Better Sentences #ad - The last part highlights the common errors which might occur while writing sentences and how to fix those errors. The book features three important parts. The book is a simple guide for writers at sentence level. The first part which include unit 1 and 2 explain what the sentences are, their types, and what they are made of — the elements of sentences.
The second part which contain unit 3 to 6 elaborate the structures of the sentences and the common patterns of the sentences — the way in which sentence elements are arranged to form sentences.
How to Start a Sentence: Words to Begin Sentences English Daily Use Book 1Manik Joshi #ad - Butthis is not hard and fast rule. So, you can use 'and' or 'But' to begin a sentence. They mightbe words formed from verbs, -ed, ending in -ing, -en, etc. Particularly in spoken English, starting a sentence with 'And' or 'But' is common. How to start a sentence -- Using 'AS'As a matter of fact no notice was given to anyone.
As a policeman myself, I am aware of all the laws. As against last time four days, the fair will last for five days this year. As always, he won the match. As an interim arrangement, we directed the authorities not to return the land. As fate would have it, he crossed the international border. As for david, he is doing fine.
How to Start a Sentence: Words to Begin Sentences English Daily Use Book 1 #ad - As he got busy, she picked up his son. As he grew older, he developed his communications skills. As if the bad power situation in the city wasn't enough, the hike in power tariff has come as the last straw for residents. As in the past, party president distanced herself from the government's unpopular decision.
As long as here is violence by unruly mobs, use of police force is inevitable. As often happened, he forgot to send me reply. As part of the deal, they will hand-over control of five west bank towns. | https://q9prodexto.com/352-english-irregular-verbs-practice-book/ |
Brazil's monetary experience during the last four decades is a classic example of how harmful uncontrolled monetary growth can be for the overall economy. Rapid economic growth in the early 1970s was driven by increasing public spending and growing public indebtedness. This pattern of economic growth had become unsustainable by the end of the 1970s and early 1980s and the government increasingly resorted to monetising the deficit in an effort to sustain economic growth. Consequently, annual rates of growth of broad money escalated from 50% in 1978 to a ten-year peak of 309.4% in 1985, eventually resulting in the default on the external debt in 1987. With such rates of growth of money, not surprisingly the economy suffered from very high inflation rates in the 1980s and even hyperinflation in 1989, 1990 and 1992.
In 1994 a new economic plan was introduced in an effort to stabilise the value of the new currency (the Real) and thus to be able to attract foreign investment again. Annual broad money growth was cut from 1,214.2% in 1994 to 45% in 1995, and inflation was kept in check for the first time in decades. A few years later, the central bank was given an inflation target and the country has experienced much more stable rates of growth of broad money since the early 2000s and thus more moderate rates of inflation with an average rate of growth of CPI prices close to 6%. Since 1994, this new monetary framework allowed the economy to experience a period of continuous growth which lasted two decades, only coming to an end in 2014. | https://www.mv-pt.org/brazil |
The State of Privacy in the Philippines is the result of an ongoing collaboration by Privacy International and Foundation for Media Alternatives.
Key privacy facts
1. Constitutional privacy protection: The constitution contains an explicit protection of the right to privacy (Art. III, section 3).
2. Data protection law: The Philippines have a data protection law, the Data Privacy Act of 2012.
3. Data protection agency: The Philippines have a data protection agncy, the National Privacy Commission.
4. Recent data breach: In March 2016, the Philippines were targeted with what was dubbed at the time the biggest breach in history concerning government-held data. The personal information of over 55 million Filipino voters were leaked following a breach on the Commission on Elections' (COMELEC's) database.
5. ID regime: The Philippines is currently working on the implementation of a new ID system.
Right to Privacy
The constitution
Communications surveillance is embodied or dealt with in various laws and rules, mostly involving penal statutes or otherwise bearing upon the privacy of communication (or communication privacy) which is a distinct species of privacy recognized in Philippine jurisprudence.
The term “communications surveillance” is not (yet) defined in Philippine law. Nonetheless, it is generally regarded as an act or activity that is proscribed or restricted by law. Such a conception is derived from the express recognition of “the privacy of communication and correspondence” in the Bill of Rights or Article III of the 1987 Philippine Constitution. Under Section 3 of the Philippine Charter, communication privacy is inviolable except upon lawful order of the court, or when public safety or order, by law, requires otherwise. Evidence obtained outside of these procedures is inadmissible for any purpose.
Regional and international conventions
The Philippines government is a signatory to a number of international human rights instruments, including:
- the Universal Declaration of Human Rights (UDHR);
- the International Covenant on Civil and Political Rights (ICCPR);
- the International Covenant on Economic, Social and Cultural Rights (ICESCR); and
- the International Convention on the Elimination of All Forms of Racial Discrimination.
Communication Surveillance
Introduction
The Philippines has a total population of over 105, 500,000 people as of November 2017. The country had a national internet penetration figure of 43.5 % in 2016, according to Internet Live Stats. Overall, 45 million people are active Internet users, while 32 million are active mobile internet users. The country ranks first in terms of average number of hours (6.3) spent using the internet per day using a laptop or desktop, according to one study. When access is through a mobile device, Filipinos spend on average 3.3 hours online per day. This is still considered high considering the global median of 2.7 hours. The number of active internet users has grown by 27% over 2016.
Out of 119 million mobile phone subscriptions, 95% are prepaid and 55% have a mobile broadband subscriptions.
The top social platforms in the country are as follows:
- Facebook (26%);
- Facebook Messenger (23%);
- Google+ (17%);
- Skype (16%);
- Viber (14%);
- Twitter (13%);
- Instagram (12%);
- LinkedIn (11%);
- Pinterest (9%) and
- WeChat (9%)
The Philippines is the country where people spend the most time on social media (4 hours and 17 minutes).
Surveillance laws
Interception and surveillance
The protection of the privacy of correspondence is echoed in international human rights instruments like Article 12 of the Universal Declaration of Human Rights and the International Convenant on Civil and Political Rights (ratified by the Philippines in 1986), which form part of Philippine law by virtue of the doctrine of incorporation. According to Section 3, Article II of the Constitution, the Philippines “adopts the generally accepted principles of international law as part of the law of the land”. Privacy of communications would therefore fall within the ambit of the Constitution’s declaration that “the State values the dignity of every human person and guarantees full respect for human rights” (Section 11, Article II).
Communications surveillance, to the extent that it impinges on communications and its attendant rights, may also be limited by the Constitutional provision that directs the State to “provide the policy environment for… the emergence of communication structures suitable to the needs and aspirations of the nation and the balanced flow of information into, out of, and across the country, in accordance with a policy that respects the freedom of speech and of the press” (Section 10, Article XVI, Constitution).
Outside the principles and policy pronouncements in the Constitution, communications surveillance is tackled, explicitly or implicitly, in several statutes or Republic Acts (RA) (Laws enacted by the Philippine Legislature or Congress) that provide a cause of action or remedies for breaches of privacy.
Under the Civil Code of the Philippines (RA 386 (1949)), anyone who “obstructs, defeats, violates or in any manner impedes or impairs” the privacy of communication and correspondence is liable for damages (Article 32).
Elsewhere, communications surveillance may be penalized as a felony or crime. Article 290 of the Revised Penal Code (Act No. 3815 (1930)) punishes any person who seizes the papers or letters of another in order to discover his/her secrets (Art. 290). Under the Electronics Engineering Law of 2004 (RA 9292), any registered electronics engineer or technician may be punished with a fine and/or imprisonment for involvement in “illegal wire-tapping, cloning, hacking, cracking, piracy and/or other forms of unauthorized and malicious electronic eavesdropping and/or the use of any electronic devices in violation of the privacy of another or in disregard of the privilege of private communications” (Section 35).
The Anti-Wiretapping Act of 1965 (RA 4200, entitled “An Act to Prohibit and Penalize Wire Tapping and other Related Violations of the Privacy of Communication, and for other Purposes”) prohibits and penalises wire tapping done by any person to secretly overhear, intercept, or record any private communication or spoken word of another person or persons without the authorisation of all the parties to the communication. Those who knowingly possess, replay, or communicate recordings of wiretapped communications (section 1) as well as those who aid or permit wiretapping (section 2), are likewise held liable. However, RA 4200 provides an exception for instances where a law enforcement officer is authorized by a written order of the Court to perform wire-tapping “in cases involving the crimes of treason, espionage, provoking war and disloyalty in case of war, piracy, mutiny in the high seas, rebellion, conspiracy and proposal to commit rebellion, inciting to rebellion, sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined by the Revised Penal Code, and violations of Commonwealth Act No. 616, punishing espionage and other offenses against national security,” provided that a number of stringent requirements are complied with (Section 3).
On the other hand, in other statutes, communications surveillance is sanctioned as a legitimate law enforcement activity. The Expanded Anti-Trafficking in Persons Act of 2012 (RA 9208, as amended by RA 10364) expressly mandates the Philippine National Police (PNP) and National Bureau of Investigation (NBI) to be the primary law enforcement agencies “to undertake surveillance, investigation and arrest of individuals or persons suspected to be engaged in trafficking” (Section 16(g), RA 9208, as amended by RA 10364. Emphasis added).
In October 2016, a bill to create the Expanded Anti-Wire Tapping Act of 2016 was presented at the Senate. The bill would include additional crimes for which wire-taping could be conducted and allow "law enforcement agencies and the military [...] to prevent and detect crimes by being able to intercept communications, conversations, discussions, data, information, messages in whatever form, kind or nature, spoken or written words through the use of electronic, mechanical or other equipment or device or technology now known or may hereafter be known to science." The bill is currently pending a second reading.
The Human Security Act of 2007 (RA 9372), entitled “An Act to Secure the State and Protect our People from Terrorism”, explicitly allows the surveillance of terrorism suspects and interception and recording of communications “between members of a judicially declared and outlawed terrorist organization, association, or group of persons or of any person charged with or suspected of the crime of terrorism or conspiracy to commit terrorism” upon a written order of the Court of Appeals (Sec. 7, RA 9372), even as it declares that in its implementation “the State shall uphold the basic rights and fundamental liberties of the people as enshrined in the Constitution” (Sec. 2, RA 9372). Similar to the Anti-Wire-Tapping Act, this law mandates compliance with many requirements, from applying for judicial authorization to the deposit and disposition of intercepted and recorded materials (see Sections 7-14, RA 9372). The Human Security Act also prohibits “the surveillance, interception and recording of communications between lawyers and clients, doctors and patients, journalists and their sources and confidential business correspondence”(Sec. 7, RA 9372).
The Anti-Child Pornography Act of 2009 (RA 9775) may be read as effectively facilitating communications surveillance by internet service providers (ISPs) – private entities – since this law requires ISPs, under pain of penalty, to: (1) notify the PNP or the NBI of facts and circumstances indicating that any form of child pornography is being committed using its server, (2) preserve evidence of the same for purpose of investigation and prosecution, and (3) install software to ensure that access to or transmittal of any form of child pornography will be blocked or filtered (Section 9, RA 9775). Ironically, the same provision states that “[n]othing in this section may be construed to require an ISP to engage in the monitoring of any user, subscriber or customer, or the content of any communication of any such person” (Section 9, RA 9775).
Data retention
Data retention is most clearly outlined in the Implementing Rules and Regulations of the Electronic Commerce Act (2000). The original act is intended to provide for the “recognition and use of electronic commercial and non-commercial transactions and documents, penalties for unlawful use thereof and for other purposes” Section 20 of its Implementing Rules and Regulations outlines appropriate forms of data retention and the mandate of “relevant government agencies” to impose regulations on data retention:
“ (a) The requirement in any provision of law that certain documents be retained in their original form is satisfied by retaining them in the form of an electronic data message or electronic document which:
(i) Remains accessible so as to be usable for subsequent reference;
(ii) Is retained in the format in which it was generated, sent or received, or in a format which can be demonstrated to accurately represent the electronic data message or electronic document generated, sent or received; and,
(iii) Where applicable, enables the identification of its originator and addressee, as well as the determination of the date and the time it was sent or received.
(b) The requirement referred to in paragraph (a) is satisfied by using the services of a third party, provided that the conditions set forth in subparagraphs (i), (ii) and (iii) of paragraph (a) are met.
(c) Relevant government agencies tasked with enforcing or implementing applicable laws relating to the retention of certain documents may, by appropriate issuances, impose regulations to ensure the integrity, reliability of such documents and the proper implementation of Section 13 of the Act.”
As part of its regulatory function, the National Telecommunications Commission released a memorandum (MC 04-06-2007) in June 2007 on the data log retention of telecommunications traffic. Section 1 states:
“PTEs shall retain the call data records on voice calls and similar records for non-voice traffic. on-voice traffic includes SMS, MMS and other similar telecommunications services.”
Section 2 states:
“Records indicating traffic data on the origin, destination, date, time, and duration of communications shall be retained within the following periods:
a) two (2) months for non-metered services with fixed monthly charges; b) four (4) months for other telecommunications services not covered in (a); or c) until excused by NTC for records requested in connection with pending complaints.”
A bill - entitled the Big Data Act of 2014 - proposed in June 2014 called for the "establishment of a Big Data Center where large volume of datasets used for research and development and other important purposes will be facilitated and protected." If the bill is passed, the Center would "develop a range of standards and use software and other tools for analytics on massive amounts of data being generated from the use of Internet and other technology." It would also be "responsible for disseminating the knowledge gained from its research activities to stakeholders in both the public and private sectors to strengthen policy making and industrial competitiveness." As of November 2017, the bill is still pending in the committee.
Surveillance Actors
Inteligence and Security Agencies
National Security Council
The National Security Council (NSC) is the lead government agency coordinating the formulation of policies relating to national security (Sec. 3, Chapter 2, Subtitle I, Title VIII, Book IV, Executive Order No. 292 (1987)). It was created through Executive Order No. 330 (s. 1950), and reorganized through Executive Order Nos. 115 (s. 1986), and 34 (s. 2001). Among other things, the Council advises the President on the integration of domestic, foreign, military, political, economic, social and educational policies relating to national security (Sec. 5(1), Chapter 2, Subtitle I, Title VIII, Book IV, Executive Order No. 292 (1987)). It also formulates government policies relating to national security and makes recommendations to the President regarding the same (Sec. 5(3), Chapter 2, Subtitle I, Title VIII, Book IV, Executive Order No. 292 (1987)). It has administrative supervision over the National Intelligence Coordinating Agency (NICA, discussed below), even as the latter may report directly to the President (Sec. 5, Executive Order No. 246 (s. 1987)). Apart from the NICA, the Council also provides guidance and direction to the operations of the Philippine Center on Transnational Crimes (PCTC), and coordinates, at the policy level, the fight against terrorism through the Anti-Terrorism Task Force.
Office of the National Security Adviser (ONSA)
The National Security Adviser is also referred to as the National Security Director (Sec. 8, Chapter 2, Subtitle I, Title VIII, Book IV, Executive Order No. 292 (1987)) or NSC Director General (Executive Order No. 69, s. 2002). As a member of both the NSC and the Council’s Executive Committee, the NSA advises the President on matters pertaining to national security and, when directed by the President, shall see to the implementation of decisions or policies that have a bearing on national security, as adopted by the President or the Council (Sec. 8, Chapter 2, Subtitle I, Title VIII, Book IV, Executive Order No. 292 (1987)). The NSA is also a member of the Presidential Anti-Organized Crime Commission (PAOCC), by virtue of Executive Order No. 8 (s. 1998) (Sec 5).
In 2006, through Executive Order No. 492, the ONSA was accorded the “principal authority to oversee and supervise the implementation of a program to build up, integrate and employ reconnaissance and surveillance capabilities of civilian agencies and armed services”. It was also made “principal adviser on national reconnaissance and surveillance activities” (Sec. 1, Executive Order No. 492, s. 2006). For this purpose, the NSA was tasked to carry out “measures to coordinate inter-agency requirements and supervise the acquisition of reconnaissance and surveillance equipment, including but not limited to unmanned aerial vehicles (UAVs) (Sec. 1, Executive Order No. 492, s. 2006). Accordingly, he was given the authority to coordinate the securing of funds necessary to acquire the required facilities and equipment (Sec. 1, Executive Order No. 492, s. 2006). The EO explicitly mandated the NSA to oversee the formulation of the terms of reference for the joint use of the UAVs, which shall enable the acquisition of the facilities and equipment by allocating the cost among the beneficiary agencies that will have actual use of such resources in their respective operations (Sec. 4, Executive Order No. 492, s. 2006; see also: Sec. 6, Executive Order No. 492, s. 2006).
Under the same EO, the Maritime Aerial Reconnaissance and Surveillance (MARS) Program was established (Sec. 3, Executive Order No. 492, s. 2006). The program is charged with the reconnaissance and surveillance of the country’s maritime zones and terrestrial/land areas, using “modern reconnaissance and surveillance systems” (Sec. 2, Executive Order No. 492, s. 2006). Its objective is “to enhance the national capability to gather near real-time video recording and information for decision-making needs” (Sec. 2, Executive Order No. 492, s. 2006), as well as to “provide law enforcement personnel and ground operators near real-time high accuracy, sustainable capability for reconnaissance and surveillance and dominant situational awareness to swiftly and effectively interdict when an illegal activity occurs” (Sec. 2, Executive Order No. 492, s. 2006). To facilitate the operations of the program, a National Maritime Aerial Reconnaissance and Surveillance Center (NMARSC) was established, through the efforts of the NICA (Sec. 3, Executive Order No. 492, s. 2006). As focal point for national reconnaissance and surveillance activities and operations, the NMARSC is under the supervision and control of the ONSA (Sec. 3, Executive Order No. 492, s. 2006).
In 2007, with the establishment of the National Security Clearance System for Government Personnel with Access to Classified Matters, the ONSA was charged with acting on the recommendations of the NICA as to who shall be granted security clearances (Sec. 2(b), Executive Order No. 608, s. 2007). Decisions by the ONSA in this regard may be appealed to the Office of the President (Sec. 3, Executive Order No. 608, s. 2007).
National Intelligence Coordinating Agency (NICA)
The National Intelligence Coordinating Agency (NICA) functions under the Office of the President, and is under the administrative supervision of the National Security Adviser (Executive Order No. 69, s. 2002; see also: Sec. 5, Administrative Order No. 68, s. 2003). Originally created in 1949 under then President Elpidio Quirino, its current mandate is to be “the focal point for the direction, coordination and integration of government activities involving intelligence, and the preparation of intelligence estimates of local and foreign situations for the formulation of national policies by the President" (Sec. 2, Executive Order No. 246, s. 1987).
In 2002, it was reorganized by then President Gloria Macapagal-Arroyo through Executive Order No. 69. The following year, its role and authority was further strengthened when, through Administrative Order No. 68, its Director General (DG-NICA) was assigned as principal adviser to the President on Intelligence (Sec. 1, Administrative Order No. 68, s. 2003). The DG was also tasked to establish the Directorate for Counterintelligence, which now serves as the focal point for the national government’s counterintelligence activities and operations. Three other offices were also created to further assist the NICA in its mandate:
- the National Intelligence Committee, which serves as an advisory board to the DG (Sec. 2, Administrative Order No. 68, s. 2003);
- the Counter-Terrorism Intelligence Center, a multi-agency body under the direct control of the DG, which provides “over-all coordination in the conduct of intelligence operations to facilitate gathering, processing, disseminating and sharing of intelligence on terrorism, especially on international terrorism”(Sec. 3, Administrative Order No. 68, s. 2003); and
- Area Counter-Terrorism Intelligence Centers (Area CTICs), which are principally tasked to “capture and fuse at the operational and tactical levels the intelligence outputs, with emphasis on domestic and international terrorism, of all intelligence agencies-- civil, military and police-- in their respective areas of operations”(Sec. 3, Administrative Order No. 68, s. 2003).
The NICA may detail “liaison officers” to other government offices both inside and outside the country (Sec. 3, Administrative Order No. 68, s. 2003). In fact, as regards its foreign liaison program, it coordinates the same with other government agencies that regularly post representatives overseas (Sec. 4, Administrative Order No. 68, s. 2003). At the same time, through its DG, it is also expected to establish and strengthen liaison work between the agency and its foreign counterpart intelligence and security organizations (Sec. 4, Administrative Order No. 68, s. 2003).
In 2006, the NICA was designated as the technical operator of the Maritime Aerial Reconnaissance and Surveillance (MARS) Program (Sec. 3, Executive Order No. 492, s. 2006). This authorized the Agency to “procure UAVs or enter into lease agreements governing such vehicles” (Sec. 3, Executive Order No. 492, s. 2006).
The following year, the NICA was tasked to formulate the Implementing Rules and Regulations of Executive Order No. 608, which provided for the establishment of a national security clearance system for all government personnel with access to classified materials. Under the EO, the Agency was tasked to receive the names of personnel granted by their respective agencies Interim Security Clearances (Sec. 2(a), Executive Order No. 608, s. 2007). From the list of names, it was expected to recommend to the ONSA who among the individuals shall ultimately be given Security Clearances (Sec. 2(b), Executive Order No. 608, s. 2007). For this purpose, the Agency was authorized to conduct further background investigation on the personnel involved, on its own or by acting upon a request (Sec. 2(a), Executive Order No. 608, s. 2007).
In 2011, The DG of the NICA was made a member of the Presidential Anti-Organized Crime Commission (PAOCC), by virtue of EO No. 46 (s. 2011), which amended EO No. 799 (s. 2009) (Sec. 1).
National Intelligence Committee (NIC)
The NIC is an advisory body to the DG-NICA for the “coordination, integration and fusion of all intelligence activities relating to the preparation of the National Intelligence Estimate (NIE) and in addressing other issues of national intelligence concern” (Sec. 2, AO No. 68 (s. 2003)).
With the DG-NICA as Chair, its membership include: (1) Undersecretary for Policy, Department of Foreign Affairs; (2) Director, National Bureau of Investigation; (3) Commissioner, Bureau of Customs; (4) Commissioner, Bureau of Immigration; (5) Deputy Chief of Staff for Intelligence, J2, Armed Forces of the Philippines; (6) Director for Intelligence, Philippine National Police; and the (7) Commanding Officer, Presidential Security Group (Sec. 2, AO No. 68 (s. 2003)).
The NICA is assisted by Regional Intelligence Committees (RICs), whose mandate is to coordinate the efforts of all government intelligence units and agencies at the regional and local levels to ensure the integration and fusion of all information of national intelligence concern gathered at the aforesaid levels.
National Intelligence Board (NIB)
The NIB is another advisory body to the DG-NICA for the coordination and integration of intelligence activities in the Government (Sec. 6, EO No. 246 (s. 1987); see also: Sec. 5, AO 217 (s. 1991)). Its members are appointed by the President, although the National Security Director/Adviser may sit in all meetings of the Board (Sec. 6, EO No. 246 (s. 1987); see also: Sec. 5, AO 217 (s. 1991)). Through Administrative Order No. 217 (s. 1991), the membership of the NIB was expanded to include twelve (12) civilian agencies and seven (7) military offices (Sec.1).
As in the case of the NIC, the DG-NICA is also the Chairperson of the NIB (Sec. 3, AO 217 (s. 1991)). The presence of the National Security Adviser/Director in all meetings of the Board is mandatory Sec. 4, AO 217 (s. 1991)).
In relation to the NIC, the Board shall utilize the NIC as its principal arm for purposes of “providing direction and control of intelligence operations and activities of NIB members, departments, agencies, and offices (Sec. 5, AO 217 (s. 1991)).
Intelligence Service, Armed Forces of the Philippines (ISAFP)
The ISAFP is one of the AFP-Wide Support and Separate Units (AFP-WSSU).
A “New Agency”
In April 2014, some reports revealed a purported plan by the government to create a new intelligence agency akin to that of the U.S. Defense Intelligence Agency. This new spy institution will supposedly incorporate the ISAFP, effectively making the unit an integral part of the defense department. It will engage in the “gathering and analysis of security-related foreign, domestic, political and economic, industrial, geographic, military and civilian intelligence data.” Sources privy to the matter have recently indicated that this plan has been scuttled because of fundamental differences between the merging institutions.
Law Enforcement
Directorate for Intelligence (Directorial Staff), Philippine National Police
Little is known about this Directorate.
Police Intelligence Group (Operational Support Unit) Philippine National Police
The Police Intelligence Unit is one of several operational support units of the PNP (Sec. 2, AO No. 68 (s. 2003); Sec. 35, Republic Act No. 697). Headed by a Director with a rank of chief superintendent, the PIU serves as the intelligence and counterintelligence operating unit of the PNP (Sec. 35(b)(2), Republic Act No. 6975). According to at least two news reports, this unit (specifically, its counter-intelligence component) is also charged with providing physical security to police camps, as well as official documents of the PNP; it also monitors the illegal activities of certain police officers.
Philippine National Police
The Anti-Cybercrime Group (ACG) was activated in March 2013, pursuant to Section 10 of the Cybercrime Prevention Act, which provides that the PNP, along with the National Bureau of Investigation (NBI), shall “organize a cybercrime unit or center manned by special investigators to exclusively handle cases involving violations” of the law. Today, it serves as the primary police unit responsible for the implementation of pertinent laws on cybercrimes and anti-cybercrime campaigns of the PNP and the national government. The Group focuses on cybercrime offenses, computer-related offenses, and other content-related offenses such as cybersex, child pornography, unsolicited commercial communication, and other related offenses.
Office of the Deputy Director for Intelligence Services, National Bureau of Investigation
The Intelligence Services units falling under this Office include: (1) Counter Intelligence Division (CID); (2) Criminal Investigation Division (CRID); and the Technical Intelligence Division (TID).
Cyber Crime Division (CCD), National Bureau of Investigation
The CCD falls under the Office of the Deputy Director for Investigation Services. Presumably, the establishment of this division was also brought about by the need to comply with Sec. 10 of the Cybercrime Prevention Act.
Surveillance capabilities
IMSI Catchers
In April 2014, The Tribune reported that the Philippine government Department of National Defense (DND) had acquired a 135 million peso (US$ 3.4 million) surveillance equipment surfaced. Supposedly covered by a 26 October 2011 purchase request, the device was described as a “Radio Frequency Test Equipment” (RFTE) provided by Rohde & Schwarz (R&S), an electronic surveillance company based in Germany. Rohde & Schwarz specializes in military and dual-use equipment, including spectrum analysers and encrupted communications systems.
According to media reports, the equipment would have the capability to hone in on and intercept calls and text messages sent within a 500-metre radius of the device. The revelation prompted concerns by opposition groups that the government would use the technology to spy on them. The government denied these claims.
According to documents obtained by Privacy International, a UK-based company sought two export licenses for “telecommunications interception equipment”, most likely for IMSI catchers, to the Philippines in 2015. An IMSI Catcher is a phone monitoring kit that provides active intercept capabilities. Traditionally, IMSI Catchers (or Stingrays as they are known in the US) can capture a number of different pieces of identifiable information including the IMEI and the IMSI: identifiers for your phone and SIM card respectively. IMSI Catchers can also record voice and message data as they travel through mobile networks.
In February 2018, it was revealed that the UK had sold £150,000 worth of spying equipment, including IMSI catchers in 2016.
Intrusion Malware
The Philippines government reportedly sought to acquire an intrusion malware tool, the Remote Control System, from Italian surveillance company Hacking Team. RCS is used to monitor a particular device through the direct installation of a malicious program on a target's device, usually by way of fallacious updates, fake websites, or false documents that a target is encouraged to download, inadvertently allowing the RCS tool to infect his or her device.
Documents leaked from Hacking Team in 2015 revealed a significant amount of interest from several parties purporting to represent different agencies of the Philippine government.
On 13 March 2011, an individual claiming to belong to the National Bureau of Investigation’s (NBI) Cyber Center, working under of the Office of the Director, reached out to the company seeking a proposed solution to a potential “cyber attack offensive”, similar to what was then a common occurrence in Australia. Hacking Team responded to this request by outlining the salient features of the RCS.
FMA reported that in January 2013, an individual named “Gadburt Mercado” began communicating with Daniel Maglietta, Chief of HT’s Singapore Representative Office, to set up a product demonstration meeting between HT executives and Mr. Mercado’s supposed principal, Col. Manuel Lucban, Chief of Police of Makati City. Spanning a period of more than a year, the email thread suggests that no actual meeting took place during such time due to the conflicting schedules of the parties.
In March 2015, a person claiming to be an officer of the Intelligence Services of the Armed Forces of the Philippines (ISAFP) relayed his unit’s interest in the capabilities of HT’s Galileo Remote Control System. He requested additional information from the company, as well as a product demonstration.
US government surveillance
The US government conducts extensive surveillance activities in and around the Philippines that it justifies in part in relation to its activities against Islamist militant groups in the “war on terror”. These include joint military exercises with the Philippine military. A downed US military surveillance drone was discovered in the Philippines' restive Quezon province in early 2015, according to the Philippines Daily Inquirer. The embassy responded that the drone was an “expended” aerial target launched during military exercises,during September 2014 off the coast of Guam.
The US has also been conducting large-scale interception of communications in and out of the Philippines. Documents released by Edward Snowden in May 2014 show that the US National Security Agency (NSA) had "access via DSD asset in a Philippine provider site. Collects Philippine GSM, short message service (SMS) and Call Detail Records.” This, the NSA predicted “[w]ill soon become a source of lucrative intelligence for terrorist activities in Southern Philippines.” The 2013 project codenamed MYSTIC, involved the interception of large amounts of the communications of five countries, including the Philippines, from undersea cables.
Surveillance oversight, checks and balances
In addition to the safeguards apparently built in the abovementioned laws, there are other laws and rules that can serve to counter or check the conduct of communications surveillance permitted by the foregoing.
The Rule on the Writ of Habeas Data (A.M. No. 08-1-16-SC) issued by the Supreme Court in 2008 provides the writ as a remedy available to persons whose right to privacy in life, liberty, or security is violated or threatened by an unlawful act or omission of a public official or employee, or of a private individual or entity engaged in the gathering, collecting, or storage of data or information regarding his person, family, home, and/or correspondence (Sec. 1, A. M. No. 08-1-16-SC). The writ of habeas data basically enables people to find out what information is being collated about them by law enforcement agencies as well as by private entities, and the use and purpose of collecting it. The petitioner may then seek such reliefs as the updating, rectification, suppression, or destruction of the database or information or files kept by the erring party, or, in the case of threats, an order enjoining the act that is the subject of the complaint (Sec. 6, Sec. 1, A. M. No. 08-1-16-SC).
Examples of surveillance
The most controversial case of communications surveillance in the Philippines to date is the “Hello Garci” scandal which involved former President Gloria-Macapagal Arroyo and one election commissioner. The wiretapped conversation concerned an electoral fraud in favor of Arroyo which was purportedly committed during the 2004 Presidential Elections.
The source of the copy of the wiretapped conversation never became clear. Several personalities, both from the administration and the opposition, presented their own copy of the record but no one claimed actual ownership. An agent of the Intelligence Service of the Armed Forces of the Philippines (ISAFP) admitted his involvement in the surveillance operation dubbed “Project Lighthouse” and pointed the Military Intelligence Group 21 of the AFP as the unit that carried out the activity. An employee of a local telecommunications company was also implicated in the wiretapping. However, the company denied its knowledge of the operation.
Another former President became subject to at least two surveillance-related incidents. In 1986, during her visit to the U.S., Corazon Aquino’s conversation with two Cabinet members regarding the impact of the new constitution was recorded. The conversation reflected the concerns of the administration regarding the impact of the ban of nuclear weapons on the existence of U.S. military bases in the country. The transcript of the recording was leaked by the opposition days before the ratification of the new constitution.
The second incident was in 2007 wherein a surveillance equipment was found near her private residence. The police and again, the ISAFP and another telco employee were implicated in the illegal activity, but they denied their involvement. No clear reason was given for the intercept.
Another confirmed wiretapping incident occurred in 2008, when the phone conversation between two witnesses to a graft-laden, albeit botched, government project with China was captured on record. While no one admitted to carrying out the surveillance operation, a copy of the recording wound up in the hands of the chairman of the elections commission, who was then being implicated in the controversial project. The witnesses accused the official of attempting to dissuade them from testifying by threatening to make public their private conversation. As they went ahead with their exposé, the recording ended up being posted online in YouTube.
Guillermo Luz, a prominent business executive and a known critic of the administration, filed petitions for the writs of Habeas Data and Amparo with the Supreme Court in order to stop the government from conducting state-sponsored military surveillance he believed he was then subject to. His cases were granted but brought to the appellate court for hearing. The case closed after the AFP declared that he was not under any surveillance or case-building activity.
Other reported cases of wiretapping were false alarms. In one case, a legislator was accused of having violated the law after recording an executive session of a Congressional committee. In another, a government executive filed charges against a well-known Filipino journalist for allegedly recording their phone conversation without her consent. Both incidents were eventually resolved, with no case being filed against the legislator, while that filed against the journalist was later dropped, after prior consent of the complainant was properly established.
Data Protection
Data protection laws
The Data Privacy Act of 2012 (RA 10173) (“DPA”) is another potential source of legal remedies against communications surveillance. It is not primarily concerned with communication privacy, let alone, communication surveillance, dealing, as it does, with data privacy which is a distinct category of privacy. However, the law includes in its scope privileged information, a term it defines as “any and all forms of data which under the Rules of Court and other pertinent laws constitute privileged communication"(Sec. 3(k), Republic Act No. 10173. Emphasis supplied). As a result, any Philippine legal regime purporting to govern communication privacy (and communication surveillance, by extension) must include the DPA as a component.
The DPA establishes the general rule that the processing of privileged information (i.e., privileged communication) is a prohibited activity (Processing is defined as referring to “any operation/set of operations performed upon personal information including, but not limited to, the collection, recording, organization, storage, updating, or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data” (Sec. 3 (j), RA 10173). It does, however, provide certain exceptions (Sec. 13, Republic Act No. 10173):
- when all the parties to the exchange have given their consent prior to the processing;
- when the processing is authorized by existing laws and regulation, provided that:
- the authorizing law/regulation guarantees the protection of the privileged information, and
- the authorizing law/regulation itself does not require the consent of the parties to the exchange
- when the processing is necessary to achieve the lawful and noncommercial objectives of public organizations and their associations, provided that all of the following conditions are present:
- the processing is limited to the members of the public organization/association involved;
- the sensitive personal information is not transferred to third parties; and
- the consent of the data subject is secured
- when the processing is necessary for purposes of medical treatment, which is carried out by a medical practitioner or a medical treatment institution, and the processing ensures an adequate level of protection
- when the processing concerns sensitive personal information which is necessary for (a) the protection of lawful rights and interests of natural and legal persons in court proceedings, or (b) the establishment, exercise or defense of legal claims
- when the sensitive personal information is to be provided to the government or a public authority
Notwithstanding these exceptions, the law does grant personal information controllers the ability to invoke the “principle of privileged communication” over the privileged information that they have in their lawful control or possession. Presumably, this would render the privileged information inadmissible as evidence in any court or legal proceeding wherein they may be presented (Sec. 15, Republic Act No. 10173).
It is also important to note that the DPA expressly amends Section 7 of the Human Security Act which authorizes the surveillance of terrorism suspects (discussed above) (SEC. 44. Repealing Clause. – The provision of Section 7 of Republic Act No. 9372, otherwise known as the “Human Security Act of 2007", is hereby amended. Except as otherwise expressly provided in this Act, all other laws, decrees, executive orders, proclamations and administrative regulations or parts thereof inconsistent herewith are hereby repealed or modified accordingly).
In August 2016, the National Privacy Commission (NPC) published the Implementing Rules and Regulations of the DPA, after several months of public consultation, involving the Foundation for Media Alternatives. The Rules aim to “enforce the Data Privacy Act and adopt generally accepted international principles and standards for personal data protection.” The Rules are written for both private companies handling personal data but also for the state.
In October 2017, the NPC published its first two memorandum circulars. The first one was on the Security of Personal Data in Government. It defines the duties and responsibilities of government bodies that process personal data. Among those responsibilities is the designation of a Data Protection Officer in charge of conducting Privacy Impact Assessment.
The second circular is on Data Sharing Agreements Involving Government Agencies. It defines data-sharing safeguard that personal information controllers will have to implement for data to be transfer among government bodies.
Examples of data breaches
In March 2016, the Philippines fell prey to what has been dubbed as the biggest breach in history concerning government-held data when the personal information of over 55 million registered Filipino voters were leaked following a breach on the Commission on Elections' (COMELEC's) database. This incident shed light on and directed attention to the extent of personal information being collected and held by government authorities, as well as their capabilities (or the lack thereof) in securing such information. It caused a stir in both local and global news and has developed into the first case for the NPC.
In September 2016, the NPC concluded that:
- There was a security breach that provided access to the COMELEC database that contained both personal and sensitive information, and other information that may be used to enable identity fraud. The personal data included in the compromised database contained passport information, tax identification numbers, names of firearm owners and information about their firearms, e-mail addresses, among others; and
- In addition to the defacement of the COMELEC website on the evening of 27 March 2016, it is reasonably established that access to the database containing personal data occurred in the week before the defacement, from around eight different networks, over four to five days.
A preliminary report identifies two indicators of negligence on behalf of COMELEC:
- The lack of a clear data governance policy, particularly in collecting and further processing of personal data, unnecessarily exposed personal and sensitive information of millions of Filipinos to unlawful access; and
- The vulnerabilities in the website, and failure to monitor regularly for security breaches allowed unlawful access to the COMELEC website.
Accountability Mecanism
i. Freedom of Information
There is currently no FOI law in the Philippines. A consolidated bill was approved by the public information panel and is now with the Committee on Appropriations. It is pending a second reading but has not been included in the Common Legislative Agenda for the 17th Congress.
However, following his election president Duterte signed an Executive Order on FOI. Executive Orders mean FOI requests can only pertain to the work of the executives, and can be ended at any point. The Order contained 11 pages of exceptions.
Identification Schemes
ID cards and databases
The Philippines currently has no national ID card system. However, the National ID bill (House Bill 6221) was approved on third reading by the House of Representatives in September 2017. In October 2018 the Philippine Statistics Authority finalised the implementing rules and regulations for the national ID.
Voter registration
Pursuant to Republic Act No. 10367, voters are required to have their biometrics data (i.e., fingerprints, photograph, and digital signature) captured by the COMELEC before they are allowed to vote. The law considers the absence of biometrics in a voter’s registration record as a ground for the deactivation of an individual as a registered voter. To register to vote, a person has to first establish his or her identity by presenting a valid ID, which may be any of the following:
- Employee’s identification card, with the signature of the employer or an authorized representative;
- Postal ID;
- Person with Disability (PWD) Discount ID;
- Student’s ID or library card, signed by the school authority;
- Senior Citizen’s ID;
- Driver’s license;
- NBI clearance;
- Passport;
- SSS/GSIS ID;
- Integrated Bar of the Philippines (IBP) ID;
- License issued by the Professional Regulatory Commission (PRC);
- Certificate of Confirmation issued by the National Commission on Indigenous Peoples (NCIP) in case of members of ICCs or IPs; or
- Any other valid ID.
Absent these, an applicant may be identified under oath by any registered voter of the precinct where he/she intends to be registered, or by any of his/her relatives within the fourth civil degree of consanguinity or affinity. A registered voter shall only be allowed to identify up to three applicants.
SIM card registration
There is currently a total of 12 bills in the House of Representatives (including House Bill No 5231) and seven bills in the Senate (including Senate Bill No 105) on SIM card registration. The technical Working Group at the House of Rep has consolidated those bills. As of November 2017, the draft has not been publicly released.
Policies and Sectoral Initiatives
Cybersecurity policy
We are not aware of any specific cybersecurity policy in the Philippines. Please send any tips or information to: [email protected]
Cybercrime
Section 12 of the Cybercrime Prevention Act of 2012 (RA 10175) originally authorized law enforcers, “with due cause… to collect or record by technical or electronic means traffic data in real-time associated with specified communications transmitted by means of a computer system,"until this provision, among others, was declared void for being unconstitutional by the Philippine Supreme Court in 2014 (see: Disini, et al. v. Secretary of Justice, et al., G.R. No. 203335 (11 February 2014)).
This Decision ruled upon 15 consolidated petitions seeking to declare several provisions of RA 10175 unconstitutional and void. The Court said that “[t]he authority that Section 12 gives law enforcement agencies is too sweeping and lacks restraint”.) Despite the nullification, however, this law still allows the interception (Interception refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring (Sec. 3(m), RA 10175) of communications and the disclosure (Sec. 14, RA 10175) and preservation (Sec. 13, RA 10175) of computer data (defined in Sec. 3(e), RA 10175.), provided certain requirements are complied with.
Under this law, the disclosure of computer data, that is, an order by law enforcement authorities requiring a person or service provider (defined in Sec. 3(n), RA 10175) to disclose or submit subscriber’s information (defined in Sec. 3(o), RA 10175), traffic data (defined in Sec. 3(p), RA 10175) or other data in his/its possession or control must be: (1) based on a court warrant secured for this purpose; (2) in relation to a valid complaint officially docketed and assigned for investigation; and (3) necessary and relevant for the purpose of investigation (Sec. 14, RA 10175). It must be pointed out, however, that there appears to be no provision for the requirements for the issuance of a court warrant. Requirements for the issuance of a court warrant could originally be found in the last paragraph of Section 12 which was nullified by the Supreme Court in the Disini case.
On the other hand, RA 10175 requires the preservation of data (i.e. traffic data and subscriber information) for a minimum period of six months from the date of the transaction (Sec. 13, RA 10175). Similarly, content data—not specifically defined by the law—shall be preserved for six months from the receipt of an order from law enforcement authorities requiring its preservation (Sec. 13, RA 10175). The law also allows law enforcement authorities to order a one-time extension for another six months, except that once computer data stored by a service provider are used as evidence in a case, the mere furnishing to such service provider of the transmittal document to the Office of the Prosecutor shall be deemed a notification to preserve the computer data until the termination of the case (Sec. 13, RA 10175). Furthermore, the service provider ordered to preserve computer data is directed to keep the order and its compliance confidential (Sec. 13, RA 10175). Again, as in the case of a court warrant, the law does not appear to state any prerequisites for the issuance of the aforementioned orders by law enforcement authorities.
Licensing of industry
Regulatory Bodies
The National Telecommunications Commission is the local telecommunications industry’s regulatory body. Its legal mandate consists of the following:
- Regulation of the installation, operation and maintenance of radio stations both for private and public use;
- Regulation and supervision of the provision of public telecommunications services;
- Management of the radio spectrum; and
- Regulation and supervision of radio and television broadcast stations, cable televisions and pay television.
In pursuit of such objectives, it performs the following functions:
- Granting certificates of Public convenience and Necessity/Provisional Authority to install, operate and maintain telecommunications, broadcast and CATV services;
- Granting licenses to install, operate and maintain radio stations;
- Allocating/sub-allocating and assigning the use of radio frequencies;
- Type-approving/type-accepting all radio communications, broadcast and customer premises equipment;
- Conducting radio communications examination and issue radio operators certificate;
- Preparing, planning and conducting studies for policy and regulatory purposes;
- Monitoring the operation of all telecommunications and broadcast activities;
- Enforcing applicable domestic and international laws, rules and regulations, prosecuting violations thereof, and imposing appropriate penalties/sanctions;
- Issuing licenses to operate land, maritime, aeronautical and safety devices; and
- Performing such other telecommunications/broadcast-related activities as may be necessary in the interest of public service.
Communications Service Providers
Only two companies control the telecommunications industry in the Philippines, Globe Telecoms (Globe) and Smart/Philippine Long Distance Telephone (PLDT).
Globe is the nation's predominant phone service provider with 65.5 million subscribers of a total population of approximately 100 million, as reported in October 2015. Smart, an operator fully owned by PLDT, has approximately 54.5 million subscribers.
E-governance/digital agenda
In 2012, the Data Privacy Act was signed into law, thereby putting into place several data protection standards. The Act applies to “personal information” One of the exemptions cited in the law pertains to “information necessary in order to carry out the functions of public authority which includes the processing of personal data for the performance by the independent, central monetary authority and law enforcement and regulatory agencies of their constitutionally and statutorily mandated functions.”
Nevertheless, the law also contains several provisions that explicitly concern government agencies. For example, it provides the following functions to the Commission: “(d) Compel or petition any entity, government agency or instrumentality to abide by its orders or take action on a matter affecting data privacy; (e) Monitor the compliance of other government agencies or instrumentalities on their security and technical measures and recommend the necessary action in order to meet minimum standards for protection of personal information pursuant to this Act; (f) Coordinate with other government agencies […] on efforts to formulate and implement plans and policies to strengthen the protection of personal information in the country;” The law also contains an entire chapter dedicated to Security of Sensitive Personal Information in Government.
Health sector and e-health
In January 2016, the Department of Health, Department of Science and Technology, and Philippine Health Insurance Corporation signed Joint Administrative Order No. 2016-0002, or the Privacy Guidelines for the Implementation of the Philippine Health Information Exchange (PHIE). The PHIE allows participating health care providers to share health information and harmonizes health data from various electronic medical record (EMR) and hospital information systems. Given that the data collected and processed in the PHIE is both personal and sensitive information, the Privacy Guidelines complement the Data Privacy Act of 2012 and other specific legislation on health privacy in ensuring that the implementation of the PHIE is in line with data protection and privacy principles.
Smart policing
There has been no news regarding the use (or planned use) of predictive policing in the Philippines. Nevertheless, the Philippine National Police currently uses an automated fingerprint identification system (AFIS), which includes the use of a central comprehensive database for criminal identification. The AFIS enables the police to compare fingerprints recovered in a crime scene against those stored in an existing database of both identified and unidentified prints. As of June 2015, the PNP crime laboratory’s database already contained more than 761,000 records.
If you know more about smart policing in the Philippines, please send any tips or information to: [email protected]
Transport
Smart cities
Most smart city initiatives in the Philippines have been implemented by the private sector, sometimes in cooperation with local government units. For instance, the Davao City government tapped IBM Philippines to provide an Intelligent Operations Center platform, which became operational in 2015. The platform “allows the authorized government bodies (including multiple local government agencies such as police, fire, and anti-terrorism task force) to use analytics software and monitor events and operations in real-time.” At the capital, the Metro Manila Development Authority (MMDA) collects and processes traffic data through its Traffic Signalization System (TSS). The TSS uses a monitoring network that initially involved 150 CCTVs in 25 video surveillance locations in Metro Manila. The MMDA also has a mobile application that lets users view real-time traffic information in major roads. A quick look at the app’s download page shows that it requires access to the user’s location.
Migration
High-security passports
The Presidential Communications Operations Office (PCOO) has announced that starting 15 August 2016, the Philippines started issuing new “high-security passports” through an expedited process. PCO Secretary Martin Andanar said that the new passport will include security features and qualities that would prevent incidents of fraud. One such feature is a microchip that contains personal data of the passport holder. There have been no reports, however, as to what types of personal data will be stored in the microchip.
Biometric data
In 2015, FMA reported that the Philippines government was considering adopting PISCES, a US-government developed biometric identification technology at its border points (including the Ninoy Aquino International Airport), as indicated in certain classified documents acquired by privacy activists. PISCES is the acronym for "Personal Identification Secure Comparison and Evaluation System," a customizable software application that provides border control officials with information that allows them to identify and detain or track individuals of interest. The system can be used to quickly retrieve information on persons entering or leaving a particular country.
The US introduced the software in 1997 through its Terrorist Interdiction Program (TIP) “a highly effective, low-cost proven tool in the global fight against terrorism.... [which] ...provides participant countries with the ability to collect, compare and analyze traveler data to assist the country in securing its borders and, if necessary, detain individuals of interest."
In 2004, a local paper quoted a Bureau of Immigration officer stationed at the NAIA making a remark about an impending upgrade of the PISCES program they were then using in the facility. Thus, it is likely that the 2015 document represents either an upgrade of an existing program, or a reintroduction of the program (if its use was discontinued at some point in the past).
Emergency response
On 1 August 2016, 911 was launched as the Philippines’ national emergency hotline. The Department of Interior and Local Government (DILG) said that calling the hotline will connect the caller to emergency, rescue, police, or fire services. The two telecommunications giants in the country have also expressed their support for the initiative.
As of this writing, there has been no information as to how the response center processes and protects the data collected from these calls. Meanwhile, a DILG official has stated plans to include in the emergency response system CCTV that will monitor public places.
Humanitarian and development programmes
One of the more prominent uses of biometric technology in the Philippines is in the welfare services, particularly in the government's Pantawid Pamilyang Pilipino Program. The Department of Social Welfare and Development (DSWD) first launched a biometric payout system for the Program in 2012.
Social media
In 2015, FMA reported capacities that the Philippines government was considering adopting Signal, a software used for large-scale social media analysis, as part of its emergency management and policing.
Initially developed by the New Zealand Police as part of its security measures during the Rugby World Cup hosted by the country in 2011, the application later underwent significant enhancements, owing to the Police’s subsequent partnership with Intergen and Microsoft. Among others, all information gathered by the application are now funneled into a single platform known as Real-Time Intelligence for Operational Deployment (RIOD). This platform is based on Microsoft SharePoint and allows for improved collaboration, process optimization and information discovery. Meanwhile, the Microsoft Azure cloud platform is used to secure real-time intelligence and provide situational awareness on specific incidents. | https://privacyinternational.org/state-privacy/1009/state-privacy-philippines |
Job Description:
-Full Time Open Rank, Open Tenure Faculty Position-Division of Infectious Diseases-Department of Medicine
The UAB School of Medicine, Department of Medicine is currently recruiting a faculty candidate to direct the Division of Infectious Diseases' immunocompromised infectious diseases program, including transplant infectious diseases. This individual will be considered for a tenure track/tenured faculty appointment in the Division of Infectious Diseases. Rank and tenure status will be determined based on qualifications. Salary and start-up package are negotiable. This position is available for Board eligible MDs.
The Immunocompromised ID Consult Service is responsible for seeing all inpatients with immunosuppression not related to HIV disease, including solid organ and bone marrow transplant patients, patients with hematologic malignancies, patients on biologic therapies, and patients with end stage organ disease on advanced modalities of support. This service is staffed by one faculty member and one ID fellow at all times, and provides inpatient consultation and outpatient follow-up. The service performs approximately 900-1000 inpatient consultations annually. UAB functions as a principal tertiary care center for the majority of local and regional hospitals in the Deep South. One of the most active organ transplant centers in the U.S., UAB performs more than 400 solid organ transplant procedures annually, including heart, lung, kidney, pancreas, liver and multi-organ transplants. These activities are consolidated under the UAB Comprehensive Transplant Institute (CTI) led by Dr. Jayme Locke. In addition, UAB performs more than 180 bone marrow transplants annually and sees thousands of patients with hematologic malignancies under the umbrella of the Comprehensive Cancer Center (CCC), led by Dr. Ravi Bhatia. UAB is an emerging center of excellence for advanced modalities of cardiopulmonary support including 50 ECMO patients under a newly created Cardiovascular Institute. Thus, the immunocompromised ID service at UAB services an active and growing patient population.
In addition to this vibrant clinical activity, UAB has a variety of research programs relevant to immunocompromised ID within the ID division led by Dr. Marrazzo, CTI, Department of Microbiology led by Dr. Lund, and the CCC. These include
We seek to recruit a candidate with an outstanding track record of accomplishments in infectious diseases for the immunocompromised host. Key characteristics include excellence in clinical care of patients in the inpatient and outpatient immunocompromised ID setting; communication and leadership skills; commitment to mentoring and education of trainees; and ability to collaborate and engage with interdisciplinary teams across a wide range of medical specialties and health care operations. A history of sustained extramural funding is preferred. Job responsibilities will also include oversight of clinical protocols, consult service, surveillance activities, quality metrics, and participation in relevant hospital, CTI and CCC committees.
The University of Alabama at Birmingham (UAB) is a research university and academic health center that discovers, teaches, and applies knowledge for the intellectual, cultural, social, and economic benefit of Birmingham, the state, and beyond. UAB is internationally renowned for its intensely collaborative culture that has — for more than five decades — produced breakthroughs in education, health care, research, and service. UAB was ranked #1 in the United States, and in the top 10 worldwide, in the Times Higher Education World University Rankings, 2018 Young University Rankings.
UAB Medicine is the third largest public academic medical center in the country, with more than 1,900 beds and almost 18,000 employees. UAB Hospital is the centerpiece of the UAB Health System and is the teaching hospital for the UAB School of Medicine. Situated among major research centers and clinics, UAB Hospital provides patients with a complete range of primary and specialty care services, as well as the most up-to-date treatments and innovations in health care. In addition to UAB Hospital, UAB Medicine includes The Kirklin Clinic of UAB Hospital, UAB Callahan Eye Hospital, as well as several primary and specialty care clinics, a dozen member and affiliate hospitals within Alabama, more than 10 cancer associates in the Southeast, and the Viva Health HMO. | https://careercenter.acil.org/jobs/12942554/school-of-medicine-open-rank-transplant-id-director |
There is no such thing as a "typical Harvard student"
In our admissions process, we give careful, individual attention to each applicant. We seek to identify students who will be the best educators of one another and their professors—individuals who will inspire those around them during their College years and beyond. As we read and discuss your application, here are some things that will be on our minds.
Growth and Potential
- Have you reached your maximum academic and personal potential?
- Have you been stretching yourself?
- Have you been working to capacity in your academic pursuits, your full-time or part-time employment, or other areas?
- Do you have reserve power to do more?
- How have you used your time?
- Do you have initiative? Are you a self-starter? What motivates you?
- Do you have a direction yet? What is it? If not, are you exploring many things?
- Where will you be in one, five, or 25 years? Will you contribute something to those around you?
- What sort of human being are you now? What sort of human being will you be in the future?
Interests and Activities
- Do you care deeply about anything—Intellectual? Extracurricular? Personal?
- What have you learned from your interests? What have you done with your interests? How have you achieved results? With what success or failure? What have you learned as a result?
- In terms of extracurricular, athletic, community, or family commitments, have you taken full advantage of opportunities?
- What is the quality of your activities? Do you appear to have a genuine commitment or leadership role?
- If you have not had much time in high school for extracurricular pursuits due to familial, work, or other obligations, what do you hope to explore at Harvard with your additional free time?
Personal Character
- What choices have you made for yourself? Why?
- Are you a late bloomer?
- How open are you to new ideas and people?
- What about your maturity, character, leadership, self-confidence, sense of humor, energy, concern for others, and grace under pressure?
Contribution to the Harvard Community
- Will you be able to stand up to the pressures and freedoms of College life?
- Will you contribute something to Harvard and to your classmates? Will you benefit from your Harvard experience?
- Would other students want to room with you, share a meal, be in a seminar together, be teammates, or collaborate in a closely-knit extracurricular group?
Our Process
Our admissions process enables us to give deliberate and meticulous consideration of each applicant as a whole person. It is labor intensive, but permits extraordinary flexibility and the possibility of changing decisions virtually until the day the Admissions Committee mails them. This is especially important since we are always receiving new information about applicants.
Of course, no process is perfect. Inevitably, some students who are not admitted will see great success, and even with a 97 to 98 percent graduation rate, some admitted students might have been better served at another institution. We do everything possible to make the best admissions decision for each student.
Here are some additional resources you may wish to review: | https://college.harvard.edu/admissions/apply/what-we-look |
With the myriad of new blockchains coming onto the market each vying for dominance, the issue of cross-chain compatibility only adds to the complexity for the end user.
By first solving the problem of cross-chain compatibility, Nabox strives to become a vital part of the DeFi ecosystem, and gradually serving users in use cases outside of DeFi as well, in their day-to-day lives. Nabox users can manage and sign their digital assets across various chains with a single DID. There are no centralized registration processes on Nabox, and all private keys are managed the user directly.
Our mission is to become the simplest gateway to Web 3.0 for DeFi.
DetailsIEO (DAOStarter Launchpad): Jun 15, 2021 - Jun 15, 2021
IEO (YellowRoad Launchpad): Jun 15, 2021 - Jun 15, 2021
Token supply: 1,000,000,000,000 NABOX
LegalBlockchain Platform: Binance Smart Chain
Registration year: 2018
Token infoTicker: NABOX
Token distribution: | https://cryptototem.com/nabox/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.